본문 바로가기
[웹해킹]/[SuNiNaTaS]

[Suninatas] 2번

by Hevton 2020. 12. 3.
반응형

시작하자마자 뭔문젠가 5분동안 고민했다.

음?

 

SQL injection을 구현해봐도 먹히질 않길래, 소스를 봤다

<!DOCTYPE html>

<html>
<head>
    <title>Game 02</title>
    <meta http-equiv="Content-Type" content="text/html; charset=utf-8">
    <link rel="shortcut icon" href="/static/img/game.ico" />
</head>
<body>
    <br>
    <br>
    <br>
    <br>
    <br>
    <br>
    <br>
    <form method="post" name="web02">
        <table width="240" cellpadding="0" cellspacing="0" align="center">
            <tr height="30">
                <td colspan="2" bgcolor="cccccc" align="center"><b>LEVEL 2</b></td>
            </tr>
            <tr height="30">
                <td colspan="2" width="100%" class="table_top" align="right">
                    <input type="button" name="main_btn" value="main" style="width: 60" onclick="location.href = '/'">&nbsp<input type="button" name="main_btn" value="Back" style="width: 60" onclick="history.back()"></td>
            </tr>
            <tr height="30" class="table_main">
                <td width="90" align="center" bgcolor="cccccc"><font size="2"><b>ID</b></font></td>
                <td width="150" align="center" bgcolor="cccccc">
                    <input type="text" name="id" style="width: 140"></td>
            </tr>
            <tr height="30" class="table_main">
                <td width="90" align="center" bgcolor="cccccc"><font size="2"><b>PW</b></font></td>
                <td width="150" align="center" bgcolor="cccccc">
                    <input type="password" name="pw" style="width: 140"></td>
            </tr>
            <tr height="30">
                <td colspan="2" align="center" class="table_top">
                    <input type="button" value="Join" style="width: 60" onclick="chk_form()">
            </tr>
            <tr height="30" class="table_main">
                <td colspan="2" align="center" bgcolor="cccccc">Authkey : ?????</td>
            </tr>
        </table>
</body>
</html>
<script>
	function chk_form(){
		var id = document.web02.id.value ;
		var pw = document.web02.pw.value ;
		if ( id == pw )
		{
			alert("You can't join! Try again");
			document.web02.id.focus();
			document.web02.id.value = "";
			document.web02.pw.value = "";
		}
		else
		{
			document.web02.submit();
		}
	}
</script>
<!-- Hint : Join / id = pw -->
<!-- M@de by 2theT0P -->

힌트는 id = pw, 아이디랑 패스워드랑 같아야된다는건가? 싶어서

크롬 개발자도구 콘솔에 들어가서 해당 함수를 id == pw 부분을 id !=pw 로 바꿔준 뒤 아이디와 비밀번호에 동일하게 입력하니 성공.

 

실수로 사진을안찍었네. 어쨋든 클리어!

반응형

'[웹해킹] > [SuNiNaTaS]' 카테고리의 다른 글

[SuNiNaTaS] 6번  (0) 2020.12.05
[SuNiNaTaS] 5번  (0) 2020.12.04
[Suninatas] 4번  (0) 2020.12.03
[Suninatas] 3번  (0) 2020.12.03
[Suninatas] 1번  (0) 2020.12.03