当前位置:网站首页>[vulnhub shooting range] impulse: lupinone
[vulnhub shooting range] impulse: lupinone
2022-07-03 21:04:00 【Starry`Quan】
Environmental preparation
Download the image and import it to vmware, There's nothing to say 
Found that the title has been given ip Address
attack IP Address :192.168.2.16
Drone aircraft IP The address is :192.168.2.17
information gathering
Use nmap Scan host information 
It's found that the target machine is only open ssh Follow http, Let's visit his website first 
There's only one picture , Looking at the source code, there is nothing good to find
It's beginning to penetrate
Let's scan his website directory 
Found to have robots.txt, Let's visit , Found to have ~myfiles Folder 
We visited and found 404, But we look at the source code and find 
Let's keep trying , It just implies that we have other folders , We use wfuzz Scan it. 
Found to have ~secret file , Let's visit 
Hello Friend, Im happy that you found my secret diretory, I created like this to share with you my create ssh private key file,
Its hided somewhere here, so that hackers dont find it and crack my passphrase with fasttrack.
I’m smart I know that.
Any problem let me know
Your best friend icex64
Hello friend , I'm glad you found my secret directory , I created it like this , To share my ssh Private key file ,
It's hidden somewhere here , So hackers won't find it , Use the fast channel to crack my password .
I'm smart , That's true. .
Come to me if you have any questions
Your best friend icex64
Here are two messages , One is user name icex64 There is also a hidden file
Use wfuzz No result after scanning 
Guess there may be a suffix , Let's change to ffuz This tool sweeps , This tool can choose its own suffix
ffuf -u "http://192.168.2.17/~secret/.FUZZ" -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt -e .txt,.pub,.html,.bak -mc 200

Swept out a file , Let's visit 
It's a bunch of random code , Look like base encryption , Let's go straight to base Family bucket Decrypt one by one
Find out base58 It can be solved 
So now we have ssh The private key
Use ssh2john Generate a password book , And then use john Blow it up , You can get the password 
Before ~secret The document has asked us to use fasttrack Dictionary to explode
Its hided somewhere here, so that hackers dont find it and crack my passphrase with fasttrack.
john --wordlist=/usr/share/wordlists/fasttrack.txt passwd.txt
Find the password 
We log in with the user name we were told before ssh, Be careful , First assign the key file to 600 jurisdiction , Permission is too high to log in 
home There is the first one in the directory flag file 
Raise the right
Let's first look at what files this user can run
Found that you can run one python file 
Look at the python file , Found that it quoted webbrowser modular , Let's go to the python See if you can modify this module under the directory , Let it return a shell
It can be edited , We'll use it again arsene The user runs this python file , You can get his permission 
Let's see what it can run 
Found that he can run pip command , We directly Baidu pip Raise the right Method 
Successful acquisition root jurisdiction , And then check out root.txt You can get flag 了 
That's the end of the experiment
边栏推荐
- "Designer universe" argument: Data Optimization in the design field ultimately falls on cost, safety and health | chinabrand.com org
- Refer to some books for the distinction between blocking, non blocking and synchronous asynchronous
- @Scenario of transactional annotation invalidation
- CesiumJS 2022^ 源码解读[7] - 3DTiles 的请求、加载处理流程解析
- Visiontransformer (I) -- embedded patched and word embedded
- Apprentissage intensif - notes d'apprentissage 1 | concepts de base
- 设计电商秒杀系统
- Single page application architecture
- Introduction to golang garbage collection
- Advanced collaboration: coroutinecontext
猜你喜欢

不同业务场景该如何选择缓存的读写策略?

MySQL——数据库备份

Custom view incomplete to be continued

Hcie security Day11: preliminarily learn the concepts of firewall dual machine hot standby and vgmp

Transformer structure analysis and the principle of blocks in it

The global industrial design revenue in 2021 was about $44360 million, and it is expected to reach $62720 million in 2028. From 2022 to 2028, the CAGR was 5.5%
![[secretly kill little buddy pytorch20 days -day02- example of image data modeling process]](/img/14/8ab1f1fb142e10dead124851180d03.jpg)
[secretly kill little buddy pytorch20 days -day02- example of image data modeling process]

Haven't expressed the artifact yet? Valentine's Day is coming. Please send her a special gift~

设计电商秒杀系统

Single page application architecture
随机推荐
浅析 Ref-NeRF
Software testing skills, JMeter stress testing tutorial, obtaining post request data in x-www-form-urlencoded format (24)
JVM JNI and PVM pybind11 mass data transmission and optimization
抓包整理外篇——————autoResponder、composer 、statistics [ 三]
MySQL master-slave synchronization principle
Gee calculated area
Golang type assertion and conversion (and strconv package)
In 2021, the global general crop protection revenue was about $52750 million, and it is expected to reach $64730 million in 2028
Transformation between yaml, Jason and Dict
"Actbert" Baidu & Sydney University of technology proposed actbert to learn the global and local video text representation, which is effective in five video text tasks
Baohong industry | good habits that Internet finance needs to develop
Scientific research document management Zotero
Basic number theory -- Chinese remainder theorem
Such as the visual appeal of the live broadcast of NBA Finals, can you still see it like this?
APEC industry +: father of the king of the ox mill, industrial Internet "king of the ox mill anti-wear faction" Valentine's Day greetings | Asia Pacific Economic media | ChinaBrand
Wireless network (preprocessing + concurrent search)
Use nodejs+express+mongodb to complete the data persistence project (with modified source code)
LabVIEW training
Node MySQL serialize cannot rollback transactions
《ActBERT》百度&悉尼科技大学提出ActBERT,学习全局局部视频文本表示,在五个视频-文本任务中有效!...