当前位置:网站首页>Infiltration learning diary day19
Infiltration learning diary day19
2022-07-04 01:10:00 【XiXioo1】
Here I added waf Knowledge
Combined with the safety dog learned before , I've seen a lot of simulated interview answers
1. Inline comments The first kind /*! The second kind /*! Add numbers , If it is greater than ( Still less than )mysql Version number of , The annotated statements here can also be used
2. Run keyword dictionary , Then run keyword combinations
3. Parameter pollution , False comment
Upload files :
1. The front-end verification can be passed directly burp Repackage , First upload his limited format , Then change the package to the suffix we want to write
2.content-type, through burp Repackage ,content-type This is based on the different content we upload type The type will change , But it can also be in burp Modify it into the format specified in
Blacklist detection : Write the suffix that is not allowed to upload in the array to match
Bypass :

upload-labs Methods that appear in
Add . .( Dot space dot )
Double write after the suffix ::$DATA
.htaceess File attack

.htaccess Two conditions for the successful operation of files as local variables
1.Allow Override All
2.LoadMoudule rewrite_module modules/mod_rewrite.so#rewrite The module is on
If you don't know which configuration file the above module is in , It can be used phpstorm open phpstudy File global search (ctrl+shift+F)
Implementation method
Create a new one .htaccess Name the file , Then add
<FilesMatch " A name ">
SetHandler application/x-httpd-php
</FilesMatch>
Then create a new one named above under this path .txt Text , Join in php The code can be parsed successfully
Add a link :
.htaccess Detailed explanation of file parsing vulnerability
边栏推荐
- HR disgusted interview behavior
- GUI application: socket network chat room
- How to set the response description information when the response parameter in swagger is Boolean or integer
- Data mining vs Machine Learning: what is the difference between them? Which is more suitable for you to learn
- Summary of common tools and technical points of PMP examination
- The culprit of unrestrained consumption -- Summary
- Function: write function fun to find s=1^k+2^k +3^k ++ The value of n^k, (the cumulative sum of the K power of 1 to the K power of n).
- mysql使用视图报错,EXPLAIN/SHOW can not be issued; lacking privileges for underlying table
- Avoid playing with super high conversion rate in material minefields
- MPLS experiment
猜你喜欢

A-Frame虚拟现实开发入门

It's OK to have hands-on 8 - project construction details 3-jenkins' parametric construction

Att & CK actual combat series - red team actual combat - V

How to use AHAS to ensure the stability of Web services?

Thinkphp6 integrated JWT method and detailed explanation of generation, removal and destruction

Mobile asynchronous sending SMS verification code solution -efficiency+redis

The super fully automated test learning materials sorted out after a long talk with a Tencent eight year old test all night! (full of dry goods

Since the "epidemic", we have adhered to the "no closing" of data middle office services

Sequence list and linked list

基于.NetCore开发博客项目 StarBlog - (14) 实现主题切换功能
随机推荐
Oracle database knowledge points (I)
功能:求5行5列矩阵的主、副对角线上元素之和。注意, 两条对角线相交的元素只加一次。例如:主函数中给出的矩阵的两条对角线的和为45。
File contains vulnerability summary
【.NET+MQTT】.NET6 环境下实现MQTT通信,以及服务端、客户端的双边消息订阅与发布的代码演示
2-Redis架构设计到使用场景-四种部署运行模式(下)
Leetcode 121 best time to buy and sell stock (simple)
【.NET+MQTT】. Net6 environment to achieve mqtt communication, as well as bilateral message subscription and publishing code demonstration of server and client
中电资讯-信贷业务数字化转型如何从星空到指尖?
AI 助力艺术设计抄袭检索新突破!刘芳教授团队论文被多媒体顶级会议ACM MM录用
What insurance products should be bought for the elderly?
The difference between fetchtype lazy and eagle in JPA
Msp32c3 board connection MSSQL method
Five high-frequency questions were selected from the 200 questions raised by 3000 test engineers
Oracle database knowledge points that cannot be learned (III)
Future source code view -juc series
[cloud native topic -48]:kubesphere cloud Governance - operation - overview of multi tenant concept
Mongodb learning notes: command line tools
技術實踐|線上故障分析及解决方法(上)
The force deduction method summarizes the single elements in the 540 ordered array
be based on. NETCORE development blog project starblog - (14) realize theme switching function