页面源码
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>404 Not Found</title>
</head>
<body>
<div id='main'><i>
<h2>Something error:</h2></i><p>
<h3>404 Not Found</h3><h3><font color=red>No such file or directory.</font></h3></p><p>Please check or <a href='javascript:location.reload()'>try again</a> later. </p><hr><div id='pb'>Generated by <a href='http://www.kanglesoft.com/?code=404' target=_blank>kangle/3.5.5</a>.
</div></div></html>
这里一个js代码,一个html页面请求
后请求页面打开后
来到这个页面
这是一个正儿八经的官网,回到原页面,抓取原页面的请求报文
GET / HTTP/1.1
Host: 114.67.175.224:16902
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36 Edg/123.0.0.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9,en;q=0.8,en-GB;q=0.7,en-US;q=0.6
Cookie: Hm_lvt_c1b044f909411ac4213045f0478e96fc=1711286763; _ga=GA1.1.52075818.1711286767; _ga_F3VRZT58SJ=GS1.1.1711288951.2.1.1711290145.0.0.0
Connection: close
抓取第一个js链接报文
GET / HTTP/1.1
Host: 114.67.175.224:16902
Cache-Control: max-age=0
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36 Edg/123.0.0.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
Referer: http://114.67.175.224:16902/
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9,en;q=0.8,en-GB;q=0.7,en-US;q=0.6
Cookie: Hm_lvt_c1b044f909411ac4213045f0478e96fc=1711286763; _ga=GA1.1.52075818.1711286767; _ga_F3VRZT58SJ=GS1.1.1711288951.2.1.1711290145.0.0.0
Connection: close
这里就多了两个字段
Cache-Control: max-age=0
缓存控制
Referer: http://114.67.175.224:16902/
这时用来表示请求原页面是哪个
这就有意思了,两个连接没有什么太大作用,提示是需要管理员,难道要伪装身份标识?
要伪装身份标识就要动cookie,但是怎么动呢?也没有提示,先扫一下敏感目录
这里扫到一个文件,那就和cookie没什么关系了?误导呀,那这提示的作用是什么?
访问得到这两个字段,这里看到一个php文件,访问
这里给了一个提示,传递的x参数会当做密码
开始爆破
密码为admin
得到flag