As a core part of a site, its importance is naturally self-evident, and the network managers have painstable database renames, plus special symbols to increase security. However, recent security sites have been found and downloaded, which is the very hot "bliss" technology discussed recently. I have also studied this technology in all the friends and the habitant and hacker X archives. Although the research results are not a lot, I hope to have a throwing role. Below I will take two systems to do instance analysis:
Power article system
Generally speaking, there will be a file that connects to data in each site program file (generally conn.asp), of course, this file name and path are not fixed, some are in the root directory, some are in a special folder. Usually this folder is named INC, and the file name is conn.asp. If you link this with the branches, people will usually think that by accessing this file, you will get information about the database, and in fact, we will directly access this file, you won't get the information we want, so you need to combine some vulnerabilities. The purpose of reaching the branches.
First of all, let's briefly introduce this program, the dynamic article system is divided into commercial SQL version and free Access version, and we are of course Access version here. The program's Conn.ASP file is used to connect the database. In / incapacity, the database file is in the / Database directory. Connecting the database is relative path: dB = "Database / adsfkldfogowerjnokfdslwejhdfsjhk.mdb"
The database path leak hazard should be considered by programmers, because Conn.asp file itself has a hidden danger, causing an attacker to obtain a database path. Vulnerability Discovery: Everyday (ie hacker X "is called SOHU's mm :), participating in researchers: strange dogs, Iceyes, snipeer. (Vulnerability analysis)
At the beginning, we thought that editor.asp file lacked enough verification, but later analyzed that we found that it was not editor.asp. The way every day just uses Editor.asp to view the server to return information. Let's demonstrate this attack process. Open this page in IE to see what role can be played (as shown).
Figure one
Obviously, this file is used to edit the content of the article, although there is no other permission, but we can edit the change of the HTML page. Click "Original Code" to find such a content: