当前位置:网站首页>Vulnhub's darkhole_ two
Vulnhub's darkhole_ two
2022-07-05 18:13:00 【Plum_ Flowers_ seven】
Catalog
3、 ... and 、 Service version discovery
3. Generate the latest version of source code
4. Check the version with loopholes
Nine 、losy information gathering
11、 ... and 、hydra Brute force
One 、 The host found
Two 、 Port scanning

3、 ... and 、 Service version discovery
What is worth noting here is .git, This is the source code also put up . The others are the same .

Four 、 information gathering
1. Home page
A picture on the homepage , There is nothing in the source code .

There's a login interface .

2. Scan directory
Most of the useful information points to .git, This is the same as the information we collected above

5、 ... and 、.git
Be careful : It is best to 2021 Version of kali,2022 the latest version git clone Will report a mistake , I don't know why
1. download .git
wget -r http://192.168.0.108/.git/
2. View version history

3. Generate the latest version of source code
git clone . backup
Login in the source code php in , We can see that the input parameters are escaped here , Prevent injection

4. Check the version with loopholes
Here, when converting branches , Sometimes you have to do it first
git stash
Transform branch
git checkout a4d900a8d85e8938d3601f3cef113ee293028e10

Enter the view , Got the account password used in the previous version . It is likely that the account password of the previous version can be used for login in this version

5. Sign in

6、 ... and 、sqlmap Inject
1' No echo results .
1'and+1=1--+ and 1 The output is the same .
Prove that there is sql Inject ,sqlmap Run
burp Grab the bag ,
(1) Run to the library
sqlmap -r ~/Desktop/1 --dbs
Four default libraries , One darkhole_2

(2) Running Watch

(3)dump Come down
ssh:

users:

7、 ... and 、ssh Sign in
1.
Got one jehad Of shell.

In information collection , We see .bash_history There are many tips in . Here is a hint , Make one Port forwarding , Then execute the command .

2.9999 Port service information
Content :

ps -aux | grep 9999
You can see that the program is based on losy Running , We use him to execute the rebound shell And then I got a losy Of shell

8、 ... and 、 Port forwarding
Why do I do this port forwarding , Because we are kali The target target cannot be accessed by the client 9999 Service script for port deployment .
there 127.0.0.1 As a target ( Remote target ) The address of .
Of course, in fact, we can directly use what we get jehad This user , Execute commands locally .
1.kali End
ssh -L 9633:127.0.0.1:9999 [email protected]
After the port forwarding, we can kali The end implements the command execution operation .

2. rebound shell
stay .bash_history In fact, it provides us with several rebounds shell The way , In fact, it is several ways that hackers try to invade , But it seems to be useless

Conduct url code :

Successfully rebound after submission .

Nine 、losy information gathering
upgrade shell, The password has been told to us

Ten 、sudo Raise the right

Use the one given above python Command line
sudo python3 -c 'import os; os.system("/bin/sh")'

11、 ... and 、hydra Brute force
lama Too much authority , The password is too simple .

Log in and use sudo Raise the right
边栏推荐
- 彻底理解为什么网络 I/O 会被阻塞?
- Star ring technology data security management platform defender heavy release
- Penetrate the whole intranet through socks agent
- 星环科技重磅推出数据要素流通平台Transwarp Navier,助力企业实现隐私保护下的数据安全流通与协作
- 深拷贝与浅拷贝【面试题3】
- Whether to take a duplicate subset with duplicate elements [how to take a subset? How to remove duplicates?]
- 使用Jmeter虚拟化table失败
- 金太阳开户安全吗?万一免5开户能办理吗?
- Nanjing University: Discussion on the training program of digital talents in the new era
- How can cluster deployment solve the needs of massive video access and large concurrency?
猜你喜欢

How to obtain the coordinates of the aircraft passing through both ends of the radar

Image classification, just look at me!

About Estimation with Cross-Validation

Thoroughly understand why network i/o is blocked?

JVM third talk -- JVM performance tuning practice and high-frequency interview question record

图扑软件数字孪生 | 基于 BIM 技术的可视化管理系统

星环科技重磅推出数据要素流通平台Transwarp Navier,助力企业实现隐私保护下的数据安全流通与协作

第十一届中国云计算标准和应用大会 | 云计算国家标准及白皮书系列发布 华云数据全面参与编制

U-Net: Convolutional Networks for Biomedical Images Segmentation

记录Pytorch中的eval()和no_grad()
随机推荐
To solve the stubborn problem of Lake + warehouse hybrid architecture, xinghuan Technology launched an independent and controllable cloud native Lake warehouse integrated platform
Introduction to Resampling
How to solve the error "press any to exit" when deploying multiple easycvr on one server?
buuctf-pwn write-ups (9)
pytorch yolov5 训练自定义数据
Clickhouse (03) how to install and deploy Clickhouse
Gimp 2.10 tutorial "suggestions collection"
深拷贝与浅拷贝【面试题3】
修复漏洞 - mysql 、es
破解湖+仓混合架构顽疾,星环科技推出自主可控云原生湖仓一体平台
Crontab 日志:如何记录我的 Cron 脚本的输出
Can communication of nano
Fix vulnerability - mysql, ES
How can cluster deployment solve the needs of massive video access and large concurrency?
MATLAB中print函数使用
Whether to take a duplicate subset with duplicate elements [how to take a subset? How to remove duplicates?]
Multithreading (I) processes and threads
Logical words in Articles
图扑软件数字孪生 | 基于 BIM 技术的可视化管理系统
U-Net: Convolutional Networks for Biomedical Images Segmentation