Http://www.51ielts.com/http://www.51toefl.com/http://bbs.51ielts.com/http://baike.51ielts.com/http://down.51ielts.com/ is a server woven dream of a vulnerability, although there is no background, but still intrusion, management awareness is not high first open the ngxin, tested a piece, add/sl in the back. php % 00.php failed. 1. php magic_quotes_gpc = off you know the ghost format and it is useless. Continue to upload the template. 1.PHP is directly downloaded... Useless .. Traverse the entire disk. Continue to flip the dede background. Both dede sites are deleted, and mysql is not the root user. I finally switched to another sub-station. mysql is actually connected by root Using phpmyadmin, and a local connection error occurred .. Can be external links... Use the shopex vulnerability to expose the brute-force physical path and export the shell, useless, read-only permission .... Continue .. The shopex command appears to be able to view the file content. I read the configuration files of several sub-stations and databases. Most of them are deleted in the background. Several databases have not been deleted. The database is separated by the station database. I thought about it. Try the ngxin resolution hole again. Maybe you can. Just now, 1. PHP is opened for download, And/Sl. php is added to the backend to connect successfully... The successful intrusion into the kernel is 2.6.18 without Elevation of Privilege... All have permissions .. HeySolution:
Fixed the ngxin Parsing Vulnerability and managed account and password security. You know the root password security.