HackMyVm T800 Walkthrough (X11 forwarding through ssh, conky)

https://hackmyvm.eu/machines/machine.php?vm=T800Very interesting machine, I have to spend whole day learning how to doX11 forwarding and how to config conky, in order to solve it.Scan ports first.Scan port 80, at /index.html, found username "ruu

Vulnhub Bluemoon 2021 Walkthrough

https://www.vulnhub.com/entry/bluemoon-2021,679/Simple and straightforward one.Scan ports.Scan port 80, check hidden_text file.Decrypt the png to text,get username and password of ftp.Login ftp, download information.txt, find username robin, and a pa

HackMyVm Eighty Walkthrough

https://hackmyvm.eu/machines/machine.php?vm=EightyInteresting machine, thanks sML@HackMyVm.Scan ports.Port 80 is unavailable right now. Port 70 is not http, but gopher (which is not familiar).We can use firefox to visit port 70. Also, we can use &quo

HackMyVm Eyes Walkthrough

https://hackmyvm.eu/machines/machine.php?vm=EyesScan ports.Log in ftp as anonymous, and get index.php.Check the source code of index.php, has LFI.<?php $file = $_GET['fil3']; if(isset($file)) { include($file); } else { pr

Vulnhub hacksudo:3 Walkthrough

https://www.vulnhub.com/entry/hacksudo-3,671/Scan port 80, find a lot php files. Most of them are rabbit holes.Get code injecting through fuzzing generator.php.Then we can upload a php shell, and  get reverse shell. In /var/www, find a file name

Vulnhub hacksudo:2 Walkthrough

https://www.vulnhub.com/entry/hacksudo-2-hackdudo,667/Scan ports.Scan port 80.Info.php is phpinfo, file.php has LFI vunerability.Use pwn code to get a cmd shell.https://raw.githubusercontent.com/vulhub/vulhub/master/php/inclusion/exp.pyCheck if the s

HackMyVm Superhuman Walkthrough

https://hackmyvm.eu/machines/machine.php?vm=SuperhumanScan port 80 with big dic.┌──(kali㉿mykali)-[~/Documents/superhuman] └─$ gobuster dir -u http://192.168.56.95  -t 50  -w /usr/share/dirbuster/word

Vulnhub ColddWorld: Immersion Walkthrough

https://www.vulnhub.com/entry/colddworld-immersion,668/easy one.Scan port 80. Find a login page at /login.Check source code, find a hint. From the hint, we know username and maybe the page has LFI.Check LFI with burpsuite.Get carls.txt, decode base64
<< < 1 2 >>
«    2021年4月    »
1234
567891011
12131415161718
19202122232425
2627282930
网站分类
搜索
最新留言
文章归档
网站收藏
  • 订阅本站的 RSS 2.0 新闻聚合

Powered By Z-BlogPHP 1.7.3