当前位置:网站首页>Vulnhub's darkhole_ two
Vulnhub's darkhole_ two
2022-07-05 18:13:00 【Plum_ Flowers_ seven】
Catalog
3、 ... and 、 Service version discovery
3. Generate the latest version of source code
4. Check the version with loopholes
Nine 、losy information gathering
11、 ... and 、hydra Brute force
One 、 The host found
Two 、 Port scanning
3、 ... and 、 Service version discovery
What is worth noting here is .git, This is the source code also put up . The others are the same .
Four 、 information gathering
1. Home page
A picture on the homepage , There is nothing in the source code .
There's a login interface .
2. Scan directory
Most of the useful information points to .git, This is the same as the information we collected above
5、 ... and 、.git
Be careful : It is best to 2021 Version of kali,2022 the latest version git clone Will report a mistake , I don't know why
1. download .git
wget -r http://192.168.0.108/.git/
2. View version history
3. Generate the latest version of source code
git clone . backup
Login in the source code php in , We can see that the input parameters are escaped here , Prevent injection
4. Check the version with loopholes
Here, when converting branches , Sometimes you have to do it first
git stash
Transform branch
git checkout a4d900a8d85e8938d3601f3cef113ee293028e10
Enter the view , Got the account password used in the previous version . It is likely that the account password of the previous version can be used for login in this version
5. Sign in
6、 ... and 、sqlmap Inject
1' No echo results .
1'and+1=1--+ and 1 The output is the same .
Prove that there is sql Inject ,sqlmap Run
burp Grab the bag ,
(1) Run to the library
sqlmap -r ~/Desktop/1 --dbs
Four default libraries , One darkhole_2
(2) Running Watch
(3)dump Come down
ssh:
users:
7、 ... and 、ssh Sign in
1.
Got one jehad Of shell.
In information collection , We see .bash_history There are many tips in . Here is a hint , Make one Port forwarding , Then execute the command .
2.9999 Port service information
Content :
ps -aux | grep 9999
You can see that the program is based on losy Running , We use him to execute the rebound shell And then I got a losy Of shell
8、 ... and 、 Port forwarding
Why do I do this port forwarding , Because we are kali The target target cannot be accessed by the client 9999 Service script for port deployment .
there 127.0.0.1 As a target ( Remote target ) The address of .
Of course, in fact, we can directly use what we get jehad This user , Execute commands locally .
1.kali End
ssh -L 9633:127.0.0.1:9999 [email protected]
After the port forwarding, we can kali The end implements the command execution operation .
2. rebound shell
stay .bash_history In fact, it provides us with several rebounds shell The way , In fact, it is several ways that hackers try to invade , But it seems to be useless
Conduct url code :
Successfully rebound after submission .
Nine 、losy information gathering
upgrade shell, The password has been told to us
Ten 、sudo Raise the right
Use the one given above python Command line
sudo python3 -c 'import os; os.system("/bin/sh")'
11、 ... and 、hydra Brute force
lama Too much authority , The password is too simple .
Log in and use sudo Raise the right
边栏推荐
- Star ring technology data security management platform defender heavy release
- Introduction to Resampling
- How to obtain the coordinates of the aircraft passing through both ends of the radar
- Tencent music launched its new product "quyimai", which provides music commercial copyright authorization
- [paddleclas] common commands
- 图像分类,看我就够啦!
- EasyCVR平台通过接口编辑通道出现报错“ID不能为空”,是什么原因?
- mybash
- JDBC reads a large amount of data, resulting in memory overflow
- [BeanShell] there are many ways to write data locally
猜你喜欢
To solve the stubborn problem of Lake + warehouse hybrid architecture, xinghuan Technology launched an independent and controllable cloud native Lake warehouse integrated platform
第十一届中国云计算标准和应用大会 | 华云数据成为全国信标委云计算标准工作组云迁移专题组副组长单位副组长单位
JVM third talk -- JVM performance tuning practice and high-frequency interview question record
"Xiaodeng in operation and maintenance" is a single sign on solution for cloud applications
Let more young people from Hong Kong and Macao know about Nansha's characteristic cultural and creative products! "Nansha kylin" officially appeared
《2022中国信创生态市场研究及选型评估报告》发布 华云数据入选信创IT基础设施主流厂商!
Nacos distributed transactions Seata * * install JDK on Linux, mysql5.7 start Nacos configure ideal call interface coordination (nanny level detail tutorial)
vulnhub之darkhole_2
瀚升优品app翰林优商系统开发功能介绍
Star Ring Technology launched transwarp Navier, a data element circulation platform, to help enterprises achieve secure data circulation and collaboration under privacy protection
随机推荐
New words new words new words new words [2]
GFS distributed file system
记录Pytorch中的eval()和no_grad()
ISPRS2022/云检测:Cloud detection with boundary nets基于边界网的云检测
Star Ring Technology launched transwarp Navier, a data element circulation platform, to help enterprises achieve secure data circulation and collaboration under privacy protection
Check namespaces and classes
node_ Exporter memory usage is not displayed
Sophon AutoCV:助力AI工业化生产,实现视觉智能感知
消除`if()else{ }`写法
热通孔的有效放置如何改善PCB设计中的热管理?
兄弟组件进行传值(显示有先后顺序)
[performance test] full link voltage test
About Statistical Power(统计功效)
Binder开辟线程数过多导致主线程ANR异常
第十届全球云计算大会 | 华云数据荣获“2013-2022十周年特别贡献奖”
MATLAB中print函数使用
开户复杂吗?网上开户安全么?
Can communication of nano
隐私计算助力数据的安全流通与共享
How to improve the thermal management in PCB design with the effective placement of thermal through holes?