Author: President @ shadow team (www.anying.org) must indicate the author and team website.
In the past, the simple sister wrote "still a GetShell" to write IIS7.5 + DZ using parsing to generate a horse GetShell Article address: http://www.bkjia.com/Article/201305/210828.html
Today, the GetShell uses the nginx + DZ nginx Parsing Vulnerability. GetShell has no special interest. The condition is that the web server Nginx or IIS7.0 or IIS7.5 supports the php language. information collection: today, a friend of the Communist Party of China said that his website has been occupied by the day and that he used the 0day of DZ. Then I said it was impossible. It was so high-profile-so I saw his website, let's take a look at what web servers and website programs are used.
It indicates nginx + DZ. Isn't it due to date? It's not 0-day at all. How do you know what web server he is using? There are many ways to report errors, or use tools for detection: since nginx does not use the nginx parsing vulnerability, I am sorry for this Parsing Vulnerability, So I conducted another GetShell, first, we use Google or Firefox to open the website for registration and then edit the profile picture. Then, F12 opens our developer tool to upload and capture packets, as for what we capture, of course, our image address, because the DZ avatar is uploaded. When we upload the original image, we will crop it and then upload it again, that is, the final image address is not our original image code. We need to capture the image address for the first upload.
Then select the image to upload our sentence image to upload
Here we capture the package address and copy the next package.
This is the one-sentence image we uploaded.
Then you will know how to use the nginx Parsing Vulnerability to get the shell
Then, when I connect to the server in one sentence, the last image is often omitted. Summary: nginx + php is due to daily failures.