Author: lonely prodigal son
Library brute-force vulnerability ODAY, celebrated the first day of 2010
I got SHELL when I checked a website to see if there are other ideas,
I suddenly remembered seeing conn. asp in the inc directory.
/Inc/conn. asp has never been successful.
Conn. asp is usually a file in ASP programs that contains database connection information.
So I tried searching inurl:/inc/conn. asp,
I found many such networks, and some of them can be viewed.
After entering "inurl: conn. asp", we found that there are also many sites that can be viewed.
I guess I accidentally constructed the keyword "inurl:/inc + conn. asp ".
There are also many discoveries. You can view the database connection information,
You also know the directory.
Haha, once you know the database address, you can get the site,
So I sent it to dtplus for sharing.
I have no structure. Let's guess for ourselves,
You also know the directory.
Haha, once you know the database address, you can get the site,
So I sent it to dtplus for sharing.
I have no structure. Let's guess for ourselves,
Google Keyword inurl:/inc/conn. asp,
Inurl: conn. asp
Inurl:/inc + conn. asp
Therefore, it is necessary to think more about script penetration. Taking a small station is not only a single idea, but also a method of the former. You can also find ODAY on your own, hope to help cainiao !!!