Example 1: "one-sentence Trojan" intrude into the "easynews news management system"
The official version of easynews news v1.01 is a common set of Full-site templates on Enterprise websites. The loose data filtering vulnerability exists in the message library of the website system, if the website is installed in the default path and default file name, intruders can exploit this vulnerability to directly upload ASP Trojans. Program Control the entire website server.
Step 1 search for intrusion targets
Websites that use the official version of easynews v1.01 usually have the key character "www.52easy. com" in the copyright statement at the bottom of the website page ". Search by keyword in Google or Baidu, you can find a large number of intrusion targets.
Step 2: detect intrusion Conditions
Here, we take the website "http://www.qswtj.com/news/index.htm?for example to conduct detection. By default, the database file of the message book of the Website "easynews news management system" is located in "\ ebook \ dB \ ebook. asp". First, enter "publish" in the address bar of the browser. If garbled characters are displayed on the page, it indicates that the database file of the message library of the website is not renamed and can be intruded.
Step 3 insert an ASP backdoor into the database
As mentioned above, the messageservice plug-in of the news system is not strictly filtered. Therefore, we can insert a "one-sentence Trojan" server in the database by submitting a speech.Code:
Visit http://www.qswtj.com/news/khly.htmto open the message page. In the "Homepage" column on the submission page, enter the "one-sentence Trojan" server code. Click "post message" after confirming,ArticleAfter the message is successfully published, you can insert the "one-sentence Trojan" server code into the Message Base database.
Step 4 connect a backdoor to upload a webshell
Because the "ebook. asp" file in the message Book database is an ASP file, the ASP statement inserted into the database file will be executed. Change the submitted address in the client of "one-sentence Trojan" to the address of the file in the message base database, open the client in a browser, and enter the Save path of the uploaded ASP trojan in the input box above, in the input box below, you can paste other ASP Trojan code. Here, you select the ASP code of Guilin veterans website management assistant. After you click the submit button, the ASP trojan that you just pasted will be written to the Forum server and saved.
Step 5 open webshell
The uploaded ASP Trojan is saved to the same web directory as the database file. The file name is "Temp. asp". Therefore, we open the "Uninstall" page in the IE browser.
In webshell, you can upload other files, install trojans and backdoors, and execute various commands. The website server is already in our hands and can do whatever you want.