type
status
date
slug
summary
tags
category
icon
password
这里写文章的前言:
一个简单的开头,简述这篇文章讨论的问题、目标、人物、背景是什么?并简述你给出的答案。
可以说说你的故事:阻碍、努力、结果成果,意外与转折。
📝 主旨内容
w1r3s 1.0.1靶机
实验环境
靶机ip:192.168.235.133
发现主机
![notion image](https://www.notion.so/image/https%3A%2F%2Fs3-us-west-2.amazonaws.com%2Fsecure.notion-static.com%2Ff7d1b917-5489-4f24-9de2-38cf4f7be5b1%2FUntitled.png?table=block&id=b74b7f77-a72f-4da3-b5e6-d1f3aedeb72d&t=b74b7f77-a72f-4da3-b5e6-d1f3aedeb72d&width=756&cache=v2)
资产收集
端口扫描(查看开放的端口)
—min-rate 10000
考虑扫描准确性,最小速度为10000
扫描结果:
![notion image](https://www.notion.so/image/https%3A%2F%2Fs3-us-west-2.amazonaws.com%2Fsecure.notion-static.com%2F46e8bb40-2017-4bde-ac6a-87669e7525df%2FUntitled.png?table=block&id=4a82e8d1-74fc-4dea-8e18-e9c40516085c&t=4a82e8d1-74fc-4dea-8e18-e9c40516085c&width=793&cache=v2)
发现开放了21,22,80,3306端口
端口扫描(特定端口/tcp)
扫描21,22,80,3306
端口扫描(指定端口/udp)
扫描21,22,80,3306/tcp
无法确定udp开放,暂时不管
使用nmap脚本扫描指定端口
存在ddos攻击漏洞(不考虑)
存在/wordpress/wp-login.php: Wordpress login page.(突破口)
MAC Address: 00:0C:29:BE:FB:8E (VMware)
vmware的宿主机器很可能是windows
大概思路
思路一:ftp匿名登录
ftp登录成功
//anonymous,匿名用户
查看文件
全部文件拿下来
分析所有文件
思路二:web服务
访问ip
![notion image](https://www.notion.so/image/https%3A%2F%2Fs3-us-west-2.amazonaws.com%2Fsecure.notion-static.com%2F0957d40c-80df-4bb1-854d-74c3fda4b5d6%2FUntitled.png?table=block&id=de1b385d-b932-47df-a47a-11fc46e22bed&t=de1b385d-b932-47df-a47a-11fc46e22bed&width=1086&cache=v2)
默认目录
推测当中存在其他web服务
目录爆破
工具:
dirb
gobirster
feroxbuster
fuff
尝试其中一个
使用feroxbuster
扫描结果
结果分析
cuppa cms安装界面
![notion image](https://www.notion.so/image/https%3A%2F%2Fs3-us-west-2.amazonaws.com%2Fsecure.notion-static.com%2F5de0b7ae-fbe0-4508-9d8a-8b3f66ead037%2FUntitled.png?table=block&id=ae7079eb-2e37-4b6e-adb5-ba67d864e235&t=ae7079eb-2e37-4b6e-adb5-ba67d864e235&width=1149&cache=v2)
![notion image](https://www.notion.so/image/https%3A%2F%2Fs3-us-west-2.amazonaws.com%2Fsecure.notion-static.com%2F51d1d9bc-19db-4b7f-838f-a71be31dae7b%2FUntitled.png?table=block&id=e01fd120-253f-4b81-a45a-7505497610eb&t=e01fd120-253f-4b81-a45a-7505497610eb&width=1122&cache=v2)
尝试安装
![notion image](https://www.notion.so/image/https%3A%2F%2Fs3-us-west-2.amazonaws.com%2Fsecure.notion-static.com%2F729330b1-50bc-467e-93e7-3ef3d31fffde%2FUntitled.png?table=block&id=7b99806a-86fe-4962-ab09-5b2934fc3e7d&t=7b99806a-86fe-4962-ab09-5b2934fc3e7d&width=1151&cache=v2)
