Post

hackmyvm Zen靶机复盘

难度-Hard

hackmyvm Zen靶机复盘

网段扫描

1
2
3
4
5
6
7
8
Interface: eth0, type: EN10MB, MAC: 00:0c:29:d1:27:55, IPv4: 192.168.137.190
Starting arp-scan 1.10.0 with 256 hosts (https://github.com/royhills/arp-scan)
192.168.137.1	3e:21:9c:12:bd:a3	(Unknown: locally administered)
192.168.137.47	3e:21:9c:12:bd:a3	(Unknown: locally administered)
192.168.137.64	a0:78:17:62:e5:0a	Apple, Inc.

8 packets received by filter, 0 packets dropped by kernel
Ending arp-scan 1.10.0: 256 hosts scanned in 2.096 seconds (122.14 hosts/sec). 3 responded

端口扫描

1
2
3
4
5
6
22/tcp   open  ssh     OpenSSH 8.4p1 Debian 5+deb11u3 (protocol 2.0)
| ssh-hostkey: 
|   3072 f6:a3:b6:78:c4:62:af:44:bb:1a:a0:0c:08:6b:98:f7 (RSA)
|   256 bb:e8:a2:31:d4:05:a9:c9:31:ff:62:f6:32:84:21:9d (ECDSA)
|_  256 3b:ae:34:64:4f:a5:75:b9:4a:b9:81:f9:89:76:99:eb (ED25519)
80/tcp   open  http    Apache httpd 2.4.62 ((Debian))

获取webshell

picture 0
picture 1
picture 3

picture 2

picture 4
picture 5
picture 6
picture 7
picture 8

无sql看看怎么处理

picture 9
picture 10

感觉是xxe

picture 11
picture 12
picture 13
picture 14

啥都没改,直接按照这个文档操作:https://github.com/F-Masood/ZenPhotoCMSv1.5.7-RCE

picture 15
picture 16
picture 17

拿shell还是很简单

提权

picture 18
picture 19

没线索密码复用试试

picture 20

不是

picture 21
picture 22
picture 23
picture 24
picture 25

mysql没啥用,没有密码

picture 26

无定时任务那我咋利用/usr/local/bin

picture 27

跑一下密码

picture 28
picture 29 picture 31

picture 30

picture 32

不是怎么干哈哈哈

picture 33

我推断环境劫持

picture 34

推断成功

userflag:hmvzenit

rootflag:hmvenlightenment

This post is licensed under CC BY 4.0 by the author.