当前位置:网站首页>[vulnhub shooting range] impulse: lupinone
[vulnhub shooting range] impulse: lupinone
2022-07-03 21:04:00 【Starry`Quan】
Environmental preparation
Download the image and import it to vmware, There's nothing to say
Found that the title has been given ip Address
attack IP Address :192.168.2.16
Drone aircraft IP The address is :192.168.2.17
information gathering
Use nmap Scan host information
It's found that the target machine is only open ssh Follow http, Let's visit his website first
There's only one picture , Looking at the source code, there is nothing good to find
It's beginning to penetrate
Let's scan his website directory
Found to have robots.txt, Let's visit , Found to have ~myfiles Folder
We visited and found 404, But we look at the source code and find
Let's keep trying , It just implies that we have other folders , We use wfuzz Scan it.
Found to have ~secret file , Let's visit
Hello Friend, Im happy that you found my secret diretory, I created like this to share with you my create ssh private key file,
Its hided somewhere here, so that hackers dont find it and crack my passphrase with fasttrack.
I’m smart I know that.
Any problem let me know
Your best friend icex64
Hello friend , I'm glad you found my secret directory , I created it like this , To share my ssh Private key file ,
It's hidden somewhere here , So hackers won't find it , Use the fast channel to crack my password .
I'm smart , That's true. .
Come to me if you have any questions
Your best friend icex64
Here are two messages , One is user name icex64 There is also a hidden file
Use wfuzz No result after scanning
Guess there may be a suffix , Let's change to ffuz This tool sweeps , This tool can choose its own suffix
ffuf -u "http://192.168.2.17/~secret/.FUZZ" -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt -e .txt,.pub,.html,.bak -mc 200
Swept out a file , Let's visit
It's a bunch of random code , Look like base encryption , Let's go straight to base Family bucket Decrypt one by one
Find out base58 It can be solved
So now we have ssh The private key
Use ssh2john Generate a password book , And then use john Blow it up , You can get the password
Before ~secret The document has asked us to use fasttrack Dictionary to explode
Its hided somewhere here, so that hackers dont find it and crack my passphrase with fasttrack.
john --wordlist=/usr/share/wordlists/fasttrack.txt passwd.txt
Find the password
We log in with the user name we were told before ssh, Be careful , First assign the key file to 600 jurisdiction , Permission is too high to log in
home There is the first one in the directory flag file
Raise the right
Let's first look at what files this user can run
Found that you can run one python file
Look at the python file , Found that it quoted webbrowser modular , Let's go to the python See if you can modify this module under the directory , Let it return a shell
It can be edited , We'll use it again arsene The user runs this python file , You can get his permission
Let's see what it can run
Found that he can run pip command , We directly Baidu pip Raise the right Method
Successful acquisition root jurisdiction , And then check out root.txt You can get flag 了
That's the end of the experiment
边栏推荐
- For in, foreach, for of
- 抓包整理外篇——————autoResponder、composer 、statistics [ 三]
- 电子科技大学|强化学习中有效利用的聚类经验回放
- How to modify the network IP addresses of mobile phones and computers?
- Visiontransformer (I) -- embedded patched and word embedded
- [Tang Laoshi] C -- encapsulation: member variables and access modifiers
- Is flush account opening and registration safe and reliable? Is there any risk?
- Discussion Net legacy application transformation
- Example of peanut shell inner net penetration
- Offset related concepts + drag modal box case
猜你喜欢
How to modify the network IP addresses of mobile phones and computers?
Yyds dry goods inventory TCP & UDP
Hcie security Day10: six experiments to understand VRRP and reliability
The global industrial design revenue in 2021 was about $44360 million, and it is expected to reach $62720 million in 2028. From 2022 to 2028, the CAGR was 5.5%
全网都在疯传的《老板管理手册》(转)
Nmap and masscan have their own advantages and disadvantages. The basic commands are often mixed to increase output
"Designer universe" argument: Data Optimization in the design field ultimately falls on cost, safety and health | chinabrand.com org
抓包整理外篇——————autoResponder、composer 、statistics [ 三]
In 2021, the global revenue of syphilis rapid detection kits was about US $608.1 million, and it is expected to reach US $712.9 million in 2028
Goodbye 2021, how do programmers go to the top of the disdain chain?
随机推荐
Viewing Chinese science and technology from the Winter Olympics (II): when snowmaking breakthrough is in progress
Kubernetes 通信异常网络故障 解决思路
XAI+网络安全?布兰登大学等最新《可解释人工智能在网络安全应用》综述,33页pdf阐述其现状、挑战、开放问题和未来方向
内存分析器 (MAT)
Software testing skills, JMeter stress testing tutorial, obtaining post request data in x-www-form-urlencoded format (24)
"Designer universe" APEC safety and health +: environmental protection Panda "xiaobaobao" Happy Valentine's Day 2022 | ChinaBrand | Asia Pacific Economic media
设计电商秒杀系统
2022 low voltage electrician examination and low voltage electrician simulation examination question bank
Yyds dry goods inventory TCP & UDP
Qualcomm platform WiFi update disconnect end open event
Goodbye 2021, how do programmers go to the top of the disdain chain?
MySQL——数据库备份
Thread, thread stack, method stack, the difference of creating thread
Discussion Net legacy application transformation
Borui data and Sina Finance released the 2021 credit card industry development report
Summary of common operation and maintenance commands
CesiumJS 2022^ 源码解读[7] - 3DTiles 的请求、加载处理流程解析
Q&A:Transformer, Bert, ELMO, GPT, VIT
18、 MySQL -- index
技术管理进阶——如何在面试中考察候选人并增大入职概率