当前位置:网站首页>Vulnhub practice DC-1 target
Vulnhub practice DC-1 target
2022-06-10 23:04:00 【Tianxia (Tianyan Master)】
Vulnhub practice DC-1 Drone aircraft
Download link https://www.vulnhub.com/entry/dc-1,292/
It is recommended to use Xunlei to download , Compared to browser download , It's going to be faster
Use nat Pattern , Build a virtual LAN , The proposal USES VMnet1
First, perform host discovery
nmap -sS 192.168.43.0/24 Use ping testing 43 Whole C End to end host survival 
Port detection , Here are two methods ,nmap and goby
Nmap -A 192.168.43.238 -T4 Perform port and service detection at a faster speed
Goby If you do, you will ip Throw it in and wait for the result 
First, determine the opening status of the port ,22 ssh Remote login interface 80 Port display Apache Indicates that the port exists web service ,111 The service displayed on the port is rpcbind, Baidu has only one ddos The loopholes of the attack , No dice , Yes 22 port , Use the super weak password detection tool to blast 
No results detected
Only from 80 Port open Apache Service starts
see 80 Open port services
The website is found to be Drupal Site, Use wapplyzer Found as drupal7, It's a cms Content management framework , stay https://www.exploit-db.com/ Find the corresponding vulnerability ,xss There's no need to see , Preference is given to remote command execution and sql Injected
It's useless here 2018-04-17 the , The back shows metasploit Description has been integrated into msf in , stay kali Open in msf, And look for druple Using modules ,

Here's the second one , Because and exploit-db The descriptions in are consistent
Set your own goals IP You can successfully obtain shell, Find yourself a normal user , The next step is to raise the right 
Originally intended to use sudo And the dirty cow ,sudo Display command not found , Dirty cow's words ,make Missing when compiling gcc
use suid Raise the right , Search for using root Permission file
find / -perm -4000 -type f 2>/dev/null
lookup SUID file
find / -uid 0 -perm -4000 -type f 2>/dev/null
found find, Use find Right to raise
touch test
Nc rebound shell
find test -exec netcat -lvp 5555 -e /bin/sh ;
Reopen a command line , Connect to the target host to get root jurisdiction 
It was supposed to end here , But seeing someone else's wp You also need to log in to the background ,
Take it out again Baidu Dafa stay exploit-db There are no other vulnerabilities shown in , Change platform
https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=drupal7 You will find druple There is one. sql Inject holes ,
cve The number is , Click in to give a detailed introduction , And there are exp The location of , But it still shows up in exploit-db in ,explioit Zhongyoudao github in , It can be described as an infinite set of dolls , However, due to the lack of personal skills ,php Written exp Don't use , stay github Search for just found cve Number , You can find the corresponding py Script , You can add users directly
https://github.com/happynote3966/CVE-2014-3704
Usage method 
Be careful , When using this script, you need to use python2, Otherwise, you will make the same mistake as me 
As for another connection to the database , How to change your password , Post the address here
https://blog.csdn.net/qq_45427131/article/details/118711572
View the current page , Use findsomething The plug-in found some paths in the current page
Copy and access
There are three functions in total , Registered account , Sign in , And email to retrieve the password
On the registration screen , Register your own account
enter one user name admin,[email protected] when , The display name admin Occupied , This is just the enumeration of user names ?
Don't talk much , Capture packets in the login interface , Weak password top1000
Stop running for a few minutes ip 了 , This method will not work
Input admin’ It is found that the returned content of the page becomes unrecognized , Don't talk much , Throw it sqlmap Run inside
边栏推荐
- Redis from entry to entry
- ICML2022 | 從零開始重新審視端到端的語音到文本翻譯
- 同花顺开户怎么样?开户安全吗?
- Matlab - Implementation of evolutionary game theory
- But it shows that you are the most native zaifkmw in five counties
- Opencv_100问_第二章 (6-10)
- Whale conference sharing: what should we do if the conference is difficult?
- 存储引擎分析
- Tcapulusdb Jun · industry news collection (IV)
- Display of successful cases of target customer matching data table
猜你喜欢

Interpreting the registry class of mmcv

Tcapulusdb Jun · industry news collection (I)

Static routing configuration of serial interface in router experiment (Supplement)

MySQL主从复制解决读写分离

Management solution for whale conference smart scenic spot

kubernetes多网卡方案之Multus CNI部署和基本使用

2022g1 industrial boiler stoker test questions and online simulation test

原生支持 ARM64 的首个版本!微软 Win11/10 免费工具集 PowerToys 0.59 发布

C语言内功修炼【整型在内存中的存储】

Opencv_100问_第二章 (6-10)
随机推荐
CCF CSP 202109-4 collect cards
Fallback operation in SVN
Icml2022 | revoir la traduction vocale de bout en bout du texte à partir de zéro
中银证券开户有什么风险吗?安全的吗?
Use of cocoeval function
[XPath] use following sibling to obtain the following peer nodes
Distributed Foundation
Web3 ecological decentralized financial platform sealem Finance
Display of successful cases of target customer matching data table
Déploiement et utilisation de base de la carte multi - réseau kubernets
PKI/TLS瑞士军刀之cfssl
Reading notes on the way of Huawei data
Native support for the first version of arm64! Microsoft win11/10 free tool set PowerToys 0.59 release
Web3技术栈权威指南【2022】
锁机制
CCF CSP 202109-4 收集卡牌
Opencv_100问_第三章 (11-15)
云数据中心中的SDN/NFV应用
Informatics Olympiad all in one 1280: [example 9.24] skiing | openjudge noi 2.690: skiing | Luogu p1434 [show2002] skiing
Sdn/nfv application in cloud data center