Skip to content

Commit

Permalink
add images
Browse files Browse the repository at this point in the history
  • Loading branch information
listenquiet committed Nov 30, 2021
1 parent e1650a6 commit 65a00b8
Showing 1 changed file with 11 additions and 3 deletions.
14 changes: 11 additions & 3 deletions readme.md
Original file line number Diff line number Diff line change
Expand Up @@ -70,8 +70,14 @@ for i in range(10000, 10500):
python .\poc.py 192.168.144.128
```

![Image text](https://raw.githubusercontent.com/listenquiet/cve-2017-2824-reverse-shell/main/img/2021-09-28_10-44-31.png)

![Image text](https://raw.githubusercontent.com/listenquiet/cve-2017-2824-reverse-shell/main/img/2021-09-28_10-44-58.png)

第一次执行没有hostid,第二次执行时,注册成功了,执行了命令。若不成功,多执行几次

![Image text](https://raw.githubusercontent.com/listenquiet/cve-2017-2824-reverse-shell/main/img/2021-09-28_10-45-45.png)

## **0x08 漏洞利用**

网上没有现成利用工具,有些反弹shell的发现不成功
Expand Down Expand Up @@ -126,19 +132,21 @@ for exp in exps:

第一次执行效果


![Image text](https://raw.githubusercontent.com/listenquiet/cve-2017-2824-reverse-shell/main/img/2021-09-28_10-54-30.png)

第二次执行效果


![Image text](https://raw.githubusercontent.com/listenquiet/cve-2017-2824-reverse-shell/main/img/2021-09-28_10-54-54.png)

第三次执行,提示连接超时,则可能是第二次已经反弹shell成功了,所以再去连接nc端口超时

![Image text](https://raw.githubusercontent.com/listenquiet/cve-2017-2824-reverse-shell/main/img/2021-09-28_10-55-22.png)

![Image text](https://raw.githubusercontent.com/listenquiet/cve-2017-2824-reverse-shell/main/img/2021-09-28_10-56-34.png)

查看反弹shell成功


![Image text](https://raw.githubusercontent.com/listenquiet/cve-2017-2824-reverse-shell/main/img/2021-09-28_10-58-49.png)

但这种反弹shell不知道什么原因,会导致容器过一分钟左右退出。非容器环境未测试,使用需谨慎,使用此脚本导致业务受影响,本人概不负责。

Expand Down

0 comments on commit 65a00b8

Please sign in to comment.