漏洞演练系统
文章平均质量分 55
zrools
这个作者很懒,什么都没留下…
展开
-
BTS PenTesting Lab - A4 Insecure Direct Object References
不安全的直接对象引用 Viewing Details 源文件:/btslab/myprofile.php 关键代码地址http://192.168.1.228/myprofile.php?id=1 (需要先登录)像id=1这种容易猜测,如果没有判断权限,就容易出现信息泄露的问题,查询代码从头到尾都没有进行权限判断,只要任意登录用户都可以查询Modifying email ID 源文件:/btslab原创 2015-12-28 09:30:31 · 1027 阅读 · 0 评论 -
DVWA-WooYun SQL Injection
乌云靶场 - SQL InjectionSqli QUERY_STRINGWooYun-2014-61361 Sourceinject_check(strtolower($_SERVER['QUERY_STRING'])); $id = $_GET['id']; $getid = "SELECT first_name, last_name FROM users WHERE user_id = $id原创 2016-02-05 17:23:45 · 3242 阅读 · 0 评论 -
BTS PenTesting Lab - A3 XSS
Reflected(GET)Challenge 1 源文件://btslab/vulnerability/xss/xss1.php # 第8行 <?php if(isset($_GET['keyword'])) echo "No results found for ".$_GET['keyword']?>直接echo提交过来的内容,提交<script>alert('xss');</script>地址原创 2015-12-26 10:02:16 · 1505 阅读 · 0 评论 -
BTS PenTesting Lab - A1 Injection
SQL InjectionSql Injection 1 源文件:/btslab/vulnerability/ForumPosts.php # 第7行 mysql_query("DELETE from posts where postid='$id'") or die("Failed to Delete the post");# 第14行 $result=mysql_query("select *原创 2015-12-25 09:20:25 · 1140 阅读 · 0 评论 -
BTS PenTesting Lab - More..
SSRF Server-side Request Forgery源文件:/vulnerability/ssrf/ssrf.php 通过curl可获取图片,下载文件,读取文件内容等,尝试读取/etc/passwdClickjacking 源文件:/vulnerability/clickjacking/cj.php 源码就是删除自己账户,利用视觉欺骗手段,让用户在不知情的情况下,点击攻击者欺骗的位置原创 2015-12-29 09:13:23 · 878 阅读 · 0 评论 -
BTS PenTesting Lab - A10 Unvalidated Redirect & Forward..
Open Redirect 源文件:/vulnerability/url/open.php http://192.168.1.228/vulnerability/url/open.php?u=http://www.breakthesecurity.com修改u参数就可以任意跳转,可用于钓鱼等Open Forward 源文件:/vulnerability/url/forward.php 修改u参数就可原创 2015-12-29 09:10:24 · 688 阅读 · 0 评论 -
BTS PenTesting Lab - A8 CSRF
CSRF 1: Change Info 源文件:/vulnerability/csrf/changeinfo.php 由于是get请求,可以使用img等标签自动加载<img src="http://192.168.1.228/vulnerability/csrf/changeinfo.php?info=CSRF_TEST!&change=Change" /> 打开效果CSRF 2: Change E原创 2015-12-29 09:06:33 · 699 阅读 · 0 评论 -
BTS PenTesting Lab - A7 Missing Function Level Access Control
功能级权限控制缺失源文件:/admin/adminlogin.php 关键代码# 第16行 $result=mysql_query("select * from users where username='$username' and password='$password' and privilege='admin' ") or die(mysql_error());;username与passw原创 2015-12-29 09:03:10 · 1120 阅读 · 0 评论 -
BTS PenTesting Lab - A5 Security Misconfiguration
安全配置错误 Setup Page not removed 源文件:/setup.php 关键代码地址http://192.168.1.228/setup.php# 第7行 if($_POST['install']==1)只要post提交install就可以重置系统原创 2015-12-29 08:57:07 · 728 阅读 · 0 评论 -
BTS PenTesting Lab - Installation
漏洞类型 SQL Injection XSS(includes Flash Based xss) CSRF Clickjacking SSRF File Inclusion Code Execution Insecure Direct Object Reference Unrestricted File Upload vulnerability Open URL Redirection Server原创 2015-12-24 11:17:40 · 1118 阅读 · 0 评论