DC-5
靶机下载地址:
链接:https://pan.baidu.com/s/1aZRB-hqvqLlGUmAPFljnIA?pwd=elxg
提取码:elxg
参考:
- DC5官方地址:https://www.vulnhub.com/entry/dc-5,314/
- DC5靶机地址:https://download.vulnhub.com/dc/DC-5.zip
- http://t.csdnimg.cn/fQuRB
- DC-5 (1).pdf
- 【DC系列靶机DC5通关讲解】 https://www.bilibili.com/video/BV1Bj411N74r/?share_source=copy_web&vd_source=12088c39299ad03109d9a21304b34fef
- ChatGPT

描述:
DESCRIPTION 说明
DC-5 is another purposely built vulnerable lab with the intent of gaining experience in the world of penetration testing.
DC-5是另一个专门建造的易受攻击实验室,旨在获得渗透测试领域的经验。
The plan was for DC-5 to kick it up a notch, so this might not be great for beginners, but should be ok for people with intermediate or better experience. Time will tell (as will feedback).
DC-5的计划是让它更上一层楼,所以这对初学者来说可能不太好,但对有中级或更好经验的人来说应该没问题。时间会证明一切(反馈也是如此)。
As far as I am aware, there is only one exploitable entry point to get in (there is no SSH either). This particular entry point may be quite hard to identify, but it is there. You need to look for something a little out of the ordinary (something that changes with a refresh of a page). This will hopefully provide some kind of idea as to what the vulnerability might involve.
据我所知,只有一个可利用的入口点(也没有SSH)。这个特定的切入点可能很难识别,但它就在那里。你需要寻找一些不同寻常的东西(随着页面刷新而变化的东西)。这将有望为漏洞可能涉及的内容提供某种思路。
And just for the record, there is no phpmailer exploit involved. :-)
而且只是为了记录在案,不涉及phpmailer漏洞。:-)
The ultimate goal of this challenge is to get root and to read the one and only flag.
这个挑战的最终目标是扎根并阅读唯一的旗帜。
Linux skills and familiarity with the Linux command line are a must, as is some experience with basic penetration testing tools.
Linux技能和熟悉Linux命令行是必须的,有一些基本渗透测试工具的经验也是必须的。
For beginners, Google can be of great assistance, but you can always tweet me at @DCAU7 for assistance to get you going again. But take note: I won't give you the answer, instead, I'll give you an idea about how to move forward.
对于初学者来说,谷歌可以提供很大的帮助,但你可以随时在@DCAU7上向我推特寻求帮助,让你重新开始。但请注意:我不会给你答案,相反,我会给你一个如何前进的想法。
But if you're really, really stuck, you can watch this video which shows the first step.
但如果你真的,真的卡住了,你可以看这段视频,它展示了第一步。
1、导入VMware虚拟机
下载完成后,得到DC-5.ova文件,导入到VMware后,设置靶机和kali的网络连接模式为NAT模式,靶机会自动获取ip地址。
2、拍摄快照,防止后面出问题,有快照还能恢复到初始设置

3、kali创建一个目录 dc5 ,后续的操作都在该目录下进行

使用工具
攻击者:kali 192.168.1.128
靶机:dc-3 192.168.1.133
一.信息收集
基础信息查询
0x01 查看存活主机 0x02 查看开放端口 和 0x03 查看端口服务
这几条命令的用法可以看之前的博客,这里不再赘述


发现主机192.168.1.133开启着80端口的HTTP服务
访问一下web页面,发现是一个静态页面

根据题目描述和提示,查找随着页面刷新而变化的东西

先在contact那里随便提交一下


随着页面的刷新 ,Copyright © 2018 会随之变化

查看源代码,发现

浙公网安备 33010602011771号