Glasglow 1.1

https://download.vulnhub.com/glasgowsmile/GlasgowSmile-v1.1.zip

靶场IP:192.168.32.222

扫描对外端口服务

┌──(root💀kali)-[~]
└─# nmap -p 1-65535 -sV  192.168.32.222
Starting Nmap 7.92 ( https://nmap.org ) at 2022-09-10 10:00 EDT
Nmap scan report for 192.168.32.222
Host is up (0.00036s latency).
Not shown: 65533 closed tcp ports (reset)
PORT   STATE SERVICE VERSION
22/tcp open  ssh     OpenSSH 7.9p1 Debian 10+deb10u2 (protocol 2.0)
80/tcp open  http    Apache httpd 2.4.38 ((Debian))
MAC Address: 00:0C:29:96:C2:2B (VMware)
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 11.92 seconds

访问80端口

image-20220910220047299

爆破目录

访问:/joomla

image-20220910232218861

使用" joomscan "并列出版本、有趣的目录、备份文件或可以帮助我们识别某些漏洞的东西了。

抓取密码单词

使用bp暴力破解,找到密码:Gotham

image-20220910233546867
image-20220910233643006

我直接修改了文件" index.php "并将" pentestmonkey "的webshell的代码。

image-20220910233904635

分析 Joomla 配置文件将揭示数据库连接细节:

让我们使用凭据连接到数据库并列出我们可以访问的数据库:

有趣的是,用户不仅可以访问 Joomla 数据库,还可以batjoke

taskforce表包含具有 base64 编码密码的潜在用户列表。解码后,将生成以下列表:

name
password (base64)
password (clear)

Bane

YmFuZWlzaGVyZQ==

baneishere

Aaron

YWFyb25pc2hlcmU=

aaronishere

Carnage

Y2FybmFnZWlzaGVyZQ==

carnageishere

buster

YnVzdGVyaXNoZXJlZmY=

busterishereff

rob

Pz8/QWxsSUhhdmVBcmVOZWdhdGl2ZVRob3VnaHRzPz8/

???AllIHaveAreNegativeThoughts???

aunt

YXVudGlzIHRoZSBmdWNrIGhlcmU=

auntis the fuck here

切换到rob

base64解码:

切换到abner

最后更新于