search
HomeOperation and MaintenanceSafetyHow to analyze and trace the source of WebShell file upload vulnerability in Mozhe Shooting Range

How to analyze and trace the source of WebShell file upload vulnerability in Mozhe Shooting Range

1. After opening the URL, I found that it is an upload page

How to analyze and trace the source of WebShell file upload vulnerability in Mozhe Shooting Range

2. Directly upload the file with the suffix php and found that Unable to upload

How to analyze and trace the source of WebShell file upload vulnerability in Mozhe Shooting Range

How to analyze and trace the source of WebShell file upload vulnerability in Mozhe Shooting Range

3. Use BurpSuite to capture packets and change the suffix of the uploaded file with the suffix php to php5. Bypass

How to analyze and trace the source of WebShell file upload vulnerability in Mozhe Shooting Range

#4. Use a kitchen knife to connect. In the directory of var/www/html, a file with KEY is found. Open it and you will see the key

How to analyze and trace the source of WebShell file upload vulnerability in Mozhe Shooting RangeHow to analyze and trace the source of WebShell file upload vulnerability in Mozhe Shooting RangeHow to analyze and trace the source of WebShell file upload vulnerability in Mozhe Shooting Range

5. Open another URL, which is also an upload page, but the upload list is set to only allow files with the suffix .gif .jpg .png to pass through Upload

How to analyze and trace the source of WebShell file upload vulnerability in Mozhe Shooting Range

6. We write a txt one sentence Trojan and change its suffix to jpg

How to analyze and trace the source of WebShell file upload vulnerability in Mozhe Shooting Range

7. When uploading, use BurpSiuit to capture the packet and modify the file suffix to show that the upload was successful

How to analyze and trace the source of WebShell file upload vulnerability in Mozhe Shooting Range

How to analyze and trace the source of WebShell file upload vulnerability in Mozhe Shooting Range

How to analyze and trace the source of WebShell file upload vulnerability in Mozhe Shooting Range

##8. Use Ant Sword to connect and find the key

How to analyze and trace the source of WebShell file upload vulnerability in Mozhe Shooting Range in var/www/html

The above is the detailed content of How to analyze and trace the source of WebShell file upload vulnerability in Mozhe Shooting Range. For more information, please follow other related articles on the PHP Chinese website!

Statement
This article is reproduced at:亿速云. If there is any infringement, please contact admin@php.cn delete

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

Video Face Swap

Video Face Swap

Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Tools

Atom editor mac version download

Atom editor mac version download

The most popular open source editor

SublimeText3 Linux new version

SublimeText3 Linux new version

SublimeText3 Linux latest version

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

SublimeText3 English version

SublimeText3 English version

Recommended: Win version, supports code prompts!

SAP NetWeaver Server Adapter for Eclipse

SAP NetWeaver Server Adapter for Eclipse

Integrate Eclipse with SAP NetWeaver application server.