当前位置:网站首页>Vulnhub's darkhole_ two
Vulnhub's darkhole_ two
2022-07-05 18:13:00 【Plum_ Flowers_ seven】
Catalog
3、 ... and 、 Service version discovery
3. Generate the latest version of source code
4. Check the version with loopholes
Nine 、losy information gathering
11、 ... and 、hydra Brute force
One 、 The host found
Two 、 Port scanning

3、 ... and 、 Service version discovery
What is worth noting here is .git, This is the source code also put up . The others are the same .

Four 、 information gathering
1. Home page
A picture on the homepage , There is nothing in the source code .

There's a login interface .

2. Scan directory
Most of the useful information points to .git, This is the same as the information we collected above

5、 ... and 、.git
Be careful : It is best to 2021 Version of kali,2022 the latest version git clone Will report a mistake , I don't know why
1. download .git
wget -r http://192.168.0.108/.git/
2. View version history

3. Generate the latest version of source code
git clone . backup
Login in the source code php in , We can see that the input parameters are escaped here , Prevent injection

4. Check the version with loopholes
Here, when converting branches , Sometimes you have to do it first
git stash
Transform branch
git checkout a4d900a8d85e8938d3601f3cef113ee293028e10

Enter the view , Got the account password used in the previous version . It is likely that the account password of the previous version can be used for login in this version

5. Sign in

6、 ... and 、sqlmap Inject
1' No echo results .
1'and+1=1--+ and 1 The output is the same .
Prove that there is sql Inject ,sqlmap Run
burp Grab the bag ,
(1) Run to the library
sqlmap -r ~/Desktop/1 --dbs
Four default libraries , One darkhole_2

(2) Running Watch

(3)dump Come down
ssh:

users:

7、 ... and 、ssh Sign in
1.
Got one jehad Of shell.

In information collection , We see .bash_history There are many tips in . Here is a hint , Make one Port forwarding , Then execute the command .

2.9999 Port service information
Content :

ps -aux | grep 9999
You can see that the program is based on losy Running , We use him to execute the rebound shell And then I got a losy Of shell

8、 ... and 、 Port forwarding
Why do I do this port forwarding , Because we are kali The target target cannot be accessed by the client 9999 Service script for port deployment .
there 127.0.0.1 As a target ( Remote target ) The address of .
Of course, in fact, we can directly use what we get jehad This user , Execute commands locally .
1.kali End
ssh -L 9633:127.0.0.1:9999 [email protected]
After the port forwarding, we can kali The end implements the command execution operation .

2. rebound shell
stay .bash_history In fact, it provides us with several rebounds shell The way , In fact, it is several ways that hackers try to invade , But it seems to be useless

Conduct url code :

Successfully rebound after submission .

Nine 、losy information gathering
upgrade shell, The password has been told to us

Ten 、sudo Raise the right

Use the one given above python Command line
sudo python3 -c 'import os; os.system("/bin/sh")'

11、 ... and 、hydra Brute force
lama Too much authority , The password is too simple .

Log in and use sudo Raise the right
边栏推荐
猜你喜欢

JVM第三话 -- JVM性能调优实战和高频面试题记录

Nanjing University: Discussion on the training program of digital talents in the new era

Tencent music launched its new product "quyimai", which provides music commercial copyright authorization

ISPRS2022/雲檢測:Cloud detection with boundary nets基於邊界網的雲檢測

mybash

ConvMAE(2022-05)

Tupu software digital twin | visual management system based on BIM Technology

Redis Foundation

破解湖+仓混合架构顽疾,星环科技推出自主可控云原生湖仓一体平台

隐私计算助力数据的安全流通与共享
随机推荐
多线程(一) 进程与线程
彻底理解为什么网络 I/O 会被阻塞?
【PaddlePaddle】 PaddleDetection 人脸识别 自定义数据集
隐私计算助力数据的安全流通与共享
Access the database and use redis as the cache of MySQL (a combination of redis and MySQL)
Simulate the hundred prisoner problem
记录Pytorch中的eval()和no_grad()
小白入门NAS—快速搭建私有云教程系列(一)[通俗易懂]
Sophon KG升级3.1:打破数据间壁垒,解放企业生产力
Sophon kg upgrade 3.1: break down barriers between data and liberate enterprise productivity
FCN: Fully Convolutional Networks for Semantic Segmentation
含重复元素取不重复子集[如何取子集?如何去重?]
OpenShift常用管理命令杂记
About Statistical Power(统计功效)
使用QT遍历Json文档及搜索子对象
使用Jmeter虚拟化table失败
数值计算方法 Chapter8. 常微分方程的数值解
破解湖+仓混合架构顽疾,星环科技推出自主可控云原生湖仓一体平台
小林coding的内存管理章节
钉钉开放平台小程序API的缓存接口都有哪些内容?