covfefe靶场
covfefe 靶机渗透
1.信息收集
扫描出多个IP
![](https://img.shuduke.com/static_img/cnblogs/2023/12/11/crmjiqct_43i5.png)
nmap只发现192.168.42.146有端口开放,为22,80,31337
![](https://img.shuduke.com/static_img/cnblogs/2023/12/11/xdqziusz_9i3p.png)
扫描192.168.42.146的22,80,31337端口,看看开放的服务
![](https://img.shuduke.com/static_img/cnblogs/2023/12/11/wbmywjyw_ten8.png)
用dirb找找目录
![](https://img.shuduke.com/static_img/cnblogs/2023/12/11/dqipvpwx_3n13.png)
2.资源分析
查看robots.txt,寻找目录
![](https://img.shuduke.com/static_img/cnblogs/2023/12/11/kcmibotw_bxcc.png)
访问taxes,拿到flag1
![](https://img.shuduke.com/static_img/cnblogs/2023/12/11/atnhkrfu_gihb.png)
进入ssh目录,下载rsa,pub
![](https://img.shuduke.com/static_img/cnblogs/2023/12/11/vmfjezhs_s3f4.png)
3.漏洞利用
下载了ssh的公钥和私钥,开放了22端口,我们尝试ssh免密登录漏洞
id_rsa加密,尝试破解
发现它是rsa加密
![](https://img.shuduke.com/static_img/cnblogs/2023/12/11/ovvtrtrk_kvn6.png)
JOHN哈希破解密码 starwars
![](https://img.shuduke.com/static_img/cnblogs/2023/12/11/jqrrukfv_o1na.png)
用id_rsa连接ssh,发现报错私钥权限过大
![](https://img.shuduke.com/static_img/cnblogs/2023/12/11/ikbyyaud_5p5x.png)
权限更改为600,重新连接
![](https://img.shuduke.com/static_img/cnblogs/2023/12/11/wakujwpo_9hba.png)
![](https://img.shuduke.com/static_img/cnblogs/2023/12/11/urqorpwf_fv0g.png)
ssh成功连接,查看ssh权限
![](https://img.shuduke.com/static_img/cnblogs/2023/12/11/ktcjepbw_4bvi.png)
4.提升权限
权限不足,开始提权
![](https://img.shuduke.com/static_img/cnblogs/2023/12/11/ntrmpgdb_kzsa.png)
发现/usr/local/bin/read_message有些少见,尝试利用
![](https://img.shuduke.com/static_img/cnblogs/2023/12/11/ddtjphwa_35fj.png)
发现源代码,开始代码审计,找到flag2
![](https://img.shuduke.com/static_img/cnblogs/2023/12/11/ifidodxx_txub.png)
代码审计发现buf存在缓冲区溢出
![](https://img.shuduke.com/static_img/cnblogs/2023/12/11/xmkbqfrc_9e3j.png)
提权成功,找到flag3
![](https://img.shuduke.com/static_img/cnblogs/2023/12/11/xagflecb_w8zm.png)
热门相关:业主的母亲和女儿 请你再粗暴一点 角质妻子交换 跟我做爱的朋友的女朋友 小姐互换