当前位置:网站首页>Web container and IIS --- Middleware penetration method 1
Web container and IIS --- Middleware penetration method 1
2022-07-31 03:13:00 【GSflyy】
Common web containers
The web container is a service program, and a server port has a program that provides corresponding services. TOMCAT in java and IIS in ASP are all such containers.A server can have multiple containers
Common web containers:
IIS, Apache, Nginx, Tomcat, Jboss, Web Logic
Glossary
Middleware: Software that provides connection between system software and application software to facilitate communication between software.Between the middleware store and the operating system and higher-level applications.
Container: Provide an environment for the application components (JSP, PHP, ASP) in it, so that the application components in the container directly interact with the environment variable interface in the container, without paying attention to other system problems.
ps: Sometimes middleware and containers are common, that is, a piece of software can function as both middleware and container
Server: www server or http server, that is, the program that provides services to the browser
Introduction to IIS
What is IIS?
The full name is Internet Information Services (Internet Information Services), a basic Internet service based on Microsoft Windows provided by Microsoft Corporation.IIS includes services such as FTP/FTPS, NNTP, https/http, and smtp.
.net framework is the basic class library and the basic framework for program running
ASP.net is a collection of technologies used by .net to make websites.
IIs assumes that the web server is used to provide web browsing services and belongs to the system environment.
Generally use ASP.net to develop software, and then rely on IIS to provide services to the public network, the bottom layer of the software is .net framework
What is file parsing?
The server receives an http request, and IIS first decides how to process the request. What does IIS do based on it?According to the file extension.
The server obtains the suffix of the requested page, and then searches the server for an application that processes such a suffix. If no application that can process such a file is found, IIS returns the file directly to the client
IIS file parsing vulnerability
Reproduce the IIS6.0 file parsing vulnerability
First open the IIS service, open the Internet Information Services (IIS) Manager in the management tool
Open the following directory. The three buttons at the top of the middle represent the opening, suspension and suspension of the service
You can test whether the service is open by visiting 192.168.237.157/iisstart.asp
Exploitation
File parsing vulnerabilities are generally used in various upload vulnerabilities, and the suffix name of the file that users can upload is generally limited in the place where the file is uploaded.
In the actual vulnerability environment, IIS is generally matched with asp. If the uploading place restricts the .asp suffix, then the first thing that comes to mind should be to use other file suffixes supported by IIS. IIS parses asp scripts in addition to the .asp suffix.Has .cer and .asa
If the website says asp, cer, and asa are all filtered, it can only be bypassed by other methods, such as file parsing vulnerabilities.
IIS6.0 will have a logic error when processing file paths containing special symbols, which has long been a file parsing vulnerability.This vulnerability can be exploited in two completely different ways:
1. Create a new directory of test.asp, any file in this directory will be executed by IIS as asp
2. Upload a file named "test.asp;jpg", although the real suffix is jpg, but because there is a; number, the file will still be executed as an asp program
ps: Upgrading the IIS version can solve the problem
Apache file parsing
Introduction
Apache file parsing vulnerability is closely related to user configuration
Strictly speaking, this is a matter of user configuration.Here we will talk about the reasons for configuration errors and how to fix them, so you need to prepare your own environment.
Using Ubuntu's docker, then run the following command:
apt-get install apache2
apt-get install php7.0
apt-get install libapache2-mod-php7.0
Use docker ps to view the docker id in ubuntu and find the dockerid of apachephp
Use docker run -it -d -p 80:80 dockerid to start the container
docker ps to see if the container is started
docker exec -it dockerid bash set the container environment
Use the above three commands to configure the container environment
After configuring the environment, start the apache service
service apache2 start
Then access the container ip, and the apache page logo service appears normally open
Apache file parsing
Three ways to combine apache and php
CGI
FastCGI
Module
View the combination of Apache and php:
/usr/sbin/apachectl -M | grep php
边栏推荐
- 7年经验,功能测试工程师该如何一步步提升自己的能力呢?
- Redis implements distributed locks
- some of my own thoughts
- 【C语言】三子棋(经典解法+一览图)
- Day32 LeetCode
- Ambiguous method call.both
- Mycat's master-slave relationship, vertical sub-database, horizontal sub-table, and detailed configuration of mycat fragmented table query (mysql5.7 series)
- Observer pattern
- 一份高质量的测试用例如何养成?
- SQALE 是什么
猜你喜欢
【动态规划】连续子数组的最大和
SQL injection Less46 (injection after order by + rand() Boolean blind injection)
The simulation application of common mode inductance is here, full of dry goods for everyone
MultipartFile文件上传
web容器及IIS --- 中间件渗透方法1
IIR滤波器和FIR滤波器
Detailed explanation of TCP (1)
8. Unified exception handling (controller notifies @ControllerAdvice global configuration class, @ExceptionHandler handles exceptions uniformly)
Ambiguous method call.both
What is distributed and clustered?What is the difference?
随机推荐
C primer plus学习笔记 —— 8、结构体
7. List of private messages
Ambiguous method call.both
【异常】The field file exceeds its maximum permitted size of 1048576 bytes.
10 Permission introduction
Good place to download jar packages
QML的使用
LeetCode简单题之两个数组间的距离值
顺序表的实现
With 7 years of experience, how can functional test engineers improve their abilities step by step?
How to develop a high-quality test case?
什么是系统?
C#远程调试
False positives and false negatives in testing are equally worthy of repeated corrections
What is SQALE
想从手工测试转岗自动化测试,需要学习哪些技能?
The els block moves the boundary to the right, and accelerates downward.
Detailed explanation of TCP (3)
Distributed locks and three implementation methods
The distance value between two arrays of LeetCode simple questions