vulnhub渗透日记02:sickos1.1

前言

⏰时间:2023.7.14
🗺️靶机地址:https://www.vulnhub.com/entry/sickos-11,132/
⚠️文中涉及操作均在靶机模拟环境中完成,切勿未经授权用于真实环境。
🙏本人水平有限,如有错误望指正,感谢您的查阅!
🎉欢迎关注🔍点赞👍收藏⭐️留言📝

信息收集

┌──(root㉿kali)-[~]
└─# nmap -sn 192.168.58.1/24                                              
Starting Nmap 7.94 ( https://nmap.org ) at 2023-07-14 10:07 HKT
Nmap scan report for 192.168.58.1
Host is up (0.00026s latency).
MAC Address: 00:50:56:C0:00:08 (VMware)
Nmap scan report for 192.168.58.2
Host is up (0.00018s latency).
MAC Address: 00:50:56:EB:56:98 (VMware)
Nmap scan report for 192.168.58.144
Host is up (0.000055s latency).
MAC Address: 00:0C:29:21:06:10 (VMware)
Nmap scan report for 192.168.58.254
Host is up (0.00015s latency).
MAC Address: 00:50:56:FE:29:0C (VMware)
Nmap scan report for 192.168.58.128
Host is up.
Nmap done: 256 IP addresses (5 hosts up) scanned in 2.27 seconds

目标是58.144
masscan扫端口

┌──(root㉿kali)-[~]
└─# masscan --rate=10000 -p 1-65535 192.168.58.144 
Starting masscan 1.3.2 (http://bit.ly/14GZzcT) at 2023-07-14 02:09:51 GMT
Initiating SYN Stealth Scan
Scanning 1 hosts [65535 ports/host]
Discovered open port 22/tcp on 192.168.58.144                                  
Discovered open port 3128/tcp on 192.168.58.144  

nmap针对开放端口进行探测

┌──(root㉿kali)-[~]
└─# nmap -sT -Pn -A -v -p 22,3128 --open 192.168.58.144
PORT     STATE SERVICE    VERSION
22/tcp   open  ssh        OpenSSH 5.9p1 Debian 5ubuntu1.1 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey: 
|   1024 09:3d:29:a0:da:48:14:c1:65:14:1e:6a:6c:37:04:09 (DSA)
|   2048 84:63:e9:a8:8e:99:33:48:db:f6:d5:81:ab:f2:08:ec (RSA)
|_  256 51:f6:eb:09:f6:b3:e6:91:ae:36:37:0c:c8:ee:34:27 (ECDSA)
3128/tcp open  http-proxy Squid http proxy 3.1.19
|_http-title: ERROR: The requested URL could not be retrieved
|_http-server-header: squid/3.1.19
MAC Address: 00:0C:29:21:06:10 (VMware)
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Aggressive OS guesses: Linux 3.10 - 4.11 (93%), Linux 3.16 - 4.6 (93%), Linux 3.2 - 4.9 (93%), Linux 4.4 (92%), Linux 3.13 (90%), Linux 3.18 (88%), Linux 4.2 (87%), Linux 3.13 - 3.16 (87%), Linux 3.16 (87%), OpenWrt Chaos Calmer 15.05 (Linux 3.18) or Designated Driver (Linux 4.1 or 4.4) (87%)
No exact OS matches for host (test conditions non-ideal).
Uptime guess: 0.299 days (since Fri Jul 14 03:01:52 2023)
Network Distance: 1 hop
TCP Sequence Prediction: Difficulty=264 (Good luck!)
IP ID Sequence Generation: All zeros
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

TRACEROUTE
HOP RTT     ADDRESS
1   0.31 ms 192.168.58.144

NSE: Script Post-scanning.
Initiating NSE at 10:11
Completed NSE at 10:11, 0.00s elapsed
Initiating NSE at 10:11
Completed NSE at 10:11, 0.00s elapsed
Initiating NSE at 10:11
Completed NSE at 10:11, 0.00s elapsed
Read data files from: /usr/bin/../share/nmap
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 35.40 seconds
           Raw packets sent: 81 (8.588KB) | Rcvd: 17 (924B)

3128需要代理访问
在这里插入图片描述在这里插入图片描述whatweb看下指纹
在这里插入图片描述
dirb扫目录
dirb http://192.168.58.144 -p http://192.168.58.144:3128
在这里插入图片描述
robots.txt
在这里插入图片描述wolfcms目录

┌──(root㉿kali)-[~]
└─# dirsearch -u http://192.168.58.144/wolfcms/ --proxy=http://192.168.58.144:3128

  _|. _ _  _  _  _ _|_    v0.4.2                                                      
 (_||| _) (/_(_|| (_| )                                                               
                                                                                      
Extensions: php, aspx, jsp, html, js | HTTP method: GET | Threads: 30 | Wordlist size: 10927                                                                                

Output File: /root/.dirsearch/reports/192.168.58.144/-wolfcms-_23-07-14_11-06-27.txt

Error Log: /root/.dirsearch/logs/errors-23-07-14_11-06-27.log

Target: http://192.168.58.144/wolfcms/
[11:06:37] 200 -    7KB - /wolfcms/docs/updating.txt                        
[11:06:38] 200 -  894B  - /wolfcms/favicon.ico                              
[11:06:40] 200 -    4KB - /wolfcms/index       

查看updating.txt,发现版本信息 0.8.2
在这里插入图片描述

发现漏洞点

搜索发现存在文件上传漏洞
在这里插入图片描述
admin:admin登录在这里插入图片描述

反弹shell

msfvenom生成反弹shell
在这里插入图片描述上传
在这里插入图片描述msfconsole 开启监听
在这里插入图片描述

访问路径/wolfcms/public/rev.php,收到shell
在这里插入图片描述/wolfcms/config.php发现数据库账号密码
在这里插入图片描述
查看/etc/passwd,sickos用户是/bin/bash,可以试试
在这里插入图片描述
python开启交互式shell
在这里插入图片描述sickos是sudo组用户
在这里插入图片描述直接sudo su提权
在这里插入图片描述

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 1
    评论

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论 1
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值