mirror of
https://github.com/carlospolop/hacktricks
synced 2024-11-29 16:10:54 +00:00
Translated ['network-services-pentesting/pentesting-web/drupal/README.md
This commit is contained in:
parent
6ddd73ec17
commit
f875826b71
1 changed files with 15 additions and 10 deletions
|
@ -29,15 +29,15 @@ curl https://www.drupal.org/ | grep 'content="Drupal'
|
||||||
```bash
|
```bash
|
||||||
curl drupal-site.com/node/1
|
curl drupal-site.com/node/1
|
||||||
```
|
```
|
||||||
## 枚举
|
## Enumeration
|
||||||
|
|
||||||
Drupal 默认支持 **三种类型的用户**:
|
Drupal 默认支持 **三种类型的用户**:
|
||||||
|
|
||||||
1. **`Administrator`**: 此用户对 Drupal 网站拥有完全控制权。
|
1. **`Administrator`**: 该用户对 Drupal 网站拥有完全控制权。
|
||||||
2. **`Authenticated User`**: 这些用户可以登录网站,并根据其权限执行添加和编辑文章等操作。
|
2. **`Authenticated User`**: 这些用户可以登录网站,并根据其权限执行添加和编辑文章等操作。
|
||||||
3. **`Anonymous`**: 所有网站访问者被指定为匿名用户。默认情况下,这些用户仅被允许阅读帖子。
|
3. **`Anonymous`**: 所有网站访问者被指定为匿名用户。默认情况下,这些用户仅被允许阅读帖子。
|
||||||
|
|
||||||
### 版本
|
### Version
|
||||||
|
|
||||||
* 检查 `/CHANGELOG.txt`
|
* 检查 `/CHANGELOG.txt`
|
||||||
```bash
|
```bash
|
||||||
|
@ -90,7 +90,7 @@ curl https://example.com/core/core.services.yml
|
||||||
# Download content from files exposed in the previous step
|
# Download content from files exposed in the previous step
|
||||||
curl https://example.com/config/sync/swiftmailer.transport.yml
|
curl https://example.com/config/sync/swiftmailer.transport.yml
|
||||||
```
|
```
|
||||||
### 自动
|
### 自动化
|
||||||
```bash
|
```bash
|
||||||
droopescan scan drupal -u http://drupal-site.local
|
droopescan scan drupal -u http://drupal-site.local
|
||||||
```
|
```
|
||||||
|
@ -102,9 +102,14 @@ droopescan scan drupal -u http://drupal-site.local
|
||||||
[drupal-rce.md](drupal-rce.md)
|
[drupal-rce.md](drupal-rce.md)
|
||||||
{% endcontent-ref %}
|
{% endcontent-ref %}
|
||||||
|
|
||||||
## Post Exploitation
|
## Drupal 从 XSS 到 RCE
|
||||||
|
通过此技术,可以通过**跨站脚本攻击 (XSS)** 在Drupal中实现**远程代码执行 (RCE)**。 https://github.com/nowak0x01/Drupalwned
|
||||||
|
<br><br>
|
||||||
|
**有关更详细的步骤,请查看:** https://nowak0x01.github.io/papers/76bc0832a8f682a7e0ed921627f85d1d.html
|
||||||
|
|
||||||
### 读取settings.php
|
## 后期利用
|
||||||
|
|
||||||
|
### 阅读 settings.php
|
||||||
```
|
```
|
||||||
find / -name settings.php -exec grep "drupal_hash_salt\|'database'\|'username'\|'password'\|'host'\|'port'\|'driver'\|'prefix'" {} \; 2>/dev/null
|
find / -name settings.php -exec grep "drupal_hash_salt\|'database'\|'username'\|'password'\|'host'\|'port'\|'driver'\|'prefix'" {} \; 2>/dev/null
|
||||||
```
|
```
|
||||||
|
@ -121,16 +126,16 @@ mysql -u drupaluser --password='2r9u8hu23t532erew' -e 'use drupal; select * from
|
||||||
{% embed url="https://websec.nl/" %}
|
{% embed url="https://websec.nl/" %}
|
||||||
|
|
||||||
{% hint style="success" %}
|
{% hint style="success" %}
|
||||||
学习和实践 AWS 黑客技术:<img src="/.gitbook/assets/arte.png" alt="" data-size="line">[**HackTricks 培训 AWS 红队专家 (ARTE)**](https://training.hacktricks.xyz/courses/arte)<img src="/.gitbook/assets/arte.png" alt="" data-size="line">\
|
学习与实践 AWS 黑客技术:<img src="/.gitbook/assets/arte.png" alt="" data-size="line">[**HackTricks 培训 AWS 红队专家 (ARTE)**](https://training.hacktricks.xyz/courses/arte)<img src="/.gitbook/assets/arte.png" alt="" data-size="line">\
|
||||||
学习和实践 GCP 黑客技术:<img src="/.gitbook/assets/grte.png" alt="" data-size="line">[**HackTricks 培训 GCP 红队专家 (GRTE)**<img src="/.gitbook/assets/grte.png" alt="" data-size="line">](https://training.hacktricks.xyz/courses/grte)
|
学习与实践 GCP 黑客技术:<img src="/.gitbook/assets/grte.png" alt="" data-size="line">[**HackTricks 培训 GCP 红队专家 (GRTE)**<img src="/.gitbook/assets/grte.png" alt="" data-size="line">](https://training.hacktricks.xyz/courses/grte)
|
||||||
|
|
||||||
<details>
|
<details>
|
||||||
|
|
||||||
<summary>支持 HackTricks</summary>
|
<summary>支持 HackTricks</summary>
|
||||||
|
|
||||||
* 查看 [**订阅计划**](https://github.com/sponsors/carlospolop)!
|
* 查看 [**订阅计划**](https://github.com/sponsors/carlospolop)!
|
||||||
* **加入** 💬 [**Discord 群组**](https://discord.gg/hRep4RUj7f) 或 [**电报群组**](https://t.me/peass) 或 **在** **Twitter** 🐦 **上关注我们** [**@hacktricks\_live**](https://twitter.com/hacktricks\_live)**.**
|
* **加入** 💬 [**Discord 群组**](https://discord.gg/hRep4RUj7f) 或 [**telegram 群组**](https://t.me/peass) 或 **关注** 我们的 **Twitter** 🐦 [**@hacktricks\_live**](https://twitter.com/hacktricks\_live)**.**
|
||||||
* **通过向** [**HackTricks**](https://github.com/carlospolop/hacktricks) 和 [**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) github 仓库提交 PR 分享黑客技巧。
|
* **通过向** [**HackTricks**](https://github.com/carlospolop/hacktricks) 和 [**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) github 仓库提交 PR 来分享黑客技巧。
|
||||||
|
|
||||||
</details>
|
</details>
|
||||||
{% endhint %}
|
{% endhint %}
|
||||||
|
|
Loading…
Reference in a new issue