Digitalworld.local打靶记录

2023-10-15 06:59

本文主要是介绍Digitalworld.local打靶记录,希望对大家解决编程问题提供一定的参考价值,需要的开发者们随着小编来一起学习吧!

文章目录

  • 总体思路:
  • nmap扫描:
    • port扫描:
    • 端口详细信息,系统信息,简单脚本扫描:
    • vuln简单利用扫描:
    • 综上,优先级排序:
  • nfs,smb渗透:
    • 2049/nfs:
    • 445/smb渗透:
  • 80和8080渗透:
    • 80端口gobuster目录扫描:
    • searchsploit搜索:
    • 8080端口gobuster:
  • 僵局:
  • getshell:
  • 提权:
    • mkpasswd生成Linux格式密码:
  • flag:
  • 靶机思考与认知成长:

总体思路:

在这里插入图片描述

nmap扫描:

port扫描:

# nmap --min-rate=10000 -p- -sS 192.168.137.141
Starting Nmap 7.93 ( https://nmap.org ) at 2023-10-01 13:09 CST
Nmap scan report for 192.168.137.141
Host is up (0.000078s latency).
Not shown: 65522 closed tcp ports (reset)
PORT      STATE SERVICE
22/tcp    open  ssh
53/tcp    open  domain
80/tcp    open  http
111/tcp   open  rpcbind
139/tcp   open  netbios-ssn
443/tcp   open  https
445/tcp   open  microsoft-ds
2049/tcp  open  nfs
3306/tcp  open  mysql
8080/tcp  open  http-proxy
20048/tcp open  mountd
35897/tcp open  unknown
51549/tcp open  unknown
MAC Address: 00:0C:29:70:25:45 (VMware)Nmap done: 1 IP address (1 host up) scanned in 1.25 seconds

端口详细信息,系统信息,简单脚本扫描:

