Loly

https://download.vulnhub.com/loly/Loly.ova

靶场IP:192.168.2.136

扫描对外端口服务

┌──(root💀kali)-[~]
└─# nmap -p1-65535 -sV 192.168.2.136                                                                                                                                                                                               
Starting Nmap 7.91 ( https://nmap.org ) at 2022-09-06 09:55 EDT
Nmap scan report for 192.168.2.136
Host is up (0.00058s latency).
Not shown: 65534 closed ports
PORT   STATE SERVICE VERSION
80/tcp open  http    nginx 1.10.3 (Ubuntu)
MAC Address: 00:0C:29:24:CB:0B (VMware)
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 8.22 seconds

浏览器访问80端口

image-20220906215926885

爆破web目录

image-20220906220003026

需要配置本地hosts

image-20220906220031942
image-20220906220122590

枚举wordpress用户

爆破密码

我看到我们安装了一个名为"AdRotate"的插件,我们可以在其中上传 zip 文件。

image-20220906220850297
image-20220906221157615

访问反弹shell

查看wp-config.php配置文件

切换到loly用户

使用CVE-2017-16995进行提权。

最后更新于

这有帮助吗?