v2ish1yan/blogtalk

NSSCTF Round#8 Basic | Hexo

Opened this issue · 1 comments

http://v2ish1yan.top/2023/02/11/%E6%AF%94%E8%B5%9Bwp/NSSCTF%20Round8/

MyDoor使用php伪协议读取index.php的代码 1php://filter/read=convert.base64-encode/resource=index.php 1234567891011121314151617<?phperror_reporting(0);if (isset($_GET['N_S.S'])) { eval($_GET[

hello