查看源代码发现路径提示

访问.../tips.php显示无用页面,怀疑.../被过滤,采用..././形式,看到phpinfo()页面

注意到disable_functions,禁用了很多函数

访问hackme.php,看到页面源码

发现eval函数,包含base64

解密获得php代码,echo eval函数

获得一句话木马连接语句

密码为cmd_66.99
蚁剑连接失败

修改密码为cmd[66.99,低版本php特性
可以连接成功
使用蚁剑插件:绕过 disable functions,连接shell

find寻找flag,cat获取flag
sh
find / -name flag*
find寻找flag,cat获取flag
