솔직히 문제 분석하는 것보다 답을 써놓는 게 나을 거 같습니다....
[ 문제 1 ]
https://webhacking.kr/challenge/bonus-6/?get=hehe
[ 문제 2 ]
POST https://webhacking.kr/challenge/bonus-6/lv2.php HTTP/1.1
Host: webhacking.kr
Connection: keep-alive
Upgrade-Insecure-Requests: 1
DNT: 1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Sec-Fetch-User: ?1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site: same-origin
Sec-Fetch-Mode: navigate
Referer: https://webhacking.kr/challenge/bonus-6/?get=hehe
Accept-Encoding: gzip, deflate, br
Accept-Language: ko-KR,ko;q=0.9,en-US;q=0.8,en;q=0.7,lt;q=0.6
Cookie: PHPSESSID=****
Content-type: application/x-www-form-urlencoded
Content-Length: 21
post=hehe&post2=hehe2
[ 문제 3 ]
https://webhacking.kr/challenge/bonus-6/33.php?myip=내 아이피
[ 문제 4 ]
https://webhacking.kr/challenge/bonus-6/l4.php?password=[MD5 해쉬값]
#!/bin/python3
import hashlib
hashlib.md5('hint에 나오는 시간보다 조금 앞'.encode()).hexdigest()
이후 새로고침
[ 문제 5 ]
POST https://webhacking.kr/challenge/bonus-6/md555.php?imget=1 HTTP/1.1
Host: webhacking.kr
Connection: keep-alive
Cache-Control: max-age=0
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/77.0.3865.120 Safari/537.36
Sec-Fetch-Mode: navigate
Sec-Fetch-User: ?1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Sec-Fetch-Site: none
Accept-Encoding: gzip, deflate, br
Accept-Language: en-US,en;q=0.9,ko;q=0.8
Content-type: application/x-www-form-urlencoded
Content-Length: 8
Cookie: PHPSESSID=***; imcookie=1;
impost=1
[ 문제 6 ]
POST https://webhacking.kr/challenge/bonus-6/gpcc.php HTTP/1.1
Host: webhacking.kr
Connection: keep-alive
Cache-Control: max-age=0
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/77.0.3865.120 Safari/537.36
Sec-Fetch-Mode: navigate
Sec-Fetch-User: ?1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Sec-Fetch-Site: same-origin
Referer: https://webhacking.kr/challenge/bonus-6/md555.php?imget=1
Content-type: application/x-www-form-urlencoded
Content-Length: 35
Accept-Encoding: gzip, deflate, br
Accept-Language: en-US,en;q=0.9,ko;q=0.8
Cookie: PHPSESSID=****; test=[자신의 IP 값의 md5 Hash];
kk=[자신의 접속해서 나온 HTTP_USER_AGENT 값의 md5 Hash]
[ 문제 7 ]
자신의 아이피가 www.xxx.yyy.zzz이면
https://webhacking.kr/challenge/bonus-6/wtff.php?wwwwxxxxyyyyzzzz=wwwwxxxxyyyyzzzz
[ 문제 8 ]
https://webhacking.kr/challenge/bonus-6/ipt.php?addr=127.0.0.1
[ 문제 9 ]
#!/bin/python3
t = ""
for i in range(13):
t += chr(97+(i*2))
print(t)
https://webhacking.kr/challenge/bonus-6/nextt.php?ans=acegikmoqsuwy
[ 문제 10 ]
phptester.net 에서 아래의 코드르 넣고 돌려보면 답이 나옴
<?php
$ip = '210.217.38.14';
for($i=0;$i<=strlen($ip);$i++) $ip=str_replace($i,ord($i),$ip);
$ip=str_replace(".","",$ip);
$ip=substr($ip,0,10);
$answer = $ip*2;
$answer = $ip/2;
$answer = str_replace(".","",$answer);
echo $ip;
echo "</br>";
echo $answer;
https://webhacking.kr/challenge/bonus-6/answerip/27577553775_5515510755.php
'WARGAMES > webhacking.kr - old' 카테고리의 다른 글
Webhacking.kr_No37(250) - old (0) | 2020.01.06 |
---|---|
Webhacking.kr_No36(200) - old (0) | 2020.01.06 |
Webhacking.kr_No35(350) - old (0) | 2020.01.06 |
Webhacking.kr_No34(400) - old (0) | 2019.12.31 |
Webhacking.kr_No32(150) - old (0) | 2019.12.31 |
Webhacking.kr_No31(150) - old (0) | 2019.12.31 |
Webhacking.kr_No30(550) - old (0) | 2019.12.31 |
Webhacking.kr_No.29(400) - old (0) | 2019.12.31 |