BUUCTF刷题-Web方向1~5wp
[极客大挑战 2019]EasySQL一个sql注入登录框,直接万能密码登录
https://track123.oss-cn-beijing.aliyuncs.com/20250122154218511.png
拿到flag
https://track123.oss-cn-beijing.aliyuncs.com/20250122154230592.png
[极客大挑战 2019]Havefun
打开环境,没有任何信息,检察源码,发现这么一段代码
https://track123.oss-cn-beijing.aliyuncs.com/20250122155130180.png
GET方式传入一个cat请求,并且变量值为dog,即?cat=dog,得到flag
https://track123.oss-cn-beijing.aliyuncs.com/20250122155320141.png
WarmUp
打开环境,是一张图片,检察源码发现source.php目录
https://track123.oss-cn-beijing.aliyuncs.com/20250122171110792.png
访问该目录,并对源码进行分析
页:
[1]