# nmap -sT -sV -O -sC -p22,53,80,111,139,443,445,2049,3306,8080,20048,35897,51549 192.168.137.141
Starting Nmap 7.93 ( https://nmap.org ) at 2023-10-01 13:13 CST
Nmap scan report for 192.168.137.141                                                                                                                                       
Host is up (0.00051s latency).                                                       PORT      STATE SERVICE     VERSION                                                  
22/tcp    open  ssh         OpenSSH 7.4 (protocol 2.0)
| ssh-hostkey:                                                                       
|   2048 4d8fbc014975830065a953a975c65733 (RSA)                                                                                                                            
|   256 92f704e209aad0d7e6fd21671fbd64ce (ECDSA)
|_  256 fb08cde8458c1ac1061b247333a5e477 (ED25519)
53/tcp    open  domain      dnsmasq 2.76                                             
| dns-nsid:                                                                          
|_  bind.version: dnsmasq-2.76                                                                                                                                             
80/tcp    open  http        Apache httpd 2.4.6 ((CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16)
| http-methods:                                                                      
|_  Potentially risky methods: TRACE                                                 
|_http-server-header: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
|_http-title: Apache HTTP Server Test Page powered by CentOS
111/tcp   open  rpcbind     2-4 (RPC #100000)     
| rpcinfo:                                                                                                                                                                 
|   program version    port/proto  service                                           
|   100000  2,3,4        111/tcp   rpcbind       
|   100000  2,3,4        111/udp   rpcbind                                           
|   100000  3,4          111/tcp6  rpcbind   
|   100000  3,4          111/udp6  rpcbind 
|   100003  3,4         2049/tcp   nfs
|   100003  3,4         2049/tcp6  nfs
|   100003  3,4         2049/udp   nfs
|   100003  3,4         2049/udp6  nfs
|   100005  1,2,3      20048/tcp   mountd
|   100005  1,2,3      20048/tcp6  mountd
|   100005  1,2,3      20048/udp   mountd
|   100005  1,2,3      20048/tcp6  mountd                                                                                                                          [31/274]
|   100005  1,2,3      20048/udp   mountd                                            
|   100005  1,2,3      20048/udp6  mountd                                            
|   100021  1,3,4      35897/tcp   nlockmgr                                                                                                                                
|   100021  1,3,4      42260/tcp6  nlockmgr                                                                                                                                
|   100021  1,3,4      44585/udp6  nlockmgr                                          
|   100021  1,3,4      50388/udp   nlockmgr                               
|   100024  1          38306/udp6  status                                            
|   100024  1          51549/tcp   status                                                                                                                                  
|   100024  1          52180/udp   status                                            
|   100024  1          52374/tcp6  status                                                                                                                                  
|   100227  3           2049/tcp   nfs_acl                                           
|   100227  3           2049/tcp6  nfs_acl                                           
|   100227  3           2049/udp   nfs_acl                                           
|_  100227  3           2049/udp6  nfs_acl            
139/tcp   open  netbios-ssn Samba smbd 3.X - 4.X (workgroup: WORKGROUP)              
443/tcp   open  ssl/http    Apache httpd 2.4.6 ((CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16)                                                                                   
| http-methods:                                                                      
|_  Potentially risky methods: TRACE                                                 
|_http-title: Apache HTTP Server Test Page powered by CentOS                         
|_http-server-header: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16           
| ssl-cert: Subject: commonName=localhost.localdomain/organizationName=SomeOrganization/stateOrProvinceName=SomeState/countryName=--                                       
| Not valid before: 2018-06-10T15:53:25                                                                                                                                    
|_Not valid after:  2019-06-10T15:53:25                                              
|_ssl-date: TLS randomness does not represent time                                   
445/tcp   open  netbios-ssn Samba smbd 4.7.1 (workgroup: WORKGROUP)       
2049/tcp  open  nfs_acl     3 (RPC #100227)                 
3306/tcp  open  mysql       MariaDB (unauthorized)
8080/tcp  open  http        nginx 1.12.2                                                                                                                                   
|_http-server-header: nginx/1.12.2                                                   
|_http-title: Welcome to Bravery! This is SPARTA!
| http-robots.txt: 4 disallowed entries                                              
|_/cgi-bin/ /qwertyuiop.html /private /public
20048/tcp open  mountd      1-3 (RPC #100005)
35897/tcp open  nlockmgr    1-4 (RPC #100021)                                        
51549/tcp open  status      1 (RPC #100024)                                          
MAC Address: 00:0C:29:70:25:45 (VMware)
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port                                                                      
Device type: general purpose             
Running: Linux 3.X|4.X                   
OS CPE: cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4 
OS details: Linux 3.2 - 4.9                                                                                                                                                
Network Distance: 1 hop                                                              
Service Info: Host: BRAVERY                                                          Host script results:                                                                 
| smb2-time:                                                                         
|   date: 2023-10-01T05:14:11                                                                                                                                              
|_  start_date: N/A                                                                  
|_nbstat: NetBIOS name: BRAVERY, NetBIOS user: <unknown>, NetBIOS MAC: 000000000000 (Xerox)
|_clock-skew: mean: 1h19m59s, deviation: 2h18m34s, median: 0s                        
| smb-security-mode:                                                                 
|   account_used: guest                                                                                                                                                    
|   authentication_level: user                                                                                                                                             
|   challenge_response: supported                                                    
|_  message_signing: disabled (dangerous, but default)                               
| smb-os-discovery:                                                                  
|   OS: Windows 6.1 (Samba 4.7.1)                                                    
|   Computer name: localhost                                                         
|   NetBIOS computer name: BRAVERY\x00                                                                                                                                     
|   Domain name: \x00                                                                
|   FQDN: localhost                                                                  
|_  System time: 2023-10-01T01:14:11-04:00                                           
| smb2-security-mode:                                                                
|   311:                                                                             
|_    Message signing enabled but not required                                       OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 23.72 seconds 

vuln简单利用扫描:

