![2024-03-12T05:54:46.png][1] |靶机|信息| |--|---| |状态|Season 四| |难度|Hard| |IP|/| |地址| https://app.hackthebox.com/machines/592| # 端口扫描 ```bash PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 8.9p1 Ubuntu 3ubuntu0.6 (Ubuntu Linux; protocol 2.0) | ssh-hostkey: | 256 5fb2cd54e447d10e9e8135923cd6a3cb (ECDSA) |_ 256 b9f00ddc057bfafb91e6d0b459e6db88 (ED25519) 80/tcp open http nginx 1.18.0 (Ubuntu) | http-title: Site doesn't have a title (text/html; charset=UTF-8). |_Requested resource was /static/index.html |_http-server-header: nginx/1.18.0 (Ubuntu) |_http-cors: GET POST Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel ``` # Web服务_80端口 ## 目录扫描 (没有什么收获) ```bash gobuster dir -u http://ip/ -w /usr/share/seclists/Discovery/Web-Content/directory-list-2.3-medium.txt ``` 访问网站,创建一个新用户 ``` a a@a.a ``` burpsuite抓包,获取认证信息,是个Cookie ![2024-03-12T05:55:30.png][2] 配合Cookie的值再次扫描一下(依旧没什么收获) ```bash gobuster dir -u http://10.129.221.31/ -w /usr/share/seclists/Discovery/Web-Content/directory-list-2.3-medium.txt -c "authorization=Bearer%20eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJ1c2VySUQiOiI2NWVlZjg2OTNiOTZmMGI2YjE2ZDViNDAiLCJpYXQiOjE3MTAxNTk5ODd9.lrnDUsLF0bZKvhI6VSONk8k2VFBQte28Z8gwfZCRd3k" ``` ## XSS 先用个简单的Payload测试一下 简单的跳转payload:`` > ``中的代码似乎不能执行.猜测过滤了` Leave a Comment Cancel reply 使用cookie技术保留您的个人信息以便您下次快速评论,继续评论表示您已同意该条款 Comment * Private comment Name * 🎲 Email * Site Leave a Comment submitting...