Simple

https://download.vulnhub.com/sectalks/Simple.ova

靶场IP:192.168.32.198

扫描对外端口

┌──(root💀kali)-[/tmp]
└─# nmap -p 1-65535 -sV 192.168.32.198                                                                                                                                                                                                 
Starting Nmap 7.92 ( https://nmap.org ) at 2022-09-02 05:39 EDT
Nmap scan report for 192.168.32.198
Host is up (0.00064s latency).
Not shown: 65534 closed tcp ports (reset)
PORT   STATE SERVICE VERSION
80/tcp open  http    Apache httpd 2.4.7 ((Ubuntu))
MAC Address: 00:0C:29:C5:01:28 (VMware)

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 8.70 seconds
image-20220902174056548

查找CMS版本漏洞

image-20220902174200925

创建一个帐户,更改头像,篡改请求,我们将拥有一个上传的 shell。

我们注册我们的帐户:

image-20220902174511845

我们转到配置文件选项:

image-20220902174538202

我们选择上传头像的选项:

image-20220902174703099

使用bp拦截修改后缀

image-20220902175138094

就可以看到上传成功。

image-20220902175203331

反弹shell建立成功。

image-20220902175332640

最后更新于

这有帮助吗?