当前位置:网站首页>Oscp raven2 target penetration process

Oscp raven2 target penetration process

2022-07-06 06:23:00 shatianyzg

Information reconnaissance stage
use dirb The scan found the following information
---- Entering directory: http://172.16.100.142/vendor/ ----
(!) WARNING: Directory IS LISTABLE. No need to scan it.
(Use mode ‘-w’ if you want to scan it anyway)
 Insert picture description here
 Insert picture description here

Find the first flag
 Insert picture description here

seek PHPMailer 5.2.16 Of exp
searchsploit phpmailer
 Insert picture description here
 Insert picture description here

Copy exp To current directory

 Insert picture description here

utilize 40974.py get shell, Get the second flag

原网站

版权声明
本文为[shatianyzg]所创,转载请带上原文链接,感谢
https://yzsam.com/2022/187/202207060618044822.html