Photographer Box, Proving Grounds
嗯,用户让我帮忙总结一下这篇文章的内容,控制在一百个字以内,而且不需要用“文章内容总结”之类的开头。直接写描述就行。 首先,我需要仔细阅读用户提供的文章内容。看起来这篇文章讲的是渗透测试的第一步,侦察阶段。他们使用了nmap来扫描目标,找到了几个开放的端口,比如22、80、139、445和8000。特别是8000端口运行的是Apache和Koken CMS 0.22.24版本。 接下来,他们通过枚举发现了Koken CMS的管理面板,并利用searchsploit找到了一个任意文件上传的漏洞。然后他们上传了一个包含phpinfo()函数的PHP文件,成功获得了shell权限。 所以,总结起来,这篇文章主要描述了通过nmap扫描发现目标漏洞,利用Koken CMS的漏洞上传恶意文件,最终获得系统权限的过程。 现在我要把这个过程浓缩到100字以内。需要涵盖侦察、工具使用、漏洞发现和利用、以及最终的权限获取。确保语言简洁明了。 最后检查一下字数是否符合要求,并且没有使用任何开头的模板语句。 </think> 文章描述了一次渗透测试过程:通过nmap扫描目标设备,发现开放端口及服务信息;利用Koken CMS漏洞上传恶意文件并获得shell权限。 2026-3-18 04:5:20 Author: infosecwriteups.com(查看原文) 阅读量:6 收藏

First Step:

Reconnaissance:

In this step we find as much info as we can from the target to work our attacks around and successfully gain initial access.

our handy tool to start with is nmap which helps for scanning for entry points and checks for open ports!

We use the command as follows:

nmap -sC -sV 192.168.230.76 -oA IntitialScan.txt — min-rtt-timeout 5 -v

-sC Default Scripts
-sV Enumerate Version
-oA Output all formats

-v Verbose

Through our scans we find these ports open:

22 for SSH
80 for HTTP
139 for SAMBA-netbios-ssn
445 for SAMBA
8000 for HTTP Server running apache and Koken CMS which is and as we noticed has this version 0.22.24

after enumerating more and in specific on port 8000

so as follows :

Press enter or click to view image in full size

Found admin Directory through Enumeration

In this image it shows that we found an admin panel for Koken, when using searchsploit we find that there is an exploit for this CMS:

Press enter or click to view image in full size

Found the exploit for the CMS ( Arbitarry File Upload While Athenticated )

Press enter or click to view image in full size

Found SAMBA Share.

Press enter or click to view image in full size

Found to Valuable Credentials

As the image shown above, I found 2 emails which are [email protected] and [email protected] with the babygirl as the password.

Get Cyb0rgBytes’s stories in your inbox

Join Medium for free to get updates from this writer.

Remember me for faster sign in

lets try it below to see if we get authenticated!

Press enter or click to view image in full size

Bingo! Authenticated Successfully.
Shell upload

As the PoC states and it’s simple as follows :

‘’After you are logged in to Koken CMS Admin Panel, select the “Import Content” option

As a proof of concept, I created a PHP file with the function phpinfo() and saved it with a double extension (image.php.jpg)

I selected the image.php.jpg file and forwarded the request to Burp’’

and while we do that we have our netcat listening :

& there we go we got a shell :

Press enter or click to view image in full size


文章来源: https://infosecwriteups.com/photographer-box-of-offsec-proving-grounds-f3db9e7fe194?source=rss----7b722bfd1b8d---4
如有侵权请联系:admin#unsafe.sh