首页 > 其他分享 >Vulnhub-Tr0ll靶机笔记

Vulnhub-Tr0ll靶机笔记

时间:2025-01-17 18:03:47浏览次数:1  
标签:ftp lol http 192.168 Tr0ll Vulnhub 靶机 txt open

Tr0ll靶机笔记

概述

靶机地址:https://www.vulnhub.com/entry/tr0ll-1,100/

这台靶机比较简单,让我们开始 Hack it!

一、nmap扫描

1、端口扫描

sudo nmap -sT --min-rate 10000 -p- 192.168.52.6 -o ports 
Nmap scan report for 192.168.52.6
Host is up (0.0026s latency).
Not shown: 65532 closed tcp ports (conn-refused)
PORT   STATE SERVICE
21/tcp open  ftp
22/tcp open  ssh
80/tcp open  http
MAC Address: 00:0C:29:E4:03:EB (VMware)

Nmap done: 1 IP address (1 host up) scanned in 1.67 seconds

看到开放了21,22,80三个服务

2、详细信息扫描

 sudo nmap -sT -sV -sC -p21,22,80 -O 192.168.52.6  -o details 
Nmap scan report for 192.168.52.6
Host is up (0.00060s latency).

PORT   STATE SERVICE VERSION
21/tcp open  ftp     vsftpd 3.0.2
| ftp-syst:
|   STAT:
| FTP server status:
|      Connected to 192.168.52.3
|      Logged in as ftp
|      TYPE: ASCII
|      No session bandwidth limit
|      Session timeout in seconds is 600
|      Control connection is plain text
|      Data connections will be plain text
|      At session startup, client count was 4
|      vsFTPd 3.0.2 - secure, fast, stable
|_End of status
| ftp-anon: Anonymous FTP login allowed (FTP code 230)
|_-rwxrwxrwx    1 1000     0            8068 Aug 09  2014 lol.pcap [NSE: writeable]
22/tcp open  ssh     OpenSSH 6.6.1p1 Ubuntu 2ubuntu2 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey:
|   1024 d618d9ef75d31c29be14b52b1854a9c0 (DSA)
|   2048 ee8c64874439538c24fe9d39a9adeadb (RSA)
|   256 0e66e650cf563b9c678b5f56caae6bf4 (ECDSA)
|_  256 b28be2465ceffddc72f7107e045f2585 (ED25519)
80/tcp open  http    Apache httpd 2.4.7 ((Ubuntu))
| http-robots.txt: 1 disallowed entry
|_/secret
|_http-server-header: Apache/2.4.7 (Ubuntu)
|_http-title: Site doesn't have a title (text/html).
MAC Address: 00:0C:29:E4:03:EB (VMware)
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Device type: general purpose
Running: Linux 3.X|4.X
OS CPE: cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4
OS details: Linux 3.2 - 4.9
Network Distance: 1 hop
Service Info: OSs: Unix, Linux; CPE: cpe:/o:linux:linux_kernel

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 8.06 seconds

有 ftp-anon: Anonymous FTP login allowed (FTP code 230)

看到ftp是允许匿名访问的

3、漏洞脚本扫描

sudo nmap --script=vuln -p21,22,80 192.168.52.6 -o vuln
PORT   STATE SERVICE
21/tcp open  ftp
22/tcp open  ssh
80/tcp open  http
|_http-dombased-xss: Couldn't find any DOM based XSS.
|_http-stored-xss: Couldn't find any stored XSS vulnerabilities.
| http-slowloris-check:
|   VULNERABLE:
|   Slowloris DOS attack
|     State: LIKELY VULNERABLE
|     IDs:  CVE:CVE-2007-6750
|       Slowloris tries to keep many connections to the target web server open and hold
|       them open as long as possible.  It accomplishes this by opening connections to
|       the target web server and sending a partial request. By doing so, it starves
|       the http server's resources causing Denial Of Service.
|
|     Disclosure date: 2009-09-17
|     References:
|       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6750
|_      http://ha.ckers.org/slowloris/
| http-enum:
|   /robots.txt: Robots file
|_  /secret/: Potentially interesting folder
|_http-csrf: Couldn't find any CSRF vulnerabilities.
MAC Address: 00:0C:29:E4:03:EB (VMware)

Nmap done: 1 IP address (1 host up) scanned in 321.47 seconds

二、FTP渗透

从nmap扫描我们得知:FTP服务是可以匿名访问的。我们连接看有没有什么感兴趣的信息透露给我们

ftp 192.168.52.6

image-20250117110455091

看到我们成功用anonymous匿名登陆成功,看到一个lol.pcap的流量包文件。

ftp> binary
200 Switching to Binary mode.
ftp> get lol.pcap
local: lol.pcap remote: lol.pcap
229 Entering Extended Passive Mode (|||15971|).
150 Opening BINARY mode data connection for lol.pcap (8068 bytes).
100% |**************************************************************************************|  8068        1.18 MiB/s    00:00 ETA
226 Transfer complete.
8068 bytes received in 00:00 (1.05 MiB/s)

