1、打开之后查看源代码信息,发现存在flag.php,信息如下:
  ![[MRCTF2020]PYWebsite-1](https://blog.ytso.com/wp-content/themes/justnews/themer/assets/images/lazy.png)
2、那就直接访问flag.php文件,信息如下:
  ![[MRCTF2020]PYWebsite-1](https://blog.ytso.com/wp-content/themes/justnews/themer/assets/images/lazy.png)
3、看到我自己,想到应该是检查了X-Forwarded-For信息,因此bp抓包修改为:X-Forwarded-For:127.0.0.1,成功获取flag,信息如下:
  ![[MRCTF2020]PYWebsite-1](https://blog.ytso.com/wp-content/themes/justnews/themer/assets/images/lazy.png)
原创文章,作者:3628473679,如若转载,请注明出处:https://blog.ytso.com/tech/pnotes/273127.html
1、打开之后查看源代码信息,发现存在flag.php,信息如下:
  ![[MRCTF2020]PYWebsite-1](https://blog.ytso.com/wp-content/themes/justnews/themer/assets/images/lazy.png)
2、那就直接访问flag.php文件,信息如下:
  ![[MRCTF2020]PYWebsite-1](https://blog.ytso.com/wp-content/themes/justnews/themer/assets/images/lazy.png)
3、看到我自己,想到应该是检查了X-Forwarded-For信息,因此bp抓包修改为:X-Forwarded-For:127.0.0.1,成功获取flag,信息如下:
  ![[MRCTF2020]PYWebsite-1](https://blog.ytso.com/wp-content/themes/justnews/themer/assets/images/lazy.png)
原创文章,作者:3628473679,如若转载,请注明出处:https://blog.ytso.com/tech/pnotes/273127.html