±à¼ÍƼö: |
±¾ÆªÎÄÕÂÖ÷Òª½²½âһЩÔÚweb°²È«ÁìÓòÉøÍ¸²âÊԵĻù´¡ÖªÊ¶µã£¬ÒÔÆÕ¼°ÀàÐÅϢΪÖ÷£¬½éÉÜÉøÍ¸²âÊÔµÄÁ÷³ÌºÍÉøÍ¸¹¤¾ßµÄʹÓ÷½·¨ÀýÈ磺sqlmap¡¢metaspolitµÈ£¬¼°Ò»Ð©Êµ¼ÊÓ¦Óó¡¾°¡£ ±¾ÎÄÀ´×ÔÓÚ¼¼Êõ²©¿Í£¬ÓÉ»ðÁú¹ûÈí¼þAlice±à¼ÍƼö¡£ |
|
ÉøÍ¸²âÊԵ͍Òå
ÉøÍ¸²âÊÔ£¨Penetration Testing£©ÊÇÊÜÐÅÈεĵÚÈý·½Í¨¹ýÄ£ÄâºÚ¿Í¿ÉÄÜʹÓõ½µÄ¹¥»÷ÊֶκÍ©¶´ÍÚ¾ò¼¼Êõ¶ÔÄ¿±êÍøÂç»òÄ¿±êϵͳµÄ°²È«ÐÔ×÷³ö·çÏÕÆÀ¹ÀºÍ´àÈõÐÔ·ÖÎö²¢¸ø³ö°²È«¼Ó¹Ì½¨ÒéµÄÒ»¸ö²âÊÔ¹ý³Ì¡£
ÉøÍ¸²âÊÔµÄÒâÒå
ÉøÍ¸²âÊÔÊÇÕ¾ÔÚµÚÈýÕߵĽǶÈÀ´Ë¼¿¼ÆóҵϵͳµÄ°²È«ÐԵģ¬Í¨¹ýÉøÍ¸²âÊÔ¿ÉÒÔ·¢¾õÆóҵDZÔÚȴδç¢Â©µÄ°²È«ÐÔÎÊÌâ¡£ÆóÒµ¿ÉÒÔ¸ù¾Ý²âÊԵĽá¹û¶ÔÄÚ²¿ÏµÍ³ÖеIJ»×ãÒÔ¼°°²È«´àÈõµã½øÐмӹÌÒÔ¼°¸ÄÉÆ£¬´Ó¶øÊ¹Æóҵϵͳ±äµÃ¸ü¼Ó°²È«£¬¼õµÍÆóÒµµÄ·çÏÕ¡£
ÉøÍ¸²âÊԵķÖÀà
ÉøÍ¸²âÊÔ°´ÕÕÉøÍ¸µÄ·½·¨ÓëÊӽǿÉÒÔ·ÖΪÒÔÏÂÈýÀࣺ
ºÚºÐ²âÊÔ
ºÚºÐ²âÊÔ£¨Black-box Testing£©Ò²³ÆÎªÍⲿ²âÊÔ£¨External Testing£©¡£²ÉÓÃÕâÖÖ·½Ê½Ê±£¬ÉøÍ¸²âÊÔÍŶӽ«´ÓÒ»¸öÔ¶³ÌÍøÂçλÖÃÀ´ÆÀ¹ÀÄ¿±êÍøÂç»ù´¡ÉèÊ©£¬²¢Ã»ÓÐÈκÎÄ¿±êÍøÂçÄÚ²¿ÍØÆËµÈÏà¹ØÐÅÏ¢£¬ËûÃÇÍêȫģÄâÕæÊµÍøÂç»·¾³ÖеÄÍⲿ¹¥»÷Õߣ¬²ÉÓÃÁ÷ÐеĹ¥»÷¼¼ÊõÓ빤¾ß£¬ÓÐ×éÖ¯Óв½ÖèµØ¶ÔÄ¿±ê×éÖ¯½øÐÐÖð²½µÄÉøÍ¸ºÍÈëÇÖ£¬½ÒʾĿ±êÍøÂçÖÐһЩÒÑÖª»òδ֪µÄ°²È«Â©¶´£¬²¢ÆÀ¹ÀÕâЩ©¶´ÄÜ·ñ±»ÀûÓûñÈ¡¿ØÖÆÈ¨»òÕß²Ù×÷ÒµÎñ×ʲúËðʧµÈ¡£
ºÚºÐ²âÊÔµÄȱµãÊDzâÊÔ½ÏΪ·Ñʱ·ÑÁ¦£¬Í¬Ê±ÐèÒªÉøÍ¸²âÊÔÕ߾߱¸½Ï¸ßµÄ¼¼ÊõÄÜÁ¦¡£ÓŵãÔÚÓÚÕâÖÖÀàÐ͵IJâÊÔ¸üÓÐÀûÓÚÍÚ¾ò³öϵͳDZÔڵĩ¶´ÒÔ¼°´àÈõ»·½Ú¡¢±¡ÈõµãµÈ
°×ºÐ²âÊÔ
