Vulnhub:DR4G0N B4LL: 1

目录

信息收集

1、arp

2、nmap

WEB

web信息收集

gobuster

隐藏目录发现

图片隐写

ssh登录

提权

get user

系统信息收集

get root


信息收集

1、arp
┌──(root㉿ru)-[~/kali/vulnhub]
└─# arp-scan -l                                                                
Interface: eth0, type: EN10MB, MAC: 00:50:56:2f:dd:99, IPv4: 192.168.211.128
Starting arp-scan 1.10.0 with 256 hosts (https://github.com/royhills/arp-scan)
192.168.211.1  00:50:56:c0:00:08  VMware, Inc.
192.168.211.2  00:50:56:e6:61:4b  VMware, Inc.
192.168.211.129  00:50:56:3e:f2:64  VMware, Inc.
192.168.211.254  00:50:56:fc:cc:e5  VMware, Inc.4 packets received by filter, 0 packets dropped by kernel
Ending arp-scan 1.10.0: 256 hosts scanned in 2.498 seconds (102.48 hosts/sec). 4 responded

2、nmap
端口信息探测┌──(root㉿ru)-[~/kali/vulnhub]
└─# nmap -p- 192.168.211.129 --min-rate 10000               
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-03-25 12:07 CST
Nmap scan report for 192.168.211.129
Host is up (0.0032s latency).
Not shown: 65533 closed tcp ports (reset)
PORT   STATE SERVICE
22/tcp open  ssh
80/tcp open  http
MAC Address: 00:50:56:3E:F2:64 (VMware)Nmap done: 1 IP address (1 host up) scanned in 8.16 seconds
服务版本信息探测┌──(root㉿ru)-[~/kali/vulnhub]
└─# nmap -sT -sC -sV -p 22,80 192.168.211.129 --min-rate 10000            
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-03-25 12:09 CST
Nmap scan report for 192.168.211.128
Host is up (0.00010s latency).PORT   STATE  SERVICE VERSION
22/tcp open   ssh     OpenSSH 9.4p1 Debian 1 (protocol 2.0)
| ssh-hostkey: 
|   256 88:b3:16:da:ee:5f:d3:ed:0b:68:41:39:87:f7:30:65 (ECDSA)
|_  256 a3:3f:3d:b4:27:ba:fa:23:5a:fb:b3:72:25:54:69:58 (ED25519)
80/tcp closed http
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernelService detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 2.62 seconds

WEB

web信息收集

主页写的都是龙珠的介绍!

我们再源码中发现特殊字符串!!VWtaS1FsSXdPVTlKUlVwQ1ZFVjNQUT09 是base64,我们去破解一下!
┌──(root㉿ru)-[~/kali/vulnhub]
└─# echo "VWtaS1FsSXdPVTlKUlVwQ1ZFVjNQUT09" | base64 -d
UkZKQlIwOU9JRUpCVEV3PQ==                                                                                                                                                                                                                                     
┌──(root㉿ru)-[~/kali/vulnhub]
└─# echo "VWtaS1FsSXdPVTlKUlVwQ1ZFVjNQUT09" | base64 -d | base64 -d
RFJBR09OIEJBTEw=                                                                                                                                                                                                                                     
┌──(root㉿ru)-[~/kali/vulnhub]
└─# echo "VWtaS1FsSXdPVTlKUlVwQ1ZFVjNQUT09" | base64 -d | base64 -d | base64 -d
DRAGON BALL    
经过三次base64解密发现字符串  DRAGON BALL  也不知道是啥?我觉得应该是目录!   我们先来一次目录爆破!

gobuster
┌──(root?ru)-[~/kali/vulnhub]
└─# gobuster dir -u http://192.168.211.129/ -x .php,.txt,.html -w /usr/share/wordlists/seclists/Discovery/Web-Content/directory-list-lowercase-2.3-medium.txt
===============================================================
Gobuster v3.6
by OJ Reeves (@TheColonial) & Christian Mehlmauer (@firefart)
===============================================================
[+] Url:                     http://192.168.211.129/
[+] Method:                  GET
[+] Threads:                 10
[+] Wordlist:                /usr/share/wordlists/seclists/Discovery/Web-Content/directory-list-lowercase-2.3-medium.txt
[+] Negative Status codes:   404
[+] User Agent:              gobuster/3.6
[+] Extensions:              html,php,txt
[+] Timeout:                 10s
===============================================================
Starting gobuster in directory enumeration mode
===============================================================
/.php                 (Status: 403) [Size: 280]
/.html                (Status: 403) [Size: 280]
/index.html           (Status: 200) [Size: 4355]
/robots.txt           (Status: 200) [Size: 33]
/.php                 (Status: 403) [Size: 280]
/.html                (Status: 403) [Size: 280]
/server-status        (Status: 403) [Size: 280]
Progress: 830572 / 830576 (100.00%)
===============================================================
Finished
===============================================================

