Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

The execution process of Chinese kitchen knife

2025-02-14 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >

Share

Shulou(Shulou.com)06/01 Report--

In a word, Chinese kitchen knives are no stranger to people who play *. So how on earth does kitchen knives judge his password? How do you list the catalog? Let's popularize science one by one.

In a word:

This is a php sentence password. How about this for people who don't understand? This is obviously a normal php syntax. Don't worry, explain it slowly.

The above sentence is that the server waits for post to submit the data of the variable name fuck.

Now it's reverse thinking. let's look at it with positive thinking.

Name:

Www.a.com/a.php

Welcome.

I'm sure you're all familiar with this code. Post submits data named fuck to a.php and then outputs it.

The kitchen knife is that you upload the receiving end to the server and then we submit the data to the receiving end ourselves.

Example:

So when submitting, it must be the corresponding code executed after post submits the data, such as a column directory? Writing papers? Wait, fuck=.. The corresponding value appears after the eval executes after the code receiving termination is received. Then the kitchen knife will read it.

As for the password here, I am sure you can see clearly why there is still a password. Because of the fuck on the receiving end, you enter 123variables to submit them without knowing where the 123variables come from, so you can't execute them.

Base64 is used to encrypt kitchen knife communication.

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Network Security

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report