在/action.php这里抓包可以发现有一个secr3t.php 打开之后进行代码审计: 首先我直接?file=flag.php了一下,页…
题目下载 strings/binwalk/file都试过啦。。没有什么发现 看wp才晓得的蜜汁规律。。需要和0x33异或: data = open("photo.dat",'rb') strs = data.read() flag = open("flag.jpg",'ab+') for i in strs: flag.write(bytes([i ^ 0x33])) 得到一张图片: 接下…
Quote saved.
Login to quote this blog
Failed to save quote. Please try again later.
You cannot quote because this article is private.