┌──(root㉿ru)-[~/kali/vulnhub]
└─# echo "eW91IGZpbmQgdGhlIGhpZGRlbiBkaXI=" | base64 -d 
you find the hidden dir
隐藏目录??想了半天只能是那个四次解码的字符串  DRAGON BALL    

果然!

隐藏目录发现

┌──(root㉿ru)-[~/kali/vulnhub]
└─# axel http://192.168.211.129/DRAGON%20BALL/secret.txt
正在初始化下载:http://192.168.211.129/DRAGON%20BALL/secret.txt
File size: 183 字节 (183 bytes)
正在打开输出文件 secret.txt
正在开始下载[100%] [.......................................................................................................................................................................................................] [   1.8KB/s]已下载 183 字节,用时 0 秒。(1.77 KB/s)
┌──(root㉿ru)-[~/kali/vulnhub]
└─# cat secret_1.txt 
http://192.168.211.129/facebook.com
http://192.168.211.129/youtube.com
http://192.168.211.129/google.com
http://192.168.211.129/vanakkam%20nanba
http://192.168.211.129/customer
http://192.168.211.129/customers
http://192.168.211.129/taxonomy
http://192.168.211.129/username
http://192.168.211.129/passwd
http://192.168.211.129/yesterday
http://192.168.211.129/yshop
http://192.168.211.129/zboard
http://192.168.211.129/zeus
http://192.168.211.129/aj.html
http://192.168.211.129/zoom.html
http://192.168.211.129/zero.html
http://192.168.211.129/welcome.html
http://192.168.211.129/%20DRAGON%20BALL/facebook.com
http://192.168.211.129/%20DRAGON%20BALL/youtube.com
http://192.168.211.129/%20DRAGON%20BALL/google.com
http://192.168.211.129/%20DRAGON%20BALL/vanakkam%20nanba
http://192.168.211.129/%20DRAGON%20BALL/customer
http://192.168.211.129/%20DRAGON%20BALL/customers
http://192.168.211.129/%20DRAGON%20BALL/taxonomy
http://192.168.211.129/%20DRAGON%20BALL/username
http://192.168.211.129/%20DRAGON%20BALL/passwd
http://192.168.211.129/%20DRAGON%20BALL/yesterday
http://192.168.211.129/%20DRAGON%20BALL/yshop
http://192.168.211.129/%20DRAGON%20BALL/zboard
http://192.168.211.129/%20DRAGON%20BALL/zeus
http://192.168.211.129/%20DRAGON%20BALL/aj.html
http://192.168.211.129/%20DRAGON%20BALL/zoom.html
http://192.168.211.129/%20DRAGON%20BALL/zero.html
http://192.168.211.129/%20DRAGON%20BALL/welcome.html
http://192.168.211.129/%20DRAGON%20BALL/Vulnhub/facebook.com
http://192.168.211.129/%20DRAGON%20BALL/Vulnhub/youtube.com
http://192.168.211.129/%20DRAGON%20BALL/Vulnhub/google.com
http://192.168.211.129/%20DRAGON%20BALL/Vulnhub/vanakkam%20nanba
http://192.168.211.129/%20DRAGON%20BALL/Vulnhub/customer
http://192.168.211.129/%20DRAGON%20BALL/Vulnhub/customers
http://192.168.211.129/%20DRAGON%20BALL/Vulnhub/taxonomy
http://192.168.211.129/%20DRAGON%20BALL/Vulnhub/username
http://192.168.211.129/%20DRAGON%20BALL/Vulnhub/passwd
http://192.168.211.129/%20DRAGON%20BALL/Vulnhub/yesterday
http://192.168.211.129/%20DRAGON%20BALL/Vulnhub/yshop
http://192.168.211.129/%20DRAGON%20BALL/Vulnhub/zboard
http://192.168.211.129/%20DRAGON%20BALL/Vulnhub/zeus
http://192.168.211.129/%20DRAGON%20BALL/Vulnhub/aj.html
http://192.168.211.129/%20DRAGON%20BALL/Vulnhub/zoom.html
http://192.168.211.129/%20DRAGON%20BALL/Vulnhub/zero.html
http://192.168.211.129/%20DRAGON%20BALL/Vulnhub/welcome.html格式化处理数据,我们要先遍历所有的url!
