Newbie takes webshell for the first time and uses the bypass intrusion detection technology
Of course, the target website for intrusion detection is owned by the Japanese Empire.
Site: www.newtb.co.jp first found the injection point. I scanned the tool and found no vulnerabilities in the scope of my capabilities. Then I used Yu Jian to find the vulnerability. There are many sites. Casually looked for a: http://www.security-icare.com/product.asp? Pid = 130 | 132 & ID = 1183 can be injected, and then the table segment is burst. Field. The tragedy did not pop up, and nothing was found after scanning the directory. Frustrated. No longer .. Don't worry. I tried my usual password .... 'Or'' = ''or. The captured packet is uploaded to the shell. Then I looked at the Directory and did not have the permission. I tried a lot of methods to raise the server and finally asked for help. After a long time, he made some effort and said that I didn't understand what was going on. I got the account and password and got a fright when I got into the server. Is an IDC100 + site .. I found the jp Japanese site, but I did not do anything. A txt file is hung.
The ticket is successfully received. It's all idle.