Google Dorks:inurl:"default_image.asp"
inurl:"default_imagen.asp"
inurl:"/box_image.htm"
သင္တုိ ့ ၾကိုက္တဲ့လင့္တစ္ခုကို သြားလုိက္ပါ..ျပီးရင္
ကုိသင္ခ်င္တဲ့ဖုိင္ တင္ပါ.. shell , html , image ,etc...
ျပီးသြားရင္ တင္ျပီးတာနဲ ့လင့္ေနာက္မွာ /cgi/editor/include/yourfile
ဥပမာအေနနဲ ့စမ္းဖုိ ့ ေအာက္ကလင့္ကိုသြားလုိက္ပါ...
မလုပ္ရေသးတဲ့လင့္ေလးပါ
http://www.bid1.co.kr/cgi/editor/include/box_image.htm
Deface လုပ္ျပီးသားလင့္ပါ..
http://www.bid1.co.kr/cgi/upload_img/mc.html
Saturday, May 19, 2012
Deface,Shell and Image Upload Vulnerability
Subscribe to:
Post Comments (Atom)





0 comments:
Post a Comment