基于msf工具复现永恒之蓝漏洞
## 靶机与攻击机准备#CTL{\n}1. 靶机:Windows Sever 2008 R2 64位#CTL{\n}ip:192.168.137.131#CTL{\n}#CTL{\n}![](https://nc0.cdn.zkaq.cn/md/19313/71d655c213402c73cc639b5380cbf6b8_29574.png)#CTL{\n}2.攻击机:Kali 2023 64位#
ctfshow web257php反序列化漏洞
最近在学php反序列化漏洞,找课外练习做的时候遇到了,觉得挺有意思,分享一下#CTL{\n}#CTL{\n}先看下源码#CTL{\n}![](https://nc0.cdn.zkaq.cn/md/19313/4c69b51b3f5a830c24eb81ac33974be5_62226.png)#CTL{\n}#CTL{\n}------------#CTL{\n}#CTL{\n}#CTL{\n}分
1