• [BSidesCF 2019]Mixer


    [BSidesCF 2019]Mixer

    • CBC整块替换

    题目给出必须要以admin的身份登陆才可以,然后又提示cookie里有内容

    我们在cookie中找到了user的值

    但是一开始并没看出来是怎么加密的cookie

    在删除了cookie的前两位后,报错

    Uh oh, something went wrong: data not multiple of block length
    

    发现这是cbc加密

    加密前的明文是

    {"first_name":"sdsad","last_name":"asdasd","is_admin":0}'
    

    由于cbc是16字节为一块,所以我们需要构造

    {"first_name":"A
    1.00000000000000
    ","last_name":"x
    xxx","is_admin":
    0}
    

    要求

    第二组是1.00000000000000,因为我们最后要进行替换

    最后一组是0}因为最后要构造闭合,这个要加在1.00000000000000后面,不能出错

    所以最后构造出的其实就是

    {"first_name":"A
    1.00000000000000
    ","last_name":"x
    xxx","is_admin":
    1.00000000000000
    0}
    

    然后我们用first_name=A1.00000000000000 last_name=xxxx登陆,拿到user的cookie

    deda993429b496ae1b10f1b6145f9b40e15c8ab134a0f4b2cad7ec5bf8f5cc35e14765a09e74ee11fb9b62993ff49132ce89bfc14c4061821533da5b49c661db0ee57d3e817f405dbaccd07283c2ff6e
    

    然后利用简单的python脚本拼接出伪造的user

    cookie = "deda993429b496ae1b10f1b6145f9b40e15c8ab134a0f4b2cad7ec5bf8f5cc35e14765a09e74ee11fb9b62993ff49132ce89bfc14c4061821533da5b49c661db0ee57d3e817f405dbaccd07283c2ff6e"
    
    fake_cookie = cookie[:-32]+cookie[32:64]+cookie[-32:]
    print(fake_cookie)
    

    得到伪造的cookie

    deda993429b496ae1b10f1b6145f9b40e15c8ab134a0f4b2cad7ec5bf8f5cc35e14765a09e74ee11fb9b62993ff49132ce89bfc14c4061821533da5b49c661dbe15c8ab134a0f4b2cad7ec5bf8f5cc350ee57d3e817f405dbaccd07283c2ff6e
    

    得到flag

  • 相关阅读:
    Extension Methods (C# Programming Guide)
    ArraySegment
    git config
    0.0.0.0 IPAddress.Any 【】127.0.0.1 IPAddress.Loopback 【】localhost
    public static float CompareExchange(ref float location1,float value,float comparand)
    ConcurrentDictionary中的 TryRemove
    enum类型
    Array.Copy vs Buffer.BlockCopy
    伴随待字闺中的生命周期分析
    Twitter实时搜索系统EarlyBird
  • 原文地址:https://www.cnblogs.com/dongqq/p/13489348.html
Copyright © 2020-2023  润新知