还没写完,今天太晚了,明天继续写!
0x01简介
- Vulnhub是一个靶场,很接近真实环境的靶场
- kali作为攻击机
开局一个登录框,后续全靠蒙!
只知道登录的用户名为 victor,密码什么的都不知道,最终目的是获取系统的root权限。
0x02信息收集
IP探测
- 使用nmap 进行IP探测
大概有五个IP地址:
192.168.133.1
192.168.133.2
192.168.133.133
192.168.133.132
192.168.133.254
连蒙带猜,并使用返回的TTL值进行判断,最后辅以nmap进行确认!
根据ttl值进行猜测,192.168.133.133可能为其IP地址,因为其TTL值为64(PS:没有截图,忘了)
根据nmap的结果显示,猜测是正确的。
端口探测
80 端口
22 ssh端口
两种思路:
一.ssh爆破。(不用说,困难)
二.从web端入手,打点,提权(肯定是这种方式)
目录探测
- 工具dirbuster
这是 http://192.168.133.133:80 的首页面
目录及文件探测
大概意思就是,你太菜了,我在第五层,你还在第0层.....
/index.php 200 315
/icons/ 403 468
/image.php 200 325
/wordpress/ 200 270
/wordpress/index.php 301 233
/icons/small/ 403 474
/wordpress/wp-content/ 200 147
/wordpress/wp-content/index.php 200 147
/wordpress/wp-content/themes/ 200 147
/wordpress/wp-content/themes/index.php 200 147
/wordpress/wp-content/uploads/ 200 1186
/wordpress/wp-content/uploads/2019/ 200 1201
/javascript/ 403 473
/wordpress/wp-content/uploads/2019/08/ 200 1024
/wordpress/wp-login.php 200 3745
/wordpress/wp-content/plugins/ 200 147
/wordpress/wp-includes/ 200 178
/wordpress/wp-content/plugins/index.php 200 147
/wordpress/wp-includes/images/ 200 6859
/wordpress/wp-includes/rss.php 500 185
/wordpress/wp-includes/images/crystal/ 200 3046
/wordpress/wp-includes/images/media/ 200 2841
/wordpress/wp-includes/images/smilies/ 200 6462
/wordpress/wp-includes/images/wlw/ 200 1639
/wordpress/wp-includes/images/crystal/license.txt 200 403
/wordpress/wp-includes/category.php 200 147
/wordpress/wp-includes/media.php 500 185
/wordpress/wp-includes/user.php 200 147
/wordpress/wp-includes/feed.php 200 147
/wordpress/wp-includes/version.php 200 147
- 以上是 dirbuster扫描的结果,我截取了一部分,意思一下