当前位置:网站首页>File upload vulnerability test based on DVWA

File upload vulnerability test based on DVWA

2022-07-06 01:07:00 wishLifeJumP

Catalog

DVWA

Low

Medium


DVWA

Low

DVWA Security Of “low” Levels can be uploaded directly “ In a word ” Trojan horse .

1.1 Write test Trojan

<?php
phpinfo();
?>

1.2 Upload directly without suffix filtering

1.3 Echo the upload path , Just visit directly

http://localhost/dvwa/hackable/uploads/info.php

Medium

Medium Level different from Low Level ,Medium The sector imposes upload restrictions on the front end , By bypassing the detection mechanism , Capture packets and change the suffix to achieve the upload effect .

2.1 Upload legal files , Open the agent

 2.2 After catching the packet ,send to repeater

 info.png Change it to info.php

The response code is 200 Instructions uploaded successfully .

2.3 perform php Script

https://localhost/dvwa/hackable/uploads/info.php

 

原网站

版权声明
本文为[wishLifeJumP]所创,转载请带上原文链接,感谢
https://yzsam.com/2022/187/202207060105165854.html

随机推荐