Deception
最后更新于
最后更新于
https://download.vulnhub.com/haclabs/Deception.ova
靶场IP:192.168.32.19
扫描对外端口服务
┌──(root㉿kali)-[~]
└─# nmap -sV -p1-65535 192.168.32.19
Starting Nmap 7.92 ( https://nmap.org ) at 2022-09-13 21:52 EDT
Nmap scan report for 192.168.32.19
Host is up (0.00010s latency).
Not shown: 65533 closed tcp ports (reset)
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 7.6p1 Ubuntu 4ubuntu0.3 (Ubuntu Linux; protocol 2.0)
80/tcp open http Apache httpd 2.4.29 ((Ubuntu))
MAC Address: 08:00:27:5B:E3:02 (Oracle VirtualBox virtual NIC)
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 8.76 seconds
访问80端口
爆破目录
┌──(root㉿kali)-[~]
└─# dirb http://192.168.32.19/
-----------------
DIRB v2.22
By The Dark Raver
-----------------
START_TIME: Tue Sep 13 22:07:45 2022
URL_BASE: http://192.168.32.19/
WORDLIST_FILES: /usr/share/dirb/wordlists/common.txt
-----------------
GENERATED WORDS: 4612
---- Scanning URL: http://192.168.32.19/ ----
+ http://192.168.32.19/index.html (CODE:200|SIZE:11026)
==> DIRECTORY: http://192.168.32.19/javascript/
==> DIRECTORY: http://192.168.32.19/phpmyadmin/
+ http://192.168.32.19/server-status (CODE:403|SIZE:278)
==> DIRECTORY: http://192.168.32.19/wordpress/
---- Entering directory: http://192.168.32.19/javascript/ ----
==> DIRECTORY: http://192.168.32.19/javascript/jquery/
---- Entering directory: http://192.168.32.19/phpmyadmin/ ----
==> DIRECTORY: http://192.168.32.19/phpmyadmin/doc/
+ http://192.168.32.19/phpmyadmin/favicon.ico (CODE:200|SIZE:22486)
+ http://192.168.32.19/phpmyadmin/index.php (CODE:200|SIZE:10525)
==> DIRECTORY: http://192.168.32.19/phpmyadmin/js/
+ http://192.168.32.19/phpmyadmin/libraries (CODE:403|SIZE:278)
==> DIRECTORY: http://192.168.32.19/phpmyadmin/locale/
+ http://192.168.32.19/phpmyadmin/phpinfo.php (CODE:200|SIZE:10527)
+ http://192.168.32.19/phpmyadmin/setup (CODE:401|SIZE:460)
==> DIRECTORY: http://192.168.32.19/phpmyadmin/sql/
+ http://192.168.32.19/phpmyadmin/templates (CODE:403|SIZE:278)
==> DIRECTORY: http://192.168.32.19/phpmyadmin/themes/
---- Entering directory: http://192.168.32.19/wordpress/ ----
+ http://192.168.32.19/wordpress/index.php (CODE:301|SIZE:0)
+ http://192.168.32.19/wordpress/robots.txt (CODE:200|SIZE:22)
==> DIRECTORY: http://192.168.32.19/wordpress/wp-admin/
==> DIRECTORY: http://192.168.32.19/wordpress/wp-content/
==> DIRECTORY: http://192.168.32.19/wordpress/wp-includes/
+ http://192.168.32.19/wordpress/xmlrpc.php (CODE:405|SIZE:42)
---- Entering directory: http://192.168.32.19/javascript/jquery/ ----
+ http://192.168.32.19/javascript/jquery/jquery (CODE:200|SIZE:268026)
访问:/wordpress/
访问:/wordpress/robots.txt
枚举用户
┌──(root㉿kali)-[~]
└─# wpscan --url http://192.168.32.19/wordpress/ -eu
[i] User(s) Identified:
[+] haclabs
| Found By: Author Id Brute Forcing - Author Pattern (Aggressive Detection)
| Confirmed By: Login Error Messages (Aggressive Detection)
[+] yash
| Found By: Author Id Brute Forcing - Author Pattern (Aggressive Detection)
| Confirmed By: Login Error Messages (Aggressive Detection)
访问:/wordpress/robots.html
,输入内容,弹窗,看不出什么东西。
查看页面源代码,说要点击大于15次就会跳转到:admindelete.html
<html>
<body>
<script>
var count = 1;
function myFunction() {
if (count<15) {
var input = document.getElementById("uname").value;
alert("clicks left for noob "+ input +":"+ (50-count));
count++;
}
else {
window.location="admindelete.html";
}
};
</script>
<input type="text" id="uname" placeholder="your name"</input>
<br>
<button onclick="myFunction()">show quest</button>
</body>
</html>
直接访问:admindelete.html
按照提示,访问:hint.html
回去首页,收集API token
<!--
Modified from the Debian original for Ubuntu
Last updated: 2016-11-16
API old0 : 5F4DCC3B5AA
See: https://launchpad.net/bugs/1288690
-->
<!--API old2 : 327DEB -->
<!--API old 1 : 765D61D8 -->
<!--API new : 882CF99-->
收集所有 API 并将它们排列成一行后,所有 API 令牌看起来像这样:5F4DCC3B5AA765D61D8327DEB882CF99
我尝试了所有 API 令牌登录用户名 yash 和密码创建了所有 API 密钥,我得到了 yash 用户 shell
ssh yash@192.168.32.19
获得第一个flag
yash@haclabs:~$ ls
flag1.txt
yash@haclabs:~$ cat flag1.txt
JUST BELIEVE IN YOU!!
71C480DF93D6AE2F1EFAD1447C66C9525E316218CF51FC8D9ED832F2DAF18B73
我们尝试使用 cat 命令读取此文件的内容。我发现了一些非常有用的东西。
cat .systemlogs
(第一个是 haclabs
)和(第二个是A=123456789)(第三个是**+A[::-1]**)
我将第二个值视为变量,第三个看起来像 String Slicing the variable A,我们找到了这样的值(hacklabs987654321)
使用su(切换用户命令)将当前用户yash更改为haclabs并尝试密码haclabs987654321,我们的shell更改成功
我移动到 haclabs 主目录,我们看到了我们的第二个标志
再次使用密码 haclabs 将我们的 shell 普通用户升级为超级用户 root sudo su 命令