vulnhub靶場之THE PLANETS: EARTH

準備:
攻擊機:虛擬機kali、本機win10 。
靶機:THE PLANETS: EARTH , 網段地址我這里設置的橋接,所以與本機電腦在同一網段,下載地址:https://download.vulnhub.com/theplanets/Earth.ova,下載后直接vm打開即可 。

vulnhub靶場之THE PLANETS: EARTH

文章插圖
信息收集:
通過nmap掃描下網段內的存活主機地址,確定下靶機的地址:nmap 192.168.0.0/24,獲得靶機地址:192.168.0.11
vulnhub靶場之THE PLANETS: EARTH

文章插圖
掃描下端口對應的服務:nmap -T4 -sV -p- -A 192.168.0.11 , 顯示開放了22、80、443端口,但是443端口需要進行dns解析 。
vulnhub靶場之THE PLANETS: EARTH

文章插圖
在未設置dns解析時,訪問下https和http服務顯示均是400:
vulnhub靶場之THE PLANETS: EARTH

文章插圖

vulnhub靶場之THE PLANETS: EARTH

文章插圖
設置dns解析:
win:打開C:\Windows\System32\drivers\etc\hosts文件 , 添加:192.168.0.11 earth.local 192.168.0.11 terratest.earth.local , 然后訪問:https://earth.local/或http://earth.local或https://terratest.earth.local獲得初始界面:
vulnhub靶場之THE PLANETS: EARTH

文章插圖

vulnhub靶場之THE PLANETS: EARTH

文章插圖
kali:打開/etc/hosts文件,添加:192.168.0.11 earth.local 192.168.0.11 terratest.earth.local,然后同windows 。
目錄掃描:
使用dirmap進行目錄掃描:python dirmap.py -i http://earth.local/ -lcf和python dirmap.py -i https://terratest.earth.local -lcf,獲得一下目錄信息:
vulnhub靶場之THE PLANETS: EARTH

文章插圖

vulnhub靶場之THE PLANETS: EARTH

文章插圖
對掃描出來的地址進行訪問,獲得一個登錄界面、一個robots.txt文件,訪問結果如下:
vulnhub靶場之THE PLANETS: EARTH

文章插圖

vulnhub靶場之THE PLANETS: EARTH

文章插圖
嘗試訪問一下testingnotes.*文件,后面后綴進行測試,最后發現txt文檔可以訪問,https://terratest.earth.local/testingnotes.txt
vulnhub靶場之THE PLANETS: EARTH

文章插圖
在該文件中發現了以下信息:
1、用戶名信息:terra used as username for admin portal , 用戶名terra是超級管理員賬戶 。
2、加密算法:Using XOR encryption as the algorithm, should be safe as used in RSA,加密算法XOR 。
3、加密文本:testdata.txt was used to test encryption , 測試數據在testdata.txt中 。
xor算法:a^b=c,則c^b=a或c^a=b,所以我們就需要將發送得信息與密碼本信息進行異或,得到原來發送得未加密得信息 。
讀取testdata.txt文件:
vulnhub靶場之THE PLANETS: EARTH

文章插圖
解碼傳輸信息
#vlunhub之THE PLANETS: EARTH腳本import binasciientry_str = '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'pass_txt = "According to radiometric dating estimation and other evidence, Earth formed over 4.5 billion years ago. Within the first billion years of Earth's history, life appeared in the oceans and began to affect Earth's atmosphere and surface, leading to the proliferation of anaerobic and, later, aerobic organisms. Some geological evidence indicates that life may have arisen as early as 4.1 billion years ago."#將pass_txt轉換成16進制pass_txt_16 = binascii.b2a_hex(pass_txt.encode(encoding="utf-8")).decode('utf-8').replace("b'",'')#進行xor運算result = hex(int(entry_str,16)^int(pass_txt_16,16)).replace('0x','')#將運算結果轉換成字符串datatext = binascii.unhexlify(result).decode('utf-8')print(datatext)

推薦閱讀