๋ณธ๋ฌธ ๋ฐ”๋กœ๊ฐ€๊ธฐ ๋ฉ”๋‰ด ๋ฐ”๋กœ๊ฐ€๊ธฐ
ABOUT

โ˜๏ธ Guleum LAB

sql injection addslash (1)
ํ”„๋กœํ•„์‚ฌ์ง„
๐ŸŒง:
Guluem
๊ฒ€์ƒ‰ํ•˜๊ธฐ
  • ALL (109)
    • WEB (27)
    • MOBILE (23)
    • CLOUD (1)
    • CHALLENGE (43)
    • ETC (15)
ยซ   2025/05   ยป
์ผ ์›” ํ™” ์ˆ˜ ๋ชฉ ๊ธˆ ํ† 
1 2 3
4 5 6 7 8 9 10
11 12 13 14 15 16 17
18 19 20 21 22 23 24
25 26 27 28 29 30 31
Tags
  • nopernik XSS
  • XSS ๊ฒŒ์ž„
  • SQL INJECTION ๊ฒŒ์ž„
  • sql injection ๋ฌธ์ œ
  • xss ํ…Œ์ŠคํŠธ
  • xss ๊ณต๊ฒฉ ์˜ˆ์ œ
  • lord of sql injection
  • xss ์šฐํšŒ
  • xss ์‹ค์Šต
  • xss ๋ž€
  • los ๋ฌธ์ œ
  • xss ๊ณต๊ฒฉ์ด๋ž€
  • cross site scripting
  • sudo.co.il xss
  • rubiya sql injection
more
[LOS] Zombie assassin ํ’€์ด(17)

17๋ฒˆ์งธ ๋ฌธ์ œ์ธ "zombie_assassin"์ž…๋‹ˆ๋‹ค. $_GET['id'] = strrev(addslashes($_GET['id'])); $_GET['pw'] = strrev(addslashes($_GET['pw'])); ์ž…๋ ฅ๋œ ๊ฐ’์„ ๋ฐ›๋Š” ๋ณ€์ˆ˜๋Š” "id"์™€ "pw"๊ฐ€ ์žˆ์Šต๋‹ˆ๋‹ค. "addslashes" ํ•จ์ˆ˜์— ์˜ํ•ด '(์‹ฑ๊ธ€ ์ฟผํ„ฐ), "(๋”๋ธ” ์ฟผํ„ฐ), \(์—ญ ์Šฌ๋ž˜์‰ฌ), null์˜ ์ž…๋ ฅ๊ฐ’์— --> "\"๋ฅผ ์ถ”๊ฐ€ํ•ด์คŒ์œผ๋กœ์จ ๋‹จ์ˆœ "๋ฌธ์ž์—ด"๋กœ ์ธ์‹ํ•˜๊ฒŒ ๋งŒ๋“ค์–ด์ฃผ๊ณ  ์žˆ์œผ๋ฉฐ "strrev" ํ•จ์ˆ˜๊ฐ€ ํฌํ•จ๋˜์–ด ์žˆ์–ด ์ž…๋ ฅ๋ฐ›์€ ๋ฌธ์ž์—ด์„ ์•ž๋’ค๋กœ ๋ฐ”๊ฟ”๋ฒ„๋ฆฌ๊ณ  ์žˆ์Šต๋‹ˆ๋‹ค/ if(preg_match('/prob|_|\.|\(\)/i', $_GET[id])) exit("No Hack ~_~"); if(preg_match('/prob|_|..

CHALLENGE
์ด์ „ 1 ๋‹ค์Œ

  • ๊ธ€์“ฐ๊ธฐ
  • ๊ด€๋ฆฌ
  • ํƒœ๊ทธ
Contact guleum.zone@gmail.com

ํ‹ฐ์Šคํ† ๋ฆฌํˆด๋ฐ”