当前位置:网站首页>Vulnhub's funfox2
Vulnhub's funfox2
2022-07-07 20:06:00 【Plum_ Flowers_ seven】
Catalog
3、 ... and 、zip Password cracking
2.john Crack the decompression password
One 、nmap Routine scanning
Scan out ftp service , And can be accessed anonymously
also 22 and 80
This range is from 80 Port did not find a breakthrough , The main page is apache The default page for , There is no hidden directory .

Two 、FTP Anonymous access
1.mget
mget *
mget Download all the files .
get Download the two hidden files
2. View hidden files
It probably means that the password is hidden zip In file . And the password of the compressed file is older


3、 ... and 、zip Password cracking
1. Transform first hash

2.john Crack the decompression password
(1)cathtine success

(2)tom success

3. Private key id_rsa Sign in
tom Can successfully login

Four 、sudo Raise the right
Can execute all sudo command , And in mysql_history The password was leaked in .
Direct use of sudo -s Mention right to success
But this is rbash One is limited shell


5、 ... and 、rbash The escape
Conditions 1: There is mysql 3306
Conditions 2:sudo Can execute all commands
1. With root function mysql
adopt mysql Directly execute operating system commands . Achieve a rebound root The powers of the shell.


边栏推荐
- Cuda版本不一致,编译apex报错
- torch. nn. functional. Pad (input, pad, mode= 'constant', value=none) record
- Force buckle 88 Merge two ordered arrays
- Make this crmeb single merchant wechat mall system popular, so easy to use!
- Force buckle 674 Longest continuous increasing sequence
- R language ggplot2 visualization: use the ggstripchart function of ggpubr package to visualize the dot strip plot, set the position parameter, and configure the separation degree of different grouped
- The project manager's "eight interview questions" is equal to a meeting
- mock. JS returns an array from the optional data in the object array
- Chapter 9 Yunji datacanvas was rated as 36 krypton "the hard core technology enterprise most concerned by investors"
- 有了ST7008, 蓝牙测试完全拿捏住了
猜你喜欢

mock.js从对象数组中任选数据返回一个数组

Redis——基本使用(key、String、List、Set 、Zset 、Hash、Geo、Bitmap、Hyperloglog、事务 )

剑指 Offer II 013. 二维子矩阵的和

多个线程之间如何协同

Compiler optimization (4): inductive variables

9 atomic operation class 18 Rohan enhancement

PMP对工作有益吗?怎么选择靠谱平台让备考更省心省力!!!

Automatic classification of defective photovoltaic module cells in electroluminescence images-論文閱讀筆記

Ways to improve the utilization of openeuler resources 01: Introduction

openEuler 资源利用率提升之道 01:概论
随机推荐
力扣 88.合并两个有序数组
【STL】vector
J ü rgen schmidhub reviews the 25th anniversary of LSTM papers: long short term memory All computable metaverses. Hierarchical reinforcement learning (RL). Meta-RL. Abstractions in generative adversar
[sword finger offer] sword finger offer II 012 The sum of left and right subarrays is equal
Semantic SLAM源码解析
Interpretation of transpose convolution theory (input-output size analysis)
Some arrangements about oneself
剑指 Offer II 013. 二维子矩阵的和
JVM GC garbage collection brief
c语言如何判定是32位系统还是64位系统
有了ST7008, 蓝牙测试完全拿捏住了
Tp6 realize Commission ranking
equals 方法
Sword finger offer II 013 Sum of two-dimensional submatrix
一锅乱炖,npm、yarn cnpm常用命令合集
Ways to improve the utilization of openeuler resources 01: Introduction
如何在软件研发阶段落地安全实践
Visual Studio 插件之CodeMaid自动整理代码
多个线程之间如何协同
JVM 类加载机制