草庐IT

BoredHackerBlog

全部标签

Vulnhub之 BoredHackerBlog: Social Network 2.0靶机详细测试过程

Socnet作者:jasonhuawen靶机信息名称:BoredHackerBlog:SocialNetwork2.0地址:https://www.vulnhub.com/entry/boredhackerblog-social-network-20,455/识别目标主机IP地址(kali㉿kali)-[~/Desktop/Vulnhub/Socnet]└─$sudonetdiscover-ieth1-r192.168.56.0/24Currentlyscanning:192.168.56.0/24|ScreenView:UniqueHosts3CapturedARPReq/Reppacket

靶机一:BOREDHACKERBLOG_ SOCIAL NETWORK

一、靶机地址:https://www.vulnhub.com/entry/boredhackerblog-social-network,454/一开始导进去靶机服务会起不来,重启几次就好了。二、信息收集arp-scan-l直接二层扫描,发现192.168.56.104nmap扫描发现5000、22端口,5000端口跑的是python服务三、渗透阶段访问5000端口,是个简单的社交聊天界面看源码没有多少东西。dirsearch发现admin页面访问了一下,提示有exec()函数,应该是python网站给了一个exec()函数的执行环境。该函数可以动态的执行代码。那就好办了,kaili起nc端口,

Vulnhub之BoredHackerBlog: Social Network_Medium Socnet详细测试过程(拿到root shell)

BoredHackerBlog:SocialNetwork作者:jasonhuawen靶机信息名称:BoredHackerBlog:SocialNetwork地址:https://www.vulnhub.com/entry/boredhackerblog-social-network,454/识别目标主机IP地址Currentlyscanning:Finished!|ScreenView:UniqueHosts3CapturedARPReq/Reppackets,from3hosts.Totalsize:180__________________________________________

Vulnhub之BoredHackerBlog: Social Network_Medium Socnet详细测试过程(拿到root shell)

BoredHackerBlog:SocialNetwork作者:jasonhuawen靶机信息名称:BoredHackerBlog:SocialNetwork地址:https://www.vulnhub.com/entry/boredhackerblog-social-network,454/识别目标主机IP地址Currentlyscanning:Finished!|ScreenView:UniqueHosts3CapturedARPReq/Reppackets,from3hosts.Totalsize:180__________________________________________