当前位置:网站首页>Advanced area of attack and defense world web masters -baby Web
Advanced area of attack and defense world web masters -baby Web
2022-07-29 00:16:00 【Ant200】
1. Go to the link , When I first went in, I saw this page 1.php, According to the topic tips “ Think about the initial page , Guess it should exist index.php, So visit index.php After inputting, jump directly to 1.php, Guess the address may be filled in 1.php.

2. Open Firefox developer mode (F12), Select the network module , request index.php, You can see location The parameters are set 1.php, And get flag.

summary : a web Common parameters location The role of
边栏推荐
- How can Plato obtain premium income through elephant swap in a bear market?
- EN 1935 building hardware. Single axis hinge - CE certification
- Servlet运行原理_API详解_请求响应构造进阶之路(Servlet_2)
- 【C】喝汽水,找单身狗问题
- Oracle super full SQL, details crazy
- 【小程序项目开发 -- 京东商城】uni-app 商品分类页面(上)
- SQL implementation merges multiple rows of records into one row
- PHP poster QR code synthesis
- 【C】 Reverse string (two recursive ideas)
- IDEA2021.2安装与配置(持续更新)
猜你喜欢

centos7安装mysql8

Servlet operation principle_ API details_ Advanced path of request response construction (servlet_2)

Interpretation of ISO 13400 (doip) standard

Eight performance analysis indicators of effective supply chain management (Part 1)

Doip communication of canoe application case

Intelligent trash can (VII) -- Introduction and use of sg90 steering gear (Pico implementation of raspberry pie)

How NAT configures address translation

熊市下PLATO如何通过Elephant Swap,获得溢价收益?

Real time data warehouse: meituan's implementation of real-time data warehouse construction based on Flink

Idea2021.2 installation and configuration (continuous update)
随机推荐
基于 FPGA 实现数字时钟详细原理讲解及验证结果
Real time data warehouse: meituan reviews Flink's real-time data warehouse application sharing
研发效能的道法术器
Feign call fails. JSON parse error illegal character ((ctrl-char, code 31)) only regular white space (R
Do like and in indexes in MySQL go
What is in word?:^ p
Please briefly describe the respective characteristics of list, set and map type sets (briefly describe three different inheritance methods)
[TA frost wolf _may- "hundred people plan"] art 2.2 model basis
【MySQL系列】MySQL数据库基础
2022网络安全学习路线 非常详细 推荐学习
Sword finger offer 55 - I. depth of binary tree
Summary of wrong questions of software designers
【C】替换空格,宏实现整数的二进制奇偶位交换
Introduction and solution of common security vulnerabilities in web system CSRF attack
Detailed explanation of 9 common reasons for MySQL index failure
PIP image download
Visual full link log tracking
【C】逆序字符串(俩种递归思路)
The failure rate is as high as 80%. How to correctly complete the strategic planning of digital transformation?
Worthington - chemical properties and related studies of Worthington trypsin