Jump to content

Title: Record the penetration experience of an illegal website

Featured Replies

Posted

0x01 Introduction 

During the information collection of offense and defense drills, it was found that the website and the asset website given were the same IP segment, so there was a penetration of the illegal site.

Dictionary and other resource files can be obtained at the end

0x02 SQL vulnerability discovery

Visit the site

rhaw0vvgnof17295.png

Use plug-in to view the site as php

vljjtgmsvge17297.png

Regular directory scan

etibx2jjzz317300.png

front desk

nkcxzvmbn3n17303.png

After logging in with one click, I found that there was injection at the new address

mmkiwigm05p17307.png

b1ffn0r1cwy17310.png

0x03 Further exploitation

Here it is prompted that you need to get the parameter. After filling in a random number request at the address.php request, continue to fill in the information and grab the packet and run SQLmap

llaobiuqjh317312.png

After a long wait, it was found that there were boolean blind and error injections.

c1hzhn4oroc17316.png

Next, find the site backend management address

j4bf2yucqvi17322.png

Log in to the background using the injected account password

p3hblg2w4gy17327.png

0x04 Upload any file

Looking for upload points

2md1etynuh317332.png

Upload

0b0vyrnihdh17334.png

Access path

ddnu4opmgq217340.png

Upload php directly and lift it away

kphgzcofkyv17347.png

So far, I took this site, and took it away in one simple and efficient way!

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

Important Information

HackTeam Cookie PolicyWe have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.