nmap --min-rate=10000