°×ºÐ²âÊÔ£¨White-box Testing£©Ò²³ÆÎªÄÚ²¿²âÊÔ£¨Internal Testing£©¡£½øÐа׺вâÊÔµÄÍŶӽ«¿ÉÒÔÁ˽⵽¹ØÓÚÄ¿±ê»·¾³µÄËùÓÐÄÚ²¿ºÍµ×²ã֪ʶ£¬Òò´ËÕâ¿ÉÒÔÈÃÉøÍ¸²âÊÔÈËÔ±ÒÔ×îСµÄ´ú¼Û·¢ÏÖºÍÑé֤ϵͳÖÐ×îÑÏÖØµÄ©¶´¡£°×ºÐ²âÊÔµÄʵʩÁ÷³ÌÓëºÚºÐ²âÊÔÀàËÆ£¬²»Í¬Ö®´¦ÔÚÓÚÎÞÐë½øÐÐÄ¿±ê¶¨Î»ºÍÇ鱨ÊÕ¼¯£¬ÉøÍ¸²âÊÔÈËÔ±¿ÉÒÔͨ¹ýÕý³£ÇþµÀÏò±»²âÊÔµ¥Î»È¡µÃ¸÷ÖÖ×ÊÁÏ£¬°üÀ¨ÍøÂçÍØÆË¡¢Ô±¹¤×ÊÁÏÉõÖÁÍøÕ¾³ÌÐòµÄ´úÂëÆ¬¶Î£¬Ò²¿ÉÒԺ͵¥Î»ÆäËûÔ±¹¤½øÐÐÃæ¶ÔÃæ¹µÍ¨¡£
°×ºÐ²âÊÔµÄȱµãÊÇÎÞ·¨ÓÐЧµÄ²âÊÔ¿Í»§×éÖ¯µÄÓ¦¼±ÏìÓ¦³ÌÐò£¬Ò²ÎÞ·¨ÅжϳöËûÃǵݲȫ·À»¤¼Æ»®¶Ô¼ì²âÌØ¶¨¹¥»÷µÄЧÂÊ¡£ÓŵãÊÇÔÚ²âÊÔÖз¢Ïֺͽâ¾ö°²È«Â©¶´Ëù»¨·ÑµÄʱ¼äºÍ´ú¼ÛÒª±ÈºÚºÐ²âÊÔÉٺܶࡣ
»ÒºÐ²âÊÔ
»ÒºÐ²âÊÔ£¨Grey-box Testing£©Êǰ׺вâÊԺͺںвâÊÔ»ù±¾ÀàÐ͵Ä×éºÏ£¬Ëü¿ÉÒÔÌṩ¶ÔÄ¿±êϵͳ¸ü¼ÓÉîÈëºÍÈ«ÃæµÄ°²È«Éó²é¡£×éºÏÖ®ºóµÄºÃ´¦¾ÍÊÇÄܹ»Í¬Ê±·¢»ÓÁ½ÖÖÉøÍ¸²âÊÔ·½·¨µÄ¸÷×ÔÓÅÊÆ¡£ÔÚ²ÉÓûҺвâÊÔ·½·¨µÄÍâ²¿ÉøÍ¸¹¥»÷³¡¾°ÖУ¬ÉøÍ¸²âÊÔÕßÒ²ÀàËÆµØÐèÒª´ÓÍⲿÖð²½ÉøÍ¸½øÄ¿±êÍøÂ磬µ«ËûËùÓµÓеÄÄ¿±êÍøÂçµ×²ãÍØÆËÓë¼Ü¹¹½«ÓÐÖúÓÚ¸üºÃµØ¾ö²ß¹¥»÷;¾¶Óë·½·¨£¬´Ó¶ø´ïµ½¸üºÃµÄÉøÍ¸²âÊÔЧ¹û¡£
ÉøÍ¸²âÊÔµÄÁ÷³Ì
ÉøÍ¸²âÊÔÖ´Ðбê×¼£¨Penetration Testing Execution Standard£¬PTES£©ÊÇÓɰ²È«Òµ½çÁì¾üÆóÒµ¼¼Êõר¼Ò¹²Í¬·¢ÆðµÄ£¬ÆÚÍûΪÆóÒµ×éÖ¯Ó밲ȫ·þÎñÌṩÉÌÉè¼Æ²¢Öƶ¨ÓÃÀ´ÊµÊ©ÉøÍ¸²âÊÔµÄͨÓÃÃèÊö×¼Ôò¡£
Õâ¸ö±ê×¼¿ÉÒÔÔÚÈÎÒâ»·¾³ÖнøÐи»ÓгɹûµÄÉøÍ¸²âÊÔ£¬ËüÓÉÉøÍ¸²âÊÔµÄ7¸ö½×¶Î×é³É£º
ǰÆÚ½»»¥
ÔÚ½øÐÐÉøÍ¸²âÊÔ֮ǰ£¬ÉøÍ¸²âÊÔÍŶÓÐèÒªÓë¿Í»§¾ÍÉøÍ¸²âÊÔÄ¿±ê¡¢ÉøÍ¸²âÊÔ·¶Î§¡¢ÉøÍ¸²âÊÔ·½Ê½£¨°×ºÐ¡¢ºÚºÐ¡¢»ÒºÐÒÔ¼°ÊÇ·ñÉæ¼°Éç»á¹¤³Ìѧ¡¢DDOSµÈ£©¡¢·þÎñºÏͬµÈϸ½Ú½øÐÐÉÌÒ飬´ï³ÉÒ»ÖÂÐÒé¡£
¸Ã½×¶ÎÊÇÖ®ºó½øÐÐÉøÍ¸²âÊԵĻù´¡Óë¹Ø¼üËùÔÚ¡£
ÐÅÏ¢ÊÕ¼¯
