FluxCapacitor(from nobody to root) 10.10.10.69 scan80/tcp open http SuperWAF 查看源代码,有一段注释,是javascript代码。 1234<!-- Please, add timestamp with something like: <script> $.ajax({ type: "GET", url: '/sync 2019-03-03 training training
msfvenom-生成攻击载荷-命令速查 参考资料: github-Micro8 https://github.com/rapid7/metasploit-framework/wiki/Metasploit-5.0-Release-Notes https://www.hackers-arise.com/single-post/2017/06/08/Metasploit-Basics-Part-7-Adding-a-New-Module- 2019-02-28 tools tools
Arctic(ColdFusion任意文件上传) scan12345678Discovered open port 8500/tcp on 10.10.10.11 Discovered open port 135/tcp on 10.10.10.11 Discovered open port 49154/tcp 2019-02-26 training training file upload
权限管理二:如何通过setuid设置root后门 上一篇:权限管理 参考资料:https://gist.github.com/dergachev/7916152 、https://pentestlab.blog/tag/find/ 为什么你不能做到,在一个已经被渗透的机器上禁止提权?假设某人临时获得了root权限访问了你的系统,即使你禁止了提权的方式,他们仍然有数不清的方式在以后重新访问你的系统。 简单提一下一些明显的方法: 添加/root/. 2019-02-24 linux linux
october(弱密码+文件上传) 10.10.14.7 12345678910111222/tcp open ssh OpenSSH 6.6.1p1 Ubuntu 2ubuntu2.8 (Ubuntu Linux; protocol 2.0)| ssh-hostkey: | 1024 79:b1:35:b6:d1:25:12:a3:0c:b5:2e:36:9c:33:26:28 (DSA)| 2048 16:08 2019-02-23 training training
Granny(webDAV put+move获取webshell) 10.10.10.15 scan1234567880/tcp open http Microsoft IIS httpd 6.0http-webdav-scan: | Allowed Methods: OPTIONS, TRACE, GET, HEAD, DELETE, COPY, MOVE, PROPFIND, PROPPATCH, SEARCH, MKCOL, LOCK, UNLO 2019-02-22 training training
绕过web应用防火墙 以下内容是对该pdf的翻译:《OWASP_Stammtisch_Frankfurt_-Web_Application_Firewall_Bypassing-_how_to_defeat_the_blue_team》 作者:Khalil Bijjou译者:whale 前景提要配置了waf的网站数量在增加waf让渗透测试变得更加困难在渗透测试中,绕过waf是一个重要的部分 对web应用防火墙的介绍 在 2019-02-18 waf
Shocker(shellshock破壳漏洞) 10.10.10.56 1280/tcp open http Apache httpd 2.4.18 ((Ubuntu))2222/tcp open ssh OpenSSH 7.2p2 Ubuntu 4ubuntu2.2 (Ubuntu Linux; protocol 2.0) 1访问web,是一个单纯的图片,查看源码无发现。 2目录扫描ing.两个目录403,未发现其他目录 3 2019-02-10 training training
Optimum(win64-msf提权) Optimum(win64-msf提权) 参考资料:https://isroot.nl/2018/06/25/hack-the-box-write-up-optimum/ 123480/tcp open http HttpFileServer httpd 2.3|_http-server-header: HFS 2.3|_http-title: HFS /Service Info: OS: 2019-02-07 training training windows
wapiti - python web scanner 下载地址:https://sourceforge.net/projects/wapiti/参考资料:http://wapiti.sourceforge.net/ 安装:12345678910cd /opt;python3 setup.py installcd /opt/wapiti3-3.0.1wapiti -u http://192.168.241.136/ --v 2python wapiti 2019-02-05 scan