HackMyVm T800 Walkthrough (X11 forwarding through ssh, conky)

https://hackmyvm.eu/machines/machine.php?vm=T800Very interesting machine, I have to spend whole day learning how to doX11 forwarding and how to config conky, in order to solve it.Scan ports first.Scan port 80, at /index.html, found username "ruu

Vulnhub Bluemoon 2021 Walkthrough

https://www.vulnhub.com/entry/bluemoon-2021,679/Simple and straightforward one.Scan ports.Scan port 80, check hidden_text file.Decrypt the png to text,get username and password of ftp.Login ftp, download information.txt, find username robin, and a pa

HackMyVm Eighty Walkthrough

https://hackmyvm.eu/machines/machine.php?vm=EightyInteresting machine, thanks sML@HackMyVm.Scan ports.Port 80 is unavailable right now. Port 70 is not http, but gopher (which is not familiar).We can use firefox to visit port 70. Also, we can use &quo

HackMyVm Eyes Walkthrough

https://hackmyvm.eu/machines/machine.php?vm=EyesScan ports.Log in ftp as anonymous, and get index.php.Check the source code of index.php, has LFI.<?php $file = $_GET['fil3']; if(isset($file)) { include($file); } else { pr

Vulnhub hacksudo:3 Walkthrough

https://www.vulnhub.com/entry/hacksudo-3,671/Scan port 80, find a lot php files. Most of them are rabbit holes.Get code injecting through fuzzing generator.php.Then we can upload a php shell, and  get reverse shell. In /var/www, find a file name

Vulnhub hacksudo:2 Walkthrough

https://www.vulnhub.com/entry/hacksudo-2-hackdudo,667/Scan ports.Scan port 80.Info.php is phpinfo, file.php has LFI vunerability.Use pwn code to get a cmd shell.https://raw.githubusercontent.com/vulhub/vulhub/master/php/inclusion/exp.pyCheck if the s

HackMyVm Superhuman Walkthrough

https://hackmyvm.eu/machines/machine.php?vm=SuperhumanScan port 80 with big dic.┌──(kali㉿mykali)-[~/Documents/superhuman] └─$ gobuster dir -u http://192.168.56.95  -t 50  -w /usr/share/dirbuster/word

Vulnhub ColddWorld: Immersion Walkthrough

https://www.vulnhub.com/entry/colddworld-immersion,668/easy one.Scan port 80. Find a login page at /login.Check source code, find a hint. From the hint, we know username and maybe the page has LFI.Check LFI with burpsuite.Get carls.txt, decode base64

Vulnhub SecureCode:1 Walkthrough (An OSWE-like machine)

https://www.vulnhub.com/entry/securecode-1,651/Because there is POC code at the end of the blog, so the walkthrough will be simple.Scan ports, only find 80.Scan port 80, with extension .zip.Download source_code.zip, unzip it, and analyse the source c

Vulnhub XPTO System: 1 Walkthrough

https://www.vulnhub.com/entry/xpto-system-1,635/Scan ports, 80 and 1337(ssh) are open.Nmap told us there is ".git" folder, then I use GitTools, but get nothing useful.We continue to scan port 80.Check source code of login.php, we notice the
<< < 3 4 5 6 7 8 9 10 11 12 > >>
«    2022年5月    »
1
2345678
9101112131415
16171819202122
23242526272829
3031
网站分类
搜索
最新留言
文章归档
网站收藏
  • 订阅本站的 RSS 2.0 新闻聚合

Powered By Z-BlogPHP 1.7.2