当前位置:网站首页>Actual combat | a tortuous fishing counteraction
Actual combat | a tortuous fishing counteraction
2022-06-24 14:35:00 【Safety of 100 million people】
The article was first published in : The prophet community
https://xz.aliyun.com/t/11471
The origin of the story
It was a beautiful day , I am fishing , All of a sudden QQ A message pops up in the group , I'll open it up , I don't think it's easy . Here's the picture :
After scanning the code, I found that I jumped to QQ Email login interface , Identified as a phishing site , The domain name is http://kak2.cn.
Just type it here , The page jumps to the following interface .
good heavens , Young man, you are good at playing , Collection complete QQ Email account password , Then collect a wave of personal information , You can't be too greedy . Get to work !
Traceability Angler
We now have his domain name , Now collect the information about the domain name . Use the webmaster tool , Here's the picture .
You can find the name and email address of the domain name registrant . The mailbox is not displayed completely , Here, you can query by micro step . Here's the picture
Here are two things to focus on , Here I got the complete email address and knew that this is Alibaba cloud .
Check the mailbox , It is found that multiple domain names have been registered under this mailbox in May and June , The names are all liujuda , The probability is used for fishing .
Try to add QQ, It was found that this man could not be found , This is awkward .
The collection of information about anglers has come to an end , Next, start working on its website .
Attack phishing sites
We got the domain name before , Now infiltrate the site , What's the idea ? We can do a domain name 、 Directory scanning , If there is no information , Then start looking at the phishing site itself to see if it can be used .
First, scan the domain name , Nothing , Here's the picture :
Then start to scan the domain name , Here's the picture
The directory that came out , Basically no permission , All are 403. There is nothing to use .
Now it seems that we can only infiltrate the website itself , See if there is anything you can use . Now open the form for collecting personal information , Press F12 See if there is anything we should pay attention to , as follows :
The previous directory scan found uploads Directory but no permissions , We found it here uploads/ads route , Try whether the path back end receives files , Construct upload packets , send data , Still failed . as follows :
Don't lose heart. , Go on with , We also found that form Form submission data , Then I customized a function chk(), Now let's follow up this function and take a look at . as follows
Here we can learn , The website uses ajax For data transmission , Submit the data to the website wap Catalog , Then the ID number makes a simple regular judgment , Specify that the input is a number and the number of digits is 18 position . Now that the data is submitted to this site , Then, if the angler directly splices the parameters to when receiving data at the back end SQL In the sentence , Then there may be SQL Inject . Now let's construct the data , Submit data , Then grab the packets for testing , The captured packets are as follows :
Next, start testing for the presence of SQL Inject ,name Add a single quotation mark after the parameter , send data , Found an error , There is SQL Inject !
Guess the database name , Database version , structure payload
' and updatexml(1,concat(0x7e,(select database()),0x7e),1)%23
and updatexml(1,concat(0x7e,(select @@version,0x7e),1)%23The database name is a7, Guess the name of the watch , structure payload as follows
'and updatexml(1,concat(0x7e,(select table_name from information_schema.tables where table_schema='a7')),0)%23Found unable to get table name , I have a bad feeling .
Sure enough, I used some other functions , The table name cannot be obtained after discovery , Maybe I don't have permission . It's so sad , This old six .
Now use sqlmap Run for a while. , give the result as follows
Can only run out a7 This database ,information_schema This library cannot get , No wonder you can't get the table name by manual injection . alas , Now try os-shell Well , See if you're lucky . as follows
Looks like bad luck , failed . however , In spite of the failure , But we also know that the current server system is Linux, And have a path , Let's take it as an absolute path , make every possible effort , See if you can write to the file , structure payload:
into outfile '\\www\\wwwroot\\p******7.a******ka.cn\\config\\wap\\test.php' FIELDS TERMINATED BY '<?php phpinfo();?>'%23give the result as follows , Still failed .
Tried some other methods , Find that the harvest is not big .
the path winds along mountain ridges
Really can't take down its server ? I don't believe it , At night , Things are turning around , I was paddling , A friend application broke the peace , When I agree , Big brother doesn't talk much , direct URL And the account and password , The compressed package including the source code is also scanned out . Give me a cigarette here .
The master here also broadened my mind , Try a few more tools when scanning the directory , There may be different surprises . visit url Log in with your account and password , The interface is as follows .
After landing , We found that , This is an open source of the imperial backup king CMS. When we know it is open source , The first idea is whether there are some open loopholes on the Internet for us to use . For example, we can search like this EmpireBak v2010 backstage RCE, give the result as follows
The red arrow refers to this article , By reading the article , We also understand getshell The idea of , Is to replace the contents of the file . The specific process is that we can back up the data first , Then click Manage backup directory , Click Replace file contents .
The idea is to have , But there are still problems , The backup king is not linked mysql, The backup function cannot be used , But not in a hurry , Here the backup King provides a function , Parameter setting . as follows
If we know the database account password and database name , Can I try to connect to the database . So now the key is to get the database account and password . How to get this ? Don't forget , Before that, we got the source code compression package of the phishing website , Now let's unpack and analyze the source code . Look for the configuration file , There may be information we need . The source code directory is as follows
Now try to find the configuration file of the database , as follows , Sure enough, we got the information we wanted
Now go to the website and try to see if the connection is successful , Sure enough , Successful connection , as follows
Now you can try to take shell 了 . The pressure of drinking water is frightening , Synchronize the information with master , Fighting alone , How can it be worth the happiness of two people standing together .
Go backstage
Before we look at the source code , Found a a1 Folder , View folder related files , Know that this is the background path
Let's visit , Find out 404
It should have changed the background path , It doesn't matter , Let's simply try , Change the discovery to a7 了 , Now access a7 The interface is as follows
Or try to use backup Wang's account password , I found that the landing was successful
The backstage also won . Check the information , Most of them are dirty data . Go to ask the master if he has any information .
The address provided by the login master is as follows
There are still some data here , There are still people who have been cheated , Your personal information has been cheated , Finally, I input my mobile number , Received the verification code , Also submitted the verification code to the phishing website . Tencent's anti-theft mechanism , The second authentication can not stop many phishing websites . I would like to remind you to be vigilant , Be careful where you are prompted to enter your personal information .
Getshell
Now let's follow the previous train of thought Getshell, Compress first , Then download the compressed package .
And then there are new problems , The downloaded files are all empty ,
No data , So it can't be replaced , It's impossible Getshell 了 . What kind of human suffering is this . Now ask Master , Let's see what step master has taken .
It seems to be stuck , Don't lose heart. , Don't give up any details , Then go to the backup directory , Try downloading the original backup file , To view the .
Everything comes to him who waits , success .
Go to the following interface to replace , Fill in the original contents , Replace the contents with ice scorpion Trojan horse .
Trying to replace config.php The content of the document . I want to visit first , The Damascus interface appears unexpectedly , Master, I'm one step ahead of you ? Go and ask
It was really the work of the master , Unexpectedly, ice scorpion and Godzilla's horse have gone up , I love you . Ice scorpion , View the file management as follows
The way to raise power
We got it webshell, Completed the first step , Now it's time to raise the power , Ice scorpion provides us with a rebound shell The function of , Here we use the ice scorpion to shell Bounce to MSF in . Go and have a look at the master's progress .
Is this the feeling of the thigh ? It's so happy . Here is the idea of raising rights .msf There is one that can automatically raise the right suggester, We can choose directly , as follows
After selecting the first , Right to start !
Here we also successfully got the server root jurisdiction . Here's the picture
Get root It's easy to work with authority , View account , Also found ssh Port and account password , land ssh as follows :
Because phishing websites are built with pagodas , So here is the information about the pagoda , Include panel landing pages , Account numbers, passwords, etc . Great master has sorted out all the assets he got .
The first master sends the first json There is a leak in the document Access key We can directly take over relevant servers by using relevant tools .
There are tools available online , Here's the picture , Tool Links :https://github.com/mrknow001/aliyun-accesskey-Tools
Last , The master summed up the text attentively , Love the . Summed up the pagoda ,phpmyadmin,SSH And other related assets .
Summary
The relevant content about phishing websites is shared here , Let's start with the first one Web Weak password , To wear the phishing server , In the middle, there have been twists and turns , Finally, I was lucky to live up to my fate , I'll see you next time !
边栏推荐
- Esp32 series -- comparison of esp32 series
- Laravel 8 realizes auth login
- I have been in the industry for 4 years and have changed jobs twice. I have learned a lot about software testing
- June training (day 24) - segment tree
- Go language -init() function - package initialization
- The difference between V-IF and v-show
- 六石管理学:垃圾场效应:工作不管理,就会变成垃圾场
- Unit contour creation method
- A common defect management tool - Zen, which teaches you from installation to using the handle
- leetcode 139. Word break word split (medium)
猜你喜欢

