NewStarCTF2023week2-Upload again!

尝试传修改后缀的普通一句话木马,被检测

NewStarCTF2023week2-Upload again!_第1张图片

尝试传配置文件 .htaccess 和 .user.ini

两个都传成功了

NewStarCTF2023week2-Upload again!_第2张图片

接下来继续传入经过修改的木马

GIF89a

没有被检测,成功绕过

NewStarCTF2023week2-Upload again!_第3张图片

直接上蚁剑

NewStarCTF2023week2-Upload again!_第4张图片

连接成功

NewStarCTF2023week2-Upload again!_第5张图片

在根目录下找到flag

NewStarCTF2023week2-Upload again!_第6张图片

NewStarCTF2023week2-Upload again!_第7张图片

flag{e47da945-148a-41de-92b1-cec2765e8810}
 

你可能感兴趣的:(CTF,web,前端,web安全,文件上传,一句话木马)