1. Information Gathering
![](https://blog.kakaocdn.net/dn/mGwlA/btrWRyzUzbT/5XHgL6304HkKawYDWaL6p1/img.png)
![](https://blog.kakaocdn.net/dn/yZtfd/btrWRzZS7iP/YBiFP3pMQXoQSdTVJdhAz1/img.png)
![](https://blog.kakaocdn.net/dn/bVSUqL/btrWS1OVJl5/NKAEJyXsElaYgW3YCDpebk/img.png)
![](https://blog.kakaocdn.net/dn/APJxW/btrWQXfTvyq/O3uVZBxMSmexcmXii7Vzi0/img.png)
![](https://blog.kakaocdn.net/dn/ZJczb/btrWWsZg3nj/spNQTKxbbRAy6RSeOBOw50/img.png)
![](https://blog.kakaocdn.net/dn/bYTzCv/btrWQLmokTZ/2V8e2qbhSDDcabheFARaCk/img.png)
: tripathproject
- dirb
![](https://blog.kakaocdn.net/dn/KeboX/btrWU8teig7/yo0lBkwxvsV6t8D14bCDak/img.png)
: admin
![](https://blog.kakaocdn.net/dn/bBKOht/btrWWsLKseD/yqHKurFkUHTsqwHUuXWMEk/img.png)
: 시도 횟수 제한 있음!
- gobuster
![](https://blog.kakaocdn.net/dn/bWeiF4/btrWU8zZGRC/c1nKyil4eIoNx0hIBxrd6K/img.png)
![](https://blog.kakaocdn.net/dn/bGABcJ/btrWQKOxNw8/ezmQpLG8LdUNNmTfeETQgK/img.png)
![](https://blog.kakaocdn.net/dn/b8rmZa/btrWQJa9gUy/vp2wrXWaPQQBkS2KLykVe0/img.png)
![](https://blog.kakaocdn.net/dn/csbKZ5/btrWRQ1nlBn/gNlq93p542TsqKEkcwHZs0/img.png)
- 다시 로그인 시도
![](https://blog.kakaocdn.net/dn/eg6mol/btrWR8nbObh/q1QpeiJKdqty9nuWZVA7Q1/img.png)
: 성공!
2. Exploitation
- ssh 로그인 시도
![](https://blog.kakaocdn.net/dn/DB2i6/btrWUc3HUtU/vgYZE5pjnhmIOMRIJlxD7K/img.png)
: 실패
- hydra 돌려두고 진행
![](https://blog.kakaocdn.net/dn/TqV8p/btrWVLSbMr4/2I6NGIPx9FuSnkK7ojjzpk/img.png)
- 서비스 정보 확인
![](https://blog.kakaocdn.net/dn/KDzKQ/btrWUIuEN4k/7U3x5omqiQ3zClb92DeBGk/img.png)
![](https://blog.kakaocdn.net/dn/ZR7Jn/btrWRQfZgXL/hOqZRIL5qS9dIMtSZSZojK/img.png)
: id 파라미터에 sql 취약점이 존재한다고 하는데
- sql 취약점 확인
![](https://blog.kakaocdn.net/dn/bhjYJB/btrWQ4MMn0P/2dRgh3KlwifhKho9zctp0K/img.png)
: Time based 되고
![](https://blog.kakaocdn.net/dn/MYDYt/btrWRkPji6p/KRwK28uMkxvFBiCCkPURu0/img.png)
: union query도 됨!
시험에서는 SQLmap
사용이 안 되니 패스!
- 처음에 디렉터리 찾을 때
간과하고 넘어간 경로가 있는데
: dirb
![](https://blog.kakaocdn.net/dn/lrjFV/btrWSvifwNh/HkKK8j2UqIXOHp4kyCPMd0/img.png)
: admin/logs
- 들어가 보면
![](https://blog.kakaocdn.net/dn/GU60E/btrWQXGYTl4/yoCKxqfvSUMqkPSE2tMWQK/img.png)
: P@$$w0rd@123
- ssh
![](https://blog.kakaocdn.net/dn/VWB3k/btrWS3eRtNs/8bLYmhP9AKUG2iT8IkvEEK/img.png)
침투 성공!
더 꼼꼼히 봐라!
3. Privilege Escalation
![](https://blog.kakaocdn.net/dn/bnDXmL/btrWQ4srJfL/tZCAylQcB1eLk5azXodSl0/img.png)
![](https://blog.kakaocdn.net/dn/Hm7y6/btrWUHoXFoi/DDX8FZBIL35T0xhbSEnUY1/img.png)
- Serv-U/Serv-U
![](https://blog.kakaocdn.net/dn/oSA1u/btrWRV9li5i/kwcl7Gor0v98EJTXUqVVRk/img.png)
![](https://blog.kakaocdn.net/dn/cjarI7/btrWTLkTB79/vy4JXjbHj7y5I3lJDfJQr1/img.png)
Root!
728x90
'OSCP > Vulnahub' 카테고리의 다른 글
[+] Torment (0) | 2023.01.22 |
---|---|
[+] Keyring (0) | 2023.01.22 |
[+] VENOM (0) | 2023.01.21 |
[+] DigitalWorld.local : FALL (SSH id_rsa) (0) | 2023.01.21 |
[+] WinterMute (Pivoting - 중요)* (0) | 2023.01.21 |