本文记录了一次针对名为“Expressway”的靶机的渗透测试过程。初步枚举未发现可利用漏洞,随后进行UDP扫描。通过破解找到的PSK哈希,成功获取到用户ike@expressway.htb的密码“freakingrockstarontheroad”。登录后,利用linpeas.sh进行权限提升,发现sudo版本为1.9.17,并找到相关的漏洞利用文章。最终,发现proxy组具有特殊权限,能够访问主机offramp.expressway.htb,从而实现更高权限的获取。 This write-up documents the penetration testing process on a target machine named "Expressway". Initial enumeration did not reveal any exploitable vulnerabilities, so UDP scanning was conducted. By cracking a discovered PSK hash, the password "freakingrockstarontheroad" for the user ike@expressway.htb was obtained. After logging in, linpeas.sh was used for privilege escalation, revealing sudo version 1.9.17 and related exploit articles. Ultimately, it was found that the proxy group has special privileges to access the host offramp.expressway.htb, enabling the acquisition of higher privileges.

初步枚举

 

image
image

搜索发现没有可利用漏洞

UDP扫描

image

漏洞利用

echo -e "/usr/share/seclists/Passwords/Leaked-Databases/NordVPN.txt" > groups.txt

image

-A 使用主动模式(为了获取 PSK 哈希进行破解)

-M 以多行格式显示输出(便于查看完整的握手信息)

--id=@groups.txt 指定身份标识,并从文件读取

-P(f) 我们可以写在这个文件,不填写就直接输出stdout

发现ike@expressway.htb

image

破解文件得到密码freakingrockstarontheroad


立足点

image

成功利用账号密码登录


提升权限

运行linpeas.sh看到

image

sudo -V得到1.9.17

查看网站找到此文章

总而言之就是要找到一个主机

查看id发现我们是proxy组。那我们看看proxy能做什么特殊的事情

find / -group proxy 2>/dev/null

image

我们查看access的内容,根据经验,如果有主机应该会包含htb

image

我们尝试一下这个主机 offramp.expressway.htb

image

可以看到可以使用root

Initial Enumeration

 

image
image

Search found no exploitable vulnerabilities

UDP Scanning

image

Exploitation

echo -e "/usr/share/seclists/Passwords/Leaked-Databases/NordVPN.txt" > groups.txt

image

-A uses active mode (to obtain PSK hash for cracking)

-M displays output in multi-line format (for viewing full handshake information)

--id=@groups.txt specifies the identity identifier and reads from a file

-P(f) We can write in this file; if left blank, it outputs directly to stdout

Discovered ike@expressway.htb

image

Cracking the file yields the password freakingrockstarontheroad


Foothold

image

Successfully logged in with credentials


Privilege Escalation

Running linpeas.sh shows

image

sudo -V gives 1.9.17

Checking the website finds this article

In short, need to find a host

Checking id shows we are in the proxy group. Let's see what special things proxy can do

find / -group proxy 2>/dev/null

image

We check the content of access. Based on experience, if there is a host, it should contain htb

image

We try this host offramp.expressway.htb

image

It can be seen that root can be used