Loading...
avatar
Articles
35
Tags
3
Categories
2
Home
Archives
Categories
Tags
Whimsical WhirlsChallenge Five Writeup
Search
Home
Archives
Categories
Tags

Challenge Five Writeup

Created2024-12-24|Updated2024-11-17|Lab Writeup
|Word Count:6|Reading Time:1mins|Post Views:
Author: Annabelle
Link: https://anneballa.github.io/posts/b9bdd83e232c/
Copyright Notice: All articles on this blog are licensed under CC BY-NC-SA 4.0 unless otherwise stated.
Sponsor
  • wechat
    wechat
  • alipay
    alipay
cover of previous post
Previous
HTB Headless Writeup
Recon:1nmap 10.10.11.8 --min-rate 2000 -Pn -p1-10000 -sT -n 1nmap 10.10.11.8 -p22,53,5000 -sC -sV -Pn GetShell:在5000端口上运行着一个web服务: 打开是一个给后端传递信息的接口,如果故意在session中填一些payload,会提示: 如果填正常的,即什么都没有发生: 可以利用回显字段来尝试xss: 将user-agent进行更改: 123456789101112131415POST /support HTTP/1.1Host: 10.10.11.8:5000Content-Length: 115Cache-Control: max-age=0Accept-Language: en-USUpgrade-Insecure-Requests: 1Origin: http://10.10.11.8:5000Content-Type: application/x-www-form-urlencodedUser-Agent:...
cover of next post
Next
HTB Administrator Writeup
...

Comments
avatar
Annabelle
Be a down-to-earth person
Articles
35
Tags
3
Categories
2
Follow Me
Announcement
Welcome to my blog! Here, you'll find a collection of my experiences and insights in red team penetration testing, programming tips, and tech tinkering. I hope you discover content that's both intriguing and practical, and that you enjoy your time here.
Contents
  1. 1. Targen:
  2. 2. Recon:
  3. 3. GetAccess:
  4. 4. NetWork enum:
  5. 5. Get DMZDC01.COMPLYEDGE.COM Access:
  6. 6. Get CDC07.OPS.COMPLY.COM Access:
  7. 7. Get CDC07.OPS.COMPLY.COM Access:
Recent Posts
使用PVE构建自己的设备环境
使用PVE构建自己的设备环境2025-01-01
HTB Vintage Writeup
HTB Vintage Writeup2025-01-01
HTB Cicada Writeup
HTB Cicada Writeup2025-01-01
©2024 - 2025 By Annabelle
Framework Hexo|Theme Butterfly
Hi, welcome to my blog!
Search
Loading Database