Clicker
```
┌──(kali㉿kali)-[~/Desktop]
└─$ nc -zvn 10.10.11.232 1-65535
(UNKNOWN) [10.10.11.232] 53863 (?) open
(UNKNOWN) [10.10.11.232] 51483 (?) open
(UNKNOWN) [10.10.11.232] 33521 (?) open
(UNKNOWN) [10.10.11.232] 33501 (?) open
(UNKNOWN) [10.10.11.232] 33347 (?) open
(UNKNOWN) [10.10.11.232] 2049 (nfs) open
(UNKNOWN) [10.10.11.232] 111 (sunrpc) open
(UNKNOWN) [10.10.11.232] 80 (http) open
(UNKNOWN) [10.10.11.232] 22 (ssh) open
┌──(root㉿kali)-[/home/kali/Desktop]
└─# nmap -sV -sC -T5 -p22,80,111,2049,33347,33501,33521,51483,53863 10.10.11.232
Starting Nmap 7.94 ( https://nmap.org ) at 2023-10-29 02:16 EDT
Nmap scan report for clicker.htb (10.10.11.232)
Host is up (0.12s latency).
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 8.9p1 Ubuntu 3ubuntu0.4 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey:
| 256 89:d7:39:34:58:a0:ea:a1:db:c1:3d:14:ec:5d:5a:92 (ECDSA)
|_ 256 b4:da:8d:af:65:9c:bb:f0:71:d5:13:50:ed:d8:11:30 (ED25519)
80/tcp open http Apache httpd 2.4.52 ((Ubuntu))
|_http-server-header: Apache/2.4.52 (Ubuntu)
| http-cookie-flags:
| /:
| PHPSESSID:
|_ httponly flag not set
|_http-title: Clicker - The Game
111/tcp open rpcbind 2-4 (RPC #100000)
| rpcinfo:
| program version port/proto service
| 100000 2,3,4 111/tcp rpcbind
| 100000 2,3,4 111/udp rpcbind
| 100000 3,4 111/tcp6 rpcbind
| 100000 3,4 111/udp6 rpcbind
| 100003 3,4 2049/tcp nfs
| 100003 3,4 2049/tcp6 nfs
| 100005 1,2,3 33501/tcp mountd
| 100005 1,2,3 38615/tcp6 mountd
| 100005 1,2,3 42541/udp6 mountd
| 100005 1,2,3 46653/udp mountd
| 100021 1,3,4 33521/tcp nlockmgr
| 100021 1,3,4 35481/udp6 nlockmgr
| 100021 1,3,4 44637/tcp6 nlockmgr
| 100021 1,3,4 49853/udp nlockmgr
| 100024 1 37455/tcp6 status
| 100024 1 37786/udp status
| 100024 1 51483/tcp status
| 100024 1 55158/udp6 status
| 100227 3 2049/tcp nfs_acl
|_ 100227 3 2049/tcp6 nfs_acl
2049/tcp open nfs_acl 3 (RPC #100227)
33347/tcp open mountd 1-3 (RPC #100005)
33501/tcp open mountd 1-3 (RPC #100005)
33521/tcp open nlockmgr 1-4 (RPC #100021)
51483/tcp open status 1 (RPC #100024)
53863/tcp open mountd 1-3 (RPC #100005)
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
```
嘗試註冊用戶名為amdin,顯示已存在,註冊用戶為admin1:admin1







會攔截role
把role=0進行URL編碼


看起來需要使role=Admin
CLRF injection也可以

成功修改後,重新登入會出現Administration



改參數可export出php文件

透過修改nickname寫入PHP代碼,並把後綴改成PHP然後通過`file_put_contents`函數把nickname寫入


需要讓自己出現在TOP players裡



反彈SHELL
https://www.revshells.com/


穩定SHELL
```
python3 -c 'import pty;pty.spawn("/bin/bash")'
export TERM=xterm
ctrl + z
stty raw -echo; fg
```

進去後可以看到.php確實有一句話木馬

提權 -> 豆子


SCP不了,開http.server下載文件來分析

放進IDA


binany ninja ->分析結果

目前路徑為:/home/jack/queries/
讀取jack的id_rsa

提權:



perl_startup」權限提升 ; CVE-2016-1531
以 root 權限執行腳本,在運行 Perl 時配置環境。