Bugku-web

Bugku-Web23

![images](https://img2023.cnblogs.com/blog/1845942/202308/1845942-20230830085627725-1803621512.png) 这个题目告诉我,正则表达式还要好好的学一下;; ![images](https://img2023. ......
Bugku-Web Bugku Web 23

Bugku-Web29

![images](https://img2023.cnblogs.com/blog/1845942/202308/1845942-20230830085729143-2084999254.png) sha数组绕过问题,和md5类似方法:: ``` <?php highlight_file('fla ......
Bugku-Web Bugku Web 29

Bugku-Web31

![images](https://img2023.cnblogs.com/blog/1845942/202308/1845942-20230830085740155-964345158.png) 后台扫描发现有robots.txt ![images](https://img2023.cnblogs ......
Bugku-Web Bugku Web 31

Bugku-web37

不能放过任何提示或是编码: ![images](https://img2023.cnblogs.com/blog/1845942/202308/1845942-20230830085841029-443888435.png) 参考博客:: [https://blog.csdn.net/qq_4120 ......
Bugku-web Bugku web 37

Bugku-web40

![images](https://img2023.cnblogs.com/blog/1845942/202308/1845942-20230830085916851-2119791233.png) 这题考察的是git信息泄露,挺好的题目;;我都不懂git信息泄露是什么鬼 用dirsearch扫描后 ......
Bugku-web Bugku web 40

Bugku-web41

![images](https://img2023.cnblogs.com/blog/1845942/202308/1845942-20230830085929091-1286459289.png) 该题目涉及到了序列化;Base64解码;cgi;ssrf;php中的file协议; 代码审计,我只知 ......
Bugku-web Bugku web 41

Bugku-web34(文件包含)

![images](https://img2023.cnblogs.com/blog/1845942/202308/1845942-20230830085804217-893683872.png) 一: 学到了一个挺有意思的文件包含代码:: ``` ``` ![images](https://img ......
Bugku-web 文件 Bugku web 34

Bugku-web35(序列化)

![images](https://img2023.cnblogs.com/blog/1845942/202308/1845942-20230830085816055-1593173101.png) 访问css样式之后得到提示: ![images](https://img2023.cnblogs.c ......
序列 Bugku-web Bugku web 35

Bugku-web36(sql注入)

![images](https://img2023.cnblogs.com/blog/1845942/202308/1845942-20230830085829939-2078684871.png) 这个题目对于我来说还是很有难度的;;;毕竟我菜;;;唉;;; 打开页面是个登录界面:: ![imag ......
Bugku-web Bugku web sql 36

Bugku-web39(CBC反转攻击)

![images](https://img2023.cnblogs.com/blog/1845942/202308/1845942-20230830085906487-1323608896.png) 传入cipher:: o0Na0VUpA9NNqK5lQTP3chZqec57H%2FAMEkq5Y ......
Bugku-web Bugku web CBC 39

Bugku-web安慰奖(序列化)

![images](https://img2023.cnblogs.com/blog/1845942/202308/1845942-20230830085941020-1792810579.png) php序列化的一个题目;; 参考博客:[https://blog.csdn.net/weixin_4 ......
序列 Bugku-web Bugku web

Bugku-Web18

![images](https://img2023.cnblogs.com/blog/1845942/202308/1845942-20230829164532573-1017021044.png) ![images](https://img2023.cnblogs.com/blog/1845942 ......
Bugku-Web Bugku Web 18

Bugku-Web19

![images](https://img2023.cnblogs.com/blog/1845942/202308/1845942-20230830085552385-1903764495.png) ![images](https://img2023.cnblogs.com/blog/1845942 ......
Bugku-Web Bugku Web 19

Bugku-Web22

送给大家一个过狗一句话 `$poc="a#s#s#e#r#t"; $poc_1=explode("#",$poc); $poc_2=$poc_1[0].$poc_1[1].$poc_1[2].$poc_1[3].$poc_1[4].$poc_1[5]; $poc_2($_GET['s'])` ![i ......
Bugku-Web Bugku Web 22

Bugku-Web24

![images](https://img2023.cnblogs.com/blog/1845942/202308/1845942-20230830085642245-1549816103.png) 5 ![images](https://img2023.cnblogs.com/blog/18459 ......
Bugku-Web Bugku Web 24

Bugku-Web25

![images](https://img2023.cnblogs.com/blog/1845942/202308/1845942-20230830085653609-1421900041.png) 第一次还是了解到这个sql约束工具,有点趣味吧... ![images](https://img20 ......
Bugku-Web Bugku Web 25

Bugku-Web26

眼睛瓢太快,看到了评论区的评论,这题不难! ![images](https://img2023.cnblogs.com/blog/1845942/202308/1845942-20230830085705540-404238906.png) 考点主要是在Referer 在burp中增加Referer ......
Bugku-Web Bugku Web 26

Bugku-Web27

![images](https://img2023.cnblogs.com/blog/1845942/202308/1845942-20230830085717435-1665980578.png) md5 collision(md5 碰撞) 一般意思,用数据绕过就可以了;;这是我目前所学到的! ! ......
Bugku-Web Bugku Web 27

Bugku-Web12

![images](https://img2023.cnblogs.com/blog/1845942/202308/1845942-20230829164401466-1203733578.png) 没啥思路,感觉自己在刷题,,, 这个考虑的是本地管理员 ![images](https://img2 ......
Bugku-Web Bugku Web 12

Bugku-Web17

这是sql的注入题 我自己的sql注入学的还不是很到位,这个题目有很学习的意味:;; ![images](https://img2023.cnblogs.com/blog/1845942/202308/1845942-20230829164512870-439098097.png) 第一个是通过sq ......
Bugku-Web Bugku Web 17

Bugku-Web3

![images](https://img2023.cnblogs.com/blog/1845942/202308/1845942-20230829164257703-479074717.png) 比较简单的题目, ![images](https://img2023.cnblogs.com/blog ......
Bugku-Web Bugku Web

Bugku-Web6

![images](https://img2023.cnblogs.com/blog/1845942/202308/1845942-20230829164312446-989323974.png) 我比较才,他给的网址就是一直弹框,flag就在这里,我打开了bp但是束手无策,打开了F2也看不到源网页 ......
Bugku-Web Bugku Web

Bugku-Web7

打开页面之后一直在刷新(也可以说是窗口重新加载?) ![images](https://img2023.cnblogs.com/blog/1845942/202308/1845942-20230829164324833-429086985.png) 最近刚学了js脚本,浏览器右键检查源代码,发现有一 ......
Bugku-Web Bugku Web

Bugku-Web10

![images](https://img2023.cnblogs.com/blog/1845942/202308/1845942-20230829164337016-1170674052.png) 这个很简单!!! ![images](https://img2023.cnblogs.com/blo ......
Bugku-Web Bugku Web 10

Bugku-Web11

![images](https://img2023.cnblogs.com/blog/1845942/202308/1845942-20230829164348073-1161410078.png) ![images](https://img2023.cnblogs.com/blog/1845942 ......
Bugku-Web Bugku Web 11

Bugku-Web13

![images](https://img2023.cnblogs.com/blog/1845942/202308/1845942-20230829164413294-1410194996.png) 根据题意进行unescape解码,得到js脚本,将js脚本中的代码填入输入框中点击提交就得到了fla ......
Bugku-Web Bugku Web 13

Bugku-Web14

![images](https://img2023.cnblogs.com/blog/1845942/202308/1845942-20230829164432023-988022306.png) php://filter/read=convert.base64-encode/resource=in ......
Bugku-Web Bugku Web 14
共27篇  :1/1页 首页上一页1下一页尾页