The main question types are WEB and PWN, with most languages being PHP, and a small amount of Java and Python. WEB mainly involves security vulnerabilities in some CMS and frameworks, such as injection, upload, and deserialization, relying more on known vulnerabilities.
Competition Process#
Generally, the competition separates the hardening phase and the attack phase, first unifying the hardening and then proceeding with the attack.
After the competition starts, the account is displayed.
The bugku platform, such as team1 with the password fe85d7dec6e3757f391e013efdd67c0c, and the port is 2222. The server is generally a Linux system, and login tools can use xSHELL, finalSHELL, etc.
The Token is mainly used as a script identity credential for automated submission verification. The virtual IP is the target machine's access URL. Other contestants' addresses are 192-168-x-250.pvp1923.bugku.cn, where x can be any number from 1 to 255.
Site Source Code Backup#
Source code backup can be done using Winscp or FileZilla, but the download may be relatively slow.
A faster method is to directly use tar to package.
The tar backup method is as follows:
Database Backup#
Sometimes there are flags in the database, so it is necessary to back up the database to avoid losing it.
First, find the configuration file and check the account password.
Backup:
Database Password Modification#
Generally, the database password must be modified.
Traffic Monitoring#
Traffic monitoring script. After someone attacks you, record the access information, URL, and use it to attack others.
This type of script is generally placed at the entry file of the CMS.
File Monitoring#
Host Detection#
You can use nmap or httpscan (on your own host).
Local python scan:
Scan Vulnerabilities#
Download the CMS source code vulnerabilities from D 盾,or search for vulnerabilities online based on CMS information.
Install WAF#
If we want to add custom WAF scripts to the web directory files, we can actually solve it with one command, taking PHP as an example:
Backdoor Removal#
Use commands to check for suspicious files:
Fork Bomb#
Input this into bash, recursively creating child processes, resulting in exhausting server resources, making the server unable to provide normal services.