General idea using WebShell breakthroughs in virtual host permission settings

xiaoxiao2021-03-06  83

The development of injected to WebShell's research provides a gestational environment, an upload vulnerability of the ASP system, especially using a wide range of DVBBs upload vulnerabilities to WebShell, and download the default database or backup database, then use the background database backup to get WebShell It is also a very important invasion, especially the table DV_ of the DVBBS database.

Logs's settings simply let MD5 are insensible. The research on the improvement of Webshell permission, and it becomes a number of web attacks.

Puzzle of lovers. Recently, some people often saw that WebShell, but because of various limits, they could not get privileges, or could not reach the purpose of the next note. I remember that a cow said: As long as there is WebShell, I will get administrator privileges. The monks are not so strong, I just talk to everyone according to my actual intrusion experience, the wrong and deficiencies, please point out, welcome to my website and I discuss (http://www.918x.com) . This section gets the Years League HAK_

Ban help, thank you here. Intrusion

The following cases are not the scope of our discussion. You can jump to any directory and write can be written; you can modify C: / Program files / serv-u / servudaemon.ini; you can successfully run "CScript C: /inetpub/adminScripts/adsutil.vbs Get W3SVC / Inprocessisapiapps" upgrade permission of. Can successfully replace relevant procedures or services with similar programs that bind Trojans

. Ok, the Trojan we used is mainly the ASP management 6.0 of the veteran, helping the C / S ASP Trojan. (These two Trojans

The effect of cooperation is better than the ocean. ) The general virtual host is set this setting: each partition of the system disables Eveyone access. Each website uses a separate IIS user, for example, IIS_

Www.target.com. A typical virtual host setting This user is a member of the guest group, the permissions are very low. Only a specific folder can only be accessed. This causes the website directory that cannot be jumped, you can only access the folder where this website is located. But I want to emphasize that although the C disk's EVERYONE access is prohibited, most system C disk folders do not inherit the restriction of the father folder, so we can access manually (note: Add path to the path) C : / Documents and Settings and C: / Program Files, this for invasion

Improvement permissions is very important. We can access C: / Program Files / Serv-U / Servudaemon.ini, but the use of Serv-U is too wide, and the general administrators know the permissions of setting the Serv-U folder, generally cannot be modified. We can also manually access and download the * .cif file under the C: / Documents and Settings / All Users / Application Data / Symantec / PCAnywhere, and then crack the username and password of the PCANywhere to remotely log in. It is also possible that the administrator will not go to log in, and the desktop will lock the desktop after the administrator leaves. Here the veterans (http://www.gxgl.com) give us a solution (http://www.918x.com/showart.asp?art_id=47&cat_

ID = 5). If you can access C: / PHP, C: / Prel et al, we can use the WebShell of PHP, CGI, etc. Specifically, the article "hacker X file" Angel's article has successfully broken through the limit, I don't repeat. Give an Angel: If you can see C: / Program Files / Java Web Start /, you can try to use JSP's WebShell, I have met once, but permissions are not very big. With the tip horse, we can see the operation of Serv-U and know his absolute path, naturally you can think of the upgrade of Serv-U. Here is three points: 1. Upload overflow procedures. 2, the available CMD. 3, IIS single users must have permission to run the program. For the first point, the veteran Trojan involves Scripting .dictionary (data stream upload auxiliary components), AdoDB .stream (data stream upload assembly), Softartisans.Fileup (SA-fileup file upload component), Lyfupload.uploadFile (Liu Yunfeng file upload Components), Persits.upload.1 (AspUpload file uploading components) Generally, it is possible to upload, no problem. (If you can't still do it, I recommend using LittlePigP without component, Hackbase.com is under.) For the second point, the use of WScript.Shell components is very important, when "refusal access.", We can know each other CMD is not allowed to access so that we can upload a cmd.exe to achieve our purpose of using CMD. But when we see "ActiveX components can't create objects", we can't use CMD at all, the invasion is in trouble. For item 3, there is no way, the exception is also the utilization of the FTA partition, the permission is low, and the program can be easily run in the FTA partition. We often talk about hackers to have divergent thinking and cannot always think. Some other breakthrough methods are not as used as the utilization of other contents of the host. For example, someone uses the configuration file in FlashFXP to get some password.

Basic Information. We can also download CUTEFTP profiles to replace local files can also achieve the same purpose. That again talk about the method "upgraded the ASP Trojan to the highest", in general, under the premise of using CMD, although service

Supports FSO, but we did not access C: / INETPUB / permissions so that we naturally not use the "CScript C: /ineTPub/adminScripts/adsutil.vbs Get W3SVC / Inprocessisapiapps" to increase permissions. Figure:

_BLANK>

转载请注明原文地址:https://www.9cbs.com/read-95174.html

New Post(0)