当前位置:网站首页>Buuctf [actf2020 freshman competition] include1
Buuctf [actf2020 freshman competition] include1
2022-04-23 09:19:00 【Partition CC】
Open the target and find that
F12 Check source code discovery :url This file may contain a vulnerability ?file=flag.php
Click on tips The page jumps to Can you find out the flag?
Judgment can save php Fake protocol
structure payload The format is as follows
?file=php://../../resource=flag.php
(php://filter" Fake protocol " To include , When combined with an include function ,php://filter Flow will be treated as php File execution . So we usually code it , Prevent it from executing , This results in arbitrary file reads .)
( If you use php://filter Pseudo protocol for File Inclusion , Need to add read=convert.base64-encode To encode the contents of the file )
This topic php The pseudo protocol code is as follows
?file=php://filter/read=convert.base64-encode/resource=flag.php
enter
Get a bunch of Base64 code
utilize Base64 Code conversion tool to convert to flag
Base64 Code conversion tool ,Base64 Encryption and decryption
Big brother, take out your little hand to get rich zan A!
版权声明
本文为[Partition CC]所创,转载请带上原文链接,感谢
https://yzsam.com/2022/04/202204230630141948.html
边栏推荐
- Image processing in opencv -- Introduction to contour + contour features
- npm报错 :operation not permitted, mkdir ‘C: \Program Files \node js \node_ cache _ cacache’
- Bk3633 specification
- ALV树(LL LR RL RR)插入删除
- Summary of common concepts and problems of linear algebra in postgraduate entrance examination
- 小程序报错 :should have url attribute when using navigateTo, redirectTo or switchTab
- 搞不懂时间、时间戳、时区,快来看这篇
- Kettle experiment
- [reading notes] Chapter 5 conditional statements, circular statements and block statements of Verilog digital system design tutorial (with answers to thinking questions)
- Rembg split mask
猜你喜欢
Matlab draw five-star red flag
Strength comparison vulnerability of PHP based on hash algorithm
Kettle experiment
Experimental report on analysis of overflow vulnerability of assembly language and reverse engineering stack
Number of islands
Node installation
Go language learning notes - structure | go language from scratch
Detailed explanation of delete, truncate and drop principles in MySQL database
Installation of data cleaning ETL tool kettle
112. 路径总和
随机推荐
[reading notes] Chapter 5 conditional statements, circular statements and block statements of Verilog digital system design tutorial (with answers to thinking questions)
資源打包關系依賴樹
员工试用期转正申请书(泸州老窖)
成功的DevOps Leader 应该清楚的3个挑战
Flink SQL realizes the integration of stream and batch
Open services in the bottom bar of idea
#yyds干货盘点#ubuntu18.0.4安装mysql并解决ERROR 1698: Access denied for user ''root''@''localhost''
Applet in wechat and app get current ()
LeetCode_ DFS_ Medium_ 1254. Count the number of closed islands
Go language self-study series | initialization of golang structure
Go language self-study series | golang structure pointer
Program, process, thread; Memory structure diagram; Thread creation and startup; Common methods of thread
Initial experience of talent plan learning camp: communication + adhering to the only way to learn open source collaborative courses
How to protect open source projects from supply chain attacks - Security Design (1)
Distributed message oriented middleware framework selection - Digital Architecture Design (7)
Technological innovation in government affairs in the construction of Digital Government
OpenCV中的图像处理 —— 轮廓入门+轮廓特征
EmuElec 编译总结
Go language self-study series | golang nested structure
Kettle experiment