1、找到靶机ip:192.168.75.11
nmap -sn 192.168.75.0/24
2、扫描靶机端口
root@chounana:~# nmap -p- -A 192.168.75.11
Starting Nmap 7.80 ( https://nmap.org )
Nmap scan report for 192.168.75.11
Host is up (0.00038s latency).
Not shown: 65533 closed ports
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 6.6.1p1 Ubuntu 2ubuntu2.13 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey:
| 1024 d8:e0:99:8c:76:f1:86:a3:ce:09:c8:19:a4:1d:c7:e1 (DSA)
| 2048 82:b0:20:bc:04:ea:3f:c2:cf:73:c3:d4:fa:b5:4b:47 (RSA)
| 256 03:4d:b0:70:4d:cf:5a:4a:87:c3:a5:ee:84:cc:aa:cc (ECDSA)
|_ 256 64:cd:d0:af:6e:0d:20:13:01:96:3b:8d:16:3a:d6:1b (ED25519)
80/tcp open http Apache httpd 2.4.10 ((Ubuntu))
|_http-server-header: Apache/2.4.10 (Ubuntu)
|_http-title: Site doesn't have a title (text/html).
MAC Address: 08:00:27:57:CE:FD (Oracle VirtualBox virtual NIC)
Device type: general purpose
Running: Linux 3.X|4.X
OS CPE: cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4
OS details: Linux 3.2 - 4.9
Network Distance: 1 hop
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
TRACEROUTE
HOP RTT ADDRESS
1 0.38 ms 192.168.75.11
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 19.80 seconds
root@chounana:~#
3、访问80端口,没有什么有用的东西
然后开始扫描目录,到这里就有点卡住了,使用kali常规的自带字典没有扫出好东西,于是后面直接使用暴力手段(修改靶机密码)进入到靶机里面看了下,发现是有个adminstration,将这个加入到字典扫一下(多此一举,假装是自己做出来的),其实自己有个好字典应该也能跑出来,所以这里还不是最靠脑洞的
进入到adminstration目录下,发现没有权限,先放着
然后扫一下这个目录下的目录,发现了很多,但是访问都是空,所以还是得返回到前面的adminstration,尝试常规的加x-forwarded-for:127.0.0.1试试能不能绕过,发现不能
于是又进去看了下源代码,发现还需要post上去username和password都是admin,才行(这就太考脑洞了吧)
4、成功进入后台,发现upload功能
上传文件拿shell,这里需要一个小小的绕过,只需要content-type是图片属性就行
本地开启监听,访问一下,成功拿到shell,然后通过python提权到tty
5、在home目录下得到第一个flag,看起来像是base64编码
base64解码后,得到yousef的用户名和密码
6、ssh登录yousef用户
sudo -l发现可以是ALL,直接sudo su切换到root身份,拿到flag