![notion image](https://www.notion.so/image/https%3A%2F%2Fs3-us-west-2.amazonaws.com%2Fsecure.notion-static.com%2F5ec835e9-bcc9-443e-bccc-b996d4a73409%2FUntitled.png?table=block&id=d1366c07-a086-4cff-a3ef-e0753bcac90d&t=d1366c07-a086-4cff-a3ef-e0753bcac90d&width=1149&cache=v2)
![notion image](https://www.notion.so/image/https%3A%2F%2Fs3-us-west-2.amazonaws.com%2Fsecure.notion-static.com%2F0de86e85-a94c-4b4c-9876-3157a27c1c99%2FUntitled.png?table=block&id=e8f3daaa-eb3d-4b88-8365-14bcfe90c982&t=e8f3daaa-eb3d-4b88-8365-14bcfe90c982&width=802&cache=v2)
记住保存的信息
![notion image](https://www.notion.so/image/https%3A%2F%2Fs3-us-west-2.amazonaws.com%2Fsecure.notion-static.com%2Fcb30006e-c37a-4bb5-862f-3db1255b50c1%2FUntitled.png?table=block&id=60359d11-38b6-4376-8d8a-e4336ea271c6&t=60359d11-38b6-4376-8d8a-e4336ea271c6&width=536&cache=v2)
返回信息
![notion image](https://www.notion.so/image/https%3A%2F%2Fs3-us-west-2.amazonaws.com%2Fsecure.notion-static.com%2F74dc7ced-b3fe-4909-b553-a34a2b6d52f7%2FUntitled.png?table=block&id=06ce99ba-b696-48dc-9f1e-82f9ca978950&t=06ce99ba-b696-48dc-9f1e-82f9ca978950&width=793&cache=v2)
成功创造表
成功编辑文件
无法创造用户
尝试寻找cms的漏洞
返回
![notion image](https://www.notion.so/image/https%3A%2F%2Fs3-us-west-2.amazonaws.com%2Fsecure.notion-static.com%2F66bb7a3e-c16f-4a83-a42e-f23c6a439961%2FUntitled.png?table=block&id=bcf90dd5-82cb-4afa-84c2-7dc99e28c5ff&t=bcf90dd5-82cb-4afa-84c2-7dc99e28c5ff&width=2506&cache=v2)
获取漏洞详情
文件包含漏洞
漏洞描述
LINE 22:
<?php include($_REQUEST["urlConfig"]); ?>
For Example:
php模块没开无法利用
http://target/cuppa/alerts/alertConfigField.php?urlConfig=php://filter/convert.base64-encode/resource=../Configuration.php
http://target/cuppa/alerts/alertConfigField.php?urlConfig=php://filter/convert.base64-encode/resource=../Configuration.php
get传参
![notion image](https://www.notion.so/image/https%3A%2F%2Fs3-us-west-2.amazonaws.com%2Fsecure.notion-static.com%2F9e85e383-b0e4-4571-920b-7bb0e8955848%2FUntitled.png?table=block&id=19db7460-8b8e-427c-b519-413d4ab592c4&t=19db7460-8b8e-427c-b519-413d4ab592c4&width=1142&cache=v2)
无法正常显示(可能是对get方式进行了过滤)
post传参
![notion image](https://www.notion.so/image/https%3A%2F%2Fs3-us-west-2.amazonaws.com%2Fsecure.notion-static.com%2F74085160-88bb-4a7b-80f5-5df0b5445940%2FUntitled.png?table=block&id=d64f7d97-6233-4b5a-a435-9a045157b24b&t=d64f7d97-6233-4b5a-a435-9a045157b24b&width=1488&cache=v2)
成功包含文件
也可以在kali中尝试使用curl方法访问
