Breakthrough anti-injection continue Injection

Source: Internet
Author: User

I published an article on advanced application of injection transfer, which mentioned the breakthrough in anti-injection. The following is an example of an early animated video, which is now converted into an article.
Bytes ----------------------------------------------------------------------------------------
Today, I met a website.
Http://www.etwj.net/ B2B _cpinfo.asp? Id = 832

Wow, B2B Baier buys a mall. It's cheaper for me.
With oday DE> DE> Of course, there are other vulnerabilities, but today we mainly use this
But when I enter, I find that
This
Preview source code

 


Bad luck. The original Bell buy only defends against get injection, and now does not even defend against post? What should I do. Someone may think of using cookies for injection.
However, if we use cookies injection to bypass injection, that article will be... Too..., I do not dare to send it in t00ls either.
Analyzed below
Use of the original anti-injection get Model DE> DE> This code can be used to bypass id --> % 69d
I guess that post can also be used ??
I learned asp ..... the parameters in the post form cannot be url encoded, that is, <input type = text name = id value = ""> <input type = text name = % 69d value = ""> it does not work.
That is, you cannot construct the form to put the id --> % 69d

What should we do ??

At this time, I thought of the great lonely hedgehog.

Generate a transit
 

Preview source code print about
DE> 01 DE> DE> Dim DE> DE> Fy_Url, Fy_a, Fy_x, Fy_Cs (), Fy_Cl, Fy_Ts, Fy_Zx DE>
DE> 02 DE> DE> Fy_Cl = 1 DE>
DE> 03 DE> DE> Fy_Zx = DE> DE> "index. Asp" DE>
DE> 04 DE> DE> On DE> DE> Error DE> DE> Resume DE> DE> Next DE>
DE> 05 DE> DE> Fy_Url = Request. ServerVariables ( DE> DE> "QUERY_STRING" DE> DE>) DE>
DE> 06 DE> DE> Fy_a = split (Fy_Url, DE> DE> "&" DE> DE>) DE>
DE> 07 DE> DE> redim Fy_Cs (ubound (Fy_a )) DE>
DE> 08 DE> DE> On DE> DE> Error DE> DE> Resume DE> DE> Next DE>
DE> 09 DE> DE> for Fy_x = 0 to ubound (Fy_a) DE>
DE> 10 DE> DE> Fy_Cs (Fy_x) = left (Fy_a (Fy_x), instr (Fy_a (Fy_x ), DE> DE> "=" DE> DE>)-1) DE>
DE> 11 DE> DE> Next DE>
DE> 12 DE> DE> DE> DE> Fy_x = 0 to ubound (Fy_Cs) DE>
DE> 13 DE> DE> If DE> DE> Fy_Cs (Fy_x) <> DE> DE> "" DE> DE> Then DE>
DE> 14 DE> DE> If DE> DE> Instr (LCase (Request (Fy_Cs (Fy_x ))), DE> DE> "" DE> DE>) <> 0 or Instr (LCase (Request (Fy_Cs (Fy_x ))), DE> DE> "and" DE> DE>) <> 0 or Instr (LCase (Request (Fy_Cs (Fy_x ))), DE> DE> "select" DE> DE>) <> 0 or Instr (LCase (Request (Fy_Cs (Fy_x ))), DE> DE> "update" DE> DE>) <> 0 or Instr (LCase (Request (Fy_Cs (Fy_x ))), DE> DE> "chr" DE> DE>) <> 0 or Instr (LCase (Request (Fy_Cs (Fy_x ))), DE> DE> "delete % 20 from" DE> DE>) <> 0 or Instr (LCase (Request (Fy_Cs (Fy_x ))), DE> DE> ";" DE> DE>) <> 0 or Instr (LCase (Request (Fy_Cs (Fy_x ))), DE> DE> "insert" DE> DE>) <> 0 or Instr (LCase (Request (Fy_Cs (Fy_x ))), DE> DE> "mid" DE> DE>) <> 0 DE> DE> Or DE> DE> Instr (LCase (Request (Fy_Cs (Fy_x ))), DE> DE> "master ." DE> DE>) <> 0 DE> DE> Then DE>
DE> 15 DE> DE> Select DE> DE> Case DE> DE> Fy_Cl DE>
DE> 16 DE> DE> DE>

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.