Welcome to HBH! If you have tried to register and didn't get a verification email, please using the following link to resend the verification email.
Poison NULL byte in Basic23
i was reading on the RFI post and the include syntax reminded me of the poison NULL byte thing. Anyways i have a question for anyone who is good with this exploit, why cant you use it in Basic 23 where it says show.php?page=
couldnt you plugin show.php%00 where %00 escapes and get the entire php source code???
DeafCode wrote: then why wont it work in real 11 when i try to use the page include from the why firm page to access /clients/login.php%00
you should have checked the url I gave you, here is the answer:
Mr_Cheese wrote: a switch is deffinatly the way to go about it ( preventing the null byte poisoning ).
it's a long winded way of doing things, but by far the most secure.
example:
switch($_GET['page']){
case 'home':
include "home.php";
break;
case 'contact':
include "contact.php";
break;
default:
include "home.php";
}```