┌──(kali㉿kali)-[~/Downloads/The_Library] └─$ sudo nmap --min-rate 10000 -p- 192.1.1.142 Starting Nmap 7.94 ( https://nmap.org ) at 2023-08-15 11:07 EDT Nmap scan report for 192.1.1.142 Host is up (0.00031s latency). Not shown: 55531 filtered tcp ports (no-response), 10002 closed tcp ports (reset) PORT STATE SERVICE 21/tcp open ftp 80/tcp open http MAC Address: 00:0C:29:E5:3F:72 (VMware)
开放了 21 和 80 端口
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19
┌──(kali㉿kali)-[~/Downloads/The_Library] └─$ sudo nmap -sT -sV -sC -O -p21,80 192.1.1.142 Starting Nmap 7.94 ( https://nmap.org ) at 2023-08-15 11:08 EDT Nmap scan report for 192.1.1.142 Host is up (0.00026s latency).
PORT STATE SERVICE VERSION 21/tcp open ftp vsftpd 3.0.3 80/tcp open http Apache httpd 2.4.18 ((Ubuntu)) |_http-server-header: Apache/2.4.18 (Ubuntu) |_http-title: Apache2 Ubuntu Default Page: It works MAC Address: 00:0C:29:E5:3F:72 (VMware) Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port Aggressive OS guesses: Linux 3.10 - 4.11 (97%), Linux 3.2 - 4.9 (97%), Linux 3.16 - 4.6 (95%), Linux 4.2 (94%), Linux 3.13 (93%), OpenWrt Chaos Calmer 15.05 (Linux 3.18) or Designated Driver (Linux 4.1 or 4.4) (93%), Linux 4.10 (93%), Android 5.0 - 6.0.1 (Linux 3.4) (93%), Linux 3.2 - 3.10 (93%), Linux 3.2 - 3.16 (93%) No exact OS matches for host (test conditions non-ideal). Network Distance: 1 hop Service Info: OS: Unix
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
┌──(kali㉿kali)-[~/Downloads/The_Library] └─$ sudo nmap --script=vuln -p21,80 192.1.1.142 Starting Nmap 7.94 ( https://nmap.org ) at 2023-08-15 11:10 EDT Pre-scan script results: | broadcast-avahi-dos: | Discovered hosts: | 224.0.0.251 | After NULL UDP avahi packet DoS (CVE-2011-1002). |_ Hosts are all up (not vulnerable). Nmap scan report for 192.1.1.142 Host is up (0.00022s latency).
PORT STATE SERVICE 21/tcp open ftp 80/tcp open http |_http-stored-xss: Couldn't find any stored XSS vulnerabilities. |_http-dombased-xss: Couldn't find any DOM based XSS. |_http-csrf: Couldn't find any CSRF vulnerabilities. MAC Address: 00:0C:29:E5:3F:72 (VMware)
Nmap done: 1 IP address (1 host up) scanned in 352.05 seconds
没有明显的漏洞和网站路径
尝试 ftp 匿名登录,失败,那只能着眼于 Web 渗透
Web 渗透
查看 Web 界面的同时使用目录爆破。Web 界面 是Apache2 Ubuntu Default Page,等一等目录爆破的结果
仔细观察,有几个比较在意的点,虽然提示没有信息,但是 We couldn’t find any information for 之后理论上应该跟着一个对象,尤其是最后还有个句号也是暗示。大概率这里存在攻击路径,接下来我尝试了对 lastviewed 的值和 country 的值进行模糊测试,但是结果不理想,看到回应源码中有个算法标识
1
<!-- ripemd160 -->
根据这个算法标志我尝试了对 lastviewed 的值和 country 的值进行加密,但依然没有得到结果,在这里卡了蛮久的。反思了一下为什么自己这里没有办法进一步想到攻击路径,一方面最近有点浮躁,思考不够深入,加上对于注入点的理解其实还是有偏差,虽然观察到了注入点却没有放在心上,只在最明显的注入点上进行了测试