当前位置:网站首页>[vulnhub shooting range] impulse: lupinone
[vulnhub shooting range] impulse: lupinone
2022-07-03 21:04:00 【Starry`Quan】
Environmental preparation
Download the image and import it to vmware, There's nothing to say
Found that the title has been given ip Address
attack IP Address :192.168.2.16
Drone aircraft IP The address is :192.168.2.17
information gathering
Use nmap Scan host information
It's found that the target machine is only open ssh Follow http, Let's visit his website first
There's only one picture , Looking at the source code, there is nothing good to find
It's beginning to penetrate
Let's scan his website directory
Found to have robots.txt, Let's visit , Found to have ~myfiles Folder
We visited and found 404, But we look at the source code and find
Let's keep trying , It just implies that we have other folders , We use wfuzz Scan it.
Found to have ~secret file , Let's visit
Hello Friend, Im happy that you found my secret diretory, I created like this to share with you my create ssh private key file,
Its hided somewhere here, so that hackers dont find it and crack my passphrase with fasttrack.
I’m smart I know that.
Any problem let me know
Your best friend icex64
Hello friend , I'm glad you found my secret directory , I created it like this , To share my ssh Private key file ,
It's hidden somewhere here , So hackers won't find it , Use the fast channel to crack my password .
I'm smart , That's true. .
Come to me if you have any questions
Your best friend icex64
Here are two messages , One is user name icex64 There is also a hidden file
Use wfuzz No result after scanning
Guess there may be a suffix , Let's change to ffuz This tool sweeps , This tool can choose its own suffix
ffuf -u "http://192.168.2.17/~secret/.FUZZ" -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt -e .txt,.pub,.html,.bak -mc 200
Swept out a file , Let's visit
It's a bunch of random code , Look like base encryption , Let's go straight to base Family bucket Decrypt one by one
Find out base58 It can be solved
So now we have ssh The private key
Use ssh2john Generate a password book , And then use john Blow it up , You can get the password
Before ~secret The document has asked us to use fasttrack Dictionary to explode
Its hided somewhere here, so that hackers dont find it and crack my passphrase with fasttrack.
john --wordlist=/usr/share/wordlists/fasttrack.txt passwd.txt
Find the password
We log in with the user name we were told before ssh, Be careful , First assign the key file to 600 jurisdiction , Permission is too high to log in
home There is the first one in the directory flag file
Raise the right
Let's first look at what files this user can run
Found that you can run one python file
Look at the python file , Found that it quoted webbrowser modular , Let's go to the python See if you can modify this module under the directory , Let it return a shell
It can be edited , We'll use it again arsene The user runs this python file , You can get his permission
Let's see what it can run
Found that he can run pip command , We directly Baidu pip Raise the right Method
Successful acquisition root jurisdiction , And then check out root.txt You can get flag 了
That's the end of the experiment
边栏推荐
- Interval product of zhinai sauce (prefix product + inverse element)
- Introduction to golang garbage collection
- Leetcode daily question 540 A single element in an ordered array Valentine's Day special article looking for a single dog in a pile of lovers ~ the clown is myself
- Strange way of expressing integers (expanding Chinese remainder theorem)
- Selenium has three waiting methods (forced waiting, implicit waiting, and display waiting)
- Custom view incomplete to be continued
- Go learning notes (4) basic types and statements (3)
- Install and use Chrony, and then build your own time server
- Capture de paquets et tri du contenu externe - - autoresponder, composer, statistiques [3]
- Ask and answer: dispel your doubts about the virtual function mechanism
猜你喜欢
Rhcsa third day operation
Hcie security Day12: supplement the concept of packet filtering and security policy
"Actbert" Baidu & Sydney University of technology proposed actbert to learn the global and local video text representation, which is effective in five video text tasks
Scientific research document management Zotero
TLS environment construction and plaintext analysis
你真的知道自己多大了吗?
String and+
9 pyqt5 qscrollarea scroll area and qscrollbar scroll bar
Interval product of zhinai sauce (prefix product + inverse element)
[Yugong series] go teaching course 002 go language environment installation in July 2022
随机推荐
APEC industry +: father of the king of the ox mill, industrial Internet "king of the ox mill anti-wear faction" Valentine's Day greetings | Asia Pacific Economic media | ChinaBrand
The "boss management manual" that is wildly spread all over the network (turn)
请教大家一个问题,用人用过flink sql的异步io关联MySQL中的维表吗?我按照官网设置了各种
MySQL dump - exclude some table data - MySQL dump - exclude some table data
In 2021, the global foam protection packaging revenue was about $5286.7 million, and it is expected to reach $6615 million in 2028
In 2021, the global general crop protection revenue was about $52750 million, and it is expected to reach $64730 million in 2028
一台服务器最大并发 tcp 连接数多少?65535?
Visiontransformer (I) -- embedded patched and word embedded
Pytorch sets the weight and bias of the model to zero
Refer to some books for the distinction between blocking, non blocking and synchronous asynchronous
Getting started with postman -- built-in dynamic parameters, custom parameters and assertions
Node MySQL serialize cannot rollback transactions
全网都在疯传的《老板管理手册》(转)
LabVIEW training
Service discovery and load balancing mechanism -service
强化学习-学习笔记1 | 基础概念
Producer consumer mode (multithreading, use of shared resources)
MySQL 8.0 data backup and recovery
Wireless network (preprocessing + concurrent search)
Instructions for common methods of regular expressions