linux2

linux2

挑战内容

前景需要:看监控的时候发现webshell告警,领导让你上机检查你可以救救安服仔吗!!

1,提交攻击者IP

2,提交攻击者修改的管理员密码(明文)

3,提交第一次Webshell的连接URL(http://xxx.xxx.xxx.xx/abcdefg?abcdefg只需要提交abcdefg?abcdefg)

3,提交Webshell连接密码

4,提交数据包的flag1

5,提交攻击者使用的后续上传的木马文件名称

6,提交攻击者隐藏的flag2

7,提交攻击者隐藏的flag3

相关账户密码:

root/Inch@957821.

分析流量

image-20250406181405901

找到蚁剑流量

攻击者IP地址为:192.168.20.1

提交第一次Webshell的连接:index.php?user-app-register

连接密码:Network2020

使用nat-a对流量进行分析

找到flag1

flag1{Network@_2020_Hack}

后面发现又再次上传了一个冰蝎马

image-20250406181746293

使用的后续上传的木马文件名称为:version2.php

查看历史命令

cat .bash_history

image-20250406181933376

下载了宝塔

image-20250406181951460

找到flag3:flag3{5LourqoFt5d2zyOVUoVPJbOmeVmoKgcy6OZ}

image-20250406183329880

编辑过mpnotify.phpalinotify.php

查看找到flag2

image-20250406183710697

flag{bL5Frin6JVwVw7tJBdqXlHCMVpAenXI9In9}

宝塔面板

image-20250406182600140

密码应该是存放在数据库里面了

在网站目录查找config文件

[root@web-server wwwroot]# find . -name "*config*"
./127.0.0.1/app/certificate/cls/config.cls.php
./127.0.0.1/app/content/cls/config.cls.php
./127.0.0.1/app/core/tpls/master/config.tpl
./127.0.0.1/app/course/cls/config.cls.php
./127.0.0.1/app/docs/cls/config.cls.php
./127.0.0.1/app/exam/controller/config.master.php
./127.0.0.1/app/exam/tpls/master/config.tpl
./127.0.0.1/app/seminar/cls/config.cls.php
./127.0.0.1/app/user/cls/config.cls.php
./127.0.0.1/app/user/controller/config.master.php
./127.0.0.1/app/user/tpls/master/config.tpl
./127.0.0.1/data/compile/exam/tpls/master/%%cpl%%config.php
./127.0.0.1/files/public/js/ckeditor/build-config.js
./127.0.0.1/files/public/js/ckeditor/config.js
./127.0.0.1/files/public/js/ckeditor/js/mathjax/config
./127.0.0.1/files/public/js/ckeditor/js/mathjax/jax/input/AsciiMath/config.js
./127.0.0.1/files/public/js/ckeditor/js/mathjax/jax/input/MathML/config.js
./127.0.0.1/files/public/js/ckeditor/js/mathjax/jax/input/TeX/config.js
./127.0.0.1/files/public/js/ckeditor/js/mathjax/jax/output/CommonHTML/config.js
./127.0.0.1/files/public/js/ckeditor/js/mathjax/jax/output/HTML-CSS/config.js
./127.0.0.1/files/public/js/ckeditor/js/mathjax/jax/output/NativeMML/config.js
./127.0.0.1/files/public/js/ckeditor/js/mathjax/jax/output/PlainSource/config.js
./127.0.0.1/files/public/js/ckeditor/js/mathjax/jax/output/PreviewHTML/config.js
./127.0.0.1/files/public/js/ckeditor/js/mathjax/jax/output/SVG/config.js
./127.0.0.1/files/public/js/ckeditor/samples/toolbarconfigurator
./127.0.0.1/files/public/js/ckeditor/samples/toolbarconfigurator/font/config.json
./127.0.0.1/files/public/js/mathajax/input/tex/extensions/configmacros.js
./127.0.0.1/lib/config.inc.php
./127.0.0.1/lib/include/phpexcel/PHPExcel/locale/bg/config
./127.0.0.1/lib/include/phpexcel/PHPExcel/locale/cs/config
./127.0.0.1/lib/include/phpexcel/PHPExcel/locale/da/config
./127.0.0.1/lib/include/phpexcel/PHPExcel/locale/de/config
./127.0.0.1/lib/include/phpexcel/PHPExcel/locale/en/uk/config
./127.0.0.1/lib/include/phpexcel/PHPExcel/locale/es/config
./127.0.0.1/lib/include/phpexcel/PHPExcel/locale/fi/config
./127.0.0.1/lib/include/phpexcel/PHPExcel/locale/fr/config
./127.0.0.1/lib/include/phpexcel/PHPExcel/locale/hu/config
./127.0.0.1/lib/include/phpexcel/PHPExcel/locale/it/config
./127.0.0.1/lib/include/phpexcel/PHPExcel/locale/nl/config
./127.0.0.1/lib/include/phpexcel/PHPExcel/locale/no/config
./127.0.0.1/lib/include/phpexcel/PHPExcel/locale/pl/config
./127.0.0.1/lib/include/phpexcel/PHPExcel/locale/pt/br/config
./127.0.0.1/lib/include/phpexcel/PHPExcel/locale/pt/config
./127.0.0.1/lib/include/phpexcel/PHPExcel/locale/ru/config
./127.0.0.1/lib/include/phpexcel/PHPExcel/locale/sv/config
./127.0.0.1/lib/include/phpexcel/PHPExcel/locale/tr/config

查看./127.0.0.1/lib/config.inc.php内容找到数据库配置文件

数据库账号密码为:kaoshi5Sx8mK5ieyLPb84m

登录数据库查看

select * from x2_user

image-20250406183121835

smd5在线爆破

image-20250406183209103

修改后的密码为:Network@2020

posted @ 2025-04-06 18:39  yk1ng  阅读(15)  评论(0)    收藏  举报