当前位置:网站首页>vulnhub-DC-2 drone penetration record
vulnhub-DC-2 drone penetration record
2022-08-06 12:26:00 【narukuuuu】
Before hitting a target,Card for a long time in the right.
Will try basis, not to see what a little sudden ideas
准备
kail攻击机IP:192.168.178.151
dc-2 IP:未知
信息收集
nmap -sS 192.168.178.151/24
Target hostIP为192.168.178.152
nmap -sV -p- 192.168.178.152

先看http的
访问80端口,显示无法访问,说明 DNS 无法解析该域名
在 HOSTS 文件中添加dc-2即可访问
flag1
访问该IP地址发现是一个wordpress框架
点开flagModules are tips you need to usecewl工具(cewl是kali的一个工具,Can crawl through a site keyword set up password dictionary)
cewl dc-2 -w pwd.txt

Here at the same time suggests the need to log in to another account for the nextflag,所以可以用wpscan扫描指定Url,枚举其中的用户名,Then use down dictionary for blasting,To get the other user corresponding password
wpsan --url http://dc-2/ -e u

Will get the user name of the three enumeration to writeuser.txt文件中,下面就是使用wpscan来进行爆破(A little curioushydra行不行,有空再试试)
wpscan --url dc-2 user.txt -P pwd.txt


得到
uername:jerry password:adipiscing
username:tom password:parturient
The next step is to sweep the background and see where is the login screen
Login interface as:http://dc-2/wp-login.php
Or the direct backgroundhttp://dc-2/wp-admin/(wordpress框架)
flag2
登录jerry用户,成功找到flag2
flag3
根据Flags2的提示,Here may use to open7744端口
jerryThe user just used to,先试试tom(-p 7744指定ssh端口登录,默认端口是22端口)
ssh [email protected]-2 -p 7744

发现没有Cat权限,并且tomUsers are limitedrbash,这时候就需要进行rbash逃逸.
方法一
1)BASH_CMDS[a]=/bin/sh;a#把/bin/bash的值赋给a
2)/bin/bash#Performed on a command to leave the input
3)export PATH=$PATH:/bin/#把/bin作为PATH环境变量导出
4)export PATH=$PATH:/usr/bin/#将/usr/binAs the environment variable export

方法二
Don't use success,Field, such as success and again
flag4
切换到jerry用户
查找flag4.txt
Prompt the last oneflag和git
提权
First take a look at the current what permissions
sudo -l
发现可以用jerry用户git提权(git When can open the pages of the input command revbash)
sudo git help config
!/bin/bash
找到最后的flag
参考文章:
https://www.freebuf.com/articles/others-articles/339352.html
边栏推荐
猜你喜欢

Kubernetes 污点和容忍

链表 | 两两交换链表中的节点 | leecode刷题笔记

阿里巴巴2022全新出品亿级并发设计速成宝典(系统拆分,缓存,MQ,读写分离,分布分表,ES扩容应有尽有)

Kubernetes stain and tolerance

剧照怎么找?哪里获取高清资源?这9个网站渠道相见恨晚! 原创

从没见过能把高并发拆解的这么详细!阿里巴巴这份堪称神级的“高并发”教程太香了

SQL 注入复习总结

Kubernetes operation and maintenance experience sharing

Zero with culture and art of tourism development of science and technology center "cultural art chain"

Kotlin-inline:你需要知道的一切(Android)
随机推荐
分布式架构网络通信
【云原生 · Kubernetes】Kubernetes容器云平台部署与运维
微信模板消息跳转小程序
1408. 数组中的字符串匹配 : 简单模拟题
机器学习实战-波士顿房价及能源效能数据的相关分析的线性回归模型
stdout stderr 重定向到文件
Disadvantages of Kubernetes Virtual Machine Deployment
Teach you to draw pixel art and share 195 issues every week
违反常识追求流量 农产品带货直播乱象丛生
Go语言类型断言简述
基于互联网群体智能的知识图谱构造方法
Kubernetes微服务、容器介绍
Kubernetes 污点和容忍
灵活好用的sql monitoring 脚本 part4
事件
EOS密钥被盗后如何恢复?
链表 | 环形链表 | leecode刷题笔记
ES6新特性——generator
链表 | 找出并返回链表相交的起始节点 | leecode刷题笔记
How does MySQL implement multi-table query?