pikachu学习记录(二)

pikachu学习记录(二)

学习来自简简大佬的博客 https://jwt1399.top/posts/30313.html#toc-heading-14

SQL注入

数字型注入POST

image-20201222215530926

字符型注入

image-20201222215949662

搜索型注入

image-20201222220544274

image-20201222221312762

RCE(命令注入)

exec "ping"

window

“|” 管道符,前面命令标准输出,后面命令的标准输入
“&” commandA & commandB 先运行命令A然后运行命令B
“||” commandA || commandB 运行命令A,如果失败则运行命令B
“&&” commandA && commandB 运行命令A,如果成功则运行命令B

linux
“|” 管道符,前面命令标准输出,后面命令的标准输入
“&” commandA & commandB 先运行命令A然后运行命令B
“||” commandA || commandB 运行命令A,如果失败则运行命令B
“&&” commandA && commandB 运行命令A,如果成功则运行命令B
“;” commandA;commandB执行完A执行B
“%0a” 换行符
“%0d” 回车符

image-20201224191923595

image-20201224192301835

image-20201224192356445

image-20201224192439140

exec "eval"

image-20201224192620863

image-20201224192639634

image-20201224192659289

image-20201224192715564

文件包含

本地文件包含

image-20201224193536498

远程文件包含

image-20201224194539394

不安全的文件下载

image-20201224194757969

文件上传

客户端check

image-20201224194926696

服务端check(mime)

image-20201224195029911

getimagesize()

image-20201224195230215

image-20201224195555153

越权

水平越权

image-20201224200153126

image-20201224200228300

垂直越权

image-20201224200503265

image-20201224200528876

image-20201224200618194

image-20201224200725238

image-20201224200834323

image-20201224200926648

image-20201224200942759

image-20201224201012946

image-20201224201050665

目录遍历

image-20201224201434592

敏感信息泄露

image-20201224201657745

image-20201224201724824

image-20201224201759583

php反序列化

image-20201224202033220

url重定向

image-20201224202345513

image-20201224202437685

posted @ 2020-12-24 20:30  木捏牛  阅读(153)  评论(0编辑  收藏  举报