ÔÚÈ·¶¨ÁËÉøÍ¸²âÊÔÄ¿±êÒÔ¼°·¶Î§Ö®ºó£¬½ÓÏÂÀ´¾ÍÐèÒª½øÈëÐÅÏ¢ÊÕ¼¯½×¶Î¡£ÔÚÕâ¸ö½×¶Î£¬ÉøÍ¸²âÊÔÈËÔ±ÐèҪʹÓø÷ÖÖ¹«¿ªµÄ×ÊÔ´¾¡¿ÉÄܵĻñÈ¡Óë²âÊÔÄ¿±êÏà¹ØµÄÐÅÏ¢¡£¿ÉÒÔ½èÖú»¥ÁªÍø½øÐÐÐÅÏ¢ÊÕ¼¯£¬±ÈÈç˵£º¹Ù·½ÍøÕ¾¡¢ÂÛ̳¡¢²©¿ÍµÈÇþµÀ¡£Í¬Ê±Ò²¿ÉÒÔ½èÖú¸÷´óËÑË÷ÒýÇæÀ´»ñÈ¡Ïà¹ØÐÅÏ¢£¬±ÈÈç˵£ºGoogle¡¢BaiduµÈ¡£Í¬Ê±Ò²¿ÉÒÔ½èÖúKali
LinuxÖеÄһЩ¹¤¾ßÀ´¶ÔDNSÐÅÏ¢¡¢×¢²áÈËÐÅÏ¢¡¢·þÎñÐÅÏ¢¡¢WAFÐÅÏ¢µÈ½øÐÐÊÕ¼¯¡£ÔÚÕâ¸ö½×¶ÎÊÕ¼¯µ½µÄÐÅÏ¢Ô½³ä·Ö¶ÔÖ®ºóµÄÉøÍ¸²âÊÔÔ½ÓÐÀû£¬ÉøÍ¸²âÊԵijɹ¦ÂÊÒ²´ó´óÌá¸ß¡£
Íþв½¨Ä£
ÔÚÍê³ÉÁ˶ÔÄ¿±êϵͳµÄÐÅÏ¢ÊÕ¼¯¹¤×÷Ö®ºó£¬½ÓÏÂÀ´¾ÍÊÇÍþв½¨Ä£½×¶ÎÁË¡£ÔÚÕâ¸ö½×¶ÎÉøÍ¸²âÊÔÍŶÓÐèÒª¾Û¼¯ÔÚÒ»Æð¾Í»ñÈ¡µ½µÄÐÅÏ¢½øÐзÖÎö²¢ÇÒ×ö³ö¹¥»÷µÄ¹æ»®¡£ÕâÊÇÉøÍ¸²âÊÔ¹ý³ÌÖзdz£ÖØÒªµ«ÊÇÓÖºÜÈÝÒ×±»ºöÂÔµÄÒ»¸ö¹Ø¼üµã¡£ÔÚÕâ¸ö¹ý³ÌÖбØÐëÒªÀíÇå˼·£¬È·¶¨³ö×îÓÐЧ¡¢×î¿ÉÐеĹ¥»÷·½°¸¡£
©¶´·ÖÎö
ÔÚÈ·¶¨ÁË×î¿ÉÐеĹ¥»÷·½°¸Ö®ºó£¬½ÓÏÂÀ´¾ÍÐèÒª¿¼ÂÇÈçºÎ»ñȡĿ±êϵͳµÄ·ÃÎÊ¿ØÖÆÈ¨ÏÞ¡£Õâ¸ö½×¶ÎÒ²±»³ÆÎªÂ©¶´·ÖÎö½×¶Î¡£
ÔÚÕâÒ»¸ö½×¶Î£¬ÉøÍ¸²âÊÔÈËÔ±ÐèÒª×ۺϷÖÎö֮ǰÐÅÏ¢ÊÕ¼¯½×¶ÎËù»ñÈ¡µ½µÄÐÅÏ¢£¬ÌرðÊÇϵͳÀàÐÍ¡¢ÏµÍ³¿ªÆôµÄ·þÎñ¡¢Â©¶´É¨ÃèµÄ½á¹ûµÈÐÅÏ¢£¬Í¨¹ý¿ÉÒÔ»ñÈ¡µÄÉøÍ¸´úÂë×ÊÔ´ÕÒ³ö¿ÉÒÔÊµÊ©ÉøÍ¸¹¥»÷µÄ¹¥»÷µã£¬²¢ÔÚ²âÊÔ¹ý³ÌÖнøÐÐÑéÖ¤¡£ÔÚÕâÒ»½×¶ÎÉøÍ¸²âÊÔÈËÔ±²»½öÐèÒªÑé֤ϵͳÊÇ·ñ´æÔÚÒÑÖªµÄ©¶´£¬Í¬Ê±Ò²ÐèҪȥÍÚ¾òϵͳһЩDZÔڵĩ¶´£¬²¢ÇÒ¿ª·¢³öÏàÓ¦µÄ©¶´ÀûÓôúÂë¡£
ÉøÍ¸¹¥»÷
ÔÚ×Ðϸ¼ì²éºÍ·¢ÏÖÄ¿±êϵͳÖеÄ©¶´Ö®ºó£¬¾Í¿ÉÒÔʹÓÃÒÑÓеÄ©¶´ÀûÓóÌÐò¶ÔÄ¿±êϵͳ½øÐÐÉøÍ¸ÁË¡£µ«ÊÇÔÚÒ»°ãÇé¿öÏÂÉøÍ¸²âÊÔÈËÔ±¶¼ÐèÒª¿¼Âǵ½Ä¿±êϵͳµÄ»·¾³¶Ô©¶´ÀûÓóÌÐò£¨exploit£©½øÐÐÐ޸ĺͶîÍâµÄÑо¿£¬·ñÔòËü¾ÍÎÞ·¨Õý³£¹¤×÷¡£Í¬Ê±Ôڸý׶ÎÒ²Òª¿¼Âǵ½¶ÔÄ¿±êϵͳµÄ°²È«»úÖÆµÄÌÓÒÝ£¬´Ó¶ø±ÜÃâÈÃÄ¿±êϵͳ·¢¾õ¡£
ºóÉøÍ¸¹¥»÷
