当前位置:网站首页>Notes on the thinking of software analysis and library acquisition of a Taobao customer
Notes on the thinking of software analysis and library acquisition of a Taobao customer
2022-07-28 06:14:00 【cainsoftware】
A previous customer threw a program , Say to study the principle , How did he collect Taobao , Let me study the principle , Collecting this thing is no longer a problem , Whether it's python Collect or pass websocket I think it can be realized , After all, now for ua The test is not as strict as before .
I'll throw it to him directly OD Inside Let's look at the shelling first .

At present, it seems to be going well There were no errors , Then I'll break sentences or something Then I found myself right exe The anti cracking of is really a little difficult ,, Sure enough, leave me web The way
The first idea is always to see how he transfers value ,,
Since there is no shelling, there is no need to consider the trouble of shelling ,,

It can be seen from the packet capture that the login module is through app.AneTaoApi.login Value transmitting Don't waste time I directly inject manually

I think it's filtered here Then the card owner Lost again nmap Go and see what ports are Anyway, I feel that there are many solutions to loopholes I'm useless sqlmap Because I passed censys.io After looking at the port, I found that he has many kinds of websites
I feel that the above idea is not the key Now it's interesting

Access through ports I found that there are many server websites By having 888 The port can directly determine that there is a pagoda ( The back of this piece is useful , In the early stage, it must be assets , So saving is still useful )
After finishing I found one dedecms The system of And a I don't know what to do with the backstage
The first starting point of not talking more and not nagging less is definitely dedecms ( After all, raising rights is the most convenient )

Ask how you know it is dedecms Look directly at robots.txt Will determine the There is no fingerprint recognition
Don't ask Go ahead and inject Version, model Direct access /data/admin/ver.txt Found to be 20180109
But through open loopholes to inject Discovery is a failure This one has been studied for a long time ... I didn't find it backstage And then visit /data/ Below the file sql The error log also does not exist
Then we'll see another backstage

The beginner doesn't know what this thing does Just try the weak password Find that you can go in !!! Heaven never shuts one door but opens another rescue .
Here, here I found a place 
See Dcat Admin Through the official found that this is a background template
See there is one above this place

I tried to raise power backstage You can't Here's to say Picture transmission %00 What messy posture I used a lot Studied 2 God Maybe I'm too good
Not much to say My idea is to apply the market to see if I can find something about a background manager ...
I found it I installed it directly

Happy I just want to eat chicken

Lose your horse and go up Want to implement I think the absolute path of splicing is no problem But keep reporting the wrong

I think it may have been intercepted
Then I found one of the most interesting This is the background management tool Yes, there is Cross directory download permission direct
/admin/media/download?file=../../../../../../etc/passwd

But what's the use of this Of course, I passed dedecms The vulnerability of absolute directory has been downloaded He dedecms Database configuration file for But it's not root Permission is not turned on Remote database access Probably dedecms It's made directly by pagoda web
Then it suddenly occurred to me that I could download him my.cnf
/admin/media/download?file=../../../../../../../etc/my.cnf

How happy direct navicat test

Find the user table end ...
Of course, I have tried mysql Writing documents is a mess Those who want to raise rights in depth It is still unsuccessful
overall The security of the whole server is not very good ,, But I haven't found any particularly good way .. Writing documents use root Permission to write logs No way No execution permission . direct Statement output It's not mysql Write permission null
But just get the data Finally, I hope pte Yes , ha-ha
边栏推荐
- Distributed cluster architecture scenario optimization solution: distributed scheduling problem
- What is the process of building a small program?
- Sqlalchemy usage related
- uniapp webview监听页面加载后回调
- 强化学习——基础概念
- D2SC-GAN:基于双深浅通道生成对抗网络的课堂场景低分辨率人脸识别
- 《Distilling the Knowledge in a Neural Network》知识蒸馏论文解读
- Deep learning (self supervision: Moco V2) -- improved bases with momentum contractual learning
- Construction of redis master-slave architecture
- 卷积神经网络
猜你喜欢

深度学习(自监督:CPC v2)——Data-Efficient Image Recognition with Contrastive Predictive Coding

Deep learning - metaformer is actually what you need for vision

Reinforcement learning - proximal policy optimization algorithms

2: Why read write separation

强化学习——Proximal Policy Optimization Algorithms

Classification of iris based on Neural Network

Neural network optimization

Deep learning (self supervision: simpl) -- a simple framework for contractual learning of visual representations

利用辅助未标记数据增强无约束人脸识别《Boosting Unconstrained Face Recognition with Auxiliary Unlabeled Data》

用于快速低分辨率人脸识别模型训练的改进知识蒸馏《Improved Knowledge Distillation for Training Fast LR_FR》
随机推荐
Matplotlib data visualization
神经网络实现鸢尾花分类
Reinforcement learning - proximal policy optimization algorithms
3: MySQL master-slave replication setup
强化学习——价值学习中的DQN
Deep learning (self supervision: simple Siam) -- Exploring simple Siamese representation learning
Uview upload component upload upload auto upload mode image compression
How to choose an applet development enterprise
Deep learning pay attention to MLPs
强化学习——Proximal Policy Optimization Algorithms
Word2vec+ regression model to achieve classification tasks
Latex入门
知识点21-泛型
vscode uniapp
Interpreting the knowledge in a neural network
UNL class diagram
How to do wechat group purchase applet? How much does it usually cost?
Scenario solution of distributed cluster architecture: cluster clock synchronization
Deep learning - metaformer is actually what you need for vision
EIGamal 密码体制描述