先理清思路
· 网络扫描
· 方法一:利用MongoDB进行入侵
· 查看robots.txt
· 通过浏览器利用MongoDB
· 获取凭证
· SSH登录
· 查看内核版本
· 内核提权
· 拿到root shell
关键词
robots.txt
关键词
robots.txt
一、信息收集
192.168.0.159


二、各种扫描
1.****主机扫描 -->Apache/2.4.7 (Ubuntu) Server at 192.168.0.159 Port 80 PHP 5.5.9
2.****端口扫描 -->445

看看开启的服务,然后尝试测试一下看看
a.ftp

b.
3.****路由扫描 -->192.168.0.159

4.****后台扫描 -->




查看表




Uer:tomcat pwd:tomacat

设置好参数,run

拿到Shell,下一步是提权

网友评论