ICode9

精准搜索请尝试: 精确搜索
  • 攻防世界--Web进阶--Web_php_unserialize--反序列化---正则表达式---wakeup绕过----base64加密2021-10-10 17:05:45

    目录 思路分析 payload 绕过preg_match 绕过__wakeup  拿到flag 注意的细节   来自攻防世界的一道web进阶题,名为Web_php_unserialize 题目给出了一段php代码,应该是后台的部分源码: <?php class Demo { private $file = 'index.php'; public function __construct(

  • Tryhackme-c4ptur3-th3-fl4g2021-09-30 16:31:32

    c4ptur3-th3-fl4g 文章目录 c4ptur3-th3-fl4gTask1 Translation & ShiftingTask2 SpectrogramsTask3 SteganographyTask4 Security through obscurity Task1 Translation & Shifting 1.c4n y0u c4p7u23 7h3 f149? can you capture the flag Leet密语翻译器 - L33t Tra

  • 攻防世界:web——Web_php_unserialize2021-08-23 22:02:02

    靶场内容: <?php class Demo { private $file = 'index.php'; public function __construct($file) { $this->file = $file; } function __destruct() { echo @highlight_file($this->file, true); } function

专注分享技术,共同学习,共同进步。侵权联系[81616952@qq.com]

Copyright (C)ICode9.com, All Rights Reserved.

ICode9版权所有