vulnhub靶机实战_DC-7

简介: 本文介绍DC-7靶机渗透测试全过程,包括靶机下载、VMware导入、网络配置、Nmap扫描发现开放80和22端口,通过信息搜集获取数据库凭证,尝试登录SSH成功,获得系统访问权限。适合网络安全学习者实践渗透流程。

一、靶机下载

  1. 靶机下载链接汇总:https://download.vulnhub.com/
  2. 使用搜索功能,搜索dc类型的靶机即可。
  3. 本次实战使用的靶机是:DC-7
  4. 系统:Debian
  5. 下载链接:https://download.vulnhub.com/dc/DC-7.zip

二、靶机启动

  1. 下载完成后,打开VMware软件,通过左上角文件打开,将ova文件导入,导入完成后将网络连接方式修改为NAT。
  2. 启动成功图

三、扫描分析

  1. 本次实践ip网段为:192.168.198.0/24 攻击机IP为:192.168.198.129
  2. 未启动靶机扫描网段
nmap -sP 192.168.198.0/24
# 结果
┌──(root㉿kali)-[/home/varin]
└─# nmap -sP 192.168.198.0/24
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-08-08 10:12 CST
Nmap scan report for 192.168.198.1
Host is up (0.0094s latency).
MAC Address: 00:50:56:C0:00:08 (VMware)
Nmap scan report for 192.168.198.2
Host is up (0.00016s latency).
MAC Address: 00:50:56:F7:F2:9C (VMware)
Nmap scan report for 192.168.198.254
Host is up (0.00019s latency).
MAC Address: 00:50:56:F0:9B:51 (VMware)
Nmap scan report for 192.168.198.129
Host is up.
Nmap done: 256 IP addresses (4 hosts up) scanned in 2.39 seconds

  1. 启动靶机扫描网段
  1. 得到靶机IP:192.168.198.137
nmap -sP 192.168.198.0/24
# 结果
┌──(root㉿kali)-[/home/varin]
└─# nmap -sP 192.168.198.0/24
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-08-08 16:06 CST
Nmap scan report for 192.168.198.1
Host is up (0.00079s latency).
MAC Address: 00:50:56:C0:00:08 (VMware)
Nmap scan report for 192.168.198.2
Host is up (0.00021s latency).
MAC Address: 00:50:56:F7:F2:9C (VMware)
Nmap scan report for 192.168.198.137
Host is up (0.00034s latency).
MAC Address: 00:0C:29:9D:C5:A2 (VMware)
Nmap scan report for 192.168.198.254
Host is up (0.00018s latency).
MAC Address: 00:50:56:F0:9B:51 (VMware)
Nmap scan report for 192.168.198.129
Host is up.
Nmap done: 256 IP addresses (5 hosts up) scanned in 2.70 seconds

