当前位置:网站首页>6-18 vulnerability exploitation - backdoor connection
6-18 vulnerability exploitation - backdoor connection
2022-07-25 22:04:00 【Mountain Rabbit 1】

Rear door connection detection
In some cases , There may be some backdoors in the server , have access to Nmap Explore and try .
We have detected its corresponding ports and services before , And then to the target IP Address detection
nmap -sV -p 1524 192.168.1.105

You can see here is a service, It's a binding shell, As well as its banner Information ,root shell
nmap 192.168.1.105

We see here ingreslock Content , We can further detect
nmap -p 1524 -sV 192.168.1.105

We according to the bindshell, Guess , It will be a backdoor program , This is the time , We need to test this guess , We use it nc The port number of the connection destination address , To connect its back door , So as to obtain the corresponding permission
nc Connect the back door to get permission
Nc The goal is IP Port number Connect the backdoor .
nc 192.168.1.105 1524

After the connection , We can execute the corresponding command , Use id and whoami To view the current permissions , And execute other system commands
ifconfig
// View the currently connected server IP Address

id
whoami
hostname

We use root Login to the server of the remote target with permission , Execute the highest authority command
Why does our server have backdoors
1、 Our current server has been attacked by corresponding hackers , It leaves a back door on the original server , We detected this back door , You can follow it directly shell, Connect
2、 System administrator , In some cases , Need to manage remote machines , But in the process of management , Need a corresponding rebound shell, This is the time , It is likely to open a waiting connection shell, We connect directly to this port number , Follow the administrator's thinking 、 Method 、 route , Enter the system
3、 Some software has connections shell back door , This is the time , We can connect directly , Connect to the corresponding shell
How to defend
We must test , The current system , Open those ports , In some cases , Try not to use ports , Close as much as possible , We just turn on , Our server is running , The port number that must be opened , Irrelevant port number , Direct closure , Of course , We also need to monitor the network status of the system server in real time , In the process of connection , We must pay attention to the possibility , This is an activity of connecting backdoors , We need to monitor it in real time
边栏推荐
- Preliminary study on Tesseract OCR
- Ansible+cronab batch deployment patrol
- Whether the five distribution methods will produce internal fragments and external fragments
- Can I buy financial products with a revenue of more than 6% after opening an account
- C language left value and right value description [easy to understand]
- sql语句练习题整理
- JS timer and swiper plug-in
- I/o case practice
- JMeter websocket接口测试
- Uninstall NPM and install NPM_ Use 'NPM uninstall' to uninstall the NPM package 'recommended collection'
猜你喜欢
随机推荐
动画曲线天天用,你能自己整一个吗?看完这篇你就会了!
In Oracle 19C version, logminer package continuous_ The outdated function of mine leads to CDC failure
How to solve the problem of using the download Plug-in for export?
Solutions to the failure of win key in ikbc keyboard
[leetcode ladder] linked list · 021 merge two ordered linked lists
Ability to choose
卸载npm和安装npm_使用`npm uninstall`卸载npm软件包「建议收藏」
[51nod1676 undirected graph isomorphism] undirected graph hash [easy to understand]
YUV420 yuv420sp image format "recommended collection"
【饭谈】测试平台为什么有组件化?模块化?很多看不到的地方设计的很好是种浪费么?
Redis 使用详解
关于接口测试你想知道的都在这儿了
Performance debugging -- chrome performance
【饭谈】那些看似为公司着想,实际却很自私的故事 (一:造轮子)
Automatic assembly and fuse degradation of feign
Jenkins+svn configuration
C language: random generated number + selective sorting
Special class design
EL表达式改进JSP
2022 the latest software tests eight part essay. Whether you can offer depends on how you recite it







