# 题目 1
日志是 nginx 的日志,我用 logparser 进行检索的
请提交攻击者攻击成功的第一时间,格式:flag {YY:MM:DD hh:mm:ss}
C:\Users\Administrator\Desktop\LogParser>LogParser.exe -i:NCSA -q:ON "SELECT DateTime,Request FROM access.log WHERE StatusCode=200 AND Request LIKE '%welcome%' | |
[29/Apr/2023:14:45:23 +0000] GET /manage/welcome.php HTTP/1.1 |
flag: flag{2023:04:29 22:45:23}
# 题目 2
请提交攻击者的浏览器版本 flag {Firgfox/2200}
C:\Users\Administrator\Desktop\LogParser>LogParser.exe -i:NCSA -q:ON "SELECT User-Agent FROM access.log WHERE StatusCode=200 AND Request LIKE '%welcome%' | |
Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/110.0 |
flag: flag{Firefox/110.0}
# 题目 3
请提交攻击者目录扫描所使用的工具名称
C:\Users\Administrator\Desktop\LogParser>LogParser.exe -i:NCSA -q:ON "SELECT DISTINCT User-Agent from access.log" | |
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/112.0.0.0 Safari/537.36 | |
Fuzz Faster U Fool v1.5.0- | |
Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/110.0 | |
Mozilla/5.0 (Windows NT 10.0) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/40.0.2214.93 Safari/537.36 | |
Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:21.0) Gecko/20100101 Firefox/21.0 | |
Opera/9.80 (Windows NT 6.1; U; zh-cn) Presto/2.7.62 Version/11.01 | |
Mozilla/4.0 (compatible; MSIE 10.0; Windows NT 6.1; Trident/5.0) | |
Mozilla/5.0 (Windows; U; Windows NT 6.1; cs-CZ) AppleWebKit/533.20.25 (KHTML, like Gecko) Version/5.0.4 Safari/533.20.27 | |
Mozilla/5.0 (Windows NT 6.2; rv:22.0) Gecko/20130405 Firefox/23.0 | |
Mozilla/5.0 (iPad; CPU OS 5_1 like Mac OS X) AppleWebKit/534.46 (KHTML, like Gecko ) Version/5.1 Mobile/9B176 Safari/7534.48.3 | |
Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2225.0 Safari/537.36 | |
Mozilla/5.0 (Windows; U; Windows NT 6.1; ko-KR) AppleWebKit/533.20.25 (KHTML, like Gecko) Version/5.0.4 Safari/533.20.27 | |
Opera/9.80 (Windows NT 6.0) Presto/2.12.388 Version/12.14 | |
Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10_6_6; en-us) AppleWebKit/533.20.25 (KHTML, like Gecko) Version/5.0.4 Safari/533.20.27 | |
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.8; rv:24.0) Gecko/20100101 Firefox/24.0 | |
Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:25.0) Gecko/20100101 Firefox/25.0 | |
Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:113.0esr) Gecko/20110101 Firefox/113.0esr/wb7yEfvqZUO0-40 |
flag: flag{Fuzz Faster U Fool}
# 题目 4
找到攻击者写入的恶意后门文件,提交文件名(完整路径)
flag: flag{C:\phpstudy_pro\WWW\.x.php}
# 题目 5
找到攻击者隐藏在正常 web 应用代码中的恶意代码,提交该文件名(完整路径)
通过看最近修改日期的方式找到的
flag: flag{C:\phpstudy_pro\WWW\usr\themes\default\post.php}
# 题目 6
请指出可疑进程采用的自动启动的方式,启动的脚本的名字 flag {1.exe}
有个进程叫 360?
直接转到进程程序的目录,发现启动的 bat 脚本
本地策略组自启动
flag: flag{x.bat}