First, write in front
*** The principle of this upload vulnerability is only for ASP and PHP scripts uploaded by Form format. ***
NC (Netcat)
Used to submit packets
Under the DOS interface:
NC -VV WWW. ***. Com 80 <1.txt
-vv: returning
80: WWW port
1.txt: is the packet you want to send
(For more use, please see the posts in this area)
WSE (WSOCKEXPERT)
Monitoring to this unit, capture the packet submitted by IE
(If you don't use yourself to search online, N more)
Second, the principle of vulnerability
The premise of the following example
WWW host: www. ***. COM;
BBS path: / bbs /
The vulnerability is derived from the research on uploading documents on the Internet. It is recommended to have some programming experience.
Take a look at the Upfile.asp file of DVBBS, there is no need to understand all
Upfile is to generate an Form table, as follows