题目提示为反序列化,关键字找一下,每个目录看一下,看看具体的调用方法
3 .具体调用在cli.php,构造得到payload,成功!:
代码审计,要求为:trick1与trick2长度<=5,并且后续md5比较通过,得到Flag
在本地环境模拟,尝试了科学计数法与精度问题,得到结果:
原型链污染:https://snyk.io/vuln/SNYK-JS-SETVALUE-450213,直接打
下载得到附件,BInkwalk看一下文件:
通过ext3grep,恢复文件:
# 查看需要恢复的文件:
ext3grep disk_dump --ls --inode 2
# 获取文件名:
ext3grep disk_dump --dump-names
# 直接恢复所有文件:
ext3grep disk_dump --restore-all
#!/usr/bin/ python
# -*- coding:utf-8 -*-
"""
-------------------------------------------------
Author: loecho
Datetime: 2020/8/20 15:56
ProjectN: exp-xor.py
Blog: https://loecho.me
Email: [email protected]
-------------------------------------------------
"""
def main():
flag = ""
v4 = 34
v5 = 0
with open('flag.txt', 'a+') as f:
data = f.read()
for i in data:
flag = flag + chr((ord(i) ^ v4) - v5)
v4 = (v4+34)&0xff
v5 = (v5+2)&0x0f
print flag
if __name__ == '__main__':
main()
python -c 'import pty; pty.spawn("/bin/bash")'