首页 > 其他分享 >Vulnhub:Hackme:1靶机

Vulnhub:Hackme:1靶机

时间:2023-03-31 20:13:14浏览次数:64  
标签:shell superadmin -- 192.168 Vulnhub 靶机 Hackme

kali:192.168.111.111

靶机:192.168.111.245

信息收集

端口扫描

nmap -A -v -sV -T5 -p- --script=http-enum 192.168.111.245

image

访问目标80端口,注册用户

image

登陆后在搜索框位置存在sql注入

image

漏洞利用

利用sqlmap获得目标数据库信息

sqlmap -o -r ./a.txt --batch --level 5 --risk 3 -D 'webapphacking' -T 'users' --dump-all

image

md5解密superadmin用户密码md5:https://www.somd5.com/

Uncrackable

image

用superadmin用户登录后上传反弹shell

image

文件上传到uploads目录

image

获得反弹shell

image

提权

运行/home/legacy/touchmenot提升为root

image

标签:shell,superadmin,--,192.168,Vulnhub,靶机,Hackme
From: https://www.cnblogs.com/ctostm/p/17277360.html

相关文章

  • vulnhub靶场之WIRELESS: 1
    准备:攻击机:虚拟机kali、本机win10。靶机:Wireless:1,下载地址:https://download.vulnhub.com/wireless/Mystiko-Wireless.rar,下载后直接vm打开即可。知识点:lxd提权、密码......
  • Vulnhub之HackNos 1详细测试过程
    HackNos1识别目标主机IP地址(kali㉿kali)-[~/Vulnhub/HackNos1]└─$sudonetdiscover-ieth1-r192.168.56.0/24Currentlyscanning:192.168.56.0/24|Scr......
  • Vulnhub之HackNos 2靶机详细测试过程
    HackNos2作者:jasonhuawen靶机信息名称:hackNos:Os-hackNos-2.1地址:https://www.vulnhub.com/entry/hacknos-os-hacknos-21,403/识别目标主机IP地址─(kali㉿kali......
  • 靶机练习8: decoy
    靶机地址https://www.vulnhub.com/entry/sunset-decoy,505/信息收集全端口扫描发现服务,并扫描其版本sudomasscan-p1-65535,U:1-65535172.16.33.40--rate=5000-et......
  • 靶机联系7:LOLY
    靶机地址https://www.vulnhub.com/entry/loly-1,538/信息收集扫描全端口,进行服务发现nmap-n-v-sS-max-retries=0-p-172.16.33.25发现只有80端口的web服务进......
  • Vulnhub之Panabee靶机详细测试过程
    Panabee识别目标主机IP地址(kali㉿kali)-[~/Desktop/Vulnhub/Panabee]└─$sudonetdiscover-ieth1-r192.168.56.0/24Currentlyscanning:192.168.56.0/24|......
  • Vulnhub之Photographer靶机详细测试过程
    Photographer识别目标主机IP地址sudonetdiscover-ieth1-r192.168.56.0/24Currentlyscanning:192.168.56.0/24|ScreenView:UniqueHosts......
  • Vulnhub:Mr-Robot:1靶机
    kali:192.168.111.111靶机:192.168.111.237信息收集端口扫描nmap-A-v-sV-T5-p---script=http-enum192.168.111.237访问robots.txt,发现两个文件发现fsocity.d......
  • Vulnhub之Player 1靶机详细测试过程
    Player1识别目标主机IP地址kali㉿kali)-[~/Desktop/Vulnhub/Player]└─$sudonetdiscover-ieth1-r192.168.56.0/24Currentlyscanning:192.168.56.0/24|......
  • Vulnhub之PowerGrid详细测试过程
    PowerGrid识别目标主机IP地址(kali㉿kali)-[~/Desktop/Vulnhub/PowerGrid]└─$sudonetdiscover-ieth1-r192.168.56.0/24Currentlyscanning:192.168.56.0/24......