当前位置:网站首页>File upload vulnerability test based on DVWA
File upload vulnerability test based on DVWA
2022-07-06 01:07:00 【wishLifeJumP】
Catalog
DVWA
Low
DVWA Security Of “low” Levels can be uploaded directly “ In a word ” Trojan horse .
1.1 Write test Trojan
<?php
phpinfo();
?>
1.2 Upload directly without suffix filtering
1.3 Echo the upload path , Just visit directly
http://localhost/dvwa/hackable/uploads/info.php
Medium
Medium Level different from Low Level ,Medium The sector imposes upload restrictions on the front end , By bypassing the detection mechanism , Capture packets and change the suffix to achieve the upload effect .
2.1 Upload legal files , Open the agent
2.2 After catching the packet ,send to repeater
info.png Change it to info.php
The response code is 200 Instructions uploaded successfully .
2.3 perform php Script
https://localhost/dvwa/hackable/uploads/info.php
边栏推荐
- [groovy] JSON string deserialization (use jsonslurper to deserialize JSON strings | construct related classes according to the map set)
- I'm interested in watching Tiktok live beyond concert
- C language programming (Chapter 6 functions)
- Interview must brush algorithm top101 backtracking article top34
- Cannot resolve symbol error
- Overview of Zhuhai purification laboratory construction details
- The growth path of test / development programmers, the problem of thinking about the overall situation
- [groovy] compile time metaprogramming (compile time method interception | find the method to be intercepted in the myasttransformation visit method)
- How spark gets columns in dataframe --column, $, column, apply
- cf:D. Insert a Progression【关于数组中的插入 + 绝对值的性质 + 贪心一头一尾最值】
猜你喜欢
Exciting, 2022 open atom global open source summit registration is hot
测试/开发程序员的成长路线,全局思考问题的问题......
How to extract MP3 audio from MP4 video files?
1791. Find the central node of the star diagram / 1790 Can two strings be equal by performing string exchange only once
[groovy] compile time meta programming (compile time method interception | method interception in myasttransformation visit method)
servlet(1)
Arduino hexapod robot
Cve-2017-11882 reappearance
猿桌派第三季开播在即,打开出海浪潮下的开发者新视野
毕设-基于SSM高校学生社团管理系统
随机推荐
GNSS terminology
SAP Spartacus home 页面读取 product 数据的请求的 population 逻辑
MIT doctoral thesis | robust and reliable intelligent system using neural symbol learning
[groovy] JSON serialization (convert class objects to JSON strings | convert using jsonbuilder | convert using jsonoutput | format JSON strings for output)
MCU通过UART实现OTA在线升级流程
Finding the nearest common ancestor of binary search tree by recursion
Cf:c. the third problem
Lone brave man
在产业互联网时代,将会凭借大的产业范畴,实现足够多的发展
Who knows how to modify the data type accuracy of the columns in the database table of Damon
小程序容器可以发挥的价值
KDD 2022 | 脑电AI助力癫痫疾病诊断
[groovy] compile time meta programming (compile time method interception | method interception in myasttransformation visit method)
MCU realizes OTA online upgrade process through UART
curlpost-php
Vulhub vulnerability recurrence 75_ XStream
View class diagram in idea
MobileNet系列(5):使用pytorch搭建MobileNetV3并基于迁移学习训练
Overview of Zhuhai purification laboratory construction details
Redis' cache penetration, cache breakdown, cache avalanche