HTB:Ignition[WriteUP]

目录

连接至HTB服务器并启动靶机

[1.Which service version is found to be running on port 80?](#1.Which service version is found to be running on port 80?)

[2.What is the 3-digit HTTP status code returned when you visit http://{machine IP}/?](#2.What is the 3-digit HTTP status code returned when you visit http://{machine IP}/?)

[3.What is the virtual host name the webpage expects to be accessed by?](#3.What is the virtual host name the webpage expects to be accessed by?)

[4.What is the full path to the file on a Linux computer that holds a local list of domain name to IP address pairs?](#4.What is the full path to the file on a Linux computer that holds a local list of domain name to IP address pairs?)

[5.Use a tool to brute force directories on the webserver. What is the full URL to the Magento login page?](#5.Use a tool to brute force directories on the webserver. What is the full URL to the Magento login page?)

[6.Look up the password requirements for Magento and also try searching for the most common passwords of 2023. Which password provides access to the admin account?](#6.Look up the password requirements for Magento and also try searching for the most common passwords of 2023. Which password provides access to the admin account?)

​编辑ROOT_FLAG:797d6c988d9dc5865e010b9410f247e0


连接至HTB服务器并启动靶机

靶机IP:10.129.1.27

分配IP:10.10.16.12


1.Which service version is found to be running on port 80?

使用nmap 对靶机80端口进行脚本、服务信息扫描:

复制代码
nmap -sC -sV -p 80 {TARGET_IP}

nmap 扫描结果可见,在VERSION 栏目下的服务版本为:nginx 1.14.2


2.What is the 3-digit HTTP status code returned when you visit http://{machine IP}/?

使用curl 对靶机URL进行访问,使用**-i**参数使输出包含响应头

由curl输出结果可见,访问靶机HTTP地址响应状态码:302


3.What is the virtual host name the webpage expects to be accessed by?

直接使用浏览器对靶机URL:**http://{TARGET_IP}**进行访问:

或者使用curl 中的**-v** 参数再次访问http://{TARGET_IP}

发现被重定向到了:ignition.htb


4.What is the full path to the file on a Linux computer that holds a local list of domain name to IP address pairs?

我们这里尝试修改本地hosts文件,使该域名从本地解析

hosts文件通常默认路径为:/etc/hosts

使用vim打开hosts文件:

复制代码
vim /etc/hosts

在文件中添加一行:{TARGET_IP} ignition.htb

或者直接在命令行中输入,表示将改行字符串追加进hosts中:

复制代码
echo '{TARGET_IP} ignition.htb' >> /etc/hosts

5.Use a tool to brute force directories on the webserver. What is the full URL to the Magento login page?

再次使用浏览器对ignition.htb进行访问,发现已经正常显示页面:

我这里使用gobuster对该域名进行目录爆破:

复制代码
gobuster dir --url http://ignition.htb --wordlist /usr/share/wordlists/dirbuster/directory-list-2.3-small.txt

使用浏览器尝试对**/admin** 进行访问:

可以成功进入后台登录界面,完整路径:http://ignition.htb/admin


6.Look up the password requirements for Magento and also try searching for the most common passwords of 2023. Which password provides access to the admin account?

随便抓一个AI来问一下magento 的最短密码长度,发现是7 位,而且默认开启登录限制的

这道题最后我也是通过看了官方WP知道是弱口令猜解:

账户:admin

密码:qwerty123

进入后台面板:

ROOT_FLAG:797d6c988d9dc5865e010b9410f247e0

相关推荐
小张的博客之旅15 分钟前
宁波市第八届网络安全大赛初赛(REVERSE-Writeup)
学习·网络安全·reverse
athink_cn20 小时前
HTTP/2新型漏洞“MadeYouReset“曝光:可发动大规模DoS攻击
网络·网络协议·安全·http·网络安全
小韩博1 天前
metasploit 框架安装更新遇到无法下载问题如何解决
linux·网络安全·公钥·下载失败
合作小小程序员小小店1 天前
SDN安全开发环境中常见的框架,工具,第三方库,mininet常见指令介绍
python·安全·生成对抗网络·网络安全·网络攻击模型
Whoami!2 天前
2-3〔O҉S҉C҉P҉ ◈ 研记〕❘ 漏洞扫描▸AppScan(WEB扫描)
网络安全·信息安全·appscan·oscp
Bruce_Liuxiaowei2 天前
跨站脚本攻击(XSS)高级绕过技术与防御方案
前端·网络安全·xss
人衣aoa3 天前
PG靶机 - Pelican
web安全·网络安全·渗透测试·内网渗透
lingggggaaaa3 天前
小迪安全v2023学习笔记(六十一讲)—— 持续更新中
笔记·学习·安全·web安全·网络安全·反序列化
运维行者_3 天前
使用Applications Manager进行 Apache Solr 监控
运维·网络·数据库·网络安全·云计算·apache·solr
挨踢攻城3 天前
IT资讯 | VMware ESXi高危漏洞影响国内服务器
安全·web安全·网络安全·vmware·虚拟化技术·厦门微思网络·vmware esxi高危漏洞