2019-01-15-Vulnhub渗透测试实战writeup(
2019-01-15 本文已影响11人
最初的美好_kai
Kioptrix
nmap如下:
# Nmap 7.40 scan initiated Tue Jan 15 02:25:35 2019 as: nmap -p- -sV -Pn -oN t.xml 192.168.1.104
Nmap scan report for 192.168.1.104
Host is up (0.0040s latency).
Not shown: 65529 closed ports
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 2.9p2 (protocol 1.99)
80/tcp open http Apache httpd 1.3.20 ((Unix) (Red-Hat/Linux) mod_ssl/2.8.4 OpenSSL/0.9.6b)
111/tcp open rpcbind 2 (RPC #100000)
139/tcp open netbios-ssn Samba smbd (workgroup: MYGROUP)
443/tcp open ssl/https Apache/1.3.20 (Unix) (Red-Hat/Linux) mod_ssl/2.8.4 OpenSSL/0.9.6b
1024/tcp open status 1 (RPC #100024)
MAC Address: 00:0C:29:47:BB:6C (VMware)
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Tue Jan 15 02:26:26 2019 -- 1 IP address (1 host up) scanned in 51.20 seconds
dirb扫描如下:
http://192.168.1.104/~operator (CODE:403|SIZE:273)
+ http://192.168.1.104/~root (CODE:403|SIZE:269)
+ http://192.168.1.104/cgi-bin/ (CODE:403|SIZE:272)
+ http://192.168.1.104/index.html (CODE:200|SIZE:2890)#首页,apache页面
+http://192.168.1.104/usage/index.html (CODE:200|SIZE:3704)#什么东西的总结图表
+http://192.168.1.104/mrtg/index.html (CODE:200|SIZE:17318)#流量图表
http://192.168.1.104/test.php#显示php版本,好老啊
又是这种首页没任何东西的了。。。
nikto扫描也是没啥web上的玩意,那就直接从主机漏洞入手了。
主机漏洞有两个,这个我不是很熟所以看了walkthrough。。。
一个是用于samba的漏洞,139端口,他们用了enum4linux这个脚本来获取samba的信息,这和以前的writeup用过不过忘了。
![](https://img.haomeiwen.com/i10153763/12ff9f745a8ae2cf.jpg)
有些可以匿名登录就直接找出来了。。据说可以获取到版本号,但我实测没有。
可以用sambaclient直接登录
![](https://img.haomeiwen.com/i10153763/6376479a223de1fe.jpg)
据说这里也可以直接获取版本号,实测也没有。
walkthrough里面是直接获取版本号以后直接上searchsploit
![](https://img.haomeiwen.com/i10153763/2c7233b9253c5b5a.jpg)
然后直接复制出来,编译该执行权限,再直接执行就获取shell了
![](https://img.haomeiwen.com/i10153763/0a86041b34208e40.jpg)
![](https://img.haomeiwen.com/i10153763/a308afbbef74e3fc.jpg)
另外还有一个openfuck漏洞,是Apache mod_ssl漏洞但是太老了这漏洞exp都不能再用了,所以上个修改图吧。
![](https://img.haomeiwen.com/i10153763/c5e9a3a2ce2ed815.jpg)