【正方教务管理系统】HACK日志(一)

使用 Wireshark 抓包后得到校正方系统的登陆过程如下:

头信息:

请求头
(Request-Line)POST /default2.aspx HTTP/1.1
Hostjwc.****.edu.cn:8989
Connectionkeep-alive
Content-Length156
Cache-Controlmax-age=0
Originhttp://jwc.****.edu.cn:8989
User-AgentMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/536.5 (KHTML, like Gecko) Chrome/19.0.1084.52 Safari/536.5
Content-Typeapplication/x-www-form-urlencoded
Accepttext/html,application/xhtml+xml,application/xml;q=0.9,/;q=0.8
Refererhttp://jwc.****.edu.cn:8989/
Accept-Encodinggzip,deflate,sdch
Accept-Languagezh-CN,zh;q=0.8
Accept-CharsetGBK,utf-8;q=0.7,*;q=0.3
CookieASP.NET_SessionId=mrctyyikxevfky55cerpjx45

发送的数据:

参数名
__VIEWSTATEdDwtMTIwMTU3OTE3Nzs7PpxRSEGelcLnTaPgA3v56uoKweD+
TextBox1**********
TextBox2**********
RadioButtonList1学生
Button1
lbLanguage

查询过程如下:

头信息:

请求头
(Request-Line)GET /readimagexs.aspx?xh=********** HTTP/1.1
Hostjwc.****.edu.cn:8989
Connectionkeep-alive
User-AgentMozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/536.5 (KHTML, like Gecko) Chrome/19.0.1084.52 Safari/536.5
Accepttext/html,application/xhtml+xml,application/xml;q=0.9,/;q=0.8
Accept-Encodinggzip,deflate,sdch
Accept-Languagezh-CN,zh;q=0.8
Accept-CharsetGBK,utf-8;q=0.7,*;q=0.3
CookieASP.NET_SessionId=mrctyyikxevfky55cerpjx45

查询字符串

参数名
xh**********

整个登陆过程已经很明朗了,明天将用Python实现。

2012-06-30
By whypro

【正方教务管理系统】HACK日志(一)

http://whypro.github.io/hexo-blog/2012/06/30/f5686c619f2d/

Author

whypro

Posted on

2012-06-30

Updated on

2022-11-11

Licensed under

Comments

Your browser is out-of-date!

Update your browser to view this website correctly.&npsb;Update my browser now

×