File contains vulnerabilities-middleware log contains bypass

Middleware log contains bypass

Usage

When a PHP file contains only local inclusion vulnerabilities and no remote inclusion vulnerabilities, but it cannot upload normal files (no upload function), this means that there are inclusion vulnerabilities but cannot be used. At this time, an attacker may Use apache log files to invade.

Middleware logs

After the Apache server is running, two log files will be generated. These two files are access.log (access log) and error.log (error log). The apache log file records our operations and writes to the access log file access. Among the logs
For example: http://192.168.1.55:8080/dvwa/vulnerabilities/fi/?page=…/…/…/…/Apache-20\logs\access.log

Actual operation

Using a low DVWA environmental security level

First of all, we need to write a sentence Trojan into the access.log access log,
directly add a sentence Trojan to the URL, and press Enter. Although an error will be reported, it does not matter. After our sentence Trojan has been recorded in the access file, we only need to use the local Include the file to run access.log. Just
use ... / to adjust the directory

Published 94 original articles · praised 8 · visits 5219

Guess you like

Origin blog.csdn.net/weixin_43079958/article/details/105398504