Éî¶ÈÀûÓý׶ÎÊÇÕû¸öÉøÍ¸²âÊÔ¹ý³ÌÖÐ×îÄܹ»ÌåÏÖÉøÍ¸²âÊÔÍŶӼ¼ÊõÄÜÁ¦µÄ»·½Ú¡£Ç°ÃæµÄ»·½Ú¿ÉÒÔ˵¶¼ÊÇÔÚ°´²¿¾Í°àµÄÍê³É·Ç³£ÆÕ±éµÄÄ¿±ê£¬¶øÔÚÕâ¸ö»·½ÚÖУ¬ÐèÒªÉøÍ¸²âÊÔÍŶӸù¾ÝÄ¿±ê×éÖ¯µÄÒµÎñ¾ÓªÄ£Ê½¡¢×ʲú±£»¤Ä£Ê½ºÍ°²È«·ÀÓù¹æ»®µÄ²»Í¬Ìص㣬×ÊÖúÉè¼Æ³ö¹¥»÷Ä¿±ê£¬Ê¶±ð¹Ø¼ü»ù´¡ÉèÊ©£¬²¢Ñ°ÕÒ¿Í»§×éÖ¯×éÖ¯×î¾ß¼ÛÖµºÍ³¢ÊÔ°²È«±£»¤µÄÐÅÏ¢ºÍ×ʲú£¬×îÖÕ´ïµ½Äܹ»¶Ô¿Í»§×éÖ¯Ôì³É×îÖØÒªÒµÎñÓ°ÏìµÄ¹¥»÷;¾¶¡£
ÊéÃæ±¨¸æ
Õû¸öÉøÍ¸²âÊԵĹý³Ì×îÖÕÐèÒªÒÔÊéÃæÎĵµµÄÐÎʽÏò¿Í»§Ìá½»£¬Õâ·Ý±¨¸æÒ²¾ÍÊÇÎÒÃdz£ËµµÄÉøÍ¸²âÊÔ±¨¸æ¡£Õâ·Ý±¨¸æº¸ÇÁË֮ǰËùÓн׶ÎÖÐÉøÍ¸²âÊÔÍŶÓËù»ñÈ¡µÄµ½¸÷ÖÖÓмÛÖµÐÅÏ¢ÒÔ¼°Ì½²âºÍÍÚ¾ò³öÀ´µÄÏà¹Ø°²È«Â©¶´¡¢³É¹¦¹¥»÷µÄ¹ý³Ì£¬ÒÔ¼°¶ÔÒµÎñÔì³ÉµÄÓ°Ïìºó¹û·ÖÎö¡£Í¬Ê±ÔÚÕâ¸ö½×¶ÎÒ²Òª¶ÔϵͳÖдæÔڵĴàÈõ»·½Ú¡¢´æÔڵݲȫÎÊÌâ¸ø³öÐÞ¸´½¨Òé¡£
ÉøÍ¸²âÊÔ¹¤¾ßµÄʹÓÃ
˵ÍêÁË»ù±¾µÄÉøÍ¸²âÊÔ֪ʶµã£¬½ÓÏÂÀ´¾Í¼òµ¥µÄ½éÉܼ¸¿îÔÚÉøÍ¸²âÊÔÖг£Óõ½µÄ¹¤¾ß¡£
sqlmap
SqlmapÊÇÒ»ÖÖ¿ªÔ´µÄÉøÍ¸²âÊÔ¹¤¾ß£¬¿ÉÒÔ×Ô¶¯¼ì²âºÍÀûÓÃSQL×¢Èë©¶´ÒÔ¼°½ÓÈë¸ÃÊý¾Ý¿âµÄ·þÎñÆ÷¡£ËüÓµÓзdz£Ç¿´óµÄ¼ì²âÒýÇæ¡¢¾ßÓжàÖÖÌØÐÔµÄÉøÍ¸²âÊÔÆ÷¡¢Í¨¹ýÊý¾Ý¿âÖ¸ÎÆÌáÈ¡·ÃÎʵײãÎļþϵͳ²¢Í¨¹ýÍâ´øÁ¬½ÓÖ´ÐÐÃüÁî¡£
Ö§³ÖµÄÊý¾Ý¿â£ºMySQL, Oracle, PostgreSQL, Microsoft SQL Server,
Microsoft Access, IBM DB2, SQLite, Firebird, Sybase
and SAP MaxDB
SQL×¢Èë¼¼Êõ£ºboolean-based blind, time-based blind, error-based,
UNION query, stacked queries and out-of-band
ö¾ÙÊý¾Ý£ºusers, password hashes, privileges, roles, databases,
tables and columns
ʹÓÃʵÀý£ºÍ¨¹ýÒ»µÀʵÑé°ÉCTFÌâÄ¿À´ÑÝʾsqlmapµÄʹÓÃ
̽²â´æÔÚ×¢ÈëµãµÄϵͳËùʹÓõÄÊý¾Ý¿âÀàÐÍ
ÃüÁî¸ñʽ£ºSqlmap ¨Cu Ä¿±êURL

