当前位置:网站首页 > 网络安全培训 > 正文

CTF靶场系列-De-ICE: S1.140

freebuffreebuf 2019-08-06 332 0

本文来源:

下载地址

http://hackingdojo.com/downloads/iso/De-ICE_S1.140.iso 

实战演练

使用netdiscover命令查找靶机的IP

image.png

使用nmap查看靶机开放的端口

image.png在浏览器打开

image.png爆破一下web目录

image.png在首页查看源代码最下面有这几行代码,就是问你有没有见到一个论坛

font class="hidden"> 1. Have you seen our new cool forum yet?br>br> 2. Do not post sensitive information to public!br>br> 3. Different passwords for different services. What is that for?!br>br> 4. What if you are able to break out of your cell and manage to enter another one?br>br> 5. Some things change from time to time, others don't.br>br> 6. Sorry, no more hints available. There where more before we had to restore a very old backup. :(/font>br>br> /td>/table>br>font class="credit">v0.1 # 2013 by para /font>/center> /body>/html> 

image.png查看其中一封登录攻击的邮件,找到一个信息

image.png

使用这个账号登录

image.png
爆破HTTPS服务,找到了这个目录

image.pngimage.png使用这个账号进去登录


image.png找到了MYSQL密码

image.png进入phpmyadmin

image.png论坛的用户账号和hash

用户名hash值密码
RHedley
31cbbdab9f5e1ebfa7d81267c258e29b5f9e171e6fcf7b1ba3
tum-ti-tum
adminfd339d53bf599d4ec7281ace84a902dc2ca16c7f63cbb16261
解密失败
SWillard
c19038340b8f5d1fc70e9bfbc3336f7bf1e0935da5ef13d4ef
解密失败

image.png用这个用户名登录FTP服务

image.png下载这个文件

image.png下载私钥

image.png使用私钥登录ssh

image.png使用另外一个账号

image.png找到了一个脚本

image.png根据脚本要求来解密

openssl aes-256-cbc -d -in backup_webhost_130111.tar.gz.enc -out /tmp/backup_webhost_130111.tar.gz -pass pass:wpaR9V616xrDTy98L7Uje2DDU5hWtWhs 

image.pngshadow文件

root:!:15773:0:99999:7::: daemon:*:15773:0:99999:7::: bin:*:15773:0:99999:7::: sys:*:15773:0:99999:7::: sync:*:15773:0:99999:7::: games:*:15773:0:99999:7::: man:*:15773:0:99999:7::: lp:*:15773:0:99999:7::: mail:*:15773:0:99999:7::: news:*:15773:0:99999:7::: uucp:*:15773:0:99999:7::: proxy:*:15773:0:99999:7::: www-data:*:15773:0:99999:7::: backup:*:15773:0:99999:7::: list:*:15773:0:99999:7::: irc:*:15773:0:99999:7::: gnats:*:15773:0:99999:7::: nobody:*:15773:0:99999:7::: libuuid:!:15773:0:99999:7::: syslog:*:15773:0:99999:7::: messagebus:*:15773:0:99999:7::: whoopsie:*:15773:0:99999:7::: landscape:*:15773:0:99999:7::: mysql:!:15773:0:99999:7::: sshd:*:15773:0:99999:7::: sraines:$6$4S0pqZzV$t91VbUY8ActvkS3717wllrv8ExZO/ZSHDIakHmPCvwzedKt2qDRh7509Zhk45QkKEMYPPwP7PInpp6WAJYwvk1:15773:0:99999:7::: mbrown:$6$DhcTFbl/$GcvUMLKvsybo4uXaS6Wx08rCdk6dPfYXASXzahAHlgy8A90PfwdoJXXyXZluw95aQeTGrjWF2zYPR0z2bX4p31:15773:0:99999:7::: rhedley:$6$PpzRSzPO$0MhuP.G1pCB3Wc1zAzFSTSnOnEeuJm5kbXUGmlAwH2Jz1bFJU/.ZPwsheyyt4hrtMvZ/k6wT38hXYZcWY2ELV/:15773:0:99999:7::: 

使用john爆破,最后得到下列的密码

Mbrown
Mbrown
swillard
brillantissimo

提权到root

image.pngimage.png

转载请注明来自网盾网络安全培训,本文标题:《CTF靶场系列-De-ICE: S1.140》

标签:ctf靶场系列

关于我

欢迎关注微信公众号

关于我们

网络安全培训,黑客培训,渗透培训,ctf,攻防

标签列表