ICode9

精准搜索请尝试: 精确搜索
  • 萌新web82021-08-15 21:03:33

      Nothing we could get, so we gonna inspect the hint.    According to the hint, it's easily to associate with that prevailing meme -- remove everything and run away.  The command removes everyting is 'rm -rf /*', so key word is.  

  • web82021-04-12 09:01:22

     include "flag.php";                                 被包含文件先按参数给出的路径寻找,如果没有给出目录(只有文件名)时则按照 include_path 指定的目录寻找    $a = @$_REQUEST['hello'];                代表 $_REQUEST 将包含 $_GET 和

  • web8-考核2020-12-09 23:01:55

    打开网页提示“Only the admin can get the flag,flag in /flag”“you name is None" 访问http://xmctf.top:8861/?name={{7}},返回"you name is 7" 访问http://xmctf.top:8861/?name={{7*7}},返回"you name is 49" 猜测可能为模板注入 访问http://xmctf.top:8861/?name={{confi

  • 28.web82019-12-22 16:01:30

       file_get_contents()文件包含漏洞,根据题目提示txt?尝试flag.txt payload:  ?ac=flags&fn=flag.txt

  • bugku web82019-10-17 21:01:08

    打开网站,是一段PHP代码, <?phpextract($_GET);if (!empty($ac)){$f = trim(file_get_contents($fn));if ($ac === $f){echo "<p>This is flag:" ." $flag</p>";}else{echo "<p>sorry!</p>";}}?> 审计一下这个代码,发现得到flag的条件是

专注分享技术,共同学习,共同进步。侵权联系[81616952@qq.com]

Copyright (C)ICode9.com, All Rights Reserved.

ICode9版权所有