sudo nmap --min-rate 10000 -p- 39.98.115.107 [sudo] mikannse 的密码: Starting Nmap 7.94 ( https://nmap.org ) at 2023-10-12 03:11 UTC Nmap scan report for 39.98.115.107 Host is up (0.25s latency). Not shown: 65533 filtered tcp ports (no-response) PORT STATE SERVICE 22/tcp open ssh 80/tcp open http
sudo nmap -sT -sV -sC -O -p22,80 39.98.115.107 -Pn Starting Nmap 7.94 ( https://nmap.org ) at 2023-10-12 03:12 UTC Nmap scan report for 39.98.115.107 Host is up (0.033s latency).
PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 8.2p1 Ubuntu 4ubuntu0.5 (Ubuntu Linux; protocol 2.0) | ssh-hostkey: | 3072 21:f6:d5:f4:13:b9:8a:07:fe:b5:c5:f9:dc:8c:7b:b2 (RSA) | 256 6c:7c:ae:fa:2e:68:1c:c3:59:bd:71:36:08:1f:db:55 (ECDSA) |_ 256 e5:1c:0a:61:98:db:95:e4:c6:39:cf:f2:84:03:4e:8f (ED25519) 80/tcp open http Apache httpd 2.4.41 ((Ubuntu)) |_http-title: Bootstrap Material Admin |_http-server-header: Apache/2.4.41 (Ubuntu) Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port Aggressive OS guesses: DD-WRT v24-sp2 (Linux 2.4.37) (97%), Microsoft Windows XP SP3 or Windows 7 or Windows Server 2012 (97%), Actiontec MI424WR-GEN3I WAP (96%), VMware Player virtual NAT device (96%), Microsoft Windows XP SP3 (95%), Linux 3.2 (93%), Linux 4.4 (93%), BlueArc Titan 2100 NAS device (90%) No exact OS matches for host (test conditions non-ideal). Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 28.79 seconds
sudo nmap --script=vuln -p22,80 39.98.115.107 Starting Nmap 7.94 ( https://nmap.org ) at 2023-10-12 03:12 UTC Nmap scan report for 39.98.115.107 Host is up (0.012s latency).
PORT STATE SERVICE 22/tcp open ssh 80/tcp open http |_http-stored-xss: Couldn't find any stored XSS vulnerabilities. |_http-dombased-xss: Couldn't find any DOM based XSS. | http-sql-injection: | Possible sqli for queries: | http://39.98.115.107:80/static/js/?C=S%3BO%3DA%27%20OR%20sqlspider | http://39.98.115.107:80/static/js/?C=D%3BO%3DA%27%20OR%20sqlspider | http://39.98.115.107:80/static/js/?C=M%3BO%3DA%27%20OR%20sqlspider | http://39.98.115.107:80/static/js/?C=N%3BO%3DD%27%20OR%20sqlspider | http://39.98.115.107:80/static/js/?C=N%3BO%3DA%27%20OR%20sqlspider | http://39.98.115.107:80/static/js/?C=D%3BO%3DA%27%20OR%20sqlspider | http://39.98.115.107:80/static/js/?C=M%3BO%3DA%27%20OR%20sqlspider | http://39.98.115.107:80/static/js/?C=S%3BO%3DD%27%20OR%20sqlspider | http://39.98.115.107:80/static/?C=D%3BO%3DA%27%20OR%20sqlspider | http://39.98.115.107:80/static/?C=M%3BO%3DA%27%20OR%20sqlspider | http://39.98.115.107:80/static/?C=S%3BO%3DA%27%20OR%20sqlspider | http://39.98.115.107:80/static/?C=N%3BO%3DD%27%20OR%20sqlspider | http://39.98.115.107:80/static/js/?C=S%3BO%3DA%27%20OR%20sqlspider | http://39.98.115.107:80/static/js/?C=N%3BO%3DA%27%20OR%20sqlspider | http://39.98.115.107:80/static/js/?C=M%3BO%3DA%27%20OR%20sqlspider | http://39.98.115.107:80/static/js/?C=D%3BO%3DD%27%20OR%20sqlspider | http://39.98.115.107:80/static/js/?C=S%3BO%3DA%27%20OR%20sqlspider | http://39.98.115.107:80/static/js/?C=N%3BO%3DA%27%20OR%20sqlspider | http://39.98.115.107:80/static/js/?C=M%3BO%3DD%27%20OR%20sqlspider | http://39.98.115.107:80/static/js/?C=D%3BO%3DA%27%20OR%20sqlspider | http://39.98.115.107:80/static/js/?C=S%3BO%3DA%27%20OR%20sqlspider | http://39.98.115.107:80/static/js/?C=N%3BO%3DA%27%20OR%20sqlspider | http://39.98.115.107:80/static/js/?C=D%3BO%3DA%27%20OR%20sqlspider | http://39.98.115.107:80/static/js/?C=M%3BO%3DA%27%20OR%20sqlspider | http://39.98.115.107:80/static/js/?C=S%3BO%3DA%27%20OR%20sqlspider | http://39.98.115.107:80/static/js/?C=D%3BO%3DA%27%20OR%20sqlspider | http://39.98.115.107:80/static/js/?C=M%3BO%3DA%27%20OR%20sqlspider | http://39.98.115.107:80/static/js/?C=N%3BO%3DD%27%20OR%20sqlspider | http://39.98.115.107:80/static/js/?C=S%3BO%3DA%27%20OR%20sqlspider | http://39.98.115.107:80/static/js/?C=N%3BO%3DA%27%20OR%20sqlspider | http://39.98.115.107:80/static/js/?C=D%3BO%3DA%27%20OR%20sqlspider | http://39.98.115.107:80/static/js/?C=M%3BO%3DA%27%20OR%20sqlspider | http://39.98.115.107:80/static/?C=M%3BO%3DA%27%20OR%20sqlspider | http://39.98.115.107:80/static/?C=N%3BO%3DA%27%20OR%20sqlspider | http://39.98.115.107:80/static/?C=S%3BO%3DA%27%20OR%20sqlspider |_ http://39.98.115.107:80/static/?C=D%3BO%3DD%27%20OR%20sqlspider | http-csrf: | Spidering limited to: maxdepth=3; maxpagecount=20; withinhost=39.98.115.107 | Found the following possible CSRF vulnerabilities: | | Path: http://39.98.115.107:80/ | Form id: loginfrom |_ Form action: login.html | http-enum: |_ /robots.txt: Robots file |_http-vuln-cve2014-3704: ERROR: Script execution failed (use -d to debug)
Nmap done: 1 IP address (1 host up) scanned in 56.26 seconds
172.22.1.15:80 open 172.22.1.2:88 open 172.22.1.18:3306 open 172.22.1.21:445 open 172.22.1.18:445 open 172.22.1.2:445 open 172.22.1.21:139 open 172.22.1.18:139 open 172.22.1.2:139 open 172.22.1.21:135 open 172.22.1.18:135 open 172.22.1.2:135 open 172.22.1.18:80 open 172.22.1.15:22 open [+] 172.22.1.21 MS17-010 (Windows Server 2008 R2 Enterprise 7601 Service Pack 1) [*] NetBios: 172.22.1.2 [+]DC DC01.xiaorang.lab Windows Server 2016 Datacenter 14393 [*] NetInfo: [*]172.22.1.21 [->]XIAORANG-WIN7 [->]172.22.1.21 [*] NetBios: 172.22.1.21 XIAORANG-WIN7.xiaorang.lab Windows Server 2008 R2 Enterprise 7601 Service Pack 1 [*] 172.22.1.2 (Windows Server 2016 Datacenter 14393) [*] NetInfo: [*]172.22.1.18 [->]XIAORANG-OA01 [->]172.22.1.18 [*] NetInfo: [*]172.22.1.2 [->]DC01 [->]172.22.1.2 [*] WebTitle: http://172.22.1.15 code:200 len:5578 title:Bootstrap Material Admin [*] NetBios: 172.22.1.18 XIAORANG-OA01.xiaorang.lab Windows Server 2012 R2 Datacenter 9600 [*] WebTitle: http://172.22.1.18 code:302 len:0 title:None 跳转url: http://172.22.1.18?m=login [*] WebTitle: http://172.22.1.18?m=login code:200 len:4012 title:信呼协同办公系统 [+] http://172.22.1.15 poc-yaml-thinkphp5023-method-rce poc1 172.22.1.2:139 open 172.22.1.18:3306 open 172.22.1.2:88 open 172.22.1.21:445 open 172.22.1.18:445 open 172.22.1.2:445 open 172.22.1.21:139 open 172.22.1.15:22 open 172.22.1.18:139 open 172.22.1.21:135 open 172.22.1.18:135 open 172.22.1.2:135 open 172.22.1.18:80 open 172.22.1.15:80 open [*] NetBios: 172.22.1.2 [+]DC DC01.xiaorang.lab Windows Server 2016 Datacenter 14393 [*] NetInfo: [*]172.22.1.18 [->]XIAORANG-OA01 [->]172.22.1.18 [*] NetInfo: [*]172.22.1.21 [->]XIAORANG-WIN7 [->]172.22.1.21 [*] NetBios: 172.22.1.21 XIAORANG-WIN7.xiaorang.lab Windows Server 2008 R2 Enterprise 7601 Service Pack 1 [*] NetBios: 172.22.1.18 XIAORANG-OA01.xiaorang.lab Windows Server 2012 R2 Datacenter 9600 [*] WebTitle: http://172.22.1.15 code:200 len:5578 title:Bootstrap Material Admin [*] WebTitle: http://172.22.1.18 code:302 len:0 title:None 跳转url: http://172.22.1.18?m=login [*] NetInfo: [*]172.22.1.2 [->]DC01 [->]172.22.1.2 [*] 172.22.1.2 (Windows Server 2016 Datacenter 14393) [+] 172.22.1.21 MS17-010 (Windows Server 2008 R2 Enterprise 7601 Service Pack 1) [*] WebTitle: http://172.22.1.18?m=login code:200 len:4012 title:信呼协同办公系统 [+] http://172.22.1.15 poc-yaml-thinkphp5023-method-rce poc1