(1): One of the stored XSS instances in coremail mail
Send the following email to the victim:
When the victim tries to open the email, the cookie will be stolen:(2): coremail storage XSS 2
Labels ):The as code of the SWF file is as follows (let's take a look at it and splice it together ):
package { import flash.external.ExternalInterface; import flash.display.Sprite; import flash.display.Sprite;
Coremail mobile storage XSS Vulnerability
An XSS vulnerability was discovered after a brain hole was opened.
Our school's internal mailbox is coremail.After logging in, set in the upper right corner-Modify Personal DataChange it to
Save. Send email to another userWhen the recipient logs in from the mobile phone, a window pops up ~
The cause of the vulnerability is that the mobile Web side does not filter the sender's name.In this case, the at
Rsync is a server and server This synchronization tool, usually we can use rsync to real-time data synchronization operation, I will look at the installation of Rsync synchronization software tutorial.
Installation
Rsync-3.1.0.tar.gz#tar ZXVF rsync-3.1.0.tar.gz#cd rsync-3.1.0#./configure--prefix=/home/work/rsync#make#make Install
The configuration of Rsync server;
Environment: 192.168.11.11 for production machine; 192.168.11.12 for backup machine;Then need to 192.168.11.11 as the client of
Installation
Rsync-3.1.0.tar.gz#tar ZXVF rsync-3.1.0.tar.gz#cd rsync-3.1.0#./configure--prefix=/home/work/rsync#make#make Install
The configuration of Rsync server;
Environment: 192.168.11.11 for production machine; 192.168.11.12 for backup machine;Then need to 192.168.11.11 as the client of rsync;192.168.11.12 as the service side of rsync;
1, 192.168.11.12_service end of the configuration;1) [Root@cmmailapp2 data]# touch/etc/rsyncd.conf//This file is the main configuration problem for rsync
Error code error code refers to the error
201 Urs validated successfully, an exception occurred coremail logon operation.
211 Coremail Login succeeded, exception occurred while processing return information.
321 encryption string Decryption timeout.
The parameters of the URS validation are missing and refer to the return information.
401 URS Validation parameter format error, see return information.
error code
-p0 ignores the results of the ICMP ECHO request, SCAN
-p Scan Port range specifies the range of scan's mesh port
1-100, or use 25,100 of the way
-O detection OS type
-on filename usually format file output
-ox filename with DTD, output results in XML format
-og file name, grep easy format output
-SV Service's program name and version scan
Ping Scan: Intruders use Nmap to scan the entire network for targets. By using the "-SP" command, by default, Nmap sends an ICMP
on/dev/mapper/mailcluster-Maildata. It appears to contain:symbolic link to './dm-3'Is you sure want to proceed? [y/N] Ydevice:/dev/mapper/mailcluster-maildatablocksize:4096Device Size4096.00GB (1073740800blocks) Filesystem Size:4096.00GB (1073740798blocks) Journals:2Resource Groups:8192Locking Protocol:"LOCK_DLM"Lock Table:"Gfsmail:maildata"UUID:50E12ACF-6fb0-6881-3064-856c383b51dd[[email protected]~]#For the MKFS.GFS2 command, the parameters we use are as follows:-P: Used to specify the lock m
(1073740800 blocks)Filesystem Size: 4096.00 GB (1073740798 blocks)Journals: 2Resource Groups: 8192Locking Protocol: "lock_dlm"Lock Table: "GFSmail:maildata"UUID: 50e12acf-6fb0-6881-3064-856c383b51dd[root@test01 ~]#
For The mkfs. gfs2 command, the parameter functions we use are as follows:
-P: used to specify the gfs lock mechanism. Generally, lock_dlm is selected;
-J: specify the number of journal (number of nodes
on/dev/mapper/mailcluster-Maildata. It appears to contain:symbolic link to './dm-3'Is you sure want to proceed? [y/N] Ydevice:/dev/mapper/mailcluster-maildatablocksize:4096Device Size4096.00GB (1073740800blocks) Filesystem Size:4096.00GB (1073740798blocks) Journals:2Resource Groups:8192Locking Protocol:"LOCK_DLM"Lock Table:"Gfsmail:maildata"UUID:50E12ACF-6fb0-6881-3064-856c383b51dd[[email protected]~]#For the MKFS.GFS2 command, the parameters we use are as follows:-P: Used to specify the lock m
