mirror of
https://github.com/carlospolop/hacktricks
synced 2024-11-25 22:20:43 +00:00
Translated ['network-services-pentesting/pentesting-web/drupal/README.md
This commit is contained in:
parent
6ddd73ec17
commit
f875826b71
1 changed files with 15 additions and 10 deletions
|
@ -29,15 +29,15 @@ curl https://www.drupal.org/ | grep 'content="Drupal'
|
|||
```bash
|
||||
curl drupal-site.com/node/1
|
||||
```
|
||||
## 枚举
|
||||
## Enumeration
|
||||
|
||||
Drupal 默认支持 **三种类型的用户**:
|
||||
|
||||
1. **`Administrator`**: 此用户对 Drupal 网站拥有完全控制权。
|
||||
1. **`Administrator`**: 该用户对 Drupal 网站拥有完全控制权。
|
||||
2. **`Authenticated User`**: 这些用户可以登录网站,并根据其权限执行添加和编辑文章等操作。
|
||||
3. **`Anonymous`**: 所有网站访问者被指定为匿名用户。默认情况下,这些用户仅被允许阅读帖子。
|
||||
|
||||
### 版本
|
||||
### Version
|
||||
|
||||
* 检查 `/CHANGELOG.txt`
|
||||
```bash
|
||||
|
@ -90,7 +90,7 @@ curl https://example.com/core/core.services.yml
|
|||
# Download content from files exposed in the previous step
|
||||
curl https://example.com/config/sync/swiftmailer.transport.yml
|
||||
```
|
||||
### 自动
|
||||
### 自动化
|
||||
```bash
|
||||
droopescan scan drupal -u http://drupal-site.local
|
||||
```
|
||||
|
@ -102,9 +102,14 @@ droopescan scan drupal -u http://drupal-site.local
|
|||
[drupal-rce.md](drupal-rce.md)
|
||||
{% endcontent-ref %}
|
||||
|
||||
## Post Exploitation
|
||||
## Drupal 从 XSS 到 RCE
|
||||
通过此技术,可以通过**跨站脚本攻击 (XSS)** 在Drupal中实现**远程代码执行 (RCE)**。 https://github.com/nowak0x01/Drupalwned
|
||||
<br><br>
|
||||
**有关更详细的步骤,请查看:** https://nowak0x01.github.io/papers/76bc0832a8f682a7e0ed921627f85d1d.html
|
||||
|
||||
### 读取settings.php
|
||||
## 后期利用
|
||||
|
||||
### 阅读 settings.php
|
||||
```
|
||||
find / -name settings.php -exec grep "drupal_hash_salt\|'database'\|'username'\|'password'\|'host'\|'port'\|'driver'\|'prefix'" {} \; 2>/dev/null
|
||||
```
|
||||
|
@ -121,16 +126,16 @@ mysql -u drupaluser --password='2r9u8hu23t532erew' -e 'use drupal; select * from
|
|||
{% embed url="https://websec.nl/" %}
|
||||
|
||||
{% hint style="success" %}
|
||||
学习和实践 AWS 黑客技术:<img src="/.gitbook/assets/arte.png" alt="" data-size="line">[**HackTricks 培训 AWS 红队专家 (ARTE)**](https://training.hacktricks.xyz/courses/arte)<img src="/.gitbook/assets/arte.png" alt="" data-size="line">\
|
||||
学习和实践 GCP 黑客技术:<img src="/.gitbook/assets/grte.png" alt="" data-size="line">[**HackTricks 培训 GCP 红队专家 (GRTE)**<img src="/.gitbook/assets/grte.png" alt="" data-size="line">](https://training.hacktricks.xyz/courses/grte)
|
||||
学习与实践 AWS 黑客技术:<img src="/.gitbook/assets/arte.png" alt="" data-size="line">[**HackTricks 培训 AWS 红队专家 (ARTE)**](https://training.hacktricks.xyz/courses/arte)<img src="/.gitbook/assets/arte.png" alt="" data-size="line">\
|
||||
学习与实践 GCP 黑客技术:<img src="/.gitbook/assets/grte.png" alt="" data-size="line">[**HackTricks 培训 GCP 红队专家 (GRTE)**<img src="/.gitbook/assets/grte.png" alt="" data-size="line">](https://training.hacktricks.xyz/courses/grte)
|
||||
|
||||
<details>
|
||||
|
||||
<summary>支持 HackTricks</summary>
|
||||
|
||||
* 查看 [**订阅计划**](https://github.com/sponsors/carlospolop)!
|
||||
* **加入** 💬 [**Discord 群组**](https://discord.gg/hRep4RUj7f) 或 [**电报群组**](https://t.me/peass) 或 **在** **Twitter** 🐦 **上关注我们** [**@hacktricks\_live**](https://twitter.com/hacktricks\_live)**.**
|
||||
* **通过向** [**HackTricks**](https://github.com/carlospolop/hacktricks) 和 [**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) github 仓库提交 PR 分享黑客技巧。
|
||||
* **加入** 💬 [**Discord 群组**](https://discord.gg/hRep4RUj7f) 或 [**telegram 群组**](https://t.me/peass) 或 **关注** 我们的 **Twitter** 🐦 [**@hacktricks\_live**](https://twitter.com/hacktricks\_live)**.**
|
||||
* **通过向** [**HackTricks**](https://github.com/carlospolop/hacktricks) 和 [**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) github 仓库提交 PR 来分享黑客技巧。
|
||||
|
||||
</details>
|
||||
{% endhint %}
|
||||
|
|
Loading…
Reference in a new issue