  1. 对ip进行详细扫描
  1. 开放端口:22、80
  2. 开放服务:SSH、HTTP
  3. web框架:
nmap -A -v -p 1-65535 192.168.198.137 --script=vuln
# 结果
┌──(root㉿kali)-[/home/varin]
└─# nmap -A -v -p 1-65535 192.168.198.137 --script=vuln
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-08-08 16:07 CST
NSE: Loaded 150 scripts for scanning.
NSE: Script Pre-scanning.
Initiating NSE at 16:07
Stats: 0:00:08 elapsed; 0 hosts completed (0 up), 0 undergoing Script Pre-Scan
NSE: Active NSE Script Threads: 1 (1 waiting)
NSE Timing: About 0.00% done
NSE Timing: About 33.33% done; ETC: 16:09 (0:01:08 remaining)
Completed NSE at 16:08, 34.06s elapsed
Initiating NSE at 16:08
Completed NSE at 16:08, 0.00s elapsed
Pre-scan script results:
| broadcast-avahi-dos:
|   Discovered hosts:
|     224.0.0.251
|   After NULL UDP avahi packet DoS (CVE-2011-1002).
|_  Hosts are all up (not vulnerable).
Initiating ARP Ping Scan at 16:08
Scanning 192.168.198.137 [1 port]
Completed ARP Ping Scan at 16:08, 0.05s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 16:08
Completed Parallel DNS resolution of 1 host. at 16:08, 0.01s elapsed
Initiating SYN Stealth Scan at 16:08
Scanning 192.168.198.137 [65535 ports]
Discovered open port 80/tcp on 192.168.198.137
Discovered open port 22/tcp on 192.168.198.137
Completed SYN Stealth Scan at 16:08, 5.45s elapsed (65535 total ports)
Initiating Service scan at 16:08
Scanning 2 services on 192.168.198.137
Completed Service scan at 16:08, 24.76s elapsed (2 services on 1 host)
Initiating OS detection (try #1) against 192.168.198.137
NSE: Script scanning 192.168.198.137.
Initiating NSE at 16:08
Completed NSE at 16:10, 114.87s elapsed
Initiating NSE at 16:10
Completed NSE at 16:10, 0.04s elapsed
Nmap scan report for 192.168.198.137
Host is up (0.0033s latency).
Not shown: 65533 closed tcp ports (reset)
PORT   STATE SERVICE VERSION
22/tcp open  ssh     OpenSSH 7.4p1 Debian 10+deb9u6 (protocol 2.0)
80/tcp open  http    Apache httpd 2.4.25 ((Debian))
|_http-dombased-xss: Couldn't find any DOM based XSS.
| http-csrf:
| Spidering limited to: maxdepth=3; maxpagecount=20; withinhost=192.168.198.137
|   Found the following possible CSRF vulnerabilities:
|
|     Path: http://192.168.198.137:80/
|     Form id: search-block-form
|     Form action: /search/node
|
|     Path: http://192.168.198.137:80/search/node
|     Form id: search-form
|     Form action: /search/node
|
|     Path: http://192.168.198.137:80/search/node
|     Form id: search-block-form
|     Form action: /search/node
|
|     Path: http://192.168.198.137:80/node/1
|     Form id: search-block-form
|     Form action: /search/node
|
|     Path: http://192.168.198.137:80/user/login
|     Form id: user-login-form
|     Form action: /user/login
|
|     Path: http://192.168.198.137:80/user/login
|     Form id: search-block-form
|     Form action: /search/node
|
|     Path: http://192.168.198.137:80/search/node
|     Form id: search-form
|     Form action: /search/node
|
|     Path: http://192.168.198.137:80/search/node
|     Form id: search-block-form
|     Form action: /search/node
|
|     Path: http://192.168.198.137:80/search/node/help
|     Form id: search-block-form
|     Form action: /search/node
|
|     Path: http://192.168.198.137:80/search/node
|     Form id: search-form
|     Form action: /search/node
|
|     Path: http://192.168.198.137:80/search/node
|     Form id: search-block-form
|     Form action: /search/node
|
|     Path: http://192.168.198.137:80/node/
|     Form id: search-block-form
|     Form action: /search/node
|
|     Path: http://192.168.198.137:80/user/login
|     Form id: user-login-form
|     Form action: /user/login
|
|     Path: http://192.168.198.137:80/user/login
|     Form id: search-block-form
|     Form action: /search/node
|
|     Path: http://192.168.198.137:80/user/password
|     Form id: user-pass
|     Form action: /user/password
|
|     Path: http://192.168.198.137:80/user/password
|     Form id: search-block-form
|     Form action: /search/node
|
|     Path: http://192.168.198.137:80/search/node/
|     Form id: search-form
|     Form action: /search/node/
|
|     Path: http://192.168.198.137:80/search/node/
|     Form id: search-block-form
|_    Form action: /search/node
|_http-server-header: Apache/2.4.25 (Debian)
|_http-stored-xss: Couldn't find any stored XSS vulnerabilities.
| http-enum:
|   /rss.xml: RSS or Atom feed
|   /robots.txt: Robots file
|   /INSTALL.txt: Drupal file
|   /: Drupal version 8
|_  /README.txt: Interesting, a readme.
MAC Address: 00:0C:29:9D:C5:A2 (VMware)
Device type: general purpose
Running: Linux 3.X|4.X
OS CPE: cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4
OS details: Linux 3.2 - 4.9
Uptime guess: 0.304 days (since Thu Aug  8 08:53:28 2024)
Network Distance: 1 hop
TCP Sequence Prediction: Difficulty=261 (Good luck!)
IP ID Sequence Generation: All zeros
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
TRACEROUTE
HOP RTT     ADDRESS
1   3.33 ms 192.168.198.137
NSE: Script Post-scanning.
Initiating NSE at 16:10
Completed NSE at 16:10, 0.00s elapsed
Initiating NSE at 16:10
Completed NSE at 16:10, 0.00s elapsed
Read data files from: /usr/bin/../share/nmap
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 186.00 seconds
           Raw packets sent: 65558 (2.885MB) | Rcvd: 65550 (2.623MB)

