sudo nmap --min-rate 10000 -p- 10.10.35.124 [sudo] mikannse 的密码: Starting Nmap 7.94 ( https://nmap.org ) at 2023-09-15 11:18 CST Nmap scan report for 10.10.35.124 Host is up (0.22s latency). Not shown: 65533 closed tcp ports (reset) PORT STATE SERVICE 21/tcp open ftp 80/tcp open http
sudo nmap -sT -sV -sC -O -p21,80 10.10.35.124 Starting Nmap 7.94 ( https://nmap.org ) at 2023-09-15 11:20 CST Nmap scan report for 10.10.35.124 Host is up (0.21s latency).
PORT STATE SERVICE VERSION 21/tcp open ftp vsftpd 3.0.3 80/tcp open http Apache httpd 2.4.29 ((Ubuntu)) |_http-generator: WordPress 5.6 |_http-title: Hello World – Just another WordPress site |_http-server-header: Apache/2.4.29 (Ubuntu) Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port Aggressive OS guesses: Linux 3.1 (95%), Linux 3.2 (95%), AXIS 210A or 211 Network Camera (Linux 2.6.17) (95%), ASUS RT-N56U WAP (Linux 3.4) (93%), Linux 3.16 (93%), Linux 2.6.32 (93%), Linux 2.6.39 - 3.2 (93%), Linux 3.1 - 3.2 (93%), Linux 3.2 - 4.9 (93%), Linux 3.7 - 3.10 (93%) No exact OS matches for host (test conditions non-ideal). Network Distance: 2 hops Service Info: OS: Unix
sudo nmap --script=vuln -p21,80 10.10.35.124 [sudo] mikannse 的密码: Starting Nmap 7.94 ( https://nmap.org ) at 2023-09-15 11:20 CST Nmap scan report for 10.10.35.124 Host is up (0.22s latency).
PORT STATE SERVICE 21/tcp open ftp 80/tcp open http |_http-dombased-xss: Couldn't find any DOM based XSS. | http-csrf: | Spidering limited to: maxdepth=3; maxpagecount=20; withinhost=10.10.35.124 | Found the following possible CSRF vulnerabilities: | | Path: http://10.10.35.124:80/ | Form id: |_ Form action: http://adana.thm/ |_http-stored-xss: Couldn't find any stored XSS vulnerabilities. | http-wordpress-users: | Username found: hakanbey01 |_Search stopped at ID #25. Increase the upper limit if necessary with 'http-wordpress-users.limit' | http-enum: | /wp-login.php: Possible admin folder | /phpmyadmin/: phpMyAdmin | /readme.html: Wordpress version: 2 | /: WordPress version: 5.6 | /wp-includes/images/rss.png: Wordpress version 2.2 found. | /wp-includes/js/jquery/suggest.js: Wordpress version 2.5 found. | /wp-includes/images/blank.gif: Wordpress version 2.6 found. | /wp-includes/js/comment-reply.js: Wordpress version 2.7 found. | /wp-login.php: Wordpress login page. | /wp-admin/upgrade.php: Wordpress login page. |_ /readme.html: Interesting, a readme.
2个端口
Web
添加adana.thm到hosts
gobuster dir -u http://10.10.35.124/ -w /usr/share/wordlists/seclists/Discovery/Web-Content/directory-list-2.3-big.txt -x rar,zip,sql,txt,jsp,php,html,bak