Target machine test--Dina

collect message

Host discovery

Insert picture description here

Port scan

Only port 80:
Insert picture description here

Directory scan

Insert picture description here
Visit every accessible path:

Homepage:
Insert picture description here
nothing/pass:
Insert picture description here
secure/:
Insert picture description here

Vulnerability discovery

Get a similar password dictionary, a zip file.

Download the zip file:

A password is required. Use the obtained password freedom. After decompression, it is in mp3 format, but it cannot be played:
Insert picture description here
Open with text:
Insert picture description here
obtain a user name and a background, open:
Insert picture description here
use diana to log in successfully: the
Insert picture description here
website framework is playsms.

Search for CMS vulnerabilities:
Insert picture description here
three belong to msf, use msf:
Insert picture description here
use the first one, set:
Insert picture description here
success.

The second one succeeded; the third one succeeded.

Insert picture description here

Right escalation

First use nc reverse shell:
Insert picture description here

Insert picture description here
Use dirty cows to escalate rights (find, sudo, attempts to no avail):

Enter the /tmp directory, kali starts the http service, wget downloads, compiles and executes.

Insert picture description here

Insert picture description here
Insert picture description here

to sum up

Obtain more information based on known information (information collection through information collection).

Use version vulnerabilities.

Guess you like

Origin blog.csdn.net/qq_45742511/article/details/115282741