Violator

https://download.vulnhub.com/violator/violator.ova

靶场IP:192.168.32.194

扫描对外端口

─(root💀kali)-[/tmp]
└─# nmap -p 1-65535  -sV 192.168.32.194
Starting Nmap 7.92 ( https://nmap.org ) at 2022-08-04 23:22 EDT
Nmap scan report for 192.168.32.194
Host is up (0.00067s latency).
Not shown: 65533 closed tcp ports (reset)
PORT   STATE SERVICE VERSION
21/tcp open  ftp     ProFTPD 1.3.5rc3
80/tcp open  http    Apache httpd 2.4.7 ((Ubuntu))
MAC Address: 00:0C:29:34:9B:25 (VMware)
Service Info: OS: Unix

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 8.59 seconds

浏览器访问80端口,没有发现有用的目录。

image-20220805111921990

查找FTP漏洞

使用mod_copy模块进行利用

image-20220805142813054

获取用户字典

根据提示获取密码字典

暴力破解

使用dg账号登录FTP,并且上传shell

使用反弹shell

查看sudo列表

查看home目录

image-20220808102819113

mg目录,找到faith_and_devotion文件

aw目录,找到hint文件

af目录,找到minarke-1.21文件夹

最后更新于

这有帮助吗?