Kioptrix1.3
00 min
2024-8-25

Scan


notion image
target machine 192.168.56.107

TCP result

notion image
22
ssh
80
http
139
netbios-ssn
445
netbios-ssn

UDP

notion image

80 / HTTP

Direct access
notion image
after try admin/admin
notion image
try brute force the path
notion image
notion image
we can find that there are four directory path can listable, so just see what inside

*/images

notion image
this path store the image that in index.php, try download it and see any more info
notion image
many information but no one we are interested in.

*/database.sql

notion image
the table save user’s info.

*/Username

notion image
notion image
we can see the file name is john.php, so we can assume that is a actually website.
but it turns us to index page, so let download it and have a look.
notion image
this look so similar with index page, in addition the file we downloaded name index.php, so it maybe we need to login to it first.
Back to the index.php, for investigation just now, we have a guess that is maybe have a user names john, so we can use brute force to get his password if we are luck.
after a day, it seems not the right way. but i have anther found, we can SQLI in password from, like this:
notion image
notion image
but it return it is not a vaild mysql, my query is ‘ or 1=1 and i found that it will warning you when you use , but if '' or \' , so i guess two possibilities
  1. There has no 'so it will error.
  1. The script change 'to something else, but i have no idea that how to identify the changed.
I had tried these two ways, but it dose not work.

Hit 1

 
so, the answer is 'or'1'=' , we just need to use ' to cover connect symbol, why i can’t thought about it….
the page we login shows like this
notion image
we have his password in writing.
let try use it in SSH

SSH

notion image
yes, we can login but seems different with normal ssh
notion image
we only can access this path which is current we are.
let try other one robert
notion image
same
 
上一篇
Target Mechine WriteUP
下一篇
AZ-900