Program: http://wapvy.cn/FILE/DOWNLOAD/2011/07/09/2011070902255801.rar
First injection: http://www.bkjia.com/bbs/bbsvice. asp? Action = view & id = [SQL]
Filtering; chicken ribs
The second serial number is used to kill the wap mobile phone network program. It is used to obtain the source address of the backend, which is the same as the principle of asp daemon backdoor,
When the Administrator clicks a specially crafted address, he will be fooled. The web is Cookies, and the wap is the sid theft identifier;
Like http://www.bkjia.com/admin/adki. asp? Sid = ad422aa442422dad244242
Go directly to the background
There are two methods to use shell: Enter shy. asp in the Self-Writing Page name; 1
Insert a sentence in the content and use the parsing vulnerability to get the backdoor/wml/shy. asp; 1. wml kitchen knife connection
Type 2 file collection
Upload the asp horse suffix gif to your FTP, remote collection address fill in http://www.bkjia.com/1.gif ?. ASP
The program successfully bypasses various filters. This process is abnormal. When you look at the end of the file, you think it is in what format. asp is used to filter out the file and bypass it with ASP, because a filter is added later ?. ASP does not affect the original address. Go to file management and check that the general address of shell is www.2cto.com/files/20124244242424242.asp.
I believe that web programs also have these vulnerabilities. Use shell to learn more.