±¬³öÄ¿±êϵͳÖеÄËùÓÐÊý¾Ý¿â
ÃüÁî¸ñʽ£ºsqlmap ¨Cu Ä¿±êURL ¨Cdbs


Ñ¡ÔñÒª±¬ÆÆµÄÊý¾Ý¿â½øÐмòµ¥µÄ±¬±í²Ù×÷
ÃüÁî¸ñʽ£ºsqlmap ¨Cu Ä¿±êURL -D Êý¾Ý¿âÃû ¨Ctables


È·¶¨±íÃû£¬Ö®ºó¾ÍÐèÒª¶Ô×ֶνøÐб¬ÆÆ²Â½â
ÃüÁî¸ñʽ£ºsqlmap ¨Cu Ä¿±êURL ¨CD Êý¾Ý¿âÃû ¨CT ±íÃû ¨Ccolumns


±¬×Ö¶ÎÖµ
ÃüÁî¸ñʽ£ºsqlmap ¨Cu Ä¿±êURL -D Êý¾Ý¿âÃû¨CT ±íÃû ¨CC ×Ö¶ÎÃû ¨Cdump
ʵÀý½á¹û·ÖÎö
ÔÚÕâÒ»µÀCTFÌâÄ¿ÖУ¬·þÎñÆ÷¶Ë¶ÔÓû§ÊäÈëµÄÊý¾Ýδ¾¹ýÑϸñµÄ¹ýÂË£¬¶øÖ±½Ó´øÈëÁ˺ǫ́Êý¾Ý¿âÖнøÐвéѯ£¬µ¼ÖÂÁËSQL×¢Èë¡£¹¥»÷Õß¿ÉÒÔʹÓøÃSQL×¢ÈëÀ´»ñÈ¡ÏàÓ¦µÄ±í¡¢×ֶΡ¢×Ö¶ÎÄÚÈÝÐÅÏ¢£¬Î£º¦¾Þ´ó¡£
°²È«¼Ó¹ÌÒâ¼û
ʹÓð²È«¹ýÂ˺¯Êý¶ÔÊäÈëµÄÊý¾Ý½øÐÐÑϸñ¹ýÂË
¶Ô´ÓÓû§¶ËÊäÈëµÄÌØÊâ×Ö·û½øÐÐתÒå²Ù×÷
²ÉÓÃÔ¤±àÒëÓï¾ä£¬°ó¶¨±äÁ¿
²ÉÓô洢¹ý³Ì
¼ì²éÊý¾ÝÀàÐÍ
Metasploit
Metasploit¾ÍÊÇÒ»¸ö©¶´¿ò¼Ü¡£ËüµÄÈ«³Æ½Ð×öThe Metasploit Framework£¬¼ò³Æ½Ð×öMSF¡£Metasploit×÷ΪȫÇò×îÊÜ»¶ÓµÄ¹¤¾ß£¬²»½ö½öÊÇÒòΪËüµÄ·½±ãÐÔºÍÇ¿´óÐÔ£¬¸üÖØÒªµÄÊÇËüµÄ¿ò¼Ü¡£ËüÔÊÐíʹÓÃÕß¿ª·¢×Ô¼ºµÄ©¶´½Å±¾£¬´Ó¶ø½øÐвâÊÔ¡£
MetasploitÖеÄרҵÊõÓ
Exploit£¨ÉøÍ¸¹¥»÷£©£ºÉøÍ¸¹¥»÷ÊÇÖ¸Óɹ¥»÷Õß»òÉøÍ¸²âÊÔÕßÀûÓÃÒ»¸öϵͳ¡¢Ó¦Óûò·þÎñÖеݲȫ©¶´£¬Ëù½øÐеĹ¥»÷ÐÐΪ¡£Á÷ÐеÄÉøÍ¸¹¥»÷¼¼Êõ°üÀ¨»º³åÇøÒç³ö¡¢WEBÓ¦ÓóÌÐò©¶´¹¥»÷£¨ÀýÈ磺SQL×¢Èë¡¢XSSµÈ£©£¬ÒÔ¼°ÀûÓÃÅäÖôíÎóµÈ¡£
Payload£¨¹¥»÷ÔØºÉ£©£º¹¥»÷ÔØºÉÊÇÎÒÃÇÆÚÍûÄ¿±êϵͳÔÚ±»ÉøÍ¸¹¥»÷Ö®ºóÈ¥Ö´ÐеĴúÂ룬ÔÚMetasploit¿ò¼ÜÖпÉÒÔ×ÔÓɵØÑ¡Ôñ¡¢´«ËͺÍÖ²Èë¡£
ShellCode£ºShellCodeÊÇÉøÍ¸¹¥»÷ʱ×÷Ϊ¹¥»÷ÔØºÉÔËÐеÄÒ»×é»úÆ÷Ö¸Áî¡£ShellCodeͨ³£Óûã±àÓïÑÔ±àд¡£
Module(Ä£¿é)£ºÔÚMetasploitÖÐÒ»¸öÄ£¿éÊÇÖ¸Metasploit¿ò¼ÜÖÐËùʹÓõÄÒ»¶ÎÈí¼þ´úÂë×é¼þ¡£
Listener(¼àÌýÆ÷)£º¼àÌýÆ÷ÊÇMetasploitÖÐÓÃÀ´µÈ´ý½ÓÈëÍøÂçÁ¬½ÓÖ÷»úµÄ×é¼þ¡£
ʹÓÃʵÀý£ºÍ¨¹ý¶ÔMetasploitable 2ÖеÄSSH½øÐб¬ÆÆÑÝʾMSFµÄʹÓÃ
Ê×ÏÈ£¬ÎÒÃÇÐèҪ̽²âÄ¿±êµÄSSH¶Ë¿ÚÊÇ·ñ¿ªÆô

