Skip to content

Wooyun_Seebug_Python_3 #31

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
PyxYuYu opened this issue May 14, 2016 · 0 comments
Open

Wooyun_Seebug_Python_3 #31

PyxYuYu opened this issue May 14, 2016 · 0 comments

Comments

@PyxYuYu
Copy link
Owner

PyxYuYu commented May 14, 2016

To choose time is to save time.

0x01 Wooyun

  • 邮箱弱口令
    • 爆破工具
  • WebLogic反序列化命令执行
    • ls
  • OA系统弱口令
    • 爆破工具(Burp / Top500
  • memcached未授权访问
  • 任意帐号登录
  • 任意密码重置
    • 获取验证码,抓包,验证码在返回的包中
    • 利用自己帐号获取验证码,填写正确后,替换目标账户
  • Github泄漏
  • Wooyun Wiki
    • FTP服务器安全配置
      • 错误配置及利用
        • 允许匿名用户直接登录,下载文件
        • 配置不当,存在弱口令
        • 权限配置不当
        • proFTPd未授权的文件拷贝(CVE-2015-3306
      • 修复方案
        • 禁止匿名访问
        • 增强口令强度
        • 进行访问限制
      • 漏洞扫描与发现
        • 使用nmap21端口的开放情况进行扫描,然后使用hydra或者medusa进行登陆验证或者暴力破解 端口扫描
        • nmap -Pn -p21 ip
        • 登录验证或端口扫描
        • medusa -H ip.txt -U user.txt -P passwd.txt -M ftp
        • hydra -L username.txt -P passwd.txt ftp://ip (hydra不支持批量的导入)
0x02 Seebug

  • Access数据库
    • PoC中关于md5()函数的验证
      • 有的网站可以执行md5(),有的只能执行纯数字的md5()
    • randomStr()函数可以正则只保留数字,开头不能为0,有的网站可能会忽略开头的0
0x03 一天总结

  • Seebug上提交了1个PoC,关于这套CMS还可以继续提交
  • Wooyun上打包了几个SQL注入漏洞
  • Python框架没有学习,等学完了框架,再去填知道创宇的Python
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

1 participant