207 lines
7.4 KiB
Python
Raw Normal View History

2025-02-02 20:43:16 +03:00
import werkzeug
2025-04-10 00:23:44 +03:00
from flask import Flask, render_template, request, url_for, session, redirect, g, abort, send_file, render_template_string
2025-01-25 22:18:21 +03:00
import sqlite3
2025-02-03 00:19:41 +03:00
from random import getrandbits
2025-02-14 13:19:23 +03:00
from func import *
import base64
2025-01-25 22:18:21 +03:00
2025-04-10 00:23:44 +03:00
2025-01-26 22:34:47 +03:00
connection = sqlite3.connect('database.db')
2025-01-25 22:18:21 +03:00
cursor = connection.cursor()
cursor.execute('''
CREATE TABLE IF NOT EXISTS Users (
id INTEGER PRIMARY KEY,
login TEXT NOT NULL,
password TEXT NOT NULL
)
''')
cursor.execute('SELECT * FROM Users where login = "admin"')
2025-01-26 22:34:47 +03:00
if not cursor.fetchone():
2025-01-25 22:18:21 +03:00
cursor.execute('INSERT INTO Users (login, password) VALUES (?, ?)', ('admin', '12345678'))
connection.commit()
2025-01-23 00:19:58 +03:00
app = Flask(__name__)
2025-01-25 22:18:21 +03:00
app.config['SECRET_KEY'] = 'ca4ac4ada05f91a5790d2132992bfaed86df15c4d08f2dfe'
2025-01-26 22:34:47 +03:00
DATABASE = 'database.db'
def get_db():
db = getattr(g, '_database', None)
if db is None:
db = g._database = sqlite3.connect(DATABASE)
return db
@app.teardown_appcontext
def close_connection(exception):
db = getattr(g, '_database', None)
if db:
db.close()
2025-01-23 00:19:58 +03:00
@app.route("/")
def index():
return render_template('index.html')
2025-04-05 22:42:20 +03:00
@app.route("/web")
def web():
return render_template('web-main.html')
@app.route("/forensic")
def forensic():
return render_template('forensic-main.html')
@app.route("/osint")
def osint():
return render_template('osint-main.html')
2025-04-06 21:37:12 +03:00
@app.route("/web/sql-injection", methods=('GET', 'POST'))
2025-04-07 12:23:56 +03:00
def websql():
2025-01-25 22:18:21 +03:00
if request.method == 'POST':
login = request.form['login']
password = request.form['pass']
2025-01-26 22:34:47 +03:00
cursor = get_db().cursor()
2025-01-26 22:50:50 +03:00
cursor.execute(f'SELECT * FROM Users WHERE login == "{login}" AND password == "{password}"')
2025-01-26 22:34:47 +03:00
user = cursor.fetchone()
if not user:
2025-01-27 00:20:55 +03:00
return render_template('sql-injection.html', error='Ошибка: неверный логин или пароль')
2025-02-03 00:19:41 +03:00
session['sql_flag'] = f'C4TchFl4g{{{hex(getrandbits(45))[2:]}}}'
2025-02-02 20:43:16 +03:00
return redirect(url_for('success_login'), code=302)
2025-01-23 00:19:58 +03:00
return render_template('sql-injection.html')
2025-04-07 12:23:56 +03:00
@app.route("/web/idor")
def webidor():
return render_template('idor.html')
@app.route("/web/path-traversal")
def webpt():
return render_template('path-traversal.html')
2025-04-10 00:23:44 +03:00
@app.route("/web/ssti", methods=('GET', 'POST'))
2025-04-07 12:23:56 +03:00
def webssti():
2025-04-10 00:23:44 +03:00
id = session.get('ssti_id')
flag = session.get('flag_ssti')
if id not in comments.keys():
session['ssti_id'] = id = hex(getrandbits(45))[2:]
comments[id] = []
session['flag_ssti'] = flag = f'C4TchFl4g{{{hex(getrandbits(45))[2:]}}}'
if request.method == 'POST':
if 'user_flag' in request.form.keys():
user_flag = request.form['user_flag']
if user_flag == flag:
return render_template('ssti.html', flag=flag, success_flag='.')
return render_template('ssti.html', flag=flag, error='Ошибка: неверный флаг!')
username = request.form['username']
comment = request.form['user_comment']
comments[id].append((username, comment))
def render(x):
try:
return render_template_string(x, flag=flag)
except:
return x
return render_template('ssti.html', render_template_string=render, comments=comments[id], flag=flag)
comments = {}
2025-04-07 12:23:56 +03:00
@app.route("/web/portswigger-guide")
def webpsguide():
return render_template('portswigger-guide.html')
2025-04-08 14:43:15 +03:00
@app.route("/forensic/metadata", methods=('GET', 'POST'))
2025-04-07 12:48:42 +03:00
def fmetadata():
flag_task1 = session.get('flag_task1')
2025-04-03 22:23:02 +03:00
if request.method == 'POST':
user_flag = request.form['user_flag']
if user_flag == flag_task1:
2025-04-05 22:42:20 +03:00
return render_template('task1-metadata.html', flag=flag_task1, success_flag='.')