┌──(root㉿ru)-[~/kali/vulnhub]
└─# cat secret_1.txt | xargs -n 1 -P 10 curl -Is -o /dev/null -w "%{url_effective}  - %{http_code} \n" >> results.txt ┌──(root㉿ru)-[~/kali/vulnhub]
└─# cat results.txt                                                                                                  
http://192.168.211.129/youtube.com  - 404 
http://192.168.211.129/facebook.com  - 404 
http://192.168.211.129/google.com  - 404 
http://192.168.211.129/customer  - 404 
http://192.168.211.129/customers  - 404 
http://192.168.211.129/taxonomy  - 404 
http://192.168.211.129/username  - 404 
http://192.168.211.129/passwd  - 404 
http://192.168.211.129/vanakkam%20nanba  - 404 
http://192.168.211.129/yesterday  - 404 
http://192.168.211.129/yshop  - 404 
http://192.168.211.129/zboard  - 404 
http://192.168.211.129/zeus  - 404 
http://192.168.211.129/aj.html  - 404 
http://192.168.211.129/zoom.html  - 404 
http://192.168.211.129/%20DRAGON%20BALL/youtube.com  - 404 
http://192.168.211.129/welcome.html  - 404 
http://192.168.211.129/%20DRAGON%20BALL/customers  - 404 
http://192.168.211.129/%20DRAGON%20BALL/facebook.com  - 404 
http://192.168.211.129/%20DRAGON%20BALL/google.com  - 404 
http://192.168.211.129/zero.html  - 404 
http://192.168.211.129/%20DRAGON%20BALL/vanakkam%20nanba  - 404 
http://192.168.211.129/%20DRAGON%20BALL/customer  - 404 
http://192.168.211.129/%20DRAGON%20BALL/taxonomy  - 404 
http://192.168.211.129/%20DRAGON%20BALL/username  - 404 
http://192.168.211.129/%20DRAGON%20BALL/passwd  - 404 
http://192.168.211.129/%20DRAGON%20BALL/yesterday  - 404 
http://192.168.211.129/%20DRAGON%20BALL/yshop  - 404 
http://192.168.211.129/%20DRAGON%20BALL/zboard  - 404 
http://192.168.211.129/%20DRAGON%20BALL/zeus  - 404 
http://192.168.211.129/%20DRAGON%20BALL/aj.html  - 404 
http://192.168.211.129/%20DRAGON%20BALL/zero.html  - 404 
http://192.168.211.129/%20DRAGON%20BALL/welcome.html  - 404 
http://192.168.211.129/%20DRAGON%20BALL/Vulnhub/facebook.com  - 404 
http://192.168.211.129/%20DRAGON%20BALL/zoom.html  - 404 
http://192.168.211.129/%20DRAGON%20BALL/Vulnhub/google.com  - 404 
http://192.168.211.129/%20DRAGON%20BALL/Vulnhub/youtube.com  - 404 
http://192.168.211.129/%20DRAGON%20BALL/Vulnhub/customer  - 404 
http://192.168.211.129/%20DRAGON%20BALL/Vulnhub/vanakkam%20nanba  - 404 
http://192.168.211.129/%20DRAGON%20BALL/Vulnhub/taxonomy  - 404 
http://192.168.211.129/%20DRAGON%20BALL/Vulnhub/customers  - 404 
http://192.168.211.129/%20DRAGON%20BALL/Vulnhub/passwd  - 404 
http://192.168.211.129/%20DRAGON%20BALL/Vulnhub/yesterday  - 404 
http://192.168.211.129/%20DRAGON%20BALL/Vulnhub/username  - 404 
http://192.168.211.129/%20DRAGON%20BALL/Vulnhub/yshop  - 404 
http://192.168.211.129/%20DRAGON%20BALL/Vulnhub/zeus  - 404 
http://192.168.211.129/%20DRAGON%20BALL/Vulnhub/zboard  - 404 
http://192.168.211.129/%20DRAGON%20BALL/Vulnhub/aj.html  - 404 
http://192.168.211.129/%20DRAGON%20BALL/Vulnhub/zoom.html  - 404 
http://192.168.211.129/%20DRAGON%20BALL/Vulnhub/zero.html  - 404 
http://192.168.211.129/%20DRAGON%20BALL/Vulnhub/welcome.html  - 404 
好吧,全部404!!!

