Some time ago, I saw a buddy in the group share a "University's Modern Teaching Management System Vulnerability". The method is very simple and webshell will be available soon.
Similar to fck, it also uses the upload function.
Ftb. imagegallery. aspx is a directory with the upload function, which can be opened after being added to the website domain name. Upload an ASP Trojan with a DNS record (you need to change the suffix to make it public for security reasons .) Direct access. As follows:
First: Search
Step 2: Find the domain names of the websites that can be uploadedUpload successful.
Step 3: access the directory of the network horse
Proof:
(The pictures above are too lazy to CAPTCHA while looking at images. They are all horses, black and wide. Slow down. Don't turn the server into a horse farm !)
Solution: (Do not spray what you want)
1. Change the Management System (the most decisive and the best solution .)
2. If the website administrator is too reluctant to change, change the path "Ftb. imagegallery. aspx. (In fact, this is not recommended. After all, if you really want to scan the directory, the directory will be scanned !)
3. Set access permissions or change to an error page.
4. Stop parsing Trojans with changed suffixes.
My personal summary should also be available online. If anything is wrong, correct it.
By: blackeagle www. blackeagle. Name/