实验吧CTF练习题---WEB---Forms解析
Posted redhskb
tags:
篇首语:本文由小常识网(cha138.com)小编为大家整理,主要介绍了实验吧CTF练习题---WEB---Forms解析相关的知识,希望对你有一定的参考价值。
实验吧web之Forms
flag值:ctfforms_are_easy
解题步骤:
1、查看页面源代码,从中发现"value=0",并且在框内输入任何东西都没有反应
![技术图片](https://image.cha138.com/20210710/d47ceeb979cb4b63aeb636cfba63cb9d.jpg)
![技术图片](file:///D:/%25E6%259C%2589%25E9%2581%2593%25E4%25BA%2591%25E7%25AC%2594%25E8%25AE%25B0%25E8%25AE%25B0%25E5%25BD%2595%25E8%25B5%2584%25E6%2596%2599/qq47DA65658B77EF870612B0AF231434DC/f33d36356a7445dca459f26fdf138183/34670ef2851440658f41d270881fa288.jpg)
2、打开调试器,找到"value=0"这个位置,把"value=0"改成"value=1"
![技术图片](https://image.cha138.com/20210710/ed9273784a1749f58b114383a0ecfe11.jpg)
![技术图片](file:///D:/%25E6%259C%2589%25E9%2581%2593%25E4%25BA%2591%25E7%25AC%2594%25E8%25AE%25B0%25E8%25AE%25B0%25E5%25BD%2595%25E8%25B5%2584%25E6%2596%2599/qq47DA65658B77EF870612B0AF231434DC/10bb446bd96d4ff3b9146f12b3b1bc51/e16699d358074801b6ca3323b7c1a37e.jpg)
3、在框内随意输出任意字符,反弹出php源码,把a=·····的数字填到框内
![技术图片](https://image.cha138.com/20210710/421a8545fca04cdbb4a3b2e2da344925.jpg)
![技术图片](file:///D:/%25E6%259C%2589%25E9%2581%2593%25E4%25BA%2591%25E7%25AC%2594%25E8%25AE%25B0%25E8%25AE%25B0%25E5%25BD%2595%25E8%25B5%2584%25E6%2596%2599/qq47DA65658B77EF870612B0AF231434DC/287459ddc0f149e28b0e4915ed02627a/7ffb5600dc094a57adb77e68ea8b6f29.jpg)
4、提交反弹flag值,结束
![技术图片](file:///D:/%25E6%259C%2589%25E9%2581%2593%25E4%25BA%2591%25E7%25AC%2594%25E8%25AE%25B0%25E8%25AE%25B0%25E5%25BD%2595%25E8%25B5%2584%25E6%2596%2599/qq47DA65658B77EF870612B0AF231434DC/82bd6bd0c79f4163b986c8a4d8afa1a0/1fcf2e3015b24240935e37aaac5441ea.jpg)
![技术图片](https://image.cha138.com/20210710/a11b0e4449b04535abc5736bd28050b6.jpg)
以上是关于实验吧CTF练习题---WEB---Forms解析的主要内容,如果未能解决你的问题,请参考以下文章