webmedium
Обходной путь (Obhodnoy Put)
hackerlab
Task: PHP web app with code input field executing via eval(). Solution: Bypassed function blacklist (system, exec blocked) using file functions (scandir, readfile) to enumerate directories and read hidden .secret file containing the flag.
$ ls tags/ techniques/
file_readphpfilter_bypassfile_get_contentsevalcode_injectionfunction_blacklistscandirreadfilerce_alternative
PHP eval() code injectionFunction blacklist bypass using file functionsDirectory enumeration with scandir()Arbitrary file read with readfile()
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Create a free account with GitHub, then upgrade to Pro.
$ssh [email protected]