剩下的两个内容一个是图片,一个是静态的登录框!

图片隐写

使用binwalk、exiftool、steghide都没用!!图片可能存在特殊机制!我们使用stegseek破解一下吧!

果然,密码是love,文件叫id_rsa

ssh登录
┌──(root㉿ru)-[~/kali/vulnhub]
└─# cat id_rsa               
-----BEGIN OPENSSH PRIVATE KEY-----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-----END OPENSSH PRIVATE KEY-----
我试了很多用户名!DRAGON BALL、DRAGON、dragon、root、admin....直到我想起了这个

用户名:xmen


成功啦!

提权

get user

得到了user的flag!

系统信息收集
xmen@debian:~$ find / -perm -u=s -type f 2>/dev/null
/home/xmen/script/shell
/usr/lib/dbus-1.0/dbus-daemon-launch-helper
/usr/lib/eject/dmcrypt-get-device
/usr/lib/openssh/ssh-keysign
/usr/bin/umount
/usr/bin/su
/usr/bin/mount
/usr/bin/chsh
/usr/bin/gpasswd
/usr/bin/chfn
/usr/bin/sudo
/usr/bin/newgrp
/usr/bin/passwd
xmen@debian:~$ 
我们可以看到/home/xmen/script/shell可以利用!!

这是一段c代码,在main函数中以uid、gid为0的权限调用ps命令!uid、pid为0,说明是root高权限!
以高权限运行ps命令!我们可以利用这个做一个命令劫持!!

创建完成之后,发现路径的优先级在usr目录!我们改变一下!

完成了!把当前的环境变量加入到系统环境变量中,且优先级当前路径大于usr路径!

get root

root@debian:~# cd /root
root@debian:/root# ls 
proof.txt
root@debian:/root# cat proof.txt _____ __________                                         /     \\______   \          ___  ___ _____   ____   ____  /  \ /  \|       _/          \  \/  //     \_/ __ \ /    \ 
/    Y    \    |   \           >    <|  Y Y  \  ___/|   |  \
\____|__  /____|_  /__________/__/\_ \__|_|  /\___  >___|  /\/       \/_____/_____/     \/     \/     \/     \/       join channel:   https://t.me/joinchat/St01KnXzcGeWMKSCyour flag: 031f7d2d89b9dd2da3396a0d7b7fb3e2root@debian:/root# 

本文来自互联网用户投稿,该文观点仅代表作者本人,不代表本站立场。本站仅提供信息存储空间服务,不拥有所有权,不承担相关法律责任。如若转载,请注明出处:http://www.hqwc.cn/news/568667.html

如若内容造成侵权/违法违规/事实不符,请联系编程知识网进行投诉反馈email:809451989@qq.com,一经查实,立即删除!

相关文章

论文篇06-论文范文-论基于架构的软件设计方法ABSD及应用(2024年软考高级系统架构设计师冲刺知识点总结系列文章)

试题 试题:论基于架构的软件设计方法(ABSD)及应用 基于架构的软件设计(Architecture-Based Software Design,ABSD)方法以构成软件架构的商业、质量和功能需求等要素来驱动整个软件开发过程。ABSD是一个自顶向下,递归细化的软件开发方法,它以软件系统功能的分解为基础…

kubernetes-k9s一个基于Linux 终端的集群管理工具

效果预览 下载 github 版本 此文档使用的版本是 v0.32.4&#xff0c;下载地址&#xff1a; https://github.com/derailed/k9s/releases/download/v0.32.4/k9s_linux_amd64.rpm 安装 rpm -ivh k9s_linux_amd64.rpm使用 启动 终端直接执行命令 k9s k9s基本操作 1 选择目…

