靶机ip:192.168.8.150
nmap扫端口
nmap -sS -Pn -A -p- -n 192.168.8.150

单单只开放了80 web服务端口
dir爆目录
小字典不够用,直接上big大字典来跑目录(用御剑也行)
dirb http://192.168.8.150/ big.txt

居然有drupal 站点,还有backup
直接访问 http://192.168.8.150/backup 可以down下一个 backup文件
直接尝试解压
unzip backup.zip

需要密码,看来里面有个 dump的数据库文件
fcrackzip跑字典爆破zip密码
fcrackzip -b -D -p rockyou.txt -u backup.zip

爆破成功,密码为: thebackup
解压后生成 dump.sql文件
翻阅该文件,发现了两个用户和密码hash
INSERT INTO `user` VALUES ('localhost','root','*7AFEAE5774E672996251E09B946CB3953FC67656','Y','Y','Y','Y','Y','Y','Y','Y','Y','Y','Y','Y','Y','Y','Y','Y','Y','Y','Y','Y','Y','Y','Y','Y','Y','Y','Y','Y','Y','','','','',0,0,0,0,'unix_socket','','N','N','',0.000000),('localhost','webman','*9AF2F8E8C08165DC70FA4B4F8D40EA6EC84CB6D2','N','N','N','N','N','N','N','N','N','N','N','N','N','N','N','N','N','N','N','N','N','N','N','N','N','N','N','N','N','','','','',0,0,0,0,'','','N','N','',0.000000);

john解hash
将上述两个密码 hash写入hash.txt中,进行john跑字典解
john --wordlist=rockyou.txt hash

解出来密码 为: moranguita
尝试登录drupal后台,两个用户都试试,只有webman能登录
所以,用户名 / 密码 为 webman / moranguita
没完成,因为靶机出现了问题
未完,待续……
靶机百度云下载
链接:https://pan.baidu.com/s/1uGPcpSzFGtGXU8tprFTmqQ
提取码:5pkh
网友评论