472f0d2124ee617a2f29ff331422d5d3976f85b81ca29f5d80fd48e4477cbb8c521805f19d4d98da61ed64e81f72410fadfe8c89c33775d09bea7e0fce8056ffe3a9c8c5a7701243c56f617f630149b3429daf84423748bfb25c155d3f919ac2e1b59ae5448bec8132391bc80f6bc24d35b336d245a07e94424519663d006d5431a49147ff854193c5d21a9082a586310f44e409f9e2315558ce2bccdba659dba9f98ac677f006aafff4bbbe469aa91d5d5f3d9ad5da9db5fe2ddffdd644b48bae2539d5f4c632408404e16db616d441e85a44a6e7500239f1ca69917e4ceefac4f9fe276cb40507c878d091a5c3e489358056a8a94469d76 ...
unserializePHP序列化和反序列化
序列化:是将变量或对象转换成字符串的过程( 序列化只作用于对象,不序列化方法),用于存储或传递 PHP 的值的过程中,同时不丢失其类型和结构。
反序列化是:将字符串转换成变量或对象的过程,反序列化的结果(即对象)的输出要用print_r(),var_dump()
PHP反序列化漏洞:是一种允许攻击者通过将恶意数据反序列化为PHP对象来执行任意代码的漏洞。
PHP序列化结果:Example:
1O:6:"HaHaHa":3:{s:5:"admin";s:5:"admin";s:6:"passwd";s:4:"wllm";}
1.对象序列化
Public(公有):类的外部、子部、内部可用
Protected(受保护):类的子部、内部可用
Private(私有):类的内部可用
Public(公有):被序列化时属性值为:属性名
Protected(受保护):被序列化时属性值为:\x00*\x00属性名
3.Pr ...
33f32c0d892c1b967873f7d5b901a7bbbda4104a54c03631e82816c80fe395eb6668dcc6dd08714f43ee36ae2088a69452ab3deefd957e7b6acc46808239a0b217389eb22f6a44a6e3a0732c95e2d148050565fb97bd96130165325796071b013ffef10d3be20285a76d7583ba0681631e09b457e943751e07587b51d57ac8dbb0967e5fe6e6f61cef7bb1e0bdeb15104a734c6267895149e02e7511d3d78b5165c04b31f0bc7561872a36d1555c0bbbf7b159a0d2608708f84aff150bf7c0ccbd246926d3b4cbd224127b57d7f38d6d52289861af056d7c0ff78c7868d51c15a89104eaaace99d300cd18eb608c5c4673a0be077f3eabd49 ...
33f32c0d892c1b967873f7d5b901a7bb1e76cc615b749e6c8974a37b1a107f4f1f8d7fb62dd6a030ac76f49a5c36a628a8ed23641300fee9718676259ea46b147a251b08a8710dfb02b2f61f264675b2c5cc9503a51b409a896a51a5f3823fcbbb3a9ffbaff4ce31d4f2cd3db28da81f874c97c7b4525d6b6d318748d44f7e1120096a7fa77d543b8df0138d588acea7b25799e551f9798bd486713ac5e9850cb441391b5c161d9589e404571ee860b5a6756235e2c088bb428f469534f9c09b7ba5f384ef617ea4c48cbf4efcd3b5765dca799393550e354f71a328fe11bcfca74b38a12c4a3de664cff3759a70258f5eb36e7acbcc28b97 ...
33f32c0d892c1b967873f7d5b901a7bb1e76cc615b749e6c8974a37b1a107f4f1f8d7fb62dd6a030ac76f49a5c36a628a8ed23641300fee9718676259ea46b147a251b08a8710dfb02b2f61f264675b2c5cc9503a51b409a896a51a5f3823fcbbb3a9ffbaff4ce31d4f2cd3db28da81f874c97c7b4525d6b6d318748d44f7e1120096a7fa77d543b8df0138d588acea7b25799e551f9798bd486713ac5e9850cb441391b5c161d9589e404571ee860b5a6756235e2c088bb428f469534f9c09b7ba5f384ef617ea4c48cbf4efcd3b5765dca799393550e354f71a328fe11bcfca74b38a12c4a3de664cff3759a70258f5eb36e7acbcc28b97 ...
BugKu-web1.滑稽简单题:打开后是空白页面,查看网页源代码就找到flag:
1<!flag{b71f4e6eb376cf5db16605c6d28ed443}
2.计算器打开页面是个输入验证码的页面,输入验证码没反应
查看网页源代码,code.js可能有东西,再打开这个页面,在页面中找到flag
3.alert页面也是空白的,查看源代码发现是写script标签内容,页面下方注释有一段 Unicode 编码内容,解码后得到flag
4.你必须让他停下
页面在不停地自动刷新,关掉网页js,让图片显示出来,在显示图片页面查看源代码
5.头等舱页面只有个这
查看网页源代码,什么也没有;查看页面元素,在响应头找到flag
6.GET
根据题目要求传入what参数,直接出结果了
7.POST
同上题一样
8.source源代码中有答案有一个
base64解码结果不对
网页目录扫描,发现有 /.git/ 路径
把 .git 下载下来,从下载内容中查找存在 flag 的文件,
下载命令: ...
[up主专用,视频内嵌代码贴在这]
.video-container {
position: relative;
width: 100%;
padding-top: 56.25%; /* 16:9 aspect ratio (height/width = 9/16 * 100%) */
}
.video-container iframe {
position: absolute;
top: 0;
left: 0;
width: 100%;
height: 100%;
}
33f32c0d892c1b967873f7d5b901a7bbe3cdc2a297e88e7db46ff333dc4c8f857d735f86602e8ea291c473336c6dadbd62162094d7f5dae6183986457a2278056a312d8b0e8aab6884ac681487b533dde406a6462c4fdcf634e664f8a7eac5e8ba496679342b00047485639f7f1384b7f9e48edefc7ff0ad8b2a7e7bcdf530b7c416069753a55dc8e7576aba2c391f7332f143aa85dc34936541e374eb17834c43c6a965dbfeb52390ccd240a45e2e6198cbb59a302a6af33ad7766a1e11e3d2fa9db81127abc771d54303d043248a11cbc22fc552c122cb7c402664a5bd536d13ad71d03937680fe440b52a66b4545694efe62e9848c4c4f ...
33f32c0d892c1b967873f7d5b901a7bbe37f8a14119c98637cef08661494f12b5b907e73af3dc142b052882dbcaaa34647a525259aa7a22b82e58cdaa0f2537d792aa35301699cae1513358499ce495fd1c5d5fbbf93a8da406ddd59fd3b6ebcd552510e0dd097b2d7161b77c98a6118b46fa2a8783558f75bb44c248b44c76fa23d19fb658846fdb1e4a3e91eff2eda76fdb200b50f3c56dc919e0eb5568ddd58ba58a1f092639e185042e3e30c5489edc7eb7183c1a1afc6390b252d3e240f597e7996ff6196b0331c6af8d7780d5a4a8ba60874aeec37096822bfb930f7f1131ace4e25d5de41afcec9d3e07ba4c205bf2980e8d68efca ...