切换到binary模式,下载下来

我们用wireshark对流量包分析

image-20250117111410512

发现了,有文件传输,我们可以看到文件内容

Well, well, well, aren't you just a clever little devil, you almost found the sup3rs3cr3tdirlol

标签:ftp,lol,http,192.168,Tr0ll,Vulnhub,靶机,txt,open
From: https://www.cnblogs.com/LINGX5/p/18677456

相关文章

  • HackMyVM-corrosion3靶机的测试报告
    目录一、测试环境1、系统环境2、使用工具/软件二、测试目的三、操作过程1、信息搜集2、Getshell3、提权RunC提权四、结论一、测试环境1、系统环境渗透机:kali2021.1(192.168.159.127)靶 机:ubuntu20.04(192.168.159.62)注意事项:①该类型靶场只能在virtualB......
  • HackMyVM-XMAS靶机的测试报告
    目录一、测试环境1、系统环境2、使用工具/软件二、测试目的三、操作过程1、信息搜集2、Getshell3、提权四、结论一、测试环境1、系统环境渗透机:kali2021.1(192.168.159.127)靶 机:ubuntu23.04(192.168.159.158)注意事项:①该类型靶场只能在virtualBox上搭建......
  • LAMPSecurityCTF5---靶机练习
    LAMPSecurityCTF5靶机练习声明B站UP主泷羽sec笔记的只是方便各位师傅学习知识,以下网站只涉及学习内容,其他的都与本人无关,切莫逾越法律红线,否则后果自负。✍......
  • LampSecurityCTF4---靶机练习
    LampSecurityCTF4靶机练习声明B站UP主泷羽sec笔记的只是方便各位师傅学习知识,以下网站只涉及学习内容,其他的都与本人无关,切莫逾越法律红线,否则后果自负。✍......
  • 复现渗透Vulnhub-VulnOSv2靶机
    本篇文章旨在为网络安全渗透测试靶机教学。通过阅读本文,读者将能够对渗透Vulnhub系列VulnOSv2靶机有一定的了解一、信息收集阶段靶机地址:https://download.vulnhub.com/vulnos/VulnOSv2.7z因为靶机为本地部署虚拟机网段,查看dhcp地址池设置。得到信息IP为:192.168.60.0/......
  • Vulnhub-Red靶机笔记
    Red靶机笔记概述这台靶机主要练习了文件包含漏洞的利用过程,以及hashcat利用规则生成字典来爆破ssh,利用进程监听修改root自执行程序来拿到root权限的shell靶机地址:https://www.vulnhub.com/entry/red-1,753/一、nmap扫描1、端口扫描sudonmap-sT--min-rate10000-p--opo......
  • vulnhub靶场【DC系列】之9 the final 结束篇
    前言靶机:DC-8,IP地址为192.168.10.11,后续因为靶机重装,IP地址变为192.168.10.13攻击:kali,IP地址为192.168.10.2都采用VMWare,网卡为桥接模式对于文章中涉及到的靶场以及工具,我放置在网盘中,链接:https://pan.quark.cn/s/54b7df0c84e1主机发现使用arp-scan-l或者netdiscover......
  • vulnhub中deathnote1靶机
    信息收集靶机开机后,按e键进入安全模式修改下图位置为:rwsignieinit=/bin/bash 按ctrl+x进入bashvi /etc/network/interfaces 修改下图两个位置为ens33注意x是删除i是输入然后退出 打开kali识别存活主机(也就是识别攻击目标):arp-scan-l端口扫描:nmap-sV-p-......
  • 【vulnhub靶场】日志投毒与文件包含漏洞 Solstice
    一、侦查1.1收集目标网络信息:IP地址1.2主动扫描:扫描IP地址段二、初始访问2.1利用面向公众的应用三、权限提升3.1利用漏洞提权:高权限运行的程序一、侦查1.1收集目标网络信息:IP地址靶机启动后,没有提供IP地址。由于Kali和靶机在同一个C段,可以扫描ARP......
  • vulnhub——Potato靶机
    还是使用arp-scan-l查找ip第一信息收集访问一下网页只有一个土豆没有什么有用的信息使用dirb扫描一下目录得到了三个页面我们访问一下没有什么有用的信息我们继续扫描一下端口发现页面开启了80端口还开启了7120端口(ssh)结合刚才的网页是一个土豆,可以猜......