how Rsync works (from the web)1) Copy Local files;This mode of operation is enabled when the SRC and DES path information does not contain the colon ":" delimiter:[Email protected]/]# rsync-avsh/home/coremail//cmbak/2) Use a remote shell program (such as rsh,ssh) to copy the contents of the local machine to the remote machine, when DST path address includes colon ":" The mode is started when the delimiter is separated;[Email protected]/]# rsync-avsh/h
e-mail format for the SMTP protocol
Following is the use of Foxmail to receive mail, the source of the message, including the body and two attachments (. Jpg. TXT):
----------------------------------------------------------------
The following sections add headers for mail servers
----------------------------------------------------------------
Received:from m15-17.126.com (unknown [220.181.15.17])
bymx10 (Coremail) with SMTP ID PMCOWECZWSFPLODRSU6NC
of protocol connectivity, so first to establish a TCP connection, the general TCP connection port number is 80
Cookie vjuids=-1b9063da8.1173d33f879.0.9aab8b85a459d; vjlast=1199406314; _ntes_nnid=a1e69963f40453af8a9ad171cc4cd8da,0|tech|; ntes_ufc=3000000100000000000000000000000000000000000000000000000000000000; province=021;
city=021; Ntes_mail_firstpage=normal; Ntes_sess=68luouh9ewccbfyn5oxz_0qf._
Iomckfscagyrooxpjtvf7r8vx7jazg7hgdwo00gqen1zmrzcx7fmaxnb052r8xofzzyk.hn;
netease_ssn=mayingbao
suffix, in the company's business dealings in the process of comprehensive promotion of the company's image. 3. Internal management. Through the company mailbox can be independent management of each department, employee mailbox, at any time according to Enterprise management needs to set up, service in the company's internal management. 4. Office applications. Company Mailbox organization Address Book, mailing list management, meeting and schedule, important mail, mass mailing and other functio
' ^] '.163.com Anti-Spam GT for Coremail System (163com[20141201])HELO 163.COMOKAUTH LOGIN334 Dxnlcm5hbwu6cwl4aw5fbw9uaxrvcg==334 Ugfzc3dvcmq6Uwl4aw5amtiz535 Error:authentication failed(where the user name and password are Base64 encoded conversion, Echo-n Username/password |base64)(2) test the original [email protected]The discovery can be successfully landed.[[Email protected]_master ~]# telnet smtp.163.com 25Trying 220.181.12.13 ...Connected to sm
Note: manual input is represented in a blue font, and # is followed by a comment, which cannot be entered.
========= Calculate the base64 encoded username and password first, Used for authentication login ==========[Crazywill @ localhost crazywill] $Perl-mmime: base64-e 'print encode_base64 ("crazywill ");'Y3jhenl3awxs
[Crazywill @ localhost crazywill] $Perl-mmime: base64-e 'print encode_base64 ("mypassword ");'Bxlwyxnzd29yza =
================================ Start the SMTP mail sending o
Document directory
Use telnet to manually send and receive SMTP/pop mails
Use telnet to manually send and receive SMTP/pop mails
Note: manual input is represented in a blue font, and # is followed by a comment, which cannot be entered.
========= Calculate the base64 encoded username and password first, Used for authentication login ==========[Crazywill @ localhost crazywill] $ Perl-mmime: base64-e 'print encode_base64 ("crazywill ");'Y3jhenl3awxs
[Crazywill @ localhost crazywill] $ Perl-mmime
It's the mail function in PHP that triggers the murders.
I accidentally saw an article with a manual practical SMTP protocol, and then I tried, and a lot of the problems were finally solved.
Now, start.
The SMTP protocol is the routing protocol between the sender and the mail server, and the mail server.
The POP protocol is the delivery protocol that the mail server sends to the receiving party.
We use Telnet to manually manipulate the two protocols.
First we use Telnet to operate the SMTP pro
(Smtptransport.java:716)
At Com.sun.mail.smtp.SMTPTransport.sendMessage (Smtptransport.java:388)
At Com.mail.TextMail.main (Textmail.java: $)
You check the Internet is to say that user authentication is not correct, in fact, everyone is in accordance with someone else's code copy, and then modify the user and password, how can not be wrong!I have this account and password can be used, I am sorry netease!Since I set up print debugging above, you will see the following in the console
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.