I thought it was an ASCII code encrypted.
114,133,114,112,130,129,114, 45,127,114,126,130,114,128,129, 75.
All digits minus 13, and then decimal decryption
The Code obtained after running is
From WebShell's Blog
Brief description: by default, the upload. asp file in the background is restricted only to asp | aspx | php | jsp | asa | shtml | html | htm | js | vbs.
Detailed description:
upload a file
Www.2cto.com
Brief description:
This is an old vulnerability that was previously reported. After consulting wooyun, I replied that I could submit the vulnerability. So I submitted the vulnerability and wanted to earn Rank!
Vulnerability: QQ mail does not
Accidentally flipped through the code to find the search Injection Vulnerability (POST)
Magic_quotes_gpc = Off
Use salt + md5 for passwords with high strength
Get username and password
'AND (SELECT 2861 FROM (select count (*), CONCAT (SELECT
Team: t00ls Author: Cond0r
Code.
Vote. php
If ($ _ REQUEST ['op'] = 'Poll '){
If ($ _ POST ['op'] & $ _ POST ['vtid']) // submit the Post
{
/* Determine whether a ticket has been cast for 24 = 86400 hours */
$ Times = 11600;
$ Add_ip = true;
$
Author: left
The test environment is win7sp1 + iis7.5 + mysql5.1, the target is a small phpcms website, the address of the injection exists is http://www.bkjia.com/show. php? Id = 2
For the first time, I wrote an article ......
1. mysql
Four VPN attack methods and hackers are introduced in "How to Avoid VPN Security Vulnerabilities (I)". This article will continue to introduce you to the security of MPLS VPN; how should enterprises build appropriate VPNs to ensure information
1. user_reg.asp
'Register
Case "user_reg_do"
User_name = trim (request. form ("user_name "))
User_pass = trim (request. form ("user_pass "))
User_pass_again = trim (request. form ("user_pass_again "))
User_mail = trim (request. form ("user_mail "
How to make the. net program run automatically under the administrator privilege VS2010 c # The compiled WINFORM program runs as administrator in Win7
Windows 7 and vista improve system security. You must specify "Run as administrator" to grant
Preface during the test, we found a site with a PHP code injection vulnerability, which is really hard to see. Now let's talk about the cause of this vulnerability and the methods for its use and repair.The following code snippets introduce the PHP
(1) mysql_real_escape_string -- escape special characters in the strings used in SQL statements, and take into account the usage of the connected current character set as follows:
$sql = "select count(*) as ctr from users where
In/admin/uplodes/set_page.php: the place where arbitrary files are read:
elseif ($action=='get_page_data'){require(PBBLOG_ROOT . '/includes/json.class.php');$json = new JSON;$file=$_POST['template_file'];$res=array('type'=>'get_page_data','content'
Some time ago, when I was reading py, I went to this friend's blog. When I went to my blog today to see what information was updated, I saw that he sent an IP address. Because I am engaged in web security, I have seen many getip vulnerabilities and
0x00Brief Introduction
CSRF (Cross-site request forgery) Cross-site request forgery. Because the target site has no token/referer restrictions, attackers can perform operations as users for various purposes. Based on the HTTP request method, CSRF
There are multiple CSRF, which can be modified in many ways.1. Modify the shipping address. When there is only one shipping address in the account, many people do not pay attention to the shipping address and pay directly xss. ajax ('
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.