leetcode:1504. Count the number of all 1 sub rectangles

MySQL log management, backup and recovery

Data sharing between laravel lower views

List of PostgreSQL

Explore cloud native databases and take a broad view of future technological development

GO语言-goroutine协程的使用

C language ---18 function (user-defined function)
![[deep learning] storage form of nchw, nhwc and chwn format data](/img/4f/4478d96132eb2547f6ec09ae49639e.jpg)
[deep learning] storage form of nchw, nhwc and chwn format data

Unit contour creation method

探索云原生数据库,纵观未来科技发展
随机推荐
Two way combination of business and technology to build a bank data security management system
Successfully solved: selenium common. exceptions. SessionNotCreatedException: Message: session not created: This versi
Daily knowledge popularization
MySQL title
Laravel 8 realizes auth login
Brief discussion on the implementation framework of enterprise power Bi CI /cd
IDEA 插件 Material Theme UI收费后的办法
Linux Installation cenos7 MySQL - 8.0.26
数据库一些基本操作(提供了原数据库信息)
MES在流程和离散制造企业的15个差别(下)
laravel8使用faker调用工厂填充数据
The function and principle of key in V-for
Go language concurrency model mpg model
Esp32 series -- comparison of esp32 series
50 practical applications of R language (23) - important concepts of Bayesian Theory: credibility, model models, and parameters
[sdx62] wcn685x IPA registration failure analysis and solution
v-if 和 v-show 的区别
update+catroot+c000021a+critical service failed+drivers+intelide+viaide+000000f
leetcode:1504. Count the number of all 1 sub rectangles
Laravel8 uses faker to call factory to fill data