zoukankan      html  css  js  c++  java
  • VulnHub::Kioptrix Lv1

    实验环境

    info

    渗透过程

    0x01 信息搜集

    由于不知道靶机IP地址,进行D段扫描,获得靶机IP地址:

    masscan:

    masscan 10.10.0.0/24 -p80 --rate 1000
    Starting masscan 1.0.5 (http://bit.ly/14GZzcT) at 2020-12-27 12:39:45 GMT
     -- forced options: -sS -Pn -n --randomize-hosts -v --send-eth
    Initiating SYN Stealth Scan
    Scanning 256 hosts [1 port/host]
    Discovered open port 80/tcp on 10.10.0.135
    

    nmap:

    nmap -sn 10.10.0.0/24 --min-rate 1000
    Starting Nmap 7.91 ( https://nmap.org ) at 2020-12-27 20:50 CST
    Nmap scan report for 10.10.0.135
    Host is up (0.00059s latency).
    Nmap done: 256 IP addresses (1 host up) scanned in 15.19 seconds
    

    访问后发现135主机为靶机,进行端口扫描:

    masscan 10.10.0.135 -p0-65535 --rate 1000
    Starting masscan 1.0.5 (http://bit.ly/14GZzcT) at 2020-12-27 12:51:24 GMT
     -- forced options: -sS -Pn -n --randomize-hosts -v --send-eth
    Initiating SYN Stealth Scan
    Scanning 1 hosts [65536 ports/host]
    Discovered open port 22/tcp on 10.10.0.135
    Discovered open port 111/tcp on 10.10.0.135
    Discovered open port 1024/tcp on 10.10.0.135
    Discovered open port 139/tcp on 10.10.0.135
    Discovered open port 80/tcp on 10.10.0.135
    Discovered open port 443/tcp on 10.10.0.135
    

    使用nmap进行详细扫描:

    nmap -sC -sV -p22,80,111,139,443,1024 --min-rate 1000 10.10.0.135
    Starting Nmap 7.91 ( https://nmap.org ) at 2020-12-27 20:56 CST
    Nmap scan report for 10.10.0.135
    Host is up (0.0012s latency).
    
    PORT     STATE SERVICE     VERSION
    22/tcp   open  ssh         OpenSSH 2.9p2 (protocol 1.99)
    | ssh-hostkey:
    |   1024 b8:74:6c:db:fd:8b:e6:66:e9:2a:2b:df:5e:6f:64:86 (RSA1)
    |   1024 8f:8e:5b:81:ed:21:ab:c1:80:e1:57:a3:3c:85:c4:71 (DSA)
    |_  1024 ed:4e:a9:4a:06:14:ff:15:14:ce:da:3a:80:db:e2:81 (RSA)
    |_sshv1: Server supports SSHv1
    80/tcp   open  http        Apache httpd 1.3.20 ((Unix)  (Red-Hat/Linux) mod_ssl/2.8.4 OpenSSL/0.9.6b)
    | http-methods:
    |_  Potentially risky methods: TRACE
    |_http-server-header: Apache/1.3.20 (Unix)  (Red-Hat/Linux) mod_ssl/2.8.4 OpenSSL/0.9.6b
    |_http-title: Test Page for the Apache Web Server on Red Hat Linux
    111/tcp  open  rpcbind     2 (RPC #100000)
    | rpcinfo:
    |   program version    port/proto  service
    |   100000  2            111/tcp   rpcbind
    |   100000  2            111/udp   rpcbind
    |   100024  1           1024/tcp   status
    |_  100024  1           1024/udp   status
    139/tcp  open  netbios-ssn Samba smbd (workgroup: MYGROUP)
    443/tcp  open  ssl/https   Apache/1.3.20 (Unix)  (Red-Hat/Linux) mod_ssl/2.8.4 OpenSSL/0.9.6b
    |_http-server-header: Apache/1.3.20 (Unix)  (Red-Hat/Linux) mod_ssl/2.8.4 OpenSSL/0.9.6b
    |_http-title: 400 Bad Request
    | ssl-cert: Subject: commonName=localhost.localdomain/organizationName=SomeOrganization/stateOrProvinceName=SomeState/countryName=--
    | Not valid before: 2009-09-26T09:32:06
    |_Not valid after:  2010-09-26T09:32:06
    |_ssl-date: 2020-12-27T13:59:43+00:00; +1h01m56s from scanner time.
    | sslv2:
    |   SSLv2 supported
    |   ciphers:
    |     SSL2_RC4_64_WITH_MD5
    |     SSL2_RC2_128_CBC_WITH_MD5
    |     SSL2_RC2_128_CBC_EXPORT40_WITH_MD5
    |     SSL2_DES_192_EDE3_CBC_WITH_MD5
    |     SSL2_RC4_128_EXPORT40_WITH_MD5
    |     SSL2_RC4_128_WITH_MD5
    |_    SSL2_DES_64_CBC_WITH_MD5
    1024/tcp open  status      1 (RPC #100024)
    
    Host script results:
    |_clock-skew: 1h01m55s
    |_nbstat: NetBIOS name: KIOPTRIX, NetBIOS user: <unknown>, NetBIOS MAC: <unknown> (unknown)
    |_smb2-time: Protocol negotiation failed (SMB2)
    
    Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
    Nmap done: 1 IP address (1 host up) scanned in 63.42 seconds
    

    whatweb识别:

    whatweb http://10.10.0.135/
    http://10.10.0.135/ [200 OK] Apache[1.3.20][mod_ssl/2.8.4], Country[RESERVED][ZZ], Email[webmaster@example.com], HTTPServer[Red Hat Linux][Apache/1.3.20 (Unix)  (Red-Hat/Linux) mod_ssl/2.8.4 OpenSSL/0.9.6b], IP[10.10.0.135], OpenSSL[0.9.6b], Title[Test Page for the Apache Web Server on Red Hat Linux]
    

    nikto:

    nikto -host http://192.168.3.110
    - Nikto v2.1.6
    ---------------------------------------------------------------------------
    + Target IP:          192.168.3.110
    + Target Hostname:    192.168.3.110
    + Target Port:        80
    + Start Time:         2020-12-28 22:46:26 (GMT-5)
    ---------------------------------------------------------------------------
    + Server: Apache/1.3.20 (Unix)  (Red-Hat/Linux) mod_ssl/2.8.4 OpenSSL/0.9.6b
    + Server may leak inodes via ETags, header found with file /, inode: 34821, size: 2890, mtime: Wed Sep  5 23:12:46 2001
    + The anti-clickjacking X-Frame-Options header is not present.
    + The X-XSS-Protection header is not defined. This header can hint to the user agent to protect against some forms of XSS
    + The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type
    + OSVDB-27487: Apache is vulnerable to XSS via the Expect header
    + Apache/1.3.20 appears to be outdated (current is at least Apache/2.4.37). Apache 2.2.34 is the EOL for the 2.x branch.
    + mod_ssl/2.8.4 appears to be outdated (current is at least 2.8.31) (may depend on server version)
    + OpenSSL/0.9.6b appears to be outdated (current is at least 1.1.1). OpenSSL 1.0.0o and 0.9.8zc are also current.
    + Allowed HTTP Methods: GET, HEAD, OPTIONS, TRACE 
    + OSVDB-877: HTTP TRACE method is active, suggesting the host is vulnerable to XST
    + OSVDB-838: Apache/1.3.20 - Apache 1.x up 1.2.34 are vulnerable to a remote DoS and possible code execution. CAN-2002-0392.
    + OSVDB-4552: Apache/1.3.20 - Apache 1.3 below 1.3.27 are vulnerable to a local buffer overflow which allows attackers to kill any process on the system. CAN-2002-0839.
    + OSVDB-2733: Apache/1.3.20 - Apache 1.3 below 1.3.29 are vulnerable to overflows in mod_rewrite and mod_cgi. CAN-2003-0542.
    + mod_ssl/2.8.4 - mod_ssl 2.8.7 and lower are vulnerable to a remote buffer overflow which may allow a remote shell. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0082, OSVDB-756.
    + ///etc/hosts: The server install allows reading of any system file by adding an extra '/' to the URL.
    + OSVDB-682: /usage/: Webalizer may be installed. Versions lower than 2.01-09 vulnerable to Cross Site Scripting (XSS).
    + OSVDB-3268: /manual/: Directory indexing found.
    + OSVDB-3092: /manual/: Web server manual found.
    + OSVDB-3268: /icons/: Directory indexing found.
    + OSVDB-3233: /icons/README: Apache default file found.
    + OSVDB-3092: /test.php: This might be interesting...
    + /wp-content/themes/twentyeleven/images/headers/server.php?filesrc=/etc/hosts: A PHP backdoor file manager was found.
    + /wordpresswp-content/themes/twentyeleven/images/headers/server.php?filesrc=/etc/hosts: A PHP backdoor file manager was found.
    + /wp-includes/Requests/Utility/content-post.php?filesrc=/etc/hosts: A PHP backdoor file manager was found.
    + /wordpresswp-includes/Requests/Utility/content-post.php?filesrc=/etc/hosts: A PHP backdoor file manager was found.
    + /wp-includes/js/tinymce/themes/modern/Meuhy.php?filesrc=/etc/hosts: A PHP backdoor file manager was found.
    + /wordpresswp-includes/js/tinymce/themes/modern/Meuhy.php?filesrc=/etc/hosts: A PHP backdoor file manager was found.
    + /assets/mobirise/css/meta.php?filesrc=: A PHP backdoor file manager was found.
    + /login.cgi?cli=aa%20aa%27cat%20/etc/hosts: Some D-Link router remote command execution.
    + /shell?cat+/etc/hosts: A backdoor was identified.
    + 8724 requests: 0 error(s) and 30 item(s) reported on remote host
    + End Time:           2020-12-28 22:47:07 (GMT-5) (41 seconds)
    ---------------------------------------------------------------------------
    + 1 host(s) tested
    

    目录扫描:

    dirscan

    未发现敏感目录。

    0x02 解题

    Apache-SSL远程缓冲区溢出漏洞(CVE-2002-0082)

    使用Exploit-DB搜索到对应的Exploit进行下载。接下来就是对.c文件进行编译。

    searchspolit

    选择参数:

    mod_ssl

    执行exp,得到root:

    exp

    Samba服务器call_trans2open远程缓冲区溢出漏洞(CVE-2003-0201)

    开放139端口,进行samba版本识别:

    enum4linux -a 192.168.3.110
    smbclient -L //192.168.3.110
    

    上述两种方式未获得samba版本信息。

    smb_version

    搜索相关漏洞:

    CVE

    exploitdb信息:

    执行exp,得到flag:

    root

  • 相关阅读:
    199. Binary Tree Right Side View
    [leetcode]leetcode初体验
    [项目]WebService涉及到的部分核心代码
    设计模式之简单工厂模式Simple Factory(四创建型)
    博客园利用Word发布博客功能[其他博客也可以如此使用]
    设计模式之单例模式Singleton(三创建型)
    设计模式之代理模式(二结构型)
    设计模式之策略模式(一对象行为型)
    Enterprise Achitect使用与类的关系的简单介绍
    2016年1月15日面试某互联网公司总结(二)
  • 原文地址:https://www.cnblogs.com/chalan630/p/14210353.html
Copyright © 2011-2022 走看看