Spring实例化Bean的三种方式

参考资料&#xff1a; Core Technologies 核心技术 spring实例化bean的三种方式 构造器来实例化bean 静态工厂方法实例化bean 非静态工厂方法实例化bean_spring中有参构造器实例化-CSDN博客 1. 构造函数 1.1. 空参构造函数 下面这样表示调用空参构造函数&#xff0c;使用p…

【JAVA】数据类型与变量(主要学习与c语言不同之处)

✅作者简介&#xff1a;大家好&#xff0c;我是橘橙黄又青&#xff0c;一个想要与大家共同进步的男人&#x1f609;&#x1f609; &#x1f34e;个人主页&#xff1a;橘橙黄又青-CSDN博客 目标&#xff1a; 1. 字面常量 2. 数据类型 3. 变量 1.字面常量 在上节课 Hello…

C语言操作符详细讲解

前言 本次博客一定会让刚刚学习C语言小白有所收获 本次操作符讲解不仅分类还会有代码示例 好好看 好好学 花上几分钟就可以避免许多坑 1 操作符的基本使用 1.1操作符的分类 按功能分 算术操作符&#xff1a; 、- 、* 、/ 、% 移位操作符: >> << 位操作符…

基于单片机的太阳能充电系统设计

摘要:本文所设计的太阳能充电系统主要由以下几个模块组成:STC89C52 主控模块、TP4056 充电电路、电压AD 采集模块、LCD1602 液晶显示模块和太阳能充电电池等组成。此太阳能充电器制作简单,性价比高,性能稳定。 关键词:LCD1602;太阳能充电系统;ADC0832 太阳能充电系统的充…

QT在子线程中更新UI界面

在Qt中&#xff0c;直接从子线程更新UI是不安全的&#xff0c;因为Qt的UI组件通常不是线程安全的。这意味着&#xff0c;如果你尝试在子线程中直接调用UI组件的方法&#xff0c;可能会导致程序崩溃或者不可预测的行为。为了安全地从子线程更新UI&#xff0c;Qt提供了几种机制&a…

中国电子学会科学技术奖公布,腾讯、北京大学、北京科技大学联合项目获一等奖

3月26日记者获悉&#xff0c;中国电子学会公布科学技术奖获奖名单&#xff0c;由腾讯主导&#xff0c;北京大学、北京科技大学共同参与的联合项目《面向大规模数据的Angel机器学习平台关键技术及应用》获科技进步一等奖。 Angel机器学习平台是支撑腾讯混元大模型的核心技术&am…

c++初步

作业&#xff1a; 定义自己的命名空间&#xff0c;其中有string类型的变量&#xff0c;再定义两个函数&#xff0c;一个函数完成字符串的输入&#xff0c;一个函数完成求字符串长度&#xff0c;再定义一个全局函数完成对该字符串的反转 #include <iostream> #include &…

Linux的学习之路:1、发展史与编译环境的搭建

一、发展史 1991年10月5日&#xff0c;赫尔辛基大学的一名研究生Linus Benedict Torvalds在一个Usenet新闻组 &#xff08;comp.os.minix&#xff09;中宣布他编制出了一种类似UNIX的小操作系统&#xff0c;叫Linux。新的操作系统是受到另一个UNIX的小操作系统——Minix的启发…

蓝桥杯2023真题-幸运数字

目录 进制转换&#xff1a; 思路 代码 题目链接&#xff1a; 0幸运数字 - 蓝桥云课 (lanqiao.cn) 本题就考的进制转换问题&#xff0c;要将十进制5转换成二进制&#xff0c;通过%2,和/2的交替使用即可完成&#xff0c;所得余数就是转换成的二进制各位的值&#xff0c;转换…

【贪心】【分类讨论】2499. 让数组不相等的最小总代价

作者推荐 视频算法专题 本文涉及知识点 贪心 分类讨论 LeetCode2499. 让数组不相等的最小总代价 给你两个下标从 0 开始的整数数组 nums1 和 nums2 &#xff0c;两者长度都为 n 。 每次操作中&#xff0c;你可以选择交换 nums1 中任意两个下标处的值。操作的 开销 为两个下…