这次的靶机是vulnhub靶机:SecTalks: BNE0x03 - Simple
靶机地址及相关描述
靶机地址
https://www.vulnhub.com/entry/sectalks-bne0x03-simple,141/
靶机描述
Simple CTF
Simple CTF is a boot2root that focuses on the basics of web based hacking. Once you load the VM, treat it as a machine you can see on the network, i.e. you don’t have physical access to this machine. Therefore, tricks like editing the VM’s BIOS or Grub configuration are not allowed. Only remote attacks are permitted. /root/flag.txt is your ultimate goal.
I suggest you use VirtualBox or VMWare Player with a Host Only adapter. The VM will assign itself an IP address through DHCP.
Location
https://www.dropbox.com/s/9spf5m9l87zjlps/Simple.ova?dl=0 [File size: 600MB]
Hints
- Get a user shell by uploading a reverse shell and executing it.
- A proxy may help you to upload the file you want, rather than the
file that the server expects. - There are 3 known privesc exploits that work. Some people have had
trouble executing one of them unless it was over a reverse shell
using a netcat listener.
Contact @RobertWi

本文介绍了如何攻破Vulnhub上的SecTalks BNE0x03靶机,重点在于web基础攻击。通过信息收集,发现了CMS系统Cutephp,利用文件上传漏洞获取了用户shell,接着针对内核版本进行提权,最终达到目标。提权过程虽然艰难,但提供了宝贵的学习经验。
最低0.47元/天 解锁文章
932

被折叠的 条评论
为什么被折叠?



