当前位置:网站首页>DVWA exercise 05 file upload file upload
DVWA exercise 05 file upload file upload
2022-07-06 14:47:00 【Fuki is on the way】
Purpose IP:192.168.142.133
Local IP:192.168.142.134
1.Security Level:Low
The code is as follows
The server did not check and process the uploaded files . I try to create a new one locally muma.php, Write a word Trojan :<?php @eval($_POST['test']);?>
( Pay attention to punctuation in English )
Upload files to dvwa
Return the path where the file was uploaded !
Go to the corresponding folder to find the file
Before connecting with a Chinese kitchen knife , There is a question . The new version of the phpstudy By default php7, Chinese kitchen knife connection failed , Switch to php5 That's it .( After changing the version , my dvwa Something went wrong , I had to repack it )
Open the Chinese kitchen knife , Right click , add to .
Address to fill in http://192.168.142.133/dvwa/hackable/uploads/muma.php
On the right is a sentence in single quotation marks
Script type selection PHP(Eval)
Right click , Virtual terminal
Input ipconfig, Check address information , But the display failed .
The target virtual machine is installed 360, A warning window will pop up when entering the system command , Default block .
hold 360 Turn it off and try again , Command executed successfully !
You can also use the file management function , View the files of the entire virtual machine , At the same time, it can upload / download / Delete and other operations .
2.Security Level:Medium
Key source code :
The upload file type restricted here is image, extension jpeg or png, And the size is smaller than 100000 byte . We can use burpsuite Modify after interception , Bypass restrictions .
Local muma.php Rename it to muma2.png
Click upload ,Burpsuite Intercept the packet , Put the filename muma2.png It is amended as follows muma2.php, Then release .
Go to the target virtual machine to view muma2.php Successfully uploaded !
3.Security Level:High
The key source code is as follows :
strrpos(string,find,start) Function return string find In another string string The last place in , If no string is found, return false, Optional parameters start Specify where to start the search .
getimagesize(string filename) The function will read the file header , Returns the length of the picture 、 Wide and so on , If there is no relevant picture file header , The function will report an error . You can see ,High Level code reads the last in the file name ”.” String after , Expect to restrict file types by file names , Therefore, the upload file name must be in the form of ”*.jpg”、”*.jpeg” 、”*.png” One of . meanwhile ,getimagesize The function also limits that the file header of the uploaded file must be of image type .
Splice a picture with the previous sentence Trojan horse file , Form a new picture .
Open the picture with Notepad , You can see a sentence at the end of the Trojan horse .
Upload succeeded , But it can't be connected with a kitchen knife . I didn't think of a solution for the time being .
Reference resources :https://www.cnblogs.com/N0r4h/p/12257848.html
https://blog.csdn.net/weixin_39190897/article/details/86772765
边栏推荐
- 数字电路基础(四) 数据分配器、数据选择器和数值比较器
- 函数:求1-1/2+1/3-1/4+1/5-1/6+1/7-…+1/n
- [issue 18] share a Netease go experience
- Solutions to common problems in database development such as MySQL
- [pointer] octal to decimal
- XSS (cross site scripting attack) for security interview
- 《统计学》第八版贾俊平第八章假设检验知识点总结及课后习题答案
- {1,2,3,2,5}查重问题
- 数字电路基础(五)算术运算电路
- 5分钟掌握机器学习鸢尾花逻辑回归分类
猜你喜欢
1. Payment system
四元数---基本概念(转载)
Keil5 MDK's formatting code tool and adding shortcuts
Uibutton status exploration and customization
Query method of database multi table link
Hcip -- MPLS experiment
ES全文索引
Statistics 8th Edition Jia Junping Chapter 5 probability and probability distribution
《统计学》第八版贾俊平第十一章一元线性回归知识点总结及课后习题答案
Fundamentals of digital circuits (III) encoder and decoder
随机推荐
High concurrency programming series: 6 steps of JVM performance tuning and detailed explanation of key tuning parameters
[pointer] use the insertion sorting method to arrange n numbers from small to large
数据库多表链接的查询方式
Chain team implementation (C language)
[pointer] find the value of the largest element in the two-dimensional array
Harmonyos application development -- address book management system telmanagesys based on listcontainer [phonebook][api v6]
Function: calculates the number of uppercase letters in a string
Statistics 8th Edition Jia Junping Chapter 10 summary of knowledge points of analysis of variance and answers to exercises after class
Résumé des points de connaissance et des réponses aux exercices après la classe du chapitre 7 de Jia junping dans la huitième édition des statistiques
Numpy Quick Start Guide
Sword finger offer 23 - print binary tree from top to bottom
【指针】查找最大的字符串
How to test whether an object is a proxy- How to test if an object is a Proxy?
Query method of database multi table link
Database monitoring SQL execution
Fundamentals of digital circuits (II) logic algebra
1. Payment system
Lintcode logo queries the two nearest saplings
What level do 18K test engineers want? Take a look at the interview experience of a 26 year old test engineer
Overview of LNMP architecture and construction of related services