Loly
https://download.vulnhub.com/loly/Loly.ova
靶场IP:192.168.2.136
扫描对外端口服务
┌──(root💀kali)-[~]
└─# nmap -p1-65535 -sV 192.168.2.136
Starting Nmap 7.91 ( https://nmap.org ) at 2022-09-06 09:55 EDT
Nmap scan report for 192.168.2.136
Host is up (0.00058s latency).
Not shown: 65534 closed ports
PORT STATE SERVICE VERSION
80/tcp open http nginx 1.10.3 (Ubuntu)
MAC Address: 00:0C:29:24:CB:0B (VMware)
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 8.22 seconds
浏览器访问80端口

爆破web目录

需要配置本地hosts


枚举wordpress用户
爆破密码
我看到我们安装了一个名为"AdRotate"的插件,我们可以在其中上传 zip 文件。


访问反弹shell
查看wp-config.php配置文件
切换到loly用户
使用CVE-2017-16995进行提权。
最后更新于
这有帮助吗?