The getshell Intranet roaming caused by no verification at a backend of the Travel Network

Source: Internet
Author: User

The getshell Intranet roaming caused by no verification at a backend of the Travel Network

The website's backend does not have authentication access and can use getshell, which then causes the entire intranet to fall.

Expose the upload interface in a place similar to the background, and then use 00 to intercept the upload.


First, the vulnerability appears in the following ways:
 





Burp packet capture data:
 







The uploaded file is saved in the current directory as focus_x.txt, where x is controllable.

You can write a trojan in recommendTitle, and then use 00 truncation to bypass the txt suffix check and upload a simple shell.

Executed some commands.



 




 




 





34. Several servers should be loaded later, and they will be connected with a kitchen knife.



10.10.0.103
 





10.10.0.95
 





10.10.0.108
 





10.10.0.102
 





Take a look at netstat
 





Zabbix_agent found

Then the shell rebounded to a server, and the session was saved with tmux.



The next day, I forwarded the Intranet. zabbix is not a weak password. It seems that the security awareness of O & M is better than that of youku Tudou XD.

Find a WordPress and check the user name.
 


 





I found a phpmyadmin with a universal password. Then I tried again and found the weak password root/root.


 





I wrote shell and went to the kitchen knife and found some amazing things.


 


 







Pwdump7.exe



Administrator: 500: A1A072F580871DC3B14FD58A657A9CA6: B29B766F15B2656ECBDA4BD4D9162879 :::

Guest: 501: no password *********************: 31D6CFE0D16AE931B73C59D7E0C089C0 :::

Admin: 1003: 32CE7A3887D3C2BFAAD3B435B51404EE: AF8E92EBC4D8A71C21BDA8F29C7338CD :::

_ Vmware_user __: 1006: no password *********************: no password *********************:::

Wps: 1008: 640D673C94B89529AAD3B435B51404EE: 79366b32ee1e36ef16ffb708fd5f5ba8 :::

Postgres: 1011: A1A072F580871DC3B14FD58A657A9CA6: B29B766F15B2656ECBDA4BD4D9162879 :::

Pentest: 1013: C170CDC8BAD80F1A2430574B6E34A817: C90D069B9B5EBA845349B042DBAF1BC3 :::



Administrator tuniu2906
 







Another server with weak passwords

10.10.10.120

Administrator tuniu520
 







Financial statement?

Run the mssql command.

172.22.0.110

Username: siweb

Password: siweb
 



There should be a lot of databases in this machine ~ XD

If you dump it, isn't it a big pants? It's just that this dog is too cool and has no zuosi.



So tired ~

Solution:

The security awareness of development is too poor, the background is exposed, and the Code also has bugs. Do you think the Intranet can be secure due to various weak passwords on the Intranet?

Unfortunately, the dog forgot to put the backdoor for two days and was busy with other things. As a result, after a week, 403 of the backend cannot be accessed from outside. Otherwise, you can continue to explore the Intranet.

Give developers a unified class, at least do not use weak passwords everywhere.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.