当前位置:网站首页>File upload vulnerability test based on DVWA
File upload vulnerability test based on DVWA
2022-07-06 01:07:00 【wishLifeJumP】
Catalog
DVWA
Low
DVWA Security Of “low” Levels can be uploaded directly “ In a word ” Trojan horse .
1.1 Write test Trojan
<?php
phpinfo();
?>
1.2 Upload directly without suffix filtering
1.3 Echo the upload path , Just visit directly
http://localhost/dvwa/hackable/uploads/info.php
Medium
Medium Level different from Low Level ,Medium The sector imposes upload restrictions on the front end , By bypassing the detection mechanism , Capture packets and change the suffix to achieve the upload effect .
2.1 Upload legal files , Open the agent
2.2 After catching the packet ,send to repeater
info.png Change it to info.php
The response code is 200 Instructions uploaded successfully .
2.3 perform php Script
https://localhost/dvwa/hackable/uploads/info.php
边栏推荐
- Recursive method converts ordered array into binary search tree
- 从 1.5 开始搭建一个微服务框架——调用链追踪 traceId
- How to extract MP3 audio from MP4 video files?
- 详细页返回列表保留原来滚动条所在位置
- Browser reflow and redraw
- 关于softmax函数的见解
- Ubantu check cudnn and CUDA versions
- Illustrated network: the principle behind TCP three-time handshake, why can't two-time handshake?
- Cf:c. the third problem
- 如何制作自己的機器人
猜你喜欢
Recoverable fuse characteristic test
[pat (basic level) practice] - [simple mathematics] 1062 simplest fraction
Who knows how to modify the data type accuracy of the columns in the database table of Damon
[groovy] XML serialization (use markupbuilder to generate XML data | set XML tag content | set XML tag attributes)
Ubantu check cudnn and CUDA versions
Mlsys 2020 | fedprox: Federation optimization of heterogeneous networks
Finding the nearest common ancestor of binary search tree by recursion
Fibonacci number
Starting from 1.5, build a micro Service Framework - call chain tracking traceid
Daily practice - February 13, 2022
随机推荐
Recursive method converts ordered array into binary search tree
Mlsys 2020 | fedprox: Federation optimization of heterogeneous networks
Cf:d. insert a progression [about the insert in the array + the nature of absolute value + greedy top-down]
Folding and sinking sand -- weekly record of ETF
What is the most suitable book for programmers to engage in open source?
View class diagram in idea
毕设-基于SSM高校学生社团管理系统
2020.2.13
视频直播源码,实现本地存储搜索历史记录
Meta AI西雅图研究负责人Luke Zettlemoyer | 万亿参数后,大模型会持续增长吗?
cf:H. Maximal AND【位运算练习 + k次操作 + 最大And】
Why can't mathematics give machine consciousness
《强化学习周刊》第52期:Depth-CUPRL、DistSPECTRL & Double Deep Q-Network
vSphere实现虚拟机迁移
Five challenges of ads-npu chip architecture design
Some features of ECMAScript
Building core knowledge points
Hundreds of lines of code to implement a JSON parser
STM32 key chattering elimination - entry state machine thinking
Spark SQL null value, Nan judgment and processing