๋ณธ๋ฌธ ๋ฐ”๋กœ๊ฐ€๊ธฐ ๋ฉ”๋‰ด ๋ฐ”๋กœ๊ฐ€๊ธฐ
ABOUT

โ˜๏ธ Guleum LAB

los 10๋ฒˆ (1)
ํ”„๋กœํ•„์‚ฌ์ง„
๐ŸŒง:
Guluem
๊ฒ€์ƒ‰ํ•˜๊ธฐ
  • ALL (109)
    • WEB (27)
    • MOBILE (23)
    • CLOUD (1)
    • CHALLENGE (43)
    • ETC (15)
ยซ   2025/05   ยป
์ผ ์›” ํ™” ์ˆ˜ ๋ชฉ ๊ธˆ ํ† 
1 2 3
4 5 6 7 8 9 10
11 12 13 14 15 16 17
18 19 20 21 22 23 24
25 26 27 28 29 30 31
Tags
  • sql injection ๋ฌธ์ œ
  • nopernik XSS
  • xss ์‹ค์Šต
  • los ๋ฌธ์ œ
  • xss ๊ณต๊ฒฉ์ด๋ž€
  • xss ๊ณต๊ฒฉ ์˜ˆ์ œ
  • cross site scripting
  • rubiya sql injection
  • xss ์šฐํšŒ
  • xss ํ…Œ์ŠคํŠธ
  • SQL INJECTION ๊ฒŒ์ž„
  • xss ๋ž€
  • sudo.co.il xss
  • lord of sql injection
  • XSS ๊ฒŒ์ž„
more
[LOS] Skeleton ํ’€์ด(10)

10๋ฒˆ์งธ ๋ฌธ์ œ์ธ " skelton "์ž…๋‹ˆ๋‹ค. if(preg_match('/prob|_|\.|\(\)/i', $_GET [pw])) exit("No Hack ~_~"); ๊ฒ€์ฆ๋˜๋Š” ๋ฌธ์ž์—ด์„ ํ™•์ธํ•ด ๋ณด๋ฉด ์ด์ฒ˜๋Ÿผ ํŠน์ˆ˜๊ธฐํ˜ธ ๋ช‡๊ฐœ๋งŒ ๊ฒ€์ฆ์„ ํ•˜๊ณ  ์žˆ์Šต๋‹ˆ๋‹ค. $query = "select id from prob_skeleton where id='guest' and pw='{$_GET [pw]}' and 1=0"; ์šฐ๋ฆฌ๊ฐ€ ์‚ฌ์šฉํ•  ๋ณ€์ˆ˜๋Š” " pw='{$_GET[pw]} " ์ด ๋ถ€๋ถ„์„ ์‚ฌ์šฉํ•˜๋ฉด ๋  ๊ฑฐ ๊ฐ™์ง€๋งŒ " and 1=0 " ์—ฐ์‚ฐ์ž๊ฐ€ ํฌํ•จ๋˜์–ด ์žˆ๊ธฐ ๋•Œ๋ฌธ์— '1'='1' ํ˜•ํƒœ์˜ ์ฐธ๊ฐ’์„ ๋Œ€์ž…ํ•ด๋„ ๊ฑฐ์ง“ ๊ฐ’์œผ๋กœ ์ธ์‹์„ ํ•˜๊ณ  ์žˆ์Šต๋‹ˆ๋‹ค. if($result ['id'] == 'admin') solve("skeleton"); ๋˜ํ•œ ..

CHALLENGE
์ด์ „ 1 ๋‹ค์Œ

  • ๊ธ€์“ฐ๊ธฐ
  • ๊ด€๋ฆฌ
  • ํƒœ๊ทธ
Contact guleum.zone@gmail.com

ํ‹ฐ์Šคํ† ๋ฆฌํˆด๋ฐ”