─$ nmap -p 1-65535 -sV 192.168.169.131 Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-10-13 23:46 EDT Nmap scan report for 192.168.169.131 Host is up (0.00020s latency). Not shown: 65531 closed tcp ports (conn-refused) PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 8.4p1 Debian 5 (protocol 2.0) 80/tcp open http Apache httpd 2.4.48 ((Debian)) 3306/tcp open mysql MySQL 8.0.26 33060/tcp open mysqlx? 1 service unrecognized despite returning data ..........
The password and connection stringforthe database are stored ina yml file. To access the yml file you can go tohttp://<website>/core/config/databases.yml fileand download
这个yml里写了账号是qdpmadmin,密码是UcVQCMQk2STVeS6J
登录sql的时候还遇到了点问题,直接链接会报错ERROR 2026 (HY000): TLS/SSL error: self-signed certificate in certificate chain,然后搜了一下加个参数,--ssl-mode=DISABLED,又说没有这个参数,然后又试了一下--skip-ssl,居然好使了😶🌫️(但这个参数说是很旧版的参数)
dexter@debian:~$ cat note.txt It seems to me that there is a weakness while accessing the system. As far as I know, the contents of executable files are partially viewable. I need to find out if there is a vulnerability or not.