Jump to content

Title: Remember the penetration test of the spinach demonstration agent site

Featured Replies

Posted

I've been browsing on QQ space

图片

So the following is here. Open the site, it’s very considerate and you can enter the front and back office.

图片

图片

Let's talk about the loopholes below

SQL injection, there is a set of programs based on a template two-opening, which happens to be the one I have in my hand and have audited. So take it easily.图片

No filtering, just make a note.

图片

I suspect that uploading this arbitrary file is the backdoor left by the developer.

图片

Those who can understand can see it at a glance. Just create a new form locally and submit it.

However, there is a problem with the target site. The path is not echoed when uploading, so it should be commented on echo. Locally built tests,

图片

Modify the upload file name to this format.

Idea: Reproduce the upload locally and submit it at the same time as the remote. At the same time point, the returned file name should be the same.

Test 图片

Reappearance is successful.

图片

Click until it is.

I would like to ask you guys who are proficient in php auditing

图片

Is this code useful?

图片

Trying various truncations can never execute php code.

Reprinted from the original link: https://mp.weixin.qq.com/s/hduQd7Jm72b00oSU9Ip1BQ

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

Important Information

HackTeam Cookie PolicyWe have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.