行业新闻

CTF靶场系列-De-ICE: S1.140

CTF靶场系列-De-ICE: S1.140

下载地址

http://hackingdojo.com/downloads/iso/De-ICE_S1.140.iso

实战演练

使用netdiscover命令查找靶机的IP

image.png

使用nmap查看靶机开放的端口

image.png在浏览器打开

image.png爆破一下web目录

image.png在首页查看源代码最下面有这几行代码,就是问你有没有见到一个论坛

font class="hidden">
1. Have you seen our new cool forum yet?br>br>
2. Do not post sensitive information to public!br>br>
3. Different passwords for different services. What is that for?!br>br>
4. What if you are able to break out of your cell and manage to enter another one?br>br>
5. Some things change from time to time, others don't.br>br>
6. Sorry, no more hints available. There where more before we had to restore a very old backup. :(/font>br>br>
/td>/table>br>font class="credit">v0.1 # 2013 by para /font>/center>
/body>/html>

image.png查看其中一封登录攻击的邮件,找到一个信息

image.png

使用这个账号登录

image.png
爆破HTTPS服务,找到了这个目录

image.pngimage.png使用这个账号进去登录


image.png找到了MYSQL密码

image.png进入phpmyadmin

image.png论坛的用户账号和hash

用户名hash值密码
RHedley
31cbbdab9f5e1ebfa7d81267c258e29b5f9e171e6fcf7b1ba3
tum-ti-tum
adminfd339d53bf599d4ec7281ace84a902dc2ca16c7f63cbb16261
解密失败
SWillard
c19038340b8f5d1fc70e9bfbc3336f7bf1e0935da5ef13d4ef
解密失败

image.png用这个用户名登录FTP服务

image.png下载这个文件

image.png下载私钥

image.png使用私钥登录ssh

image.png使用另外一个账号

image.png找到了一个脚本

image.png根据脚本要求来解密

openssl aes-256-cbc -d -in backup_webhost_130111.tar.gz.enc -out /tmp/backup_webhost_130111.tar.gz -pass pass:wpaR9V616xrDTy98L7Uje2DDU5hWtWhs

image.pngshadow文件

root:!:15773:0:99999:7:::
daemon:*:15773:0:99999:7:::
bin:*:15773:0:99999:7:::
sys:*:15773:0:99999:7:::
sync:*:15773:0:99999:7:::
games:*:15773:0:99999:7:::
man:*:15773:0:99999:7:::
lp:*:15773:0:99999:7:::
mail:*:15773:0:99999:7:::
news:*:15773:0:99999:7:::
uucp:*:15773:0:99999:7:::
proxy:*:15773:0:99999:7:::
www-data:*:15773:0:99999:7:::
backup:*:15773:0:99999:7:::
list:*:15773:0:99999:7:::
irc:*:15773:0:99999:7:::
gnats:*:15773:0:99999:7:::
nobody:*:15773:0:99999:7:::
libuuid:!:15773:0:99999:7:::
syslog:*:15773:0:99999:7:::
messagebus:*:15773:0:99999:7:::
whoopsie:*:15773:0:99999:7:::
landscape:*:15773:0:99999:7:::
mysql:!:15773:0:99999:7:::
sshd:*:15773:0:99999:7:::
sraines:$6$4S0pqZzV$t91VbUY8ActvkS3717wllrv8ExZO/ZSHDIakHmPCvwzedKt2qDRh7509Zhk45QkKEMYPPwP7PInpp6WAJYwvk1:15773:0:99999:7:::
mbrown:$6$DhcTFbl/$GcvUMLKvsybo4uXaS6Wx08rCdk6dPfYXASXzahAHlgy8A90PfwdoJXXyXZluw95aQeTGrjWF2zYPR0z2bX4p31:15773:0:99999:7:::
rhedley:$6$PpzRSzPO$0MhuP.G1pCB3Wc1zAzFSTSnOnEeuJm5kbXUGmlAwH2Jz1bFJU/.ZPwsheyyt4hrtMvZ/k6wT38hXYZcWY2ELV/:15773:0:99999:7:::

使用john爆破,最后得到下列的密码

Mbrown
Mbrown
swillard
brillantissimo

提权到root

image.pngimage.png