OSCP备考_0x14_Vulnhub靶机_Raven: 2

Ethan医生8个月前靶场252
名称说明
靶机下载链接https://www.vulnhub.com/entry/raven-2,269/
攻击机(kali)ip:192.168.233.168
靶机(CentOS)ip:192.168.233.181

image.png

image.png


image.png


image.png


gobuster dir -u http://192.168.233.181 -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt -x php,txt,html


image.png


image.png


hydra -L user.txt -P /usr/share/wordlists/rockyou.txt 192.168.233.181 ssh 

好家伙爆破不了

image.png

只好测试其他方向 

phpmail找寻漏洞searchsploit phpmail 

尝试看看使用40974.py

image.png

image.png

image.png

开始操作提权

查看到mysql有执行,R@v3nSecurity

image.png


image.png

操作跟前面的靶场一样就不再多说

image.png

image.png





标签: OSCP

相关文章

OSCP备考_0x08_HackThBox靶机_Linux_Valentine

OSCP备考_0x08_HackThBox靶机_Linux_Valentine

nmap -sCV -p- --min-rate 10000 -T4 -sS 10.129.3.150 (扫描TCP)nmap -sU --top-ports 100 10.129.3.15...

OSCP备考_0x10_Vulnhub靶机_GoldenEye: 1

OSCP备考_0x10_Vulnhub靶机_GoldenEye: 1

名称说明靶机下载链接https://www.vulnhub.com/entry/goldeneye-1,240/攻击机(kali)ip:192.168.233.168靶机(CentOS)ip:192....

OSCP备考_0x07_Vulnhub靶机_Tr0ll: 2

OSCP备考_0x07_Vulnhub靶机_Tr0ll: 2

名称说明靶机下载链接https://www.vulnhub.com/entry/tr0ll-2,107/攻击机(kali)ip:192.168.233.168靶机(CentOS)ip:192.168....

OSCP备考_0x28_HackThBox靶机_Linux_blunder

OSCP备考_0x28_HackThBox靶机_Linux_blunder

blundernmap -sCV -p- --min-rate 10000 -T4 -sS 10.129.193.124 (扫描TCP)nmap -sU --top-ports 1...

OSCP备考_0x39_HackThBox靶机_Windows_Optimum

OSCP备考_0x39_HackThBox靶机_Windows_Optimum

nmap -sCV -p- --min-rate 10000 -T4 -sS 10.129.254.155 (扫描TCP)查看到版本是2.3,有rcepython3 49125.p...

OSCP备考_0x16_HackThBox靶机_Linux_jarvis

OSCP备考_0x16_HackThBox靶机_Linux_jarvis

nmap -sCV -p- --min-rate 10000 -T4 -sS 10.129.229.137 (扫描TCP)nmap -sU --top-ports 100 ...

发表评论    

◎欢迎参与讨论,请在这里发表您的看法、交流您的观点。