# nmap --script=vuln -p22,53,80,111,139,443,445,2049,3306,8080,20048,35897,51549 192.168.137.141
Starting Nmap 7.93 ( https://nmap.org ) at 2023-10-01 13:14 CST
Pre-scan script results:
| broadcast-avahi-dos:      
|   Discovered hosts:                                                                
|     224.0.0.251         
|   After NULL UDP avahi packet DoS (CVE-2011-1002).
|_  Hosts are all up (not vulnerable).
Nmap scan report for 192.168.137.141
Host is up (0.00029s latency).          PORT      STATE SERVICE                                                              
22/tcp    open  ssh              
53/tcp    open  domain
80/tcp    open  http                                                                 
|_http-dombased-xss: Couldn't find any DOM based XSS.
|_http-csrf: Couldn't find any CSRF vulnerabilities.                
|_http-trace: TRACE is enabled                                                       
| http-enum:          
|   /phpinfo.php: Possible information file
|   /README.txt: Interesting, a readme.
|   /icons/: Potentially interesting folder w/ directory listing
|_  /uploads/: Potentially interesting folder w/ directory listing
|_http-stored-xss: Couldn't find any stored XSS vulnerabilities.
111/tcp   open  rpcbind   
139/tcp   open  netbios-ssn
443/tcp   open  https  
|_http-dombased-xss: Couldn't find any DOM based XSS.
|_http-trace: TRACE is enabled                                                       
|_http-stored-xss: Couldn't find any stored XSS vulnerabilities.
|_http-csrf: Couldn't find any CSRF vulnerabilities.                                                                                                                       
445/tcp   open  microsoft-ds                                                                                                                                               
2049/tcp  open  nfs                                                                  
3306/tcp  open  mysql
8080/tcp  open  http-proxy
| http-enum:                                                                         
|   /robots.txt: Robots file
|_  /public/: Potentially interesting folder 
| http-vuln-cve2011-3192: 
|   VULNERABLE:                                                                      
|   Apache byterange filter DoS       
|     State: VULNERABLE             
|     IDs:  BID:49303  CVE:CVE-2011-3192
|       The Apache web server is vulnerable to a denial of service attack when numerous                                                                                    
|       overlapping byte ranges are requested.                                       
|     Disclosure date: 2011-08-19
|     References:     
|       https://www.tenable.com/plugins/nessus/55976                                 
|       https://www.securityfocus.com/bid/49303      
|       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3192
|_      https://seclists.org/fulldisclosure/2011/Aug/175                             
20048/tcp open  mountd
35897/tcp open  unknown                                                              
51549/tcp open  unknown                
MAC Address: 00:0C:29:70:25:45 (VMware)                                              Host script results:                                                                 
|_smb-vuln-ms10-054: false
|_smb-vuln-ms10-061: false 
| smb-vuln-regsvc-dos: 
|   VULNERABLE:                                                                      
|   Service regsvc in Microsoft Windows systems vulnerable to denial of service      
|     State: VULNERABLE                                                              
|       The service regsvc in Microsoft Windows 2000 systems is vulnerable to denial of service caused by a null deference                                                 
|       pointer. This script will crash the service if it is vulnerable. This vulnerability was discovered by Ron Bowes                                                    
|       while working on smb-enum-sessions.                                          
|_                   Nmap done: 1 IP address (1 host up) scanned in 102.81 seconds 

综上,优先级排序:

2049/nfs,445/smb优先尝试,然后80和8080,443,最后其他端口。

nfs,smb渗透:

2049/nfs:

  1. 尝试挂载,查看可挂载文件:
# showmount -e 192.168.137.141
Export list for 192.168.137.141:
/var/nfsshare *
  1. 挂载:
# mount -t nfs 192.168.137.141:/var/nfsshare ./nfs
  1. 总体看下来,得到一个意思用户名:david,和一个疑似密码:
    qwertyuioplkjhgfdsazxcvbnm

445/smb渗透:

  1. smbclient:
# smbclient -L 192.168.137.141
Password for [WORKGROUP\root]:Sharename       Type      Comment---------       ----      -------anonymous       Disk      secured         Disk      IPC$            IPC       IPC Service (Samba Server 4.7.1)
Reconnecting with SMB1 for workgroup listing.Server               Comment---------            -------Workgroup            Master---------            -------WORKGROUP            BRAVERY

存在anonymous,secured,IPC$。依次尝试,其中,secured需要授权登录,尝试刚刚nfs得到的账号密码,发现可以登录。

# smbclient '\\192.168.137.141\secured' -U david                              
Password for [WORKGROUP\david]:
Try "help" to get a list of possible commands.
smb: \> ls.                                   D        0  Fri Sep 28 21:52:14 2018..                                  D        0  Fri Jun 15 00:30:39 2018david.txt                           N      376  Sat Jun 16 16:36:07 2018genevieve.txt                       N      398  Tue Jul 24 00:51:27 2018README.txt                          N      323  Tue Jul 24 09:58:53 201817811456 blocks of size 1024. 12326872 blocks available

发现一下可能有用的信息:

1. 可能是连接:http://<developmentIPandport>/devops/directortestpagev1.php.
2. 可能是网页目录/genevieve/
3. 关键字goodtech

80和8080渗透:

80端口gobuster目录扫描:

