Jump to content

Title: Record an attack on the penetration of the spinach website

Featured Replies

Posted

We found a background with a QP background framework with vulnerabilities

图片

There are many loopholes in this framework, such as user traversal. If we enter an existing user, if the password is incorrect, it will prompt the user or password if the password is incorrect. If we enter an non-existent user, it will prompt the user not exists.

In addition, there will be SQL injection vulnerabilities on the website. We only need to grab a POST package to submit the account password.

图片

Paste a txt document and throw it into SQLmap.

图片

It is mssql, we can enable xp_cmdshell, here we plan to write to webshell, so first os-shell determines the path (super slow)

图片

Then use xp_cmdshell to write to webshell

图片 was successfully launched

Then I planned to go online to cs for the next operation, and tried web delivery, but was stopped by Killer

图片

It's very annoying, there's no way, I can only try to go online without killing. The method I use here is to separate without killing.

图片

Generate payload, then write a shellloader and compile it at base64.

I put shellcode on vps

图片

Upload shellloader to target

图片

One, two, three are online!

图片

That's right, the low-powered user did not succeed in trying to escalate power many times, but in the end sweetpotato won it

图片

Get my favorite system

Add a user

net user admin$ admin@123 /add to add to the administrator group

net localgroup administrators test /add direct 3389 connection

图片

I originally planned to scan the remote desktop with FScan, but I found that the IP of the intranet is different from usual. After scanning, I found that many hosts appeared, so I judged that this was a VPS, so I penetrated it until it was.

Reprinted from the original link: https://mp.weixin.qq.com/s/ch3zcIlUPpZ8tjCJttwarQ

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

Important Information

HackTeam Cookie PolicyWe have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.