当前位置:网站首页>An interesting logic SRC mining

An interesting logic SRC mining

2022-06-25 11:18:00 Hetian network security laboratory

 

Today is another day of digging SRC Good day , Ha ha ha ha ~

Discover a system , Go in and have a look ...

Input at will shouj Number and verification code , Catch bao, Modify the return package

Continue to capture packets and intercept , See that a openid

Continue to grab the bag , notice shouj Number and openid In request package , Because it is invalid shouj Number , Although verification code verification can be bypassed , But it must not be that you can't enter the system , At this point, I want to find a valid account on the Internet

Google grammar has gone through a wave , Found something useful , Save it now

Choose one of them shouj Replace with , And then put the bag , View the front page , No reaction

Send to repeater Module to see , I saw this shouj Personal information corresponding to No , By replacing shouj Number , Can see a large number of users' sensitive information , Not just ultra vires , Or unauthorized

It's not over yet , Because the system hasn't entered yet , At this point, I will try to modify it randomly openid Field , Replace the last character with , Pack , I found that I went into the system , Confused and happy

【---- Help network security learn , All the following learning materials are free ! Add vx:yj009991, remarks “ csdn ” obtain !】

 ① Thinking map of the growth path of Network Security Learning

 ② 60+ Network security classic common toolkit

 ③ 100+SRC Vulnerability analysis report

 ④ 150+ Network security attack and defense technology ebook

 ⑤ The most authoritative CISSP Certification test guide + Question bank

 ⑥ super 1800 page CTF Practical skills manual

After arriving here, continue to grab bags , I found another interesting bag , Try the ultra vires test , modify body Number in , Look at the response , Indeed, you can overstep your authority , Ha ha ha , General administrator id No 0 Namely 1 , Change to 1 Try to see if you can overstep your authority to the Administrator , I went to ,1 That's the administrator

Repeat the above method of entering the system , modify openid And replace administrator shouj Number , Finally, I got the permission of the Administrator

The administrator doesn't do whatever he wants , Ha ha ha .......

Today's sharing is here .

More range experiments 、 Network security learning materials , Please click here >>https://www.hetianlab.com/  

原网站

版权声明
本文为[Hetian network security laboratory]所创,转载请带上原文链接,感谢
https://yzsam.com/2022/176/202206251101056709.html