return render_template('task1-metadata.html', flag=flag_task1, error='Ошибка: неверный флаг!')
if not flag_task1:
session['task1_id'] = id = hex(getrandbits(45))[2:]
session['flag_task1'] = flag_task1 = f'C4TchFl4g{{{hex(getrandbits(45))[2:]}}}'
task1_flag(flag_task1, id)
return render_template('task1-metadata.html', flag=flag_task1)
2025-01-23 00:19:58 +03:00
2025-04-07 23:38:07 +03:00
@app.route("/forensic/getimg")
2025-02-14 13:19:23 +03:00
def forensic_task1():
if 'task1_id' not in session.keys():
abort(404)
2025-02-14 13:19:23 +03:00
return send_file(f'/tmp/task1/{session['task1_id']}.jpg')
@app.route("/forensic/base-guide", methods=('GET', 'POST'))
2025-04-07 12:48:42 +03:00
def fbase():
flag_task4 = session.get('flag_task4')
if request.method == 'POST':
user_flag = request.form['user_flag']
if user_flag == flag_task4:
return render_template('base.html', flag=flag_task4, success_flag='.')
return render_template('base.html', flag=flag_task4, error='Ошибка: неверный флаг!')
if not flag_task4:
session['flag_task4'] = flag_task4 = f'C4TchFl4g{{{hex(getrandbits(45))[2:]}}}'
base32str = str(base64.b32encode(flag_task4.encode()))[2:-1]
2025-04-09 21:43:43 +03:00
base64str = str(base64.b64encode(f"Ой-ой, похоже, что самое главное всё ещё зашифровано.. Сможешь расшифровать, ОП? {base32str}".encode()))[2:-1]
return render_template('base.html', base_task=base64str)
2025-04-07 12:48:42 +03:00
@app.route("/forensic/.docx_files", methods=('GET', 'POST'))
2025-04-07 12:48:42 +03:00
def fbinwalk():
flag_task3 = 'C4TchFl4g{GT4_6_1eaks}'
if request.method == 'POST':
user_flag = request.form['user_flag']
if user_flag == flag_task3:
return render_template('binwalk.html', flag=flag_task3, success_flag='.')
return render_template('binwalk.html', flag=flag_task3, error='Ошибка: неверный флаг!')
2025-04-07 12:48:42 +03:00
return render_template('binwalk.html')
@app.route("/forensic/hex", methods=('GET', 'POST'))
2025-04-07 12:48:42 +03:00
def fhex():
flag_task2 = "C4TchFl4g{I_hir3d_7his_c4r_t0_st4r3_4t_Y0u}"
if request.method == 'POST':
user_flag = request.form['user_flag']
if user_flag == flag_task2:
return render_template('hex.html', flag=flag_task2, success_flag='.')
return render_template('hex.html', flag=flag_task2, error='Ошибка: неверный флаг!')
return render_template('hex.html')
2025-04-07 12:48:42 +03:00
@app.route("/forensic/hash", methods=('GET', 'POST'))
2025-04-07 12:48:42 +03:00
def fhash():
flag_task5 = "C4TchFl4g{superadmin}"
if request.method == 'POST':
user_flag = request.form['user_flag']
if user_flag == flag_task5:
return render_template('hash.html', flag=flag_task5, success_flag='.')
return render_template('hash.html', flag=flag_task5, error='Ошибка: неверный флаг!')
2025-04-07 12:48:42 +03:00
return render_template('hash.html')
@app.route("/osint/questions")
def osintquestions():
return render_template('osint-questions.html')
@app.route("/osint/geoguessr")
def osintgeoguessr():
return render_template('osint-geoguessr.html')
@app.route("/osint/really_hard_task")
def osintrht():
return render_template('osint-hardtask.html')
2025-04-07 22:13:31 +03:00
@app.route("/web/success_login-sqltask", methods=('GET', 'POST'))
2025-02-02 20:43:16 +03:00
def success_login():
2025-02-05 00:17:09 +03:00
flag = session.get('sql_flag')
2025-02-03 00:19:41 +03:00
if request.method == 'POST':
user_flag = request.form['user_flag']
2025-02-05 00:17:09 +03:00
if user_flag == flag:
2025-04-05 22:42:20 +03:00
return render_template('success-sql.html', flag=flag, success_flag='.')
return render_template('success-sql.html', flag=flag, error='Ошибка: неверный флаг!')
2025-02-05 00:17:09 +03:00
if flag:
2025-04-05 22:42:20 +03:00
return render_template('success-sql.html', flag=flag)
2025-02-02 20:43:16 +03:00
abort(404)
2025-01-25 22:18:21 +03:00
2025-02-02 20:43:16 +03:00
@app.errorhandler(werkzeug.exceptions.NotFound)
def handle_bad_request(e):
return '<img src="https://http.cat/404.jpg">', 404
2025-01-24 21:21:41 +03:00
2025-01-30 20:55:31 +03:00
app.run(host="0.0.0.0", debug=False)
2025-01-26 22:50:50 +03:00
connection.close()