April 7, 2016 Infiltration learning summary

Source: Internet
Author: User

Today the main study of PHP Pony test writing, understand some of the principles of PHP horse, but also learned a few back-end that Shell method.


Dismount principle this piece, nothing to say, imaginative achievement here inexpressible (hehe), mainly write about, take the method of shell.


    1. Database backup, now the database has the function of data backup, using this function, we in the background after the database backup write a sentence code, modified file name xxx.php;. SQL form, so that the use of server file Parsing vulnerability can be the database file to parse out the effect of the script, and then with a kitchen knife link.

2. Editor take the shell, if we do not find the editor's address before entering the background, after entering the background, we can find out the editor's page, through the network listening package find the address of the editor, with the editor's address, we can try to enter the background of the editor, modify the file upload style, In the upload a word, or some website, after the editor address plus admin_style.asp can go directly to the style modification interface, modified can also upload.


3. Site Configuration page Insert a word, in the Site Configuration page, the modified configuration information will be directly written to the site's files, using this, we can directly write a sentence, but note that here the content in the file, is surrounded by quotation marks and script identification symbols, So we need to close the quotes and identifiers so that a word is exposed, only so that the chopper can connect.


4. Import a sentence through SQL command: Most of the sites have SQL command execution page, in this page we can also insert a sentence, for example: select ' A word ' into the out file ' d:\ddf.php ';


5. Template modification


6. Grab the package upload (with the bright Kid for a specific website program can be grabbed upload)

This article is from the "Xiao Yu" blog, please be sure to keep this source http://791120766.blog.51cto.com/10836248/1761562

April 7, 2016 Infiltration learning summary

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.