# gobuster dir -u "http://192.168.137.141" -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt -x.txt,.php,.zip,.tar                                        
===============================================================
Gobuster v3.4
by OJ Reeves (@TheColonial) & Christian Mehlmauer (@firefart)
===============================================================
[+] Url:                     http://192.168.137.141
[+] Method:                  GET
[+] Threads:                 10
[+] Wordlist:                /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt
[+] Negative Status codes:   404
[+] User Agent:              gobuster/3.4
[+] Extensions:              txt,php,zip,tar
[+] Timeout:                 10s
===============================================================
2023/10/02 15:26:41 Starting gobuster in directory enumeration mode
===============================================================
/1                    (Status: 200) [Size: 2]
/2                    (Status: 200) [Size: 2]
/3                    (Status: 200) [Size: 2]
/4                    (Status: 200) [Size: 2]
/contactus            (Status: 200) [Size: 27]
/5                    (Status: 200) [Size: 2]
/6                    (Status: 200) [Size: 2]
/about                (Status: 200) [Size: 79]
/9                    (Status: 200) [Size: 2]
/7                    (Status: 200) [Size: 2]
/0                    (Status: 200) [Size: 2]
/8                    (Status: 200) [Size: 30]
/uploads              (Status: 301) [Size: 239] [--> http://192.168.137.141/uploads/]
/README.txt           (Status: 200) [Size: 12]
/phpinfo.php          (Status: 200) [Size: 1]
Progress: 1102754 / 1102805 (100.00%)
===============================================================
2023/10/02 15:28:56 Finished
===============================================================

80端口貌似只是测试,得到如下信息:

1. Remind gen to set up my cuppaCMS account.
2. 80 and 8080 are best friends!

得知了cuppaCMS 。

searchsploit搜索:

# searchsploit cuppa          
----------------------------------------------------------------------------------------------------------------------------------------- ---------------------------------Exploit Title                                                                                                                           |  Path
----------------------------------------------------------------------------------------------------------------------------------------- ---------------------------------
Cuppa CMS - '/alertConfigField.php' Local/Remote File Inclusion                                                                          | php/webapps/25971.txt
----------------------------------------------------------------------------------------------------------------------------------------- ---------------------------------
Shellcodes: No Results

貌似存在一个文件包含。尝试后发现不行。

8080端口gobuster:

# gobuster dir -u "http://192.168.137.141:8080" -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt -x.txt,.php,.zip,.tar
===============================================================
Gobuster v3.4
by OJ Reeves (@TheColonial) & Christian Mehlmauer (@firefart)
===============================================================
[+] Url:                     http://192.168.137.141:8080
[+] Method:                  GET
[+] Threads:                 10
[+] Wordlist:                /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt
[+] Negative Status codes:   404
[+] User Agent:              gobuster/3.4
[+] Extensions:              txt,php,zip,tar
[+] Timeout:                 10s
===============================================================
2023/10/02 15:31:36 Starting gobuster in directory enumeration mode
===============================================================
/about                (Status: 200) [Size: 503]
/public               (Status: 301) [Size: 185] [--> http://192.168.137.141:8080/public/]
/private              (Status: 301) [Size: 185] [--> http://192.168.137.141:8080/private/]
/robots.txt           (Status: 200) [Size: 103]
Progress: 1102057 / 1102805 (99.93%)
===============================================================
2023/10/02 15:33:28 Finished
===============================================================

8080端口存在/public网站。再次尝试文件包含。失败。此网站并没有再多的信息。

僵局:

思考一下之前所收集到的信息,有的还没用上。尝试后发现,存在http://192.168.137.141/genevieve/网站。存在登录页面,点击进去发现CMS目录有变,根据网站目录再次尝试文件包含,包含成功!

getshell:

远程文件包含getshell,生成反弹shell,用python搭建临时http服务python -m http.server。包含成功即可getshell。

提权:

常规提权枚举之后,搜索suid文件时,发现cp具有s权限:
在这里插入图片描述

cp命令具有s权限,想到去覆盖/etc/passwd。

mkpasswd生成Linux格式密码:

# mkpasswd -m sha-512 123456
$6$lRQzAUixUYQR8cQH$V7a1ikeQsmeFic8Pp1CnSzq94VYbmAEK/Ib.u6QqJQ00fLnSQtABD5v53bMeeswdGT1scO6xwIge/S76.IZbq0

覆盖之后提权成功。

flag:

cat ./proof.txt                                                                      
Congratulations on rooting BRAVERY. :)     

靶机思考与认知成长:

  1. nfs,ftp,smb等要优先级最先,可以探测到一些有用的信息。
  2. 遇到瓶颈时,一定是之前有漏掉什么信息没用或者没有发现。
  3. 渗透测试的核心是枚举。
  4. CMS利用的时候,网站的目录可能发生变化,可以根据目标网站进行适当调整。
  5. cp命令suid时,可以进行提权。

这篇关于Digitalworld.local打靶记录的文章就介绍到这儿,希望我们推荐的文章对编程师们有所帮助!



http://www.chinasem.cn/article/216124

相关文章

Node.js学习记录(二)

目录 一、express 1、初识express 2、安装express 3、创建并启动web服务器 4、监听 GET&POST 请求、响应内容给客户端 5、获取URL中携带的查询参数 6、获取URL中动态参数 7、静态资源托管 二、工具nodemon 三、express路由 1、express中路由 2、路由的匹配 3、路由模块化 4、路由模块添加前缀 四、中间件

