hack the box注册方法:https://blog.csdn.net/Kevinhanser/article/details/84723103
![](https://img.haomeiwen.com/i17109564/5de16ec0609d8e8c.png)
First Blood:
![](https://img.haomeiwen.com/i17109564/42250fe86a5be24c.png)
直接上御剑跑目录:
扫描php:
![](https://img.haomeiwen.com/i17109564/2716c20733d2e488.png)
访问获取到的路径:
![](https://img.haomeiwen.com/i17109564/3ea9e3c0ea674706.png)
此时就需要进行模糊测试参数名称了,上使用OWASP DirBuster 1.0:
![](https://img.haomeiwen.com/i17109564/7a40db43f6bd45be.png)
得到结果参数名为reset,随便传一个reset=1:
![](https://img.haomeiwen.com/i17109564/2c44ebf55ca68ac3.png)
继续爆破rest,最后得到reset=20:
![](https://img.haomeiwen.com/i17109564/e81ffe621f7e4bba.png)
Second Blood:
![](https://img.haomeiwen.com/i17109564/0286eb5e484c7442.png)
查看源码,发现:
![](https://img.haomeiwen.com/i17109564/2e19df3fab79c79d.png)
访问:http://docker.hackthebox.eu:31649/portfolio.php?id=1
![](https://img.haomeiwen.com/i17109564/aa60cf51069caead.png)
http://docker.hackthebox.eu:31649/portfolio.php?id=1and 1=1回显正常;
http://docker.hackthebox.eu:31649/portfolio.php?id=1and 1=2回显错误;(证明为整型sql注入)
http://docker.hackthebox.eu:31649/portfolio.php?id=1union select 1,2,3有回显位;
![](https://img.haomeiwen.com/i17109564/65a872e620deb034.png)
数据库名为freelancer,表名为safeadmin
![](https://img.haomeiwen.com/i17109564/b30bfa6bd65fae91.png)
![](https://img.haomeiwen.com/i17109564/2102cad4bea9026a.png)
username列:
![](https://img.haomeiwen.com/i17109564/3852f2f0ce613551.png)
爆破出password列:
![](https://img.haomeiwen.com/i17109564/a44ff86c48dcbda7.png)
使用 OWASP DirBuster 1.0:进行目录爆破,得到/administrat(输入之前爆出的账号密码错误!!)
![](https://img.haomeiwen.com/i17109564/24f7d840bde21521.png)
![](https://img.haomeiwen.com/i17109564/9e2a412950e6485d.png)
这里尝试继续探测/administrat下的目录,发现还存在panel.php。尝试访问,发现是302跳转到index.php。
用sqlmap的file-read功能:--file-read=/var/www/html/administrat/panel.php
将文件成功下载:
![](https://img.haomeiwen.com/i17109564/d8ca45beb886f779.png)
查看文件,得到flag:
![](https://img.haomeiwen.com/i17109564/44b12ee4cb583a14.png)
CTF是一个有趣的东西,希望每天都能进步一点点,持续更新ing!!!
网友评论