第三题<label>猜猜这是经过了多少次加密?</label>分值: 200

加密后的字符串为:一大串
字符串最后面是=
所以是base64.b64decode编码
究竟为啥有=就是base64咱也不知道 咱也不敢问
咋解密也是从网上随便搜来的我也不会

代码如下

 1 import base64
 2 code = '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'
 3 count = 0
 4 try:
 5     while True:
 6         code = base64.b64decode(code)
 7         count = count + 1
 8 except :
 9     
10     print("经过了" + str(count) + "次加密")
11     print('解密后结果为:' +str(code))

运行结果

 1 经过了20次加密

2 解密后结果为:b'key is jkljdkl232jkljkdl2389' 


 

<label>第五题种族歧视</label>分值: 300

小明同学今天访问了一个网站,竟然不允许中国人访问!太坑了,于是小明同学决心一定要进去一探究竟! 
通关地址
使用培训时学长发的爬取学校官网代码,经过简单改装
把网址改成通关地址,
因为不允许中国人访问的,方式是限制中文,究竟为啥是限制中文 咱也不知道 咱也不敢问
把请求头中的Accept-Language: 删去中文部分,只保留其他文字

修改请求头

1 Host: lab1.xseclab.com
2 User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:66.0) Gecko/20100101 Firefox/66.0
3 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
4 Accept-Language: q=0.5,en-US;q=0.3,en;q=0.2
5 Accept-Encoding: gzip, deflate
6 Connection: keep-alive
7 Upgrade-Insecure-Requests: 1
8 Pragma: no-cache
9 Cache-Control: no-cache

代码如下

1 import requests
2 url = "http://lab1.xseclab.com/base1_0ef337f3afbe42d5619d7a36c19c20ab/index.php"
3 headers = {'Accept-Language': 'q=0.5,en-US;q=0.3,en;q=0.2'}
4 r = requests.get(url,headers=headers)
5 r.encoding = r.apparent_encoding
6 r.encoding = 'utf-8'
7 print(r.text)

运行结果

1 <html>
2          <head>
3         <meta http-equiv="content-type" content="text/html;charset=utf-8">
4     </head>
5     <body>
6         key is: *(TU687jksf6&*

 

 


<label>第六题HAHA浏览器</label>分值: 200

据说信息安全小组最近出了一款新的浏览器,叫HAHA浏览器,有些题目必须通过HAHA浏览器才能答对。小明同学坚决不要装HAHA浏览器,怕有后门,但是如何才能过这个需要安装HAHA浏览器才能过的题目呢? 
通关地址
同第五题一致,这次修改浏览器的请求头User-Agent:后面改成HAHA即可

修改请求头

1 Host: lab1.xseclab.com
2 User-Agent: HAHA
3 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
4 Accept-Language: q=0.5,en-US;q=0.3,en;q=0.2
5 Accept-Encoding: gzip, deflate
6 Connection: keep-alive
7 Upgrade-Insecure-Requests: 1
8 Pragma: no-cache
9 Cache-Control: no-cache

代码如下

1 import requests
2 url = "http://lab1.xseclab.com/base1_0ef337f3afbe42d5619d7a36c19c20ab/index.php"
3 headers = {'User-Agent': 'HAHA'}
4 r = requests.get(url,headers=headers)
5 r.encoding = r.apparent_encoding
6 r.encoding = 'utf-8'
7 print(request.get_header('User-agent'))
8 print(r.text)

运行结果

1 <html>
2          <head>
3         <meta http-equiv="content-type" content="text/html;charset=utf-8">
4     </head>
5     <body>
6         用浏览器才可以!

说明出现了问题

问题分析

1.爬虫被检测?

后来莫名其妙就解决了?我啥也没动?

1 <html>
2          <head>
3         <meta http-equiv="content-type" content="text/html;charset=utf-8">
4     </head>
5     <body>
6         恭喜您,成功安装HAHA浏览器!key is: meiyouHAHAliulanqi

代码还是这个代码

1 import requests
2 url = "http://lab1.xseclab.com/base6_6082c908819e105c378eb93b6631c4d3/index.php"
3 headers = {'User-Agent': 'HAHA'}
4 r = requests.get(url,headers=headers)
5 #r = requests.get(url)
6 r.encoding = r.apparent_encoding
7 r.encoding = 'utf-8'
8 print(r.text)

 


 

 

第七题<label>key究竟在哪里呢?</label>分值: 200

上一次小明同学轻松找到了key,感觉这么简单的题目多无聊,于是有了找key的加强版,那么key这次会藏在哪里呢? 
通关地址
 这次答案藏在了响应头
究竟为啥是在响应头 咱也不知道 咱也不敢问