AI基础 L9 Local Search II 局部搜索

Local Beam search 对于当前的所有k个状态,生成它们的所有可能后继状态。 检查生成的后继状态中是否有任何状态是解决方案。 如果所有后继状态都不是解决方案,则从所有后继状态中选择k个最佳状态。 当达到预设的迭代次数或满足某个终止条件时,算法停止。 — Choose k successors randomly, biased towards good ones — Close

记录每次更新到仓库 —— Git 学习笔记 10

记录每次更新到仓库 文章目录 文件的状态三个区域检查当前文件状态跟踪新文件取消跟踪(un-tracking)文件重新跟踪(re-tracking)文件暂存已修改文件忽略某些文件查看已暂存和未暂存的修改提交更新跳过暂存区删除文件移动文件参考资料 咱们接着很多天以前的 取得Git仓库 这篇文章继续说。 文件的状态 不管是通过哪种方法,现在我们已经有了一个仓库,并从这个仓

学习记录:js算法(二十八):删除排序链表中的重复元素、删除排序链表中的重复元素II

文章目录 删除排序链表中的重复元素我的思路解法一:循环解法二:递归 网上思路 删除排序链表中的重复元素 II我的思路网上思路 总结 删除排序链表中的重复元素 给定一个已排序的链表的头 head , 删除所有重复的元素,使每个元素只出现一次 。返回 已排序的链表 。 图一 图二 示例 1:(图一)输入:head = [1,1,2]输出:[1,2]示例 2:(图

perl的学习记录——仿真regression

1 记录的背景 之前只知道有这个强大语言的存在,但一直侥幸自己应该不会用到它,所以一直没有开始学习。然而人生这么长,怎就确定自己不会用到呢? 这次要搭建一个可以自动跑完所有case并且打印每个case的pass信息到指定的文件中。从而减轻手动跑仿真,手动查看log信息的重复无效低质量的操作。下面简单记录下自己的思路并贴出自己的代码,方便自己以后使用和修正。 2 思路整理 作为一个IC d

SSM项目使用AOP技术进行日志记录

本步骤只记录完成切面所需的必要代码 本人开发中遇到的问题: 切面一直切不进去,最后发现需要在springMVC的核心配置文件中中开启注解驱动才可以,只在spring的核心配置文件中开启是不会在web项目中生效的。 之后按照下面的代码进行配置,然后前端在访问controller层中的路径时即可观察到日志已经被正常记录到数据库,代码中有部分注释,看不懂的可以参照注释。接下来进入正题 1、导入m

flume系列之:记录一次flume agent进程被异常oom kill -9的原因定位

flume系列之:记录一次flume agent进程被异常oom kill -9的原因定位 一、背景二、定位问题三、解决方法 一、背景 flume系列之:定位flume没有关闭某个时间点生成的tmp文件的原因,并制定解决方案在博主上面这篇文章的基础上,在机器内存、cpu资源、flume agent资源都足够的情况下,flume agent又出现了tmp文件无法关闭的情况 二、

Linux常用工具与命令日常记录(长期更新)

Linux常用工具与命令日常记录(长期更新) 目录 1.本地复制到远程2.Linux压缩拆包与解压3.生成随机密码4.ubuntu默认Python版本设置5.计算当前文件夹中文件数量6.windows中编写shell脚本,在Linux运行出错7.history 历史命令显示时间用户8.Ubuntu18.04设置源、网卡9.Ubuntu18.04设置网卡10.Ubuntu:自定义开

Excel和Word日常使用记录:

Excel使用总结 表格颜色填充: 合并单元格: 选中你要合并的单元格区域。按下快捷键 Alt + H,然后松开这些键。再按下 M,接着按 C。这个组合键执行的操作是:Alt + H:打开“主页”选项卡。M:选择“合并单元格”选项。C:执行“合并并居中”操作。 插入行: 在Excel中,插入一行的快捷键是:Windows:选择整行(可以点击行号)。按下 Ctrl + Sh

野火霸天虎V2学习记录

文章目录 嵌入式开发常识汇总1、嵌入式Linux和stm32之间的区别和联系2、stm32程序下载方式3、Keil5安装芯片包4、芯片封装种类5、STM32命名6、数据手册和参考手册7、什么是寄存器、寄存器映射和内存映射8、芯片引脚顺序9、stm32芯片里有什么10、存储器空间的划分11、如何理解寄存器说明12、如何操作寄存器的某一位 STM32F407芯片学习1、stm32单片机启动流程s