£¨2£©¿ªÆôMetasploit framework¿ò¼Ü£¬²¢ÇÒÖ¸¶¨Ê¹ÓõĹ¥»÷Ä£¿é

£¨3£©ÏÔʾÐèÒªÅäÖõÄÑ¡Ïî

£¨4£©ÉèÖù¥»÷Ä¿±êÖ÷»úµÄIPµØÖ·¡¢×ֵ䣨ÐèÒªÔ¤ÏÈÉú³É£©¡¢Ïß³ÌÊýÁ¿

£¨5£©¹¥»÷¿ªÊ¼

ʵÀý½á¹û·ÖÎö
ͨ¹ýÒÔÉÏʵÀý¿ÉÒÔ·¢ÏÖSSHÔÚ¸øÓè¹ÜÀíÕß·½±ãµÄͬʱҲΪ¹¥»÷ÕßÁôÏÂÁË¿ÉÀûÓõÄÇþµÀ£¬ÒÔÉϵı¬ÆÆÖ÷ÒªÀûÓÃÁËÓû§ÃûÃÜÂë¹ýÓÚ¼òÒ׿ɲ½âµÄÔµ¹ÊÒÔ¼°¶ÔͬһIPµÄ·ÃÎʻỰ´ÎÊýΪ×öÈκÎÏÞÖÆ¡£
°²È«¼Ó¹ÌÒâ¼û£º
²ÉÓù«Ô¿ÈÏÖ¤£¬È¡ÏûÃÜÂëµÇ¼
ͨ¹ý¿ØÖÆÓû§·ÃÎÊÏÞÖÆSSH·ÃÎÊ
ÅäÖ÷À»ðǽÒÔ½ÓÊÕ½öÀ´×Ô×Ô¼ººÍÒÑÖªÍø¶ÎµÄSSHÁ´½Ó
ÉèÖÃÓû§²ßÂÔ£¬ÊµÊ©Ç¿´óµÄÃÜÂëÀ´·ÀÓùÇ¿Á¦¹¥»÷£¬Éç»á¹¤³ÌÆóͼ¡£
Burp suite
Burp suiteÊÇÒ»¸ö¼¯³É»¯µÄÉøÍ¸²âÊÔ¹¤¾ß£¬Ëü¼¯ºÏÁ˶àÖÖÉøÍ¸²âÊÔ×é¼þ£¬Ê¹ÎÒÃÇÄܹ»×Ô¶¯»¯»òÊÖ¹¤µÄÍê³É¶ÔwebÓ¦ÓõÄÉøÍ¸²âÊÔ¹¥»÷£¬ÔÚÉøÍ¸²âÊÔÖУ¬ÎÒÃÇʹÓÃBurp
suite½«»áʹµÃ²âÊÔ¹¤×÷±äµÃ¸ü¼ÓÈÝÒ׺ͷ½±ã£¬¼´Ê¹ÔÚÐèÒªÒªæµÊìµÄ¼¼ÇɵÄÇé¿öÏ£¬Ö»ÒªÎÒÃÇÊìϤBurp
suiteµÄʹÓã¬Ò²»áʹµÃÉøÍ¸²âÊÔ¹¤×÷±äµÃ¸ü¼ÓÇáËɺ͸ßЧ¡£
Burp suite ¸÷´óÄ£¿é£º
Target(Ä¿±ê)¡ª¡ªÏÔʾĿ±êĿ¼½á¹¹µÄµÄÒ»¸ö¹¦ÄÜ
Proxy(´úÀí)¡ª¡ªÀ¹½ØHTTP/SµÄ´úÀí·þÎñÆ÷£¬×÷Ϊһ¸öÔÚä¯ÀÀÆ÷ºÍÄ¿±êÓ¦ÓóÌÐòÖ®¼äµÄÖмäÈË£¬ÔÊÐíÄãÀ¹½Ø£¬²é¿´£¬ÐÞ¸ÄÔÚÁ½¸ö·½ÏòÉϵÄÔʼÊý¾ÝÁ÷¡£
Spider(Ö©Öë)¡ª¡ªÓ¦ÓÃÖÇÄܸÐÓ¦µÄÍøÂçÅÀ³æ£¬ËüÄÜÍêÕûµÄö¾ÙÓ¦ÓóÌÐòµÄÄÚÈݺ͹¦ÄÜ¡£
Scanner(ɨÃèÆ÷)¡ª¡ª¸ß¼¶¹¤¾ß£¬Ö´Ðкó£¬ËüÄÜ×Ô¶¯µØ·¢ÏÖweb Ó¦ÓóÌÐòµÄ°²È«Â©¶´¡£
Intruder(ÈëÇÖ)¡ª¡ªÒ»¸ö¶¨ÖƵĸ߶ȿÉÅäÖõŤ¾ß£¬¶ÔwebÓ¦ÓóÌÐò½øÐÐ×Ô¶¯»¯¹¥»÷£¬È磺ö¾Ù±êʶ·û£¬ÊÕ¼¯ÓÐÓõÄÊý¾Ý£¬ÒÔ¼°Ê¹ÓÃfuzzing
¼¼Êõ̽²â³£¹æÂ©¶´¡£
Repeater(ÖÐ¼ÌÆ÷)¡ª¡ªÒ»¸ö¿¿ÊÖ¶¯²Ù×÷À´´¥·¢µ¥¶ÀµÄHTTP ÇëÇ󣬲¢·ÖÎöÓ¦ÓóÌÐòÏìÓ¦µÄ¹¤¾ß¡£
Sequencer(»á»°)¡ª¡ªÓÃÀ´·ÖÎöÄÇЩ²»¿ÉÔ¤ÖªµÄÓ¦ÓóÌÐò»á»°ÁîÅÆºÍÖØÒªÊý¾ÝÏîµÄËæ»úÐԵŤ¾ß¡£
Decoder(½âÂëÆ÷)¡ª¡ª½øÐÐÊÖ¶¯Ö´Ðлò¶ÔÓ¦ÓóÌÐòÊý¾ÝÕßÖÇÄܽâÂë±àÂëµÄ¹¤¾ß¡£
Comparer(¶Ô±È)¡ª¡ªÍ¨³£ÊÇͨ¹ýһЩÏà¹ØµÄÇëÇóºÍÏìÓ¦µÃµ½Á½ÏîÊý¾ÝµÄÒ»¸ö¿ÉÊÓ»¯µÄ¡°²îÒ족¡£
Extender(À©Õ¹)¡ª¡ª¿ÉÒÔÈÃÄã¼ÓÔØBurp SuiteµÄÀ©Õ¹£¬Ê¹ÓÃÄã×Ô¼ºµÄ»òµÚÈý·½´úÂëÀ´À©Õ¹Burp
SuitµÄ¹¦ÄÜ¡£
Options(ÉèÖÃ)¡ª¡ª¶ÔBurp SuiteµÄһЩÉèÖÃ

ʹÓÃʵÀý£ºÍ¨¹ýPHP°²È«ÎÊÌâÔì³ÉµÄÎļþÉÏ´«Â©¶´À´ÑÝʾburp suiteµÄʹÓá£
£¨1£©·ÃÎÊ´æÔÚÎļþÉÏ´«Â©¶´µÄÁ´½ÓµØÖ·£º

