Date
Mar 10, 2024 → Mar 17, 2024
Tag
SQLI
Linux
Local privilege escalation
Password Cracking
Scan
Confirm which internal IP
192.168.56.103
scan this ip, see what port it open and what service running on it.
scan those port and see what version is the service, what OS system is this PC and try search any we can used script for those service.
http | 80 |
rpcbind | 111 |
ssh | 777 |
80/http
try scan this website
some path contain about phpinfo or others, maybe it is the way.
we also can access their admin login page.
and we can see what version is for this PHP
search any vulnerability we can used
according the result, maybe we can use 35539, although it looks like a DDOS, but the version is most suitable.
after build payload and use it, nothing happened, so chose an other way to try one more time.
After 1 days, i had tied almost every methods in searchsploit, but it doesn’t work, i want to change the target to RPCBIND which is port 111, but i tried search in searchsploit and google, all of them shows me that only included DDOS but i don’t know what is the related between DDOS and get the access.Maybe i need to give up, since i don’t have more knowledge to support me to find out others clue.
Hit 1
After see a hit from redteamnote, i can continue for my journey.
we can see there is a photo in the main website, we can try if any info inside the photo.
wget http://192.168.56.104/main.gif
after checked, a suspicious info behind of the metadata of the photo.
kzMb5nVYJw
and we can try as password of the phpmyadmin or ssh, but none of them are true one.
Hit 2
Turns out it is a PATH!!!!!!
Code say the key isn’t difficult, so we can use hydra to have a try.
analyze the request method via burpsuite and struct the command.
BurpsuiteHydrasudo hydra 192.168.56.104 http-post-form "/kzMb5nVYJw/index.php:key=^PASS^:invalid key" -P /usr/share/wordlists/rockyou.txt -l null
POKEMON GETed : elite
use the result see what will happened
try input something
only shown success but nothing else, i guess must none of a users are same with my input. so maybe we can BF it again.
only a sec the answer come out, but diff with my imagined,
input a
seems like a username search from SQL, maybe we can use SQLI to breakthroughs the situation.
SQLMAP
Oh! won the lottery
but i don’t know what is this, try network power! hash-identify
OK, Nice one, Base64!
what next?
Sure Sure MD5
omega
here is the password of the username ramses, so what is the platform about this account?
after tried, we can login to the SSH~!
the most i interested file is
but after search, none of them i have privilege to edit or run, but i find a file in backup folder.
Hit 3
I totally don’t know how to raise my privilege,
after see the video, i know, hope next time i can rmb it.
create a link file to link /bin/sh, it will make
ps
command can make a shell session to me.and add the
.
to $PATH, but i don’t know what is this rig doing.and then