![notion image](https://www.notion.so/image/https%3A%2F%2Fs3-us-west-2.amazonaws.com%2Fsecure.notion-static.com%2F5933ab4f-3396-4b22-a141-9403e7479469%2FUntitled.png?table=block&id=96d0ba25-f1be-4a4b-b6a0-ae5870bd5e05&t=96d0ba25-f1be-4a4b-b6a0-ae5870bd5e05&width=1907&cache=v2)
包含/etc/shadow来爆破密码
![notion image](https://www.notion.so/image/https%3A%2F%2Fs3-us-west-2.amazonaws.com%2Fsecure.notion-static.com%2F780fa526-6844-4b78-a117-10494c428949%2FUntitled.png?table=block&id=a17221ac-07a1-457e-a65e-8b1bf3c1a820&t=a17221ac-07a1-457e-a65e-8b1bf3c1a820&width=1617&cache=v2)
shadow文件解析
文件的格式为:
{用户名}:{加密后的口令密码}:{口令最后修改时间距原点(1970-1-1)的天数}:{口令最小修改间隔(防止修改口令,如果时限未到,将恢复至旧口令):{口令最大修改间隔}:{口令失效前的警告天数}:{账户不活动天数}:{账号失效天数}:{保留}
w1r3s:$6$xe/eyoTx$gttdIYrxrstpJP97hWqttvc5cGzDNyMb0vSuppux4f2CcBv3FwOt2P1GFLjZdNqjwRuP3eUjkgb/io7x9q1iP.:17567:0:99999:7:::
使用工具爆破密码
![notion image](https://www.notion.so/image/https%3A%2F%2Fs3-us-west-2.amazonaws.com%2Fsecure.notion-static.com%2Fbfde93f5-50f7-49b2-9ce1-46dc8e95d5b4%2FUntitled.png?table=block&id=f855d94c-67d3-42e2-a98f-79a6a13870ec&t=f855d94c-67d3-42e2-a98f-79a6a13870ec&width=1548&cache=v2)
ssh登录
![notion image](https://www.notion.so/image/https%3A%2F%2Fs3-us-west-2.amazonaws.com%2Fsecure.notion-static.com%2Fae7c69d7-931d-4ec4-aa80-7dc9b31d294c%2FUntitled.png?table=block&id=6168f6fd-8c38-4222-baf6-507f42fb07b1&t=6168f6fd-8c38-4222-baf6-507f42fb07b1&width=889&cache=v2)
![notion image](https://www.notion.so/image/https%3A%2F%2Fs3-us-west-2.amazonaws.com%2Fsecure.notion-static.com%2Fac81afea-f9ce-43d0-abaa-0eecaf04b54b%2FUntitled.png?table=block&id=3503d41f-ad76-4497-ad04-fd5634aa6c3a&t=3503d41f-ad76-4497-ad04-fd5634aa6c3a&width=1453&cache=v2)
获取主机权限
提权
直接ssh登录
查看信息
![notion image](https://image.3001.net/images/20211117/1637118382_619471ae58906c87c476a.png!small?t=5cc54e09-c449-4ded-9459-d6b82789c2c3)
![notion image](https://image.3001.net/images/20211117/1637118383_619471af608146b1d99ca.png!small?t=10489afc-f54c-4ebe-ad05-a126da58eddf)
这里直接提权....?因为这里他貌似是没有设置root密码,也就是说可以用普通用户的高级权限sudo进行操作
![notion image](https://image.3001.net/images/20211117/1637118384_619471b04fb46d7e35a99.png!small?t=5b7f9380-307a-4613-9c0f-5f0c5eccd07c)
直接重置root密码
由于ubtun系统默认是没有激活root用户的,需要管理员手工进行操作 sudo passwd 或者sudo passwd root
或者直接可以 sudo su 直接无密码进入root
🤗 总结归纳
收获满满。。。
📎 参考文章
- 一些引用
- 引用文章
有关Notion安装或者使用上的问题,欢迎您在底部评论区留言,一起交流~
- 作者:Yuki
- 链接:https://yuki8888.top/article/7fe1859f-7ed4-4506-97ff-49688b82cb57
- 声明:本文采用 CC BY-NC-SA 4.0 许可协议,转载请注明出处。