当前位置:网站首页>[geek challenge 2019] secret file & file contains common pseudo protocols and gestures
[geek challenge 2019] secret file & file contains common pseudo protocols and gestures
2022-07-28 21:43:00 【Try to be a big man M0_ sixty-eight million seventy-four thousa】
1. Go to the page to see the source code
Find a hint Archive_room.php file , see
Click in to check
Go back to see Archive_room.php Source code , Find out url yes action.php But after coming in, I reset the guide end.php. Capture packets and replay them. Check the corresponding packets and find secr3t.php
Check the source code
2. File contains
Code audit , Here the file can contain and filter some specific characters , however php Not filtered . Include directly first flag.php have a look .
There are files , Classic posture view source code :php://filter/read=convert.base64-encode/resource=flag.php
base64 Decrypt
find flag
The file contains common protocols ( posture )
One 、 agreement :
1.php://filter Read the file source code
php://filter The protocol can filter and filter the open data stream , Commonly used to read file source code
When using the file include function to include a file , The code in the file will be executed , If you want to read the source code of the file ,
have access to base64 Encode the contents of the document , The encoded file content will not be executed , It's a show
In the page , We use the content in the page base64 decode , You can get the source code of the file
2.php://input Arbitrary code execution
php://input Can access the requested raw data , The matching file contains a vulnerability that can post Request body
The contents in are executed as the contents of the file , So as to realize arbitrary code execution , It should be noted that , When
enctype=multipart/form-data when ,php:/input It will not work
3.data://text/plain Arbitrary code execution
Form of agreement : data: The resource type ; code , Content
data:// The protocol executes the resource type , Make the following content execute as file content , Thus causing any
Italian code execution
4.zip:// Cooperate with file upload to open the back door
ziip:// The protocol is used to read the files in the compressed package , Can cooperate with file upload to open the back door , obtain
webshell take shell.txt Compressed into zip, Then change the suffix to jpg Upload to server , Re pass
zip Pseudo protocol to access the files in the compressed package , To link the Trojan horse
Two 、 posture :
?page=php://filter/read=string.rot13/resource=index.php
?page=php://filter/convert.base64-encode/resource=index.php
?page=pHp://FilTer/convert.base64-encode/resource=index.php
?page=zip://shell.jpg%23payload.php
?page=data://text/plain;base64,[base64_encode_shell]
?page=expect://id
?page=expect://ls
?page=php://input | POST DATA:
边栏推荐
- 小霸王被申请破产!公司成“老赖” ,法人被限制高消费
- 【Bluetooth蓝牙开发】八、BLE协议之传输层
- 顶级“Redis 笔记”, 缓存雪崩 + 击穿 + 穿透 + 集群 + 分布式锁,NB 了
- Huawei releases the first electric drive system driveone: charging for 10 minutes, endurance of 200km
- Why does Baidu search only crawl, but not show the page?
- Leetcode 19. delete the penultimate node of the linked list [knowledge points: speed pointer, recursion, stack]
- 纳米金偶联抗体/蛋白试剂盒(20nm,1mg/100μg/500 μg偶联量)的制备
- MySQL 是如何归档数据的呢?
- Discussion: if you want to land Devops, is it enough to only consider a good PAAS container platform?
- C process control statement
猜你喜欢
Another installation artifact
怎样巧用断言+异常处理类,使代码更简洁!(荣耀典藏版)
[Bluetooth Bluetooth development] VIII. Transmission layer of ble protocol
数据插值——对不同量级的数据进行归一化
Coding with these 16 naming rules can save you more than half of your comments!
Uncaught Error:Invalid geoJson format Cannot read property ‘length‘ of undefind
技术选型Rust——事后分析
Leetcode interview question 02.07. Linked list intersection [knowledge points: Double pointers, stack]
基于Paragraph-BERT-CRF的科技论文摘要语步功能信息识别方法研究
OA项目之会议通知(查询&是否参会&反馈详情)
随机推荐
PyQt5快速开发与实战 5.4 网页交互
Paging function (board)
Icml2022 | timing self-monitoring video transformer
Leetcode linked list question - interview question 02.07. linked list intersection (learn linked list by one question and one article)
Attribute based encryption simulation and code implementation (cp-abe) paper: ciphertext policy attribute based encryption
(PMIC) full and half bridge drive csd95481rwj PDF specification
Study - Summary of geometric calculations
瑞典法院取消对华为和中兴的5G频谱拍卖禁令
基于属性词补全的武器装备属性抽取研究
Top level "redis notes", cache avalanche + breakdown + penetration + cluster + distributed lock, Nb
作价11.5亿元,1206件设备注入合资公司!SK海力士抢食大陆晶圆代工市场!
数据插值——对不同量级的数据进行归一化
日志瘦身神操作:从5G优化到1G到底是怎么做到的!(荣耀典藏版)
[英雄星球七月集训LeetCode解题日报] 第28日 动态规划
Edited by vimtutor
Learning typescript (II)
学习Typescript(二)
物联网技术栈之网关技术
纳米金偶联抗体/蛋白试剂盒(20nm,1mg/100μg/500 μg偶联量)的制备
Analysis of critical path