sawtooth384
  • 首页
  • 归档
  • 分类
  • 标签
  • 关于
欢迎光临

强网杯2019 Upload

强网杯2019 Upload目录扫描发现源码泄露 www.tar.gz 直接看文件上传部分的关键代码 123456789101112131415161718192021222324252627public function upload_img(){ if($this->checker){ if(!$this->checker->login
2024-07-22
#web #php #代码审计 #文件上传

HarekazeCTF2019 Avatar Uploader 1

[HarekazeCTF2019]Avatar Uploader 1原题中是给出源码的 主要看upload.php 1234567891011121314151617181920212223242526272829303132333435363738394041424344<?phperror_reporting(0);require_once('config.php')
2024-07-07
#web #php

SHCTF 2023 week2 web ez_rce

[SHCTF 2023] week2 web ez_rce题目源码(附件)如下: 123456789101112131415161718192021222324252627282930313233343536373839404142434445from flask import *import subprocessapp = Flask(__name__)def gett(obj,arg):
2023-10-14
#web #rce #python #flask

MRCTF2020 套娃

[MRCTF2020]套娃先看页面源代码,发现有代码注释: 12345678$query = $_SERVER['QUERY_STRING']; if( substr_count($query, '_') !== 0 || substr_count($query, '%5f') != 0 ){ die('Y0u
2023-09-05
#RCE #PHP #正则

FBCTF2019 RCEService

[FBCTF2019]RCEService这题是有源码的(别管怎么来的了,我看的十几篇wp都没说清楚): 123456789101112131415161718192021222324<?phpputenv('PATH=/home/rceservice/jail');if (isset($_REQUEST['cmd'])) { $jso
2023-09-04
#RCE #PHP #正则

buu FlareOn4 login

[FlareOn4]login直接看JS 1234567891011document.getElementById("prompt").onclick = function () {var flag = document.getElementById("flag").value;var rotFlag = flag.replace(/[a-zA-Z
2023-09-02
#reverse

极客大挑战 2019 RCE ME

[极客大挑战 2019]RCE ME分析1234567891011121314151617 <?phperror_reporting(0);if(isset($_GET['code'])){ $code=$_GET['code']; if(strlen($code)>40)&#
2023-09-01
#web #RCE

easy_serialize

easy_serializepayload先上payload: 1http://124.220.165.133:9906/?a=O:5:"Hello":2:{s:6:"source";N;s:3:"str";O:4:"Show":2:{s:6:"source";N;s:3:&qu
2023-04-23
#web #php #wp #反序列化

web第一周

rce2 (无字母数字绕过)
2023-01-15
#web #第一周 #寒假

my-first-blog

新年快乐
2023-01-15
#初体验
12

搜索

Hexo Fluid