当前位置:网站首页>Hackmyvm target series (4) -vulny
Hackmyvm target series (4) -vulny
2022-07-06 13:57:00 【The moon should know my meaning】
One 、 information gathering
The old , Let's start with a wave of network segment scanning , Discover the host
nmap -sP 192.168.200.0/24 | grep -i -B 2 virtualbox
Use nmap Scan port , Two ports were found , One 80 port , One 33060( I don't know what it is , No matter it first )
nmap -sC -sV 192.168.200.153 -p-
Visit the home page , However, no useful information was found .
The old , Let's start with a wave of directory scanning , See if you can find any useful information .
Use gobuster Scan the directory .
gobuster dir -u http://192.168.200.153 -w directory-list-2.3-medium.txt -t 30 -x php,html,txt,7z,zip,bak,gz
Found several directories and files , After visiting , Only secret The directory is useful .
Find keywords wordpress, Is this website cms yes wordpress?
Reuse dirsearch Scan this record and try
dirsearch -u "http://192.168.200.153/secret/" -e php,html,txt,zip,bak,gz,7z -x 404,500-599 -t 50
Sure enough wordpress, There are many catalogues .
Visit the following directories one by one to see if there are any gains
Found a compressed file , Download it and see . However, after opening it, I found that I was still too young , I don't understand .
So Baidu took a look , This is a wordpress A plug-in for , There is also an arbitrary file upload vulnerability .
On exploitdb Search the Internet , Found a utilization script . But I always report syntax errors in this script , We won't change , Then we can only find another way .
Two 、 Exploit
Use msf, stay msf The exploitation method of this vulnerability is found above .
Configuration module parameters , Use success , To obtain a web jurisdiction . Use python Get an interactive shell
python3 -c 'import pty; pty.spawn("/bin/bash")'
Check the user , Find out besides root One more adrian user
cat /etc/passwd
Pay attention to this sentence , Mentioned the configuration file and the ability to read accounts and passwords .
Then try reading wordpress Try the configuration file of !
<!-- A picture is missing here , Reading the configuration file, you can see a line of comments -->
Why ! A line of comments is found here , Is this the password of the user above ?
adrian:idrinksomewater
perfect , Successfully switched users !
Get the first flag
3、 ... and 、 Elevated privileges
See if there is any order to raise power !
flock The command can be executed as any user without permission password .
Enter the following command to raise the right
sudo flock -u / /bin/bash
perfect , Successfully promoted the permission to root
Get the second flag
边栏推荐
- Implementation of count (*) in MySQL
- [during the interview] - how can I explain the mechanism of TCP to achieve reliable transmission
- Experiment five categories and objects
- [VMware abnormal problems] problem analysis & Solutions
- HackMyvm靶机系列(6)-videoclub
- HackMyvm靶机系列(2)-warrior
- 7-1 输出2到n之间的全部素数(PTA程序设计)
- 实验四 数组
- Strengthen basic learning records
- Leetcode.3 无重复字符的最长子串——超过100%的解法
猜你喜欢
Canvas foundation 1 - draw a straight line (easy to understand)
这次,彻底搞清楚MySQL索引
3. Input and output functions (printf, scanf, getchar and putchar)
HackMyvm靶机系列(2)-warrior
强化学习基础记录
A piece of music composed by buzzer (Chengdu)
Canvas foundation 2 - arc - draw arc
(original) make an electronic clock with LCD1602 display to display the current time on the LCD. The display format is "hour: minute: Second: second". There are four function keys K1 ~ K4, and the fun
Leetcode. 3. Longest substring without repeated characters - more than 100% solution
MySQL事务及实现原理全面总结,再也不用担心面试
随机推荐
Difference and understanding between detected and non detected anomalies
Differences among fianl, finally, and finalize
这次,彻底搞清楚MySQL索引
MySQL事务及实现原理全面总结,再也不用担心面试
Inaki Ading
[during the interview] - how can I explain the mechanism of TCP to achieve reliable transmission
【数据库 三大范式】一看就懂
实验八 异常处理
7-3 construction hash table (PTA program design)
Attach the simplified sample database to the SQLSERVER database instance
【MySQL-表结构与完整性约束的修改(ALTER)】
力扣152题乘数最大子数组
中间件漏洞复现—apache
[modern Chinese history] Chapter 6 test
4. Branch statements and loop statements
Leetcode.3 无重复字符的最长子串——超过100%的解法
【头歌educoder数据表中数据的插入、修改和删除】
7-6 矩阵的局部极小值(PTA程序设计)
[data processing of numpy and pytoch]
Programme de jeu de cartes - confrontation homme - machine