当前位置:网站首页>Getting started with rce
Getting started with rce
2022-07-05 13:54:00 【Cwxh0125】
brief introduction
Command Injection, Command injection , It means to destroy the structure of command statement by submitting maliciously constructed parameters , So as to achieve the purpose of executing malicious commands .PHP The command injection exploit is PHP One of the common scripting vulnerabilities in applications .
When the application needs to call some external programs to process the content , It will use some functions to execute system commands . Such as PHP Medium system,exec,shell_exec etc. , When the user can control the parameters in the command execution function , Inject malicious system commands into normal commands , Cause command execution attacks . ------------ Training documents
Divided into remote command execution ping And remote code execution evel.
The reason for the vulnerability : There is no input processing at the input port .
Our common router 、 A firewall 、 Intrusion detection and other devices web On the management interface
Case study
With pikachu Two lanes of the shooting range RCE As an example
One .exec"ping"
Generally, users will be provided with a ping Operation of the web Interface , User from web Input target on the interface IP, After submission , The backstage will be right for IP Address once ping test , And return the test results . In fact, this is an interface , It allows attackers to inject operating system commands or code directly into the background server , To control the background system , This is it. RCE Loophole . The specific back-end code is as follows :
$result.=shell_exec('ping '.$ip);// Splice variables directly , I didn't deal with it
Try first ping Baidu
Try splicing at the back
Try to view the directory
Two .exec"evel"
Back end code :
if(@!eval($_POST['txt']))
Submit directly phpinfo();
边栏推荐
- redis6数据类型及操作总结
- js 从一个数组对象中取key 和value组成一个新的对象
- Internal JSON-RPC error. {"code":-32000, "message": "execution reverted"} solve the error
- Assembly language - Beginner's introduction
- 搭建一个仪式感点满的网站,并内网穿透发布到公网 2/2
- Idea remote debugging agent
- How to apply the updated fluent 3.0 to applet development
- Request + BS4 crawl Netease cloud music popular comments
- Kotlin协程利用CoroutineContext实现网络请求失败后重试逻辑
- Requests + BS4 crawl Douban top250 movie information
猜你喜欢
How to apply the updated fluent 3.0 to applet development
内网穿透工具 netapp
Brief introduction to revolutionary neural networks
Laravel dompdf exports PDF, and the problem of Chinese garbled code is solved
When using Tencent cloud for the first time, you can only use webshell connection instead of SSH connection.
这18个网站能让你的页面背景炫酷起来
Convolutional Neural Networks简述
Usage, installation and use of TortoiseSVN
:: ffff:192.168.31.101 what address is it?
These 18 websites can make your page background cool
随机推荐
Redis6 data type and operation summary
Ordering system based on wechat applet
What is information security? What is included? What is the difference with network security?
2022年机修钳工(高级)考试题模拟考试题库模拟考试平台操作
Summit review | baowanda - an integrated data security protection system driven by compliance and security
Why do I support bat to dismantle "AI research institute"
Hide Chinese name
Kafaka log collection
Aspx simple user login
Catch all asynchronous artifact completable future
Intranet penetration tool NetApp
Datapipeline was selected into the 2022 digital intelligence atlas and database development report of China Academy of communications and communications
Personal component - message prompt
[js] basic syntax - for loop
Solve the problem of invalid uni app configuration page and tabbar
嵌入式软件架构设计-消息交互
清大科越冲刺科创板:年营收2亿 拟募资7.5亿
Redis6 master-slave replication and clustering
UE源码阅读[1]---由问题入手UE中的延迟渲染
ETCD数据库源码分析——集群间网络层客户端peerRt