四、网站首页

五、SQLMAP

# 首页有搜索框尝试sqlmap注入
sqlmap -u http://192.168.198.137/search/node?keys=ff --dbs
# 结果:注入失败

六、@DC7USER

# 因为注入不了,网页也没有什么东西,观察有一个@DC7 USER 
# 尝试使用google搜索
# 发现github项目有叫这个名称的

# 点击后发现是PHP项目
# 查看项目配置文件
# 数据库用户名:dc7user
# 数据库密码:MdR3xOgB7#dW
# 数据库名称:Staff
<?php
  $servername = "localhost";
  $username = "dc7user";
  $password = "MdR3xOgB7#dW";
  $dbname = "Staff";
  $conn = mysqli_connect($servername, $username, $password, $dbname);
?>

七、MYSQL登录尝试

# 数据库用户名:dc7user
# 数据库密码:MdR3xOgB7#dW
# 结果:登录失败

八、SSH登录尝试

# 因为在信息扫描时,发现存在ssh服务,mysql登录不上,尝试ssh登录
# ip:192.168.198.137
# 用户名:dc7user
# 密码:MdR3xOgB7#dW
# 结果:登录成功

# 登录后信息收集
# 一个文件一个文件夹
mbox文件
backups文件夹
# 文件夹中有两个文件:
website.sql.gpg
website.tar.gz.gpg
# gpg文件:

目录
相关文章
|
5月前
|
SQL Shell 网络安全
vulnhub靶机实战_DC-8
本文介绍DC-8靶机渗透全过程,涵盖环境搭建、信息扫描、SQL注入、密码爆破、反向Shell获取及提权。利用sqlmap与john工具破解用户凭据,通过Web表单执行命令并获取root权限,最终读取flag完成渗透测试。
618 0
|
5月前
|
中间件 测试技术 应用服务中间件
vulnhub靶机实战_DC-5
本教程介绍如何下载并配置DC-5靶机进行安全测试。内容包括靶机下载链接、VMware导入步骤、网络设置及Nmap扫描分析,帮助快速搭建渗透测试环境。
291 0
|
5月前
|
存储 安全 Shell
vulnhub靶机实战_DC-4
本文介绍了DC-4靶机渗透测试的完整过程,包括靶机下载、环境搭建、信息扫描、漏洞利用、提权以及最终获取flag的详细步骤。通过使用工具如nmap、Hydra进行端口扫描与密码爆破,结合反向Shell与teehee命令实现权限提升,最终成功获取系统flag。内容详实,适合网络安全学习与实践。
811 0
vulnhub靶机实战_DC-4
BOSHIDA DC/AC电源模块的节能特点与环保优势
BOSHIDA DC/AC电源模块的节能特点与环保优势
BOSHIDA DC/AC电源模块的节能特点与环保优势
|
5月前
|
机器学习/深度学习 新能源 C++
【三相AC-DC-AC PWM变换器】基于三相PWM VSC的电源供应SimPowerSystems模型研究(Simulink仿真实现)
【三相AC-DC-AC PWM变换器】基于三相PWM VSC的电源供应SimPowerSystems模型研究(Simulink仿真实现)
202 6
DC/AC电源模块为现代电子设备提供稳定的能源
DC/AC电源模块为现代电子设备提供稳定的能源
 DC/AC电源模块为现代电子设备提供稳定的能源
DC/AC电源模块:让电力转换变得更简单
DC/AC电源模块:让电力转换变得更简单
DC/AC电源模块:让电力转换变得更简单
BOSHIDA 使用DC/AC电源模块时需要注意的事项
BOSHIDA 使用DC/AC电源模块时需要注意的事项
226 14
BOSHIDA  使用DC/AC电源模块时需要注意的事项
DC/AC电源模块在工业科技中重要的作用
DC/AC电源模块在工业科技中发挥着重要的作用
DC/AC电源模块在工业科技中重要的作用
|
芯片 网络架构
开关电源DC-DC电源应用
DC-DC指直流转直流电源(Direct Current)。是一种在直流电路中将一个电压值的电能变为另一个电压值的电能的装置。如,通过一个转换器能将一个直流电压(5.0V)转换成其他的直流电压(1.5V或12.0V),我们称这个转换器为DC-DC转换器,或称之为开关电源或开关调整器。 DC-DC转换器一般由控制芯片,电感线圈,二极管,三极管,电容器构成。在讨论DC-DC转换器的性能时,如果单针对控制芯片,是不能判断其优劣的。其外围电路的元器件特性,和基板的布线方式等,能改变电源电路的性能,因此,应进行综合判断。 DC-DC转换器的使用有利于简化电源电路设计,缩短研制周期,实现最佳指标等,被
310 5

热门文章

最新文章