By love letter
In the search box, enter a keyword, which must be searched for on this site. For example, I entered 1 on this site and found a lot of news.
Determine whether there is an injection vulnerability in the search box.
In the search box,
Use master
Go -- Check whether xp_mongoshell is tampered Select * from master .. syscomments where object_name (id) = xp_mongoshell and text <> xplog70.dll Go -- Check whether other stored procedures are tampered Select object_name (id), * from
Author: by radish headCopyright: 3EST Information Security Team (www.3est.com)Target main site: Target Website:Www.huangshengyi.com
First of all, let's use the most basic method. The ASP site method is changed to several types, and thinking is the
Let's take a demonstration of zzzhk's horse today. His horse backdoor is also the best.
First, we can see
Then we will use an asp anti-encoding tool, a bunch of Baidu tools, etc.
Note that the character "X" will be removed from the semi-automated
Recently, I met a PHP site.
Http://www.xxx.com/Http://www.xxx.com/index.php? Id = 112This injection point
Judgment basis: and 1 = 1 and 1 = 2 you know it's basically similar to ASPStart manually:The order by statement is used to sort the result
Directory or file permission settings are incorrect, which can cause intrusion!To fundamentally solve the problem, we recommend that all users upgrade the controlled terminal installation package to version 2011-3-15, and click Set "ASP.net strict
The website found a weak PHPMYADMIN result and logged in with a weak password. The absolute path was revealed and then the SQL statement was executed. The SHELL found that the file import. php was missing and the MYSQL statement could not be
After learning the injection statement and explanation of the injection statement, many friends may not distinguish and determine whether the injected website uses a database, in this lesson, we will learn how to use injection points to determine
Background:/wp-login.php Upload the first sentence of gif89 at will: Gif89a?);?> Record upload location Modify 404 page: wp-admin/theme-editor.php? File =/home/timp_3/CHEAPERCOSMETICDENTISTRYABROAD. COM/wp-content/themes/twentyten/404.php& theme =
// Database explosionSelect name from sysdatabases// Violent tableAnd 1 = (select top 1 quotename (name) from sysobjects where xtype = CHAR (85) and name not in (select top N name from sysobjects where xtype = CHAR (85 )))// Violent FieldAnd 1 = (
I have read an article about cross-origin XSS using iframe a long time ago.
Although we also talk about using an external domain as xss proxy, there are too many restrictions in the article, and it is based on ie6, so it is not reliable to
Source: Traces Space
Code http://www.venshop.com/down/venshop.rarSmall Program, forget itAd_chk.asp: Determine the Administrator Logon status
If Request. cookies ("venshop") ("admin_name") = "" or Request. cookies ("venshop") ("admin_pass") = "" or
Author: LengF Time: 2011-06-24
I have done some tests recently, and I have summarized some of my skills to facilitate my learning. If you think it is useful, let's go!
Tip 1: use the File Inclusion vulnerability in PHPIf
Include ($ _ GET [p]. ". php
Statement: Although there is a lot of information about manual blind injection of mysql on the Internet, most of the statements are too complicated.
Learn about the IFORMATION_SCHEMA library before learning blind note.
The built-in system database
Brief description: design defects, lax restrictions, unrestricted voting by sending packets!
I personally think that voting in this way is generally used as a reference, or purely democratic.Detailed description:POST/ajax/post_vote? Aid = 145 HTTP/1
Http://hot.qunar.com/news_nr.php? Id =-1104 orThis works too ???
Proof of vulnerability:
Html> http://www.bkjia.com/Article/201107/95982.html
Refer to this article
17 and (select 1) = (select0
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.