前段时间有个网友给我发了个网址,说找到个专门做钓鱼网站的连接,让我看看,然后就引出了下面的一系列事件
http://mfnyongshihuigui.jiebao8.top
网址如下
当时也没在意,有天闲着无聊就开干了,
直接打开 jiebao8.top
果然是钓鱼站 先对其进行一些信息搜集看看
http://www.jiebao8.top/robots.txt
对其用谷歌语法搜索,看看是否有以下漏洞,
1目录遍历漏洞 语法为: site:jiebao8.top intitle:index.of
2 配置文件泄露 语法为: site:jiebao8.top ext:xml | ext:conf | ext:cnf | ext:reg | ext:inf | ext:rdp | ext:cfg | ext:txt | extra | ext:ini
3数据库文件泄露 site:jiebao8.top ext:sql | ext:dbf | ext:mdb
4日志文件泄露 site:jiebao8.top ext:log
5备份和历史文件 site:jiebao8.top ext:bkf | ext:bkp | ext:bak | extld | ext:backup
6SQL错误 site:jiebao8.top intext:”sql syntax near” | intext:”syntax error has occurred” | intext:”incorrect syntax near” | intext:”unexpected end of SQL command” | intext:”Warning: mysql_connect()” | intext:”Warning: mysql_query()” | intext:”Warning: pg_connect()”
7公开文件信息 site:jiebao8.top ext:doc | ext:docx | extdt | ext:pdf | ext:rtf | ext:sxw | ext:psw | ext:ppt | ext:pptx | ext:pps | ext:csv
8 phpinfo() site:jiebao8.top ext:php intitle:phpinfo “published by the PHP Group”
然而没查到什么
将此域名放到情报分析里查看
https://x.threatbook.cn/domain/mfnyongshihuigui.jiebao8.top
发现IP地址一共有230个域名
谁没事会注册这么多域名,肯定拿来干坏事
查询此IP162.247.96.114
开放端口:21(ftp),80,102(ssh),3306
对ssh端口进行爆破,无果~
对该域名进行CMS识别
结果为 PCWAP
PCWAP一个小众的CMS系统,手里头刚好有个PCWAP的0day越权进后台查看信息