banner
lca

lca

真正的不自由,是在自己的心中设下牢笼。

I remember a time when I got server access through an xxl job (as long as you have hands, it can be done sequentially).

The process of exploiting vulnerabilities is simple and clear. Weak passwords can be used to execute commands in the background, which is a straightforward sequence of actions.

Weak password for xxl-job: admin/123456

After logging in, the interface is as follows:

image

Find task management and select the external interface executor to bounce the shell:

image

Select the created task, choose operation-GLUE IDE:

image

Open the editor window, write the command, and save:

image

Go back to the task window and select execute once:

image

The server nc is listening and successfully obtains server permissions:

image

Loading...
Ownership of this post data is guaranteed by blockchain and smart contracts to the creator alone.