[level:Medium] IClean
一 、信息收集
靶机信息
1.1 nmap扫描结果
┌──(a1ertx5s㉿kali)-[~]
└─$ nmap -Pn 10.129.99.246
Starting Nmap 7.94 ( https://nmap.org ) at 2024-04-10 22:50 CST
Nmap scan report for capiclean.htb (10.129.99.246)
Host is up (0.34s latency).
Not shown: 998 closed tcp ports (conn-refused)
PORT STATE SERVICE
22/tcp open ssh
80/tcp open http
Nmap done: 1 IP address (1 host up) scanned in 122.72 seconds1.2 url目录扫描结果
┌──(a1ertx5s㉿kali)-[~]
└─$ dirsearch -u http://capiclean.htb/
_|. _ _ _ _ _ _|_ v0.4.3
(_||| _) (/_(_|| (_| )
Extensions: php, aspx, jsp, html, js | HTTP method: GET | Threads: 25 | Wordlist size: 11460
Output File: /home/a1ertx5s/reports/http_capiclean.htb/__24-04-10_23-08-03.txt
Target: http://capiclean.htb/
[23:08:03] Starting:
[23:09:40] 200 - 5KB - /about
[23:12:01] 302 - 189B - /dashboard -> /
[23:13:22] 200 - 2KB - /login
[23:13:25] 302 - 189B - /logout -> /
[23:14:45] 403 - 278B - /server-status
[23:14:46] 403 - 278B - /server-status/
[23:14:46] 200 - 8KB - /services
Task Completed1.3 指纹信息

二、渗透过程
2.1 XSS获取管理员cookie


2.2 Flask SSTI 反弹shell






2.3 sudo提权





最后更新于