┌──(kali㉿kali)-[~] └─$ sudo nmap --min-rate 10000 -p- 192.168.56.104 Starting Nmap 7.92 ( https://nmap.org ) at 2023-05-26 22:32 EDT Nmap scan report for 192.168.56.104 Host is up (0.000093s latency). Not shown: 65534 closed tcp ports (reset) PORT STATE SERVICE 80/tcp open http MAC Address: 08:00:27:72:6C:8B (Oracle VirtualBox virtual NIC)
Nmap done: 1 IP address (1 host up) scanned in 1.83 seconds
┌──(kali㉿kali)-[~] └─$ sudo nmap -sT -sV -sC -O -p80 192.168.56.104 Starting Nmap 7.92 ( https://nmap.org ) at 2023-05-26 22:34 EDT Nmap scan report for 192.168.56.104 Host is up (0.00036s latency).
PORT STATE SERVICE VERSION 80/tcp open http Apache httpd 2.4.7 ((Ubuntu)) |_http-title: Please Login / CuteNews |_http-server-header: Apache/2.4.7 (Ubuntu) MAC Address: 08:00:27:72:6C:8B (Oracle VirtualBox virtual NIC) Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port Device type: general purpose Running: Linux 3.X|4.X OS CPE: cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4 OS details: Linux 3.2 - 4.9 Network Distance: 1 hop
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 8.14 seconds
┌──(kali㉿kali)-[~] └─$ sudo nmap --script=vuln -p80 192.168.56.104 Starting Nmap 7.92 ( https://nmap.org ) at 2023-05-26 22:42 EDT Nmap scan report for 192.168.56.104 Host is up (0.00031s latency).
PORT STATE SERVICE 80/tcp open http | http-slowloris-check: | VULNERABLE: | Slowloris DOS attack | State: LIKELY VULNERABLE | IDs: CVE:CVE-2007-6750 | Slowloris tries to keep many connections to the target web server open and hold | them open as long as possible. It accomplishes this by opening connections to | the target web server and sending a partial request. By doing so, it starves | the http server's resources causing Denial Of Service. | | Disclosure date: 2009-09-17 | References: | http://ha.ckers.org/slowloris/ |_ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6750 | http-enum: |_ /rss.php: RSS or Atom feed |_http-stored-xss: Couldn't find any stored XSS vulnerabilities. |_http-vuln-cve2017-1001000: ERROR: Script execution failed (use -d to debug) | http-csrf: | Spidering limited to: maxdepth=3; maxpagecount=20; withinhost=192.168.56.104 | Found the following possible CSRF vulnerabilities: | | Path: http://192.168.56.104:80/ | Form id: login_form | Form action: /index.php | | Path: http://192.168.56.104:80/?register | Form id: regpassword | Form action: /index.php?register | | Path: http://192.168.56.104:80/?register&lostpass | Form id: | Form action: /index.php | | Path: http://192.168.56.104:80/index.php | Form id: login_form | Form action: /index.php | | Path: http://192.168.56.104:80/index.php?register | Form id: regpassword |_ Form action: /index.php?register |_http-dombased-xss: Couldn't find any DOM based XSS. MAC Address: 08:00:27:72:6C:8B (Oracle VirtualBox virtual NIC)
Nmap done: 1 IP address (1 host up) scanned in 321.44 seconds
1 - Sign up for New User 2 - Log In 3 - Go to Personal options http://www.target.com/cutenews/index.php?mod=main&opt=personal 4 - Select Upload Avatar Example: Evil.jpg 5 - use tamper data & Rename File Evil.jpg to Evil.php