A Security Test for Hunan Satellite TV
OA system http: // 222.240.176.22/cracking
I won't go into details about the clues I found on Baidu.
However, I found that http: // 222.240.176.21/index. php built by phpcms? M = member & c = index & a = login.
Resolution vulnerability found during the test.
Then I found the upload point and uploaded the image horse.
As a result, I got a shell. After all, there will be a lot of Sister papers to submit the application. Then I changed the Administrator's password and entered the background.
Another handsome guy
Information about the first handsome girl, all of which are available, and then enter the Intranet.
This intranet segment is the same as the public ip. Then, we scanned iphttp: // 85.16.17.12: 8012/in the same segment and found RTX and collected the user name.
Then the brute-force attack finally got a bunch of login accounts.
Cracking of an OA system
The old version of Tongda OA has SQL injection and vulnerability profile. upload images containing one sentence to getshell.
Jboss getshell
Then some machines are cracked.
Various phone numbers
Injection exists. Solution: patching + Password Change