Hacking Book | Free Online Hacking Learning

Home

maccms hidden back door analysis

Posted by patinella at 2020-02-27
all

(this article is only for the normal learning record. If there is any mistake, please point out. If this article can help you, I'm also very happy.)

The recurrence refers to the articles in the network. The loophole is only for learning and communication. Illegal use is strictly prohibited!!!

1、 Event background

CMS: content management system

2、 Vulnerability analysis

1. After downloading maccms10 from the fake "Apple official website", open the source code and find maccms10. Zip \ extend \ qcloud \ SMS \ sms.php, maccms10. Zip \ extend \ upyun \ SRC \ upyun \ API \ format. PHP

2. Move the source code of the website to the web root directory of phpstudy, open phpstudy, open Apache service, and access with password

3. As can be seen from the figure above, this is a horse with many functions, such as executing SQL, executing commands, rebounding ports, etc. test several of them

4. Test rebound port, use Kali virtual machine as attacker and local machine as target

5. Open Kali, use NC to monitor, and click bounce