随笔分类 -  dvwa

摘要:XSS XSS,全称Cross Site Scripting,即跨站脚本攻击,某种意义上也是一种注入攻击,是指攻击者在页面中注入恶意的脚本代码,当受害者访问该页面时,恶意代码会在其浏览器上执行,需要强调的是,XSS不仅仅限于JavaScript,还包括flash等其它脚本语言。根据恶意代码是否存储在 阅读全文
posted @ 2020-05-06 17:02 zhengna 阅读(1205) 评论(0) 推荐(0)
摘要:Impossible Level 查看源码 <?php $html = ""; if ($_SERVER['REQUEST_METHOD'] == "POST") { $cookie_value = sha1(mt_rand() . time() . "Impossible"); setcookie 阅读全文
posted @ 2020-05-06 17:01 zhengna 阅读(230) 评论(0) 推荐(0)
摘要:High Level 查看源码 <?php $html = ""; if ($_SERVER['REQUEST_METHOD'] == "POST") { if (!isset ($_SESSION['last_session_id_high'])) { $_SESSION['last_sessio 阅读全文
posted @ 2020-05-06 17:00 zhengna 阅读(616) 评论(0) 推荐(0)
摘要:Medium Level 查看代码 <?php $html = ""; if ($_SERVER['REQUEST_METHOD'] == "POST") { $cookie_value = time(); setcookie("dvwaSession", $cookie_value); } ?> 阅读全文
posted @ 2020-05-06 16:59 zhengna 阅读(302) 评论(0) 推荐(0)
摘要:Weak Session IDs 当用户登陆后,在服务器端就会创建一个会话(Session),接着访问页面的时候就不用登陆,只需要携带Session去访问。SessionID作为特定用户访问站点所需的唯一内容。如果能够计算或轻易猜到该SessionID,则攻击者将可以轻易获取访问权限,无需登录密码直 阅读全文
posted @ 2020-05-06 16:58 zhengna 阅读(541) 评论(0) 推荐(0)
摘要:Impossible Level 查看源码 <?php if( isset( $_GET[ 'Submit' ] ) ) { // Check Anti-CSRF token checkToken( $_REQUEST[ 'user_token' ], $_SESSION[ 'session_tok 阅读全文
posted @ 2020-05-06 16:57 zhengna 阅读(311) 评论(0) 推荐(0)
摘要:High Level 查看源码 <?php if( isset( $_COOKIE[ 'id' ] ) ) { // Get input $id = $_COOKIE[ 'id' ]; // Check database $getid = "SELECT first_name, last_name 阅读全文
posted @ 2020-05-06 16:56 zhengna 阅读(520) 评论(0) 推荐(0)
摘要:Medium Level 查看代码 <?php if( isset( $_POST[ 'Submit' ] ) ) { // Get input $id = $_POST[ 'id' ]; $id = ((isset($GLOBALS["___mysqli_ston"]) && is_object( 阅读全文
posted @ 2020-05-06 16:55 zhengna 阅读(619) 评论(0) 推荐(0)
摘要:SQL Injection(Blind) SQL Injection(Blind),即SQL盲注,与一般注入的区别在于,一般的注入攻击者可以直接从页面上看到注入语句的执行结果,而盲注时攻击者通常是无法从显示页面上获取执行结果,甚至连注入语句是否执行都无从得知,因此盲注的难度要比一般注入高。目前网络上 阅读全文
posted @ 2020-05-06 16:54 zhengna 阅读(680) 评论(0) 推荐(0)
摘要:Impossible Level 查看源码 <?php if( isset( $_GET[ 'Submit' ] ) ) { // Check Anti-CSRF token checkToken( $_REQUEST[ 'user_token' ], $_SESSION[ 'session_tok 阅读全文
posted @ 2020-05-06 16:53 zhengna 阅读(829) 评论(0) 推荐(0)
摘要:High Level 查看源码 <?php if( isset( $_SESSION [ 'id' ] ) ) { // Get input $id = $_SESSION[ 'id' ]; // Check database $query = "SELECT first_name, last_na 阅读全文
posted @ 2020-05-06 16:52 zhengna 阅读(868) 评论(0) 推荐(0)
摘要:Medium Level 查看代码 <?php if( isset( $_POST[ 'Submit' ] ) ) { // Get input $id = $_POST[ 'id' ]; $id = mysqli_real_escape_string($GLOBALS["___mysqli_sto 阅读全文
posted @ 2020-05-06 16:51 zhengna 阅读(1290) 评论(0) 推荐(0)
摘要:Low Level 查看源码 <?php if( isset( $_REQUEST[ 'Submit' ] ) ) { // Get input $id = $_REQUEST[ 'id' ]; // Check database $query = "SELECT first_name, last_ 阅读全文
posted @ 2020-05-06 16:50 zhengna 阅读(571) 评论(0) 推荐(0)
摘要:Impossible Level 查看源码 <?php if( isset( $_POST[ 'Change' ] ) ) { // Check Anti-CSRF token token验证 checkToken( $_REQUEST[ 'user_token' ], $_SESSION[ 'se 阅读全文
posted @ 2020-05-06 16:49 zhengna 阅读(279) 评论(0) 推荐(0)
摘要:High Level 查看源码 <?php if( isset( $_POST[ 'Change' ] ) ) { // Hide the CAPTCHA form $hide_form = true; // Get input $pass_new = $_POST[ 'password_new' 阅读全文
posted @ 2020-05-06 16:48 zhengna 阅读(370) 评论(0) 推荐(0)
摘要:Medium Level 查看代码 <?php if( isset( $_POST[ 'Change' ] ) && ( $_POST[ 'step' ] == '1' ) ) { // Hide the CAPTCHA form $hide_form = true; // Get input $p 阅读全文
posted @ 2020-05-06 16:47 zhengna 阅读(330) 评论(0) 推荐(0)
摘要:Insecure CAPTCHA Insecure CAPTCHA,意思是不安全的验证码,CAPTCHA是Completely Automated Public Turing Test to Tell Computers and Humans Apart (全自动区分计算机和人类的图灵测试)的简称。 阅读全文
posted @ 2020-05-06 16:46 zhengna 阅读(637) 评论(0) 推荐(0)
摘要:Impossible Level 查看源码 <?php if( isset( $_POST[ 'Upload' ] ) ) { // Check Anti-CSRF token 校验token checkToken( $_REQUEST[ 'user_token' ], $_SESSION[ 'se 阅读全文
posted @ 2020-05-06 16:45 zhengna 阅读(1322) 评论(0) 推荐(0)
摘要:High Level 查看源码 <?php if( isset( $_POST[ 'Upload' ] ) ) { // Where are we going to be writing to? $target_path = DVWA_WEB_PAGE_TO_ROOT . "hackable/upl 阅读全文
posted @ 2020-05-06 16:44 zhengna 阅读(2849) 评论(1) 推荐(1)
摘要:Medium Level 查看代码 <?php if( isset( $_POST[ 'Upload' ] ) ) { // Where are we going to be writing to? $target_path = DVWA_WEB_PAGE_TO_ROOT . "hackable/u 阅读全文
posted @ 2020-05-06 16:43 zhengna 阅读(975) 评论(0) 推荐(0)