Text / Tu Yong Ge
This article has been published in the hacker X file, reproduced please indicate
Since the opening of the mobile network 7, the upload vulnerability of various systems came one after another. Their vulnerability principle is basically almost similar, and it is slightly different in the method. In short, the brief can be summarized as a few steps: first capture the package, then modify the file type, then add space after the upload path, use the hex editor Change the space to 00 and finally submitted with NC. Of course, it is best to find a specific UPFILE file comes from yourself, which helps to improve the understanding and memory of vulnerabilities!
There is no very deep technology in this article, but it is only the system that has discovered the upload vulnerability by programming language, and through a software of Guilin veterans, combined with examples explain the vulnerability utilization method of various systems. Upload a variety of popular WebShells in specific examples for reference! At the same time, I hope that I can remind some of the programmers to pay attention to the strictness of thinking when programming, avoiding a thousand miles of embankments to collapse! Let's start with this tool from the veterans!
Briefly introduce this program of the veteran, the interface is shown in Figure 1 below:
In order to facilitate explanation, we will explain two files of DVBBS's Upfile.asp and Reg_upload.asp (do not necessarily understand all, probably knowing). The UPFILE.ASP file is a file with the upload vulnerability, and the REG_UPLOAD.ASP file is the parameters used when filling the pattern tool, that is, the parameters used in the execution of this file are from REG_UPLOAD. The content submitted by the form in the ASP file!
Upfile is uploaded by generating an Form table (in the REG_UPLOAD.ASP file). code show as below: