后門(mén),你懂得
一條龍開(kāi)服專(zhuān)用WEB系統(tǒng)。
就是那些給幾千元就送個(gè)配置好的服務(wù)器給你立刻當(dāng)GM的東西,騙了不少無(wú)知少年。
加密的,很難找到了解密文件。
看代碼。
LgKj.LocalDevilRank.asp:
開(kāi)頭省了沒(méi)用的
Sc=request.Form("ServerCode")
Job=request.Form("Job")
F Sc="" THEN
Sql="SELECT Name,cLevel,Class,Money,PkLevel,PkCount,ResetLife,AccountID FROM Character INNER JOIN memb_info ON AccountID = memb_info.memb___id WHERE (memb_info.servercode = 0 ) AND (IsNull(CtlCode,0)<>1) ORDER BY PkCount DESC"
rs1.open sql,conn,1,1
Else
if Job="" then
Sql="SELECT Name,cLevel,Class,Money,PkLevel,PkCount,ResetLife,AccountID FROM Character INNER JOIN memb_info ON AccountID = memb_info.memb___id WHERE (memb_info.servercode = "&Sc&" ) AND (IsNull(CtlCode,0)<>1) ORDER BY PkCount DESC"
rs1.open sql,conn,1,1
else
Sql="SELECT Name,cLevel,Class,Money,PkLevel,PkCount,ResetLife,AccountID FROM Character INNER JOIN memb_info ON AccountID = memb_info.memb___id WHERE (memb_info.servercode = "&Sc&" ) AND (Class = "&Job&") AND (IsNull(CtlCode,0)<>1) ORDER BY PkCount DESC"
rs1.open sql,conn,1,1
前臺(tái)唯一能注入的地方就只有這里
除了沒(méi)解密的公用函數(shù)庫(kù) 看不到
然后就是后臺(tái)登錄文件 任意一文件
前面代碼沒(méi)用省了
<%
'檢查管理員是否登錄
AdminName = ReplaceBadChar(Trim(Request.Cookies(webkey)("AdminName")))
AdminPassword = ReplaceBadChar(Trim(Request.Cookies(webkey)("AdminPassword")))
RndPassword = ReplaceBadChar(Trim(Request.Cookies(webkey)("RndPassword")))
If AdminName = "" Or AdminPassword = "" Or RndPassword = "" Then
Response.Redirect "default.asp"
End If
%>
這驗(yàn)證方法真好
webkey
默認(rèn)是BaiWanMuWebServer
新版本好像是 BaiWanMU.Com
后臺(tái)沒(méi)有任何寫(xiě)文件方法!
還有一處漏洞就是COOKIES修改登錄了的會(huì)員 不驗(yàn)證密碼的 不過(guò)沒(méi)什么作用