代码如下

 1 import urllib.request
 2 import random
 3 url="http://lab1.xseclab.com/base7_eb68bd2f0d762faf70c89799b3c1cc52/index.php"
 4 headerUserAgentList=['Mozilla/5.0(compatible;MSIE9.0;WindowsNT6.1;Trident/5.0',
 5 'Mozilla/5.0(Macintosh;IntelMacOSX10.6;rv:2.0.1)Gecko/20100101Firefox/4.0.1']
 6 
 7 randomHeaderUserAgent=random.choice(headerUserAgentList)#随机取值
 8 request=urllib.request.Request(url) #构建请求链接
 9 request.add_header('User-Agent',randomHeaderUserAgent) #添加User-agent
10 response=urllib.request.urlopen(request)
11 print(request.get_header('User-agent'))
12 print(request.headers)#打印请求头信息
13 print(response.headers)#打印响应头信息

运行结果

1 Mozilla/5.0(compatible;MSIE9.0;WindowsNT6.1;Trident/5.0
2 {'User-agent': 'Mozilla/5.0(compatible;MSIE9.0;WindowsNT6.1;Trident/5.0'}
3 Server: nginx
4 Date: Thu, 25 Apr 2019 13:45:04 GMT
5 Content-Type: text/html
6 Transfer-Encoding: chunked
7 Connection: close
8 Key: kjh%#$#%FDjjj
9 Via: 100167

<label>第八题key又找不到了</label>分值: 350

小明这次可真找不到key去哪里了,你能帮他找到key吗? 
通关地址
个人问题暂未发现python方法

第九题<label>冒充登陆用户</label>分值: 200

小明来到一个网站,还是想要key,但是却怎么逗登陆不了,你能帮他登陆吗? 
通关地址
继续修改请求头把COOKIE的0改成1
究竟为啥是在请求头 咱也不知道 咱也不敢问

代码对比

 1 import requests
 2 url = "http://lab1.xseclab.com/base9_ab629d778e3a29540dfd60f2e548a5eb/index.php"
 3 headers = {'Cookie': 'Login=0'}
 4 r = requests.get(url,headers=headers)
 5 #r = requests.get(url)
 6 r.encoding = r.apparent_encoding
 7 r.encoding = 'utf-8'
 8 print(r.text)
 9 
10 import requests
11 url = "http://lab1.xseclab.com/base9_ab629d778e3a29540dfd60f2e548a5eb/index.php"
12 headers = {'Cookie': 'Login=1'}
13 r = requests.get(url,headers=headers)
14 #r = requests.get(url)
15 r.encoding = r.apparent_encoding
16 r.encoding = 'utf-8'
17 print(r.text)

运行结果

 1 <html>
 2          <head>
 3         <meta http-equiv="content-type" content="text/html;charset=utf-8">
 4     </head>
 5     <body>
 6         您还没有登陆呢!                
 7     </body>
 8 </html>
 9 <html>
10          <head>
11         <meta http-equiv="content-type" content="text/html;charset=utf-8">
12     </head>
13     <body>
14         key is: yescookieedit7823789KJ

第十题<label>比较数字大小</label>分值: 100

只要比服务器上的数字大就可以了!
通关地址
根据网站源码可知,只能提交3位数的值
 1 <html>
 2     <head>
 3         <meta http-equiv=Content-Type content="text/html;charset=utf-8">
 4     </head>
 5     <body>
 6                 <form action="" method="post">
 7             <input type="text" maxlength="3" name="v"/>
 8             <input type="submit" value="提交"/>
 9         </form>
10     </body>
11 </html>

传个比三大的就行了

代码如下

1 import urllib.request
2 import urllib.parse
3 url="http://lab1.xseclab.com/base10_0b4e4866096913ac9c3a2272dde27215/index.php"
4 mydata=urllib.parse.urlencode({
5     "v":"99999"
6 }).encode("utf-8")
7 req=urllib.request.Request(url,mydata)
8 data=urllib.request.urlopen(req).read()
9 print(data)

运行结果

 1 b'<html>\n  
 2   <head>\n
 3         <meta http-equiv=Content-Type content="text/html;charset=utf-8">\n   
 4  </head>\n   
 5  <body>\n      
 6           <form action="" method="post">\n     
 7        <input type="text" maxlength="3" name="v"/>\n       
 8      <input type="submit" value="\xe6\x8f\x90\xe4\xba\xa4"/>\n      
 9   </form>\n   
10  </body>\n
11 </html>\n
12 key is 768HKyu678567&*&K'