当前位置:网站首页>An interesting logic SRC mining
An interesting logic SRC mining
2022-06-25 11:18:00 【Hetian network security laboratory】
Today is another day of digging SRC Good day , Ha ha ha ha ~
Discover a system , Go in and have a look ...
Input at will shouj Number and verification code , Catch bao, Modify the return package
Continue to capture packets and intercept , See that a openid
Continue to grab the bag , notice shouj Number and openid In request package , Because it is invalid shouj Number , Although verification code verification can be bypassed , But it must not be that you can't enter the system , At this point, I want to find a valid account on the Internet
Google grammar has gone through a wave , Found something useful , Save it now
Choose one of them shouj Replace with , And then put the bag , View the front page , No reaction
Send to repeater Module to see , I saw this shouj Personal information corresponding to No , By replacing shouj Number , Can see a large number of users' sensitive information , Not just ultra vires , Or unauthorized
It's not over yet , Because the system hasn't entered yet , At this point, I will try to modify it randomly openid Field , Replace the last character with , Pack , I found that I went into the system , Confused and happy
【---- Help network security learn , All the following learning materials are free ! Add vx:yj009991, remarks “ csdn ” obtain !】
① Thinking map of the growth path of Network Security Learning
② 60+ Network security classic common toolkit
③ 100+SRC Vulnerability analysis report
④ 150+ Network security attack and defense technology ebook
⑤ The most authoritative CISSP Certification test guide + Question bank
⑥ super 1800 page CTF Practical skills manual
After arriving here, continue to grab bags , I found another interesting bag , Try the ultra vires test , modify body Number in , Look at the response , Indeed, you can overstep your authority , Ha ha ha , General administrator id No 0 Namely 1 , Change to 1 Try to see if you can overstep your authority to the Administrator , I went to ,1 That's the administrator
Repeat the above method of entering the system , modify openid And replace administrator shouj Number , Finally, I got the permission of the Administrator
The administrator doesn't do whatever he wants , Ha ha ha .......
Today's sharing is here .
More range experiments 、 Network security learning materials , Please click here >>https://www.hetianlab.com/
边栏推荐
- A program reflecting the characteristics of C language program structure
- GC
- 子类A继承父类B, A a = new A(); 则父类B构造函数、父类B静态代码块、父类B非静态代码块、子类A构造函数、子类A静态代码块、子类A非静态代码块 执行的先后顺序是?
- XSS attack
- Checking whether the double value is an integer - Swift - checking if a double value is an integer - swift
- Dragon Book tiger Book whale Book gnawing? Try the monkey book with Douban score of 9.5
- GaussDB 如何统计用户sql的响应时间
- Android: generic mapping analysis of gson and JSON in kotlin
- Jincang database kingbasees plug-in identity_ pwdexp
- 今天16:00 | 中科院计算所研究员孙晓明老师带大家走进量子的世界
猜你喜欢
How to start the phpstudy server
SystemVerilog(十三)-枚举数据类型
[observation] objectscale: redefining the next generation of object storage, reconstruction and innovation of Dell Technology
今天16:00 | 中科院计算所研究员孙晓明老师带大家走进量子的世界
基于OpenStreetMap+PostGIS的地理位置系统 论文文档+参考论文文献+项目源码及数据库文件
Geographic location system based on openstreetmap+postgis paper documents + reference papers + project source code and database files
JVM 原理简介
FPGA displays characters and pictures based on VGA
Double buffer transparent encryption and decryption driven course paper + project source code based on minifilter framework
XSS attack
随机推荐
1-7snapshots and clones in VMWare
查询法,中断法实现USART通信
Causes and solutions of over fitting
Explanation and use of kotlin syntax for Android
金仓数据库 KingbaseES 插件DBMS_OUTPUT
2022年PMP项目管理考试敏捷知识点(2)
动态规划解决股票问题(上)
Sign up to open the third session of the "flying oar hacker marathon". It's been a long time
开源社邀请您参加OpenSSF开源安全线上研讨会
Apache ShenYu 入門
Jincang KFS data cascade scenario deployment
16 enterprise architecture strategies
Daily 3 questions (2) - find out the lucky numbers in the array
Kingbasees plug-in DBMS of Jincang database_ OUTPUT
Jincang KFS data centralized scenario (many to one) deployment
Apache ShenYu 入门
Arrays.asList()
Use of comparable (for arrays.sort)
Big Endian 和 Little Endian
NuxtJS实战案例