# DotNetNuke (DNN) {% hint style="success" %} Learn & practice AWS Hacking:[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)\ Learn & practice GCP Hacking: [**HackTricks Training GCP Red Team Expert (GRTE)**](https://training.hacktricks.xyz/courses/grte)
Support HackTricks * Check the [**subscription plans**](https://github.com/sponsors/carlospolop)! * **Join the** πŸ’¬ [**Discord group**](https://discord.gg/hRep4RUj7f) or the [**telegram group**](https://t.me/peass) or **follow** us on **Twitter** 🐦 [**@hacktricks\_live**](https://twitter.com/hacktricks\_live)**.** * **Share hacking tricks by submitting PRs to the** [**HackTricks**](https://github.com/carlospolop/hacktricks) and [**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) github repos.
{% endhint %} ## DotNetNuke (DNN) DNN에 **κ΄€λ¦¬μž**둜 λ‘œκ·ΈμΈν•˜λ©΄ RCEλ₯Ό μ–»λŠ” 것이 μ‰½μŠ΅λ‹ˆλ‹€. ## RCE ### SQL을 ν†΅ν•œ μ ‘κ·Ό **`Settings`** νŽ˜μ΄μ§€μ—μ„œ SQL μ½˜μ†”μ— μ ‘κ·Όν•  수 있으며, μ—¬κΈ°μ„œ **`xp_cmdshell`**을 ν™œμ„±ν™”ν•˜κ³  **운영 체제 λͺ…령을 μ‹€ν–‰**ν•  수 μžˆμŠ΅λ‹ˆλ‹€. **`xp_cmdshell`**을 ν™œμ„±ν™”ν•˜λ €λ©΄ λ‹€μŒ 쀄을 μ‚¬μš©ν•˜μ„Έμš”: ```sql EXEC sp_configure 'show advanced options', '1' RECONFIGURE EXEC sp_configure 'xp_cmdshell', '1' RECONFIGURE ``` 그리고 **"Run Script"**λ₯Ό 눌러 ν•΄λ‹Ή SQL 문을 μ‹€ν–‰ν•©λ‹ˆλ‹€. 그런 λ‹€μŒ, λ‹€μŒκ³Ό 같은 λ°©λ²•μœΌλ‘œ OS λͺ…령을 μ‹€ν–‰ν•©λ‹ˆλ‹€: ```sql xp_cmdshell 'whoami' ``` ### Via ASP webshell `Settings -> Security -> More -> More Security Settings`μ—μ„œ `Allowable File Extensions` μ•„λž˜μ— **μƒˆλ‘œμš΄ ν—ˆμš©λœ ν™•μž₯자**λ₯Ό **μΆ”κ°€**ν•  수 있으며, κ·Έ ν›„ `Save` λ²„νŠΌμ„ ν΄λ¦­ν•©λ‹ˆλ‹€. **`asp`** λ˜λŠ” **`aspx`**λ₯Ό μΆ”κ°€ν•œ ν›„ **`/admin/file-management`**μ—μ„œ 예λ₯Ό λ“€μ–΄ **`shell.asp`**λΌλŠ” **asp webshell**을 μ—…λ‘œλ“œν•©λ‹ˆλ‹€. 그런 λ‹€μŒ **`/Portals/0/shell.asp`**에 μ ‘κ·Όν•˜μ—¬ μ›Ήμ‰˜μ— μ ‘κ·Όν•©λ‹ˆλ‹€. ### Privilege Escalation 예λ₯Ό λ“€μ–΄ **Potatoes** λ˜λŠ” **PrintSpoofer**λ₯Ό μ‚¬μš©ν•˜μ—¬ **κΆŒν•œ μƒμŠΉ**을 ν•  수 μžˆμŠ΅λ‹ˆλ‹€. {% hint style="success" %} Learn & practice AWS Hacking:[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)\ Learn & practice GCP Hacking: [**HackTricks Training GCP Red Team Expert (GRTE)**](https://training.hacktricks.xyz/courses/grte)
Support HackTricks * Check the [**subscription plans**](https://github.com/sponsors/carlospolop)! * **Join the** πŸ’¬ [**Discord group**](https://discord.gg/hRep4RUj7f) or the [**telegram group**](https://t.me/peass) or **follow** us on **Twitter** 🐦 [**@hacktricks\_live**](https://twitter.com/hacktricks\_live)**.** * **Share hacking tricks by submitting PRs to the** [**HackTricks**](https://github.com/carlospolop/hacktricks) and [**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) github repos.
{% endhint %}