A social engineering penetration reconstructs the CMS chicken rib vulnerability in the Deep Throat

Source: Internet
Author: User

Reference: http://www.bkjia.com/Article/201209/157778.html

This penetration is also a pain point. The target site is a discuz forum. The latest version does not have any 0day. Let's take a look at the side Station, which is basically a deep-throat cms and discuz. Deep Throat has been injected before, but its encryption method is unknown, even if the password is disclosed, there is no solution. Section C takes too long, so we decided to conduct social engineering. one of the several stations in Deep Throat was responsible for selling virtual hosts, so we started with him.

First of all, we should first consult with the customer carefully. Obtain trust.

After gaining trust, the recipient accepts my requirements to make me buy his space

As a result, he received the background and account password. It's also the first time I 've got a website with Deep Throat.

He gave me an explanation, so I tried to find a breakthrough point to prevent him.

Change the background account password.

The Upload Vulnerability of Deep Throat cms is no longer useful on the Internet, and all of them are invalid. You can only find it by yourself. Of course

This also exposes a chicken rib vulnerability.

In the back-end upload, change to/1.asp in the root directory of the site. Now, we understand that IIS6

Parse Vulnerabilities and upload images. However, the IIS6 vulnerability is not false, but is not used to upload images.

In my test, although the path of the uploaded file is modified

Cannot be uploaded to the/1.asp directory.

In the module, we can upload the pony package. Then it is automatically uploaded to/1.asp.

Decompress the package. As a result, we achieved our lovely pony.

Done

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.