2025-8.8日AWD



防御

1.先拖源码

1
tar -zcvf backup.tar.gz /var/www/html
1
tar -zxvf backup.tar.gz
image-20250808193647035
1
2
3
4
5
6
7
8
9
修改靶机密码passwd
fxznb666!

修改mysql密码
mysql -uroot -proot
update mysql.user set password=password('fxznb666!') where user='cms';//root也要修改

修改后看看
select host,user,password from mysql.user;
image-20250808194331772

wc了,phpmyadmin的用户密码默认是root,中途我才记起,反应过来的时候已经被改了

攻击:

扫c段

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
16
17
import requests
from concurrent.futures import ThreadPoolExecutor
import re
f = open("host.txt", "w")
 
def get_ip(url):
    resp = requests.get(url)
    status = resp.status_code
    if status == 200:
        f.write(url + "\n")
        print(url)
 
url = []
for i in range(1, 255):
    url.append("http://192-168-1-" + str(i) + ".pvp6306.bugku.cn")
with ThreadPoolExecutor(max_workers=100) as executor:
    executor.map(get_ip, url)

开始看到别人的马本来想利用,后面马全被人删了,D盾没有扫出哪里有什么漏洞

谢谢观看