ÉèÖôúÀí£º

£¨3£©×¼±¸Ò»¾ä»°Ä¾ÂíÎļþ

£¨4£©Ö±½ÓÉÏ´«PHPÎļþ»á³öÏÖ±¨¡°ÎļþÉÏ´«ÀàÐÍ´íÎó¡±

£¨5£©Ö®ºóʹÓÃburpsuite½øÐÐ×¥°ü¸Ä°ü

£¨6£©/00½Ø¶Ï£º


£¨7£©Ö®ºóÊͷŰü£¬Îļþ³É¹¦ÉÏ´«³É¹¦£º

£¨8£©Ö®ºóʹÓò˵¶Á´½Ó£º


ʵÀý·ÖÎö
ÉÏÃæÕâÒ»¸öʵÀýÖ÷ÒªÀûÓÃÁËPHP°æ±¾´æÔÚµÄ0x00½Ø¶Ï©¶´£¬¿ÉÏë¶øÖªÓÐʱºòÒ»¸ö·þÎñÆ÷¶ËµÄ×é¼þµÄÎÊÌâÒ²ÊÇ»á²úÉú·Ç³£¾Þ´óµÄÎÊÌâµÄ£¡
¼Ó¹Ì½¨Òé
¼°Ê±¸üзþÎñÆ÷¶ËµÄÅäÖã¬ÐÞ¸´ÏàÓ¦µÄÅäÖÃȱÏÝÒÔ¼°×é¼þµÄ°²È«ÎÊÌ⡣ͬʱ¶ÔÓû§ÉÏ´«µÄÎļþµÄ¸ñʽ¡¢ÄÚÈݵȽøÐÐÑϸñµÄ¹ýÂË
ÒÔÉϵÄʵÀýÖ÷ÒªÊÇÓÃÀ´ÑÝÊ¾Ò»Ð©ÉøÍ¸²âÊÔ¹ý³ÌÖй¤¾ßµÄʹÓ÷½·¨£¬ÕâÀï²¢²»ÊÇÈôó¼ÒÈ¥×ö¶ñÒâ¹¥»÷£¬ÎÒÃǵijõÔ¸ÊÇÉøÍ¸²âÊÔÈËԱͨ¹ýʹÓÃÉøÍ¸²âÊÔ¹¤¾ß»òʹÓÃ×ÔÎÒ¿ª·¢µÄ¹¤¾ßÀ´¶ÔһЩ´àÈõÐÔϵͳ½øÐвâÊÔ£¬´Ó¶øÍÚ¾òDZÔڵĩ¶´£¬ÐÖúÆóÒµÀ´¼ÓÇ¿°²È«ÏµÍ³µÄ·ÀÓù´ëÊ©£¬Î¬»¤°²È«£¡ÓÉÓÚÆª·ùÔÒòÕâÀï¾Í²»ÔÙ¶ÔÆäËû¹¤¾ß½øÐнéÉÜÁË£¬Èç¹ûÓÐÐËȤ¿ÉÒÔÖ®ºó×ÔÎÒÁ˽âһϣ¡
ÉøÍ¸²âÊÔʵս£¨×¢ÒâÉøÍ¸Ë¼Â·¡¢°²È«¼Ó¹ÌÎÊÌ⣩
Ä¿±ê»ú£ºMetasploitable 2 IP:192.168.11.138
¹¥»÷»ú£ºKali 2018 IP:192.168.11.144
ÉøÍ¸²âÊÔ¹ý³Ì
£¨1£©Ç°ÆÚ½»»¥
¼Ù¶¨ÎÒÃǾ¹ýǰÆÚ½»»¥×îºóÈ¡µÃµÄ½á¹ûÊÇ£ºÉøÍ¸²âÊÔÄ¿±êΪ 192.168.11.138£¬·¶Î§ÎªÕû¸öMetasploitable2ϵͳ°²È«Óë·þÎñ°²È«£¬ÉøÍ¸²âÊÔ·½Ê½ÎªºÚºÐ²âÊÔ£¬ÉøÍ¸²âÊÔÖв»Éæ¼°Éç»á¹¤³ÌѧÏà¹ØµÄ¹¥»÷£¬²»Éæ¼°DDOSµÈ¡£³õ²½ÉÌÒéÔÝʱÈç´Ë£¡
£¨2£©ÐÅÏ¢ÊÕ¼¯
Ö÷»ú´æ»î+·þÎñö¾Ù+¶Ë¿ÚɨÃè+Ö÷»úÖ¸ÎÆÊ¶±ð

×¢£ºÕâÀïÊǵ¥´¿µÄ¶ÔÒ»¸öÄ¿±êÖ÷»ú½øÐÐÉøÍ¸²âÊÔ£¬Ö»ÊÇΪÁËÑÝʾһÏÂÉøÍ¸Á÷³Ì£¬ËùÒÔ¾ÍûÓÐÉæ¼°µ½ÔÚ¶ÔÆóÒµ½øÐÐÉøÍ¸²âÊÔ¹ý³ÌÖÐÓõ½µÄ¸÷ÖÖÐÅÏ¢£¨¹ÙÍøÐÅÏ¢¡¢ÓÑÇéÁ´½Ó¡¢DNSÐÅÏ¢¡¢WAFÐÅÏ¢¡¢Â·ÓÉÐÅÏ¢µÈµÈ£©µÄÊÕ¼¯¡£µ«ÊǶÁÕßÐèÒª×Ô¼ºÇå³þÔڸý׶ÎÐèÒªÍê³ÉʲôÑùµÄ¹¤×÷¡£
£¨3£©Íþв½¨Ä£
´ÓÉÏÃæµÄɨÃè½á¹ûÎÒÃDz»ÄÑ¿´³öÀ´ÓÐvsftpd¡¢OpenSSH¡¢Telnet¡¢Apache¡¢Samba¡¢rmiregistry¡¢nfs¡¢mysql¡¢postgresql¡¢vncµÈ·þÎñ£¬¶øÕâЩ·þÎñ´ó¶àÊý¶¼Ôø³öÏÖ¹ý©¶´£¬¶øÇÒ¶ÔÓ¦µÄºóÃæ¶¼¸ø³öÁËVersion£¬ÓÚÊǾͿÉÒÔ´ÓÕâЩ·þÎñÀ´ÏÂÊÖ£¬Í¬Ê±¿ÉÒÔ¹Ø×¢Ò»Ð©ËùʹÓõÄϵͳÊÇ·ñ´æÔÚÈκΩ¶´£¬ÓÚ´Ëͬʱ×÷Ϊһ¸öÉøÍ¸²âÊÔÈËÔ±£¬²»½öÒª´ÓÒѾ·¢Ïֵĩ¶´ÈëÊÖÈ¥·ÖÎö£¬Ò²ÒªÈ¥ÍÚ¾òδ֪µÄDZÔڵĩ¶´¡£ÎÒÃÇÕâÀï½ö½öÑÝʾÆäÖеÄÒ»¸öPHP
CGI²ÎÊý×¢ÈëÖ´ÐР©¶´£¬ÖÁÓÚÆäËû©¶´£¬¶ÁÕß¿ÉÒÔ×ÔÎҴ»·¾³£¬×ÔÎÒʵÏÖһϣ¡
£¨4£©Â©¶´·ÖÎö
PHP CGI©¶´ÊÇÓû§½«HTTPÇëÇóÌá½»µ½Apache·þÎñÆ÷£¬Í¨¹ýmod_cgiÄ£¿éÌá½»¸øºó¶ËµÄphp-cgi´¦Àí£¬µ«ÊÇÔÚÖ´Ðйý³ÌÖв¿·Ö×Ö·ûûÓеõ½´¦Àí£¬±ÈÈç¿Õ¸ñ¡¢µÈºÅ¡¢¼õºÅµÈ¡£ÀûÓÃÕâЩ×Ö·û£¬¹¥»÷Õß¿ÉÒÔÏòºó¶ËµÄPHP
CGI½âÎö³ÌÐòÌá½»¶ñÒâÊý¾Ý£¬PHP CGI»á½«Õâ¶Î¡°Êý¾Ý¡±µ±×öPHPµÄ²ÎÊýÖ±½ÓÖ´ÐС£
£¨5£©Â©¶´ÀûÓÃ
Ö¸¶¨Ê¹ÓõĹ¥»÷Ä£¿é

