1. File NameWe all know that in windows, there are rules for file names and some reserved characters are defined. They are:
(greater than): (colon)" (double quote)/ (forward slash) (backslash)| (vertical bar or pipe)? (question mark)* (asterisk)
In
Googel advanced search, Keyword: inurl: show_cat2.php? Grid =Add parameters after grid =-1 + union + select + concat_ws (char (58), username, password) + from + adminAttackers can obtain the Administrator account and password.Later, you can make
Condition: 1. Know the absolute address of the ewebeditor database.
2. Injection exists or SQL statements can be executed in the background.
Cross-database injection:
Update eWebEditor_Style in E: webhostxxxxxxxxwwwadminEditordbewebeditor. mdb
By: xhm1n9
Many of the experts in this area should know that some of them have found out in a jar, so they still let it go ~~
ecshop v2.72 front-end shell Write Vulnerability test by the attacker: submit twice, the second time any content
This is because a friend has been cheated.Http://www.okdownload.cn
Simple Query
As a result, the game went into battle. A brief look at the target, the new cloud system. All vulnerabilities have been cleared. After registering a member, you must
The SOOP Portal Member registration page contains security questions, which can be uploaded and executed using pseudo-creation shell.asp;.jpg.
Google: "soops Portal 2.0"
1. Register as a Website member; http://www.bkjia.com/member_form.asp? Do = 5
Vulnerability Type: File InclusionVulnerability Description: The stream. php download function does not strictly filter the path, causing any local file loading vulnerability.
Vulnerability Analysis: stream. php
.....
// Include_once
Author: Salvatore Fresta aka Drosophila
Official Website: joomlaextensions. co. in
Vulnerability Type: File UploadVulnerability Description: an error in the program saving function. (compose. php) allows you to upload files with any extension to
Windows IIS has been prone to vulnerabilities, but vulnerabilities can be patched. Write Permission is not a vulnerability because of improper settings of IIS. the issue of IIS write permission has been exposed for a long time. Many people use it to
Author: JulietFrom: XI ke Information Technology (Silic Group hacker operation camp)Site:Http://blackbap.orgThis is the first article.CMU may not know English, but many people have heard of it in Chinese, that is, Carnegie Mellon University. It is
Author: monyer
1. onmouseenter: When the mouse enters the selection area, the code is executed.
123456 2. onmouseleave: run the code when the mouse leaves the constituency. 123456 3. onmousewheel: the code is executed when the mouse clicks the
Text/GraphWhen winning this website, I felt very disappointed, because what I can do now is to use the WebShell obtained from a very concealed SQL injection point, in the directory where the website is located. The website administrator imposes
In many cases, we often encounter SQL injection that can be used to list directories and Run Command, but it is not easy to find the directory where the web is located, so it is difficult to get a webshell. This is a good trick:
Exec master. dbo.
Use of environment variables. Sometimes we get some surprises when viewing system variables in webshell,
For example, the default environment variable Path is:
% SystemRoot % system32; % SystemRoot % System32Wbem;
If the system has installed php,
I have read the package this article: http://www.bkjia.com/Article/201101/81705.html
Gg has a few. With the following article
1. What is Suhosin?
Suhosin is a PHP program protection system. It was designed to protect servers and users against
RAyh4c Black Box
Let's talk about the idea and specific code of using discuz xss last year.
A persistent XSS vulnerability exists in the personal signature settings of all versions of discuz x Series and below: for example, when modifying a personal
We enter the background. Access admincp. php? Frames = yes & action = members & operation = newsletter
Then send a notification with the following content: (Note the line feed)$ {Eval (chr (102 ). chr (1, 112 ). chr (1, 117 ). chr (1, 116 ). chr (1,
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.