首页 > 其他 > 详细

OSCP Learning Notes - Capstone(3)

时间:2019-08-04 16:32:12      阅读:71      评论:0      收藏:0      [点我收藏+]

DroopyCTF Walkthrough

Preparation:

Download the DroopyCTF virtual machine from the following website:

https://www.vulnhub.com/entry/droopy-v02,143/

 

1. Scan the network to find the IP address of the DroopyCTF server.

netdiscover -r 10.0.0.0/24

技术分享图片

2. Scan the DroopyCTF server using Nmap to find some potential vulnerabilities.

TCP Scan 1:

nmap -Pn -sS --stats-every 3m --max-retries 1 --max-scan-delay 20 --defeat-rst-ratelimit -T4 -p1-65535 -oN /root/Delete/tcp1.txt 10.0.0.30

技术分享图片

TCP Scan 2:

nmap -nvv -Pn- -sSV -p 80 --version-intensity 9 -A -oN /root/Delete/tcp2.txt 10.0.0.30

技术分享图片

UDP Scan:

map -Pn --top-ports 1000 -sU --stats-every 3m --max-retries 1 -T3 -oN /root/Delete/udp.txt 10.0.0.30

技术分享图片

3. Browse the website(http://10.0.0.30/) through Firefox. Nothing valuable find in the source page.

技术分享图片

Browse the website(http://10.0.0.30/robots.txt) through Firefox.

技术分享图片

Browse the website(http://10.0.0.30/CHANGELOG.txt) through Firefox and try to find some vulnerabilities.

技术分享图片

Try to find some exploit guider related to Drupal 7.0 in the Exploit Database. Download the exploit code 

https://www.exploit-db.com/exploits/34992

技术分享图片

We can also find some exploit titles on Kali Linux locally.

searchsploit drupal 7

技术分享图片

We can also try to search for exploit modules related to drupal in Metasploit.

search drupal

技术分享图片

4. Let‘s try to exploit the target server with Metasploit.

 Use the exploit/multi/http/drupal_drupageddon module and show the information. It should be work.

技术分享图片

Set the parameters and start to exploit. We have the shell.

技术分享图片

 Find the information of droopy server.

技术分享图片

Try to find some exploit guider related to Linux Kernel 3.13.0 in the Exploit Database. Download the exploit code.

 https://www.exploit-db.com/exploits/37292

技术分享图片

Copy the code to the /var/www/html folder on Kali Linux, then download to the Droopy server.

Try to search the tty shell escapte cheat sheet on the Internet. https://netsec.ws/?p=337

python -c import pty; pty.spawn("/bin/sh")

技术分享图片

5. Download the exploit source code to /tmp folder on Droopy server. Compile and execute the exploit file.

Get the root privilege successfully.

技术分享图片

 

OSCP Learning Notes - Capstone(3)

原文:https://www.cnblogs.com/keepmoving1113/p/11298558.html

(0)
(0)
   
举报
评论 一句话评论(0
关于我们 - 联系我们 - 留言反馈 - 联系我们:wmxa8@hotmail.com
© 2014 bubuko.com 版权所有
打开技术之扣,分享程序人生!