hacktricks/network-services-pentesting/24007-24008-24009-49152-pentesting-glusterfs.md

63 lines
3.9 KiB
Markdown
Raw Normal View History

{% hint style="success" %}
Learn & practice AWS Hacking:<img src="/.gitbook/assets/arte.png" alt="" data-size="line">[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)<img src="/.gitbook/assets/arte.png" alt="" data-size="line">\
Learn & practice GCP Hacking: <img src="/.gitbook/assets/grte.png" alt="" data-size="line">[**HackTricks Training GCP Red Team Expert (GRTE)**<img src="/.gitbook/assets/grte.png" alt="" data-size="line">](https://training.hacktricks.xyz/courses/grte)
2022-04-28 16:01:33 +00:00
<details>
2022-04-28 16:01:33 +00:00
<summary>Support HackTricks</summary>
2022-04-28 16:01:33 +00:00
* Check the [**subscription plans**](https://github.com/sponsors/carlospolop)!
* **Join the** 💬 [**Discord group**](https://discord.gg/hRep4RUj7f) or the [**telegram group**](https://t.me/peass) or **follow** us on **Twitter** 🐦 [**@hacktricks\_live**](https://twitter.com/hacktricks\_live)**.**
* **Share hacking tricks by submitting PRs to the** [**HackTricks**](https://github.com/carlospolop/hacktricks) and [**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) github repos.
2022-04-28 16:01:33 +00:00
</details>
{% endhint %}
2022-04-28 16:01:33 +00:00
2023-08-03 19:12:22 +00:00
# 基本信息
2022-02-03 02:15:45 +00:00
**GlusterFS** 是一个 **分布式文件系统**,将多个服务器的存储结合成一个 **统一系统**。它允许 **任意扩展性**,这意味着您可以轻松添加或移除存储服务器,而不会干扰整体文件系统。这确保了数据的高 **可用性****容错性**。使用 GlusterFS您可以像访问本地存储的文件一样访问您的文件无论底层服务器基础设施如何。它为在多个服务器上管理大量数据提供了强大而灵活的解决方案。
2022-02-03 02:15:45 +00:00
**默认端口**24007/tcp/udp, 24008/tcp/udp, 49152/tcp (及其之后的端口)\
对于端口 49152需要打开递增 1 的端口以使用更多的砖块。_之前使用的是端口 24009而不是 49152._
2022-02-03 02:15:45 +00:00
```
PORT STATE SERVICE
24007/tcp open rpcbind
49152/tcp open ssl/unknown
```
## Enumeration
2022-02-03 02:15:45 +00:00
要与此文件系统交互,您需要安装 [**GlusterFS client**](https://download.gluster.org/pub/gluster/glusterfs/LATEST/) (`sudo apt-get install glusterfs-cli`)。
2022-02-03 02:15:45 +00:00
2023-08-03 19:12:22 +00:00
要列出和挂载可用的卷,您可以使用:
2022-02-03 02:15:45 +00:00
```bash
sudo gluster --remote-host=10.10.11.131 volume list
# This will return the name of the volumes
sudo mount -t glusterfs 10.10.11.131:/<vol_name> /mnt/
```
如果您收到**挂载文件系统时出错**,可以检查`/var/log/glusterfs/`中的日志。
**提到证书的错误**可以通过窃取文件来修复(如果您有系统访问权限):
2022-02-03 02:15:45 +00:00
* /etc/ssl/glusterfs.ca
* /etc/ssl/glusterfs.key
* /etc/ssl/glusterfs.ca.pem
2022-02-03 02:15:45 +00:00
并将它们存储在您的机器的`/etc/ssl`或`/usr/lib/ssl`目录中如果使用不同的目录请检查日志中类似于“_无法在/usr/lib/ssl/glusterfs.pem加载我们的证书_”的行
2022-02-03 02:15:45 +00:00
{% hint style="success" %}
Learn & practice AWS Hacking:<img src="/.gitbook/assets/arte.png" alt="" data-size="line">[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)<img src="/.gitbook/assets/arte.png" alt="" data-size="line">\
Learn & practice GCP Hacking: <img src="/.gitbook/assets/grte.png" alt="" data-size="line">[**HackTricks Training GCP Red Team Expert (GRTE)**<img src="/.gitbook/assets/grte.png" alt="" data-size="line">](https://training.hacktricks.xyz/courses/grte)
<details>
<summary>Support HackTricks</summary>
* Check the [**subscription plans**](https://github.com/sponsors/carlospolop)!
* **Join the** 💬 [**Discord group**](https://discord.gg/hRep4RUj7f) or the [**telegram group**](https://t.me/peass) or **follow** us on **Twitter** 🐦 [**@hacktricks\_live**](https://twitter.com/hacktricks\_live)**.**
* **Share hacking tricks by submitting PRs to the** [**HackTricks**](https://github.com/carlospolop/hacktricks) and [**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) github repos.
</details>
{% endhint %}