Server Side Includes Injection
#11
(04-28-2013, 05:46 PM)alkaaf Wrote: Wew keren. Berarti ky xss yah bro? Tapi bs eksekusi cmd servernya.

iya semacam xxs .. kalau biasanya xxs kan di kolom search ..
atau di url .. kalau ini di kolom username gara" username yang kita masukin di tampilin ulang sama dia Big Grin

#12
tutorial yang bagus.. ayo temen2 yang web develop harus hati2 masalah bugs ini
FOLLOW @DutaLinux
for more question and sharing about security and Opensource only

#13
(04-28-2013, 07:11 PM)abdilahrf Wrote:
(04-28-2013, 05:46 PM)alkaaf Wrote: Wew keren. Berarti ky xss yah bro? Tapi bs eksekusi cmd servernya.

iya semacam xxs .. kalau biasanya xxs kan di kolom search ..
atau di url .. kalau ini di kolom username gara" username yang kita masukin di tampilin ulang sama dia Big Grin

Wew kok bs yah semudah itu. :d tp emg prnh bc kl SSI penuh vuln deh.

#14
(04-28-2013, 01:40 PM)Andy182 Wrote: pas ane mau tanem shellnya, malah redirect ke sini /?I+AM+A+HACKER+AND+I+WAS+TRYING+TO+BREAK+INTO+A+SITE+WITH+SSI+INJECTION+EXEC+CMD+TYPE+ATTACK+AND+SO+THEY+SENT+ME+HERE.+PLEASE+COME+FIND+ME wkwkw parah :v

itu bisa pake !ctype .. kalo ada karakter aneh masuk. langsung direct ke alamat yg di tujukan ownernya. :-bd

Hacking For Security | Beda Alam Beda Akhirat.

#15
(05-05-2013, 07:53 PM)hexadecimal Wrote:
(04-28-2013, 01:40 PM)Andy182 Wrote: pas ane mau tanem shellnya, malah redirect ke sini /?I+AM+A+HACKER+AND+I+WAS+TRYING+TO+BREAK+INTO+A+SITE+WITH+SSI+INJECTION+EXEC+CMD+TYPE+ATTACK+AND+SO+THEY+SENT+ME+HERE.+PLEASE+COME+FIND+ME wkwkw parah :v

itu bisa pake !ctype .. kalo ada karakter aneh masuk. langsung direct ke alamat yg di tujukan ownernya. :-bd
Code:
<?php
$strings = array('AB10BC99', 'AR1012', 'ab12bc99');
foreach ($strings as $testcase) {
    if (ctype_xdigit($testcase)) {
        echo "The string $testcase consists of all hexadecimal digits.\n";
    } else {
        echo "The string $testcase does not consist of all hexadecimal digits.\n";
    }
}
?>
semacam ini bukan om :/

#16
mantaapppp Smile nice share om Big Grin






Users browsing this thread: 1 Guest(s)