Vulnhub SickOs1

# CTF-WriteupSickOs1

all resource can be found on www.vulnhub.com

Use arp-scan to get target's IP 
And NMAP to scan the target


We found port 3128 is open, next step use nikto to scan if there's any vulnerability. 



We found a shellshock, which can be use on attack. Also we found a /robots.txt file

Next, port 3128 is a proxy server, so I use firefox to set proxy on port 3128 and go to localhost. I got this picture:


Based on the nikto, we can enter localhost/robots.txt, and got /wolfcms

So, I decided go to this /wolfcms page and see a website


For wolf CMS, it's admin page URL is /?/admin, and a good start username/password is admin/admin

Go through the login page, next step is found is there any place we can upload a reverse shell to connect back to my host. And is on files folder, I can upload files

This time, I use php-reverse-shell.php as my upload file 

upload to 3128 server, also need to chmod 777
 open netcat, and use browser to see the payload file, let nc connect remotely
escalate your privilege by python :
python -c 'import pty; pty.spawn("/bin/bash")' 
now we still need to escalate to root
 there is a config file in /var/www/wolf include username and password
 We can use this usr/pwd as way to have higher privilege, final step is sudo su

Finally, I have the highest privilege.


Basically, always starts from nmap and nikto, which can provide many information and vulnerability.
Next is try to find is there any place can put your payload or backdoor.
Finally is using netcat or metasploit to exploit and escalate privilege .

留言

  1. 感謝您的分享 受益良多 ~^^~ 希望看完你的部落格後可以變成駭客大師

    回覆刪除
  2. 我先變神奇寶貝大師啦!!!!

    回覆刪除

張貼留言

這個網誌中的熱門文章

惡意程式分析 - 常用工具篇

Offensive Security Certified Professional (OSCP) 滲透測試證照經驗分享

Offensive Security Certified Professional Review