본문 바로가기
반응형

[Dreamhack]WebHacking/로드맵_ClientSide4

[Dreamhack] Level3: CSP Bypass Advanced 🛎️Access Exercise: CSP Bypass의 패치된 문제이다. 👾Exploit Algorithm & Payload 더보기 #!/usr/bin/python3 from flask import Flask, request, render_template from selenium import webdriver import urllib import os app = Flask(__name__) app.secret_key = os.urandom(32) nonce = os.urandom(16).hex() try: FLAG = open("./flag.txt", "r").read() except: FLAG = "[**FLAG**]" def read_url(url, cookie={"name": "name", "val.. 2024. 1. 17.
[Dreamhack] Level2: CSP Bypass 🛎️ Access Exercise: XSS Filtering Bypass의 패치된 문제이다. 👾Exploit Algorithm & Payload 더보기 #!/usr/bin/python3 from flask import Flask, request, render_template from selenium import webdriver import urllib import os app = Flask(__name__) app.secret_key = os.urandom(32) nonce = os.urandom(16).hex() try: FLAG = open("./flag.txt", "r").read() except: FLAG = "[**FLAG**]" def read_url(url, cookie={"name": ".. 2023. 11. 18.
[Dreamhack] Level3: XSS Filtering Bypass Advanced 🛎️ Access Exercise: XSS Filtering Bypass의 패치된 문제이다. 👾Exploit Algorithm & Payload 더보기 #!/usr/bin/python3 from flask import Flask, request, render_template from selenium import webdriver import urllib import os app = Flask(__name__) app.secret_key = os.urandom(32) try: FLAG = open("./flag.txt", "r").read() except: FLAG = "[**FLAG**]" def read_url(url, cookie={"name": "name", "value": "value"}): co.. 2023. 9. 2.
[Dreamhack] Level1: XSS Filtering Bypass 🛎️ Access Exercise: XSS Filtering Bypass에서 실습하는 문제이다. 👾Exploit Algorithm & Payload 더보기 #!/usr/bin/python3 from flask import Flask, request, render_template from selenium import webdriver import urllib import os app = Flask(__name__) app.secret_key = os.urandom(32) try: FLAG = open("./flag.txt", "r").read() except: FLAG = "[**FLAG**]" def read_url(url, cookie={"name": "name", "value": "value"}): .. 2023. 8. 28.
반응형