ÉèÖÃÑ¡Ïî

¿ªÊ¼¹¥»÷

µ½´ËÒ»¸ö¼òÒ׵ĩ¶´µÄÀûÓÃÒѾʵÏÖÁË£¡
£¨6£©Éî¶ÈÀûÓÃ
ÔÚÒ»¸ö³£¹æµÄ©¶´Éî¶ÈÀûÓý׶Σ¬ÉøÍ¸²âÊÔÈËÔ±ÍùÍùÐèҪʵÏÖÒÔϲÙ×÷£ºÈ¨ÏÞÌáÉý¡¢»á»°Î¬³Ö¡¢Ê¶±ðÄ¿±êϵͳÖеĹؼüÉèÊ©¡¢²éѯ¿Í»§×î¾ßÓмÛÖµºÍÊÔͼ±£»¤µÄÐÅÏ¢ºÍ×ʲúµÈÄÚÈÝ£¬²¢ÊÔͼÑé֤ͨ¹ý¶Ôµ±Ç°Â©¶´µÄÀûÓÿÉÒÔʵÏÖ¶Ô¿Í»§×éÖ¯Ôì³É×îÖØÒªµÄÒµÎñÓ°ÏìºÍÐÅÏ¢»ò×ʲúËðʧ¡£
ÕâÀï¿´ÁËÒ»ÏÂÆª·ùʵÔÚÊÇÓе㳤ÁË£¬ËùÒԾͲ»¶ÔÕâÒ»²¿·ÖÕ¹¿ª½éÉÜÁË¡£
£¨7£©ÊéÃæ±¨¸æ
ÕâÒ»²¿·ÖÐèÒª¶Ô֮ǰËù×öµÄÉøÍ¸²âÊÔµÄϸ½Ú½øÐÐÏêϸµÄ¸ÅÀ¨£¬²¢¶Ô´æÔڵݲȫÎÊÌâ¸ø³öÐÞ¸´ÐÔ½¨Ò飡
ÏÖÔÚ¶ÔPHP CGI©¶´¸ø³ö°²È«¼Ó¹Ì·½°¸£º
ÓÉÓÚÊÇPHP±¾Éí³öÎÊÌ⣬ËùÒÔ»¹ÐèÒª¸ªµ×³éн£¬½¨ÒéÖ±½ÓÉý¼¶µ½×îйٷ½°æ±¾£¬»òÕß°²×°PHP²¹¶¡¡£
×ܽá
ÉøÍ¸²âÊÔÊÇÒ»¸ö¿¼Ñé˼άÓë±äͨÄÜÁ¦µÄ¹ý³Ì£¬×÷ÎªÉøÍ¸²âÊÔÈËÔ±Ó¦µ±¾ß±¸½ÏÇ¿µÄÐÅÏ¢ÊÕ¼¯ÄÜÁ¦£¬¿ÉÒÔ¿ìËٵġ¢Ï꾡µÄÊÕ¼¯µ½ÓëÄ¿±êϵͳÏà¹ØµÄÐÅÏ¢£¬Í¬Ê±Ò²Òª¾ß±¸½ÏÇ¿µÄ¶´²ìÄÜÁ¦£¬¿ÉÒÔ¸ù¾ÝÐÅÏ¢À´·ÖÎöÓëÍÚ¾òÒÑÖª»òδ֪©¶´£¬½¨Á¢Êʵ±µÄÉøÍ¸¹¥»÷Ä£ÐÍ£¬µ±È»Ò²ÐèÒª½ÏΪ»îÔ¾µÄ˼Ð÷£¬¿ÉÒÔ´Ó¶à·½Ãæ·ÖÎö¡¢ÀûÓé¶´£¬ÊµÏÖ©¶´ÀûÓõÄ×î´ó»¯£¬Í¬Ê±Ò²ÐèÒª½«Â©¶´¿ÉÄܸøÄ¿±êϵͳ´øÀ´µÄ·çÏÕ½øÐÐÏ꾡µÄ·ÖÎöÓë˵Ã÷£¬ÐÖú¿Í»§Á˽â×Ô¼ºÏµÍ³µÄ´àÈõµã²¢¶ÔÍê³É¶ÔÆóҵϵͳµÄ°²È«¼Ó¹Ì¡£ |