当前位置:网站首页>In a word, several common methods of uploading Trojan horse
In a word, several common methods of uploading Trojan horse
2022-06-22 11:37:00 【CNRio】
1, utilize 00 truncation ,brupsuite Upload
utilize 00 Truncation is to use programmers to filter the upload path of files when writing programs , produce 0X00 Upload truncation vulnerability .
Assume that the upload path of the file is http://xx.xx.xx.xx/upfiles/lubr.php.jpg , adopt Burpsuite Packet capture truncation will lubr.php hinder “.” Switch to “0X00”. When uploading , When the file system reads ”0X00″ when , Will think the file is over , So that lubr.php.jpg The content of lubr.php in , So as to achieve the purpose of attack .
2, Construct server-side extension detection upload
When the browser submits the file to the server , The server will detect the file extensions submitted by the browser according to the set blacklist , If the extension of the uploaded file does not meet the restriction of the blacklist , Will not be uploaded , Otherwise, the upload will succeed .
Explanation of this example , In a word, the file name of the Trojan horse lubr.php Change to lubr.php.abc. First , When the server verifies the file extension , The proof is .abc, As long as the extension conforms to the server-side blacklist rules , Upload . in addition , When the file is accessed on the browser side ,Apache If you can't parse .abc Extension , Will look forward to the resolvable extension , namely ”.php”. In a word, the Trojan horse can be parsed , It can be connected through a Chinese kitchen knife .
3, Bypass Content-Type Detect file type upload
When the browser uploads files to the server , The server uploads files Content-Type Type to test , If the white list allows , It can be uploaded normally , Otherwise, the upload will be invalid . Bypass Content-Type File type detection , Just use Burpsuite Intercept and modify the file in the package Content-Type type , Make it comply with the rules of the white list , Achieve the purpose of uploading .
4, Construct picture Trojan horse , Bypass file content detection upload Shell
General document content verification use getimeagesize() Function detection , Will determine whether the file is a valid file image , If it is , Allow to upload , Otherwise, you are not allowed to upload .
Make picture Trojan horse : copy 1.jpg/b+2.php/a 3.jpg
Three methods of making picture Trojan horse
https://blog.csdn.net/whatday/article/details/54731043
边栏推荐
- 从原型链到继承,图解来龙去脉,推荐收藏
- 牛客练习赛94F题解
- Cloud minimalist deployment svelte3 chat room
- Save: software analysis, verification and test platform
- Redis common commands
- The role of connect in the network
- 6-9 应用间通信 - 子应用通信
- 2022年度敏捷教练行业现状报告(2022 State of Agile Coaching Report)
- 奋斗吧,程序员——第四十八章 千金纵买相如赋,脉脉此情谁诉
- 2022 the latest software testing classic summarized by major manufacturers. After reading it, I'm not afraid I won't get an offer
猜你喜欢

Basic principles of the Internet

Web Configuration of Visual Studio Code

Convert the colored liquid image into transparent liquid, and CMU teaches the robot to accurately control how much water is poured into the cup

PHP database mysql question

【软工】 概论 & 过程和生命周期建模

How much memory does a TCP connection occupy?

【软工】计划和项目管理

IDE 的主题应该用亮色还是暗色?终极答案来了!

牛客挑战赛55E题解

Community article | mosn building subset optimization ideas sharing
随机推荐
Pychart debugging is stuck and connected appears
PHP website, how to achieve the function of batch printing express orders?
Ones attends the first "Lean Software Engineering Conference" to share performance improvement practices
PHP database mysql question
奋斗吧,程序员——第四十八章 千金纵买相如赋,脉脉此情谁诉
R language performs two sample t-test on the specified covariates based on the with function, and the t.test function performs Welch two sample t-test analysis and two independent sample t-test on the
Microsoft edge browser dev 104 is released, and the deep / shallow theme switching is smoother
Leetcode algorithm Delete the node of the linked list
[Software Engineering] Introduction & process and life cycle modeling
牛客练习赛94D题解
奋斗吧,程序员——第三十九章 人生不失意,焉能慕知己
庖丁解牛,这八个MySQL经典错误,你遇到几个?
Go微服务(一)——RPC入门
mysql 锁查看
Electron adding SQLite database
R语言epiDisplay包的idr.display函数获取泊松回归poisson模型的汇总统计信息(初始事件密度比IDR值、调整事件密度比IDR值及其置信区间、Wald检验的p值和似然比检验的p值)
线程死锁的理解
Popular understanding of TCP 3-time handshake
R语言使用自定义函数编写深度学习阶跃step激活函数、并可视化阶跃step激活函数
What is the image used to parse the Tso of the DN binlog? It seems that there is no direct use of mysqlbinlog?