Advertisement
Guest User

Bypass Linux Server Security

a guest
Jan 25th, 2013
1,977
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.91 KB | None | 0 0
  1. Method 1; open_basedir bypass
  2.  
  3. Shell above "open_basedir" values ​​are used to confine the directory in which the server owner php users. Allows us the chance to bypass the mistakes made in these settings.
  4.  
  5. Open_basedir: / home / username :/ usr / lib / php :/ usr/php4/lib/php :/ usr / local / lib / php :/ usr/local/php4/lib/php :/ tmp
  6.  
  7. Open_basedir values ​​as shown in the example php4 support. Shell is extension "shell.php4" When upload by changing the php server on server 4 version can be captured and Safe Mode, OFF will be located.
  8.  
  9.  
  10. Method 2; Cgishell to run the command with
  11.  
  12. Safe mode off if written in the language of perl cgi-telnet Shell setting chmod 755 after upload to your server and run it. Unblocked cgi script to invoke a server is not even in a situation like that.
  13.  
  14. Method 3, Index Of / On Server directory Jump to
  15.  
  16. As is known, the current servers, safe mode, disable functions even take elements such as files, usually forbidden Assam error. In such cases, by means of tool that I Index of / open directory server with the user you want to bypass the config file.
  17.  
  18.  
  19. Rar file after the upload server on the command line, type tar root root.tar.gz open the compressed file server. Then delete the name of the shell above the current urlden / c1/1/home/k.adı/public_html / making the switch to writing.
  20.  
  21. Method 4, Ln-b with the File Pull
  22.  
  23. Ln-s command given permission restrictions on some server Ln-b command, the command is not forgotten, and in such cases;
  24.  
  25. ln - help command, then ln-b / home / user / public_html / config.php file oku.txt can take any form.
  26.  
  27. Method 5; Symlink the file to read
  28.  
  29. #! / Usr / bin / perl-w
  30.  
  31. use File :: Copy;
  32.  
  33. copy ("/ home / victim / public_html / includes / config.php", "/ home / youruser / public_html / oku.txt");
  34.  
  35. If you have a small perl script This can take the target file.
  36.  
  37.  
  38. #By Mauritania Attacker
  39.  
  40. https://www.facebook.com/mauritanie.forever
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement