[朱雀组]Nmap
康康源码:
index.php
<?
require('settings.php');
set_time_limit(0);
if (isset($_POST['host'])):
if (!defined('WEB_SCANS')) {
die('Web scans disabled');
}
$host = $_POST['host'];
if(stripos($host,'php')!==false){
die("Hacker...");
}
$host = escapeshellarg($host);
$host = escapeshellcmd($host);
$filename = substr(md5(time() . rand(1, 10)), 0, 5);
$command = "nmap ". NMAP_ARGS . " -oX " . RESULTS_PATH . $filename . " " . $host;
$result_scan = shell_exec($command);
if (is_null($result_scan)) {
die('Something went wrong');
} else {
header('Location: result.php?f=' . $filename);
}
else:
?>settings.php:
主要语句:
带入之后相当于:
方法一:直接读flag写入文件
-iL:从文件中加载目标
-oN:将扫描后的文件信息以“Normal”的形式输出存储
访问flag.txt
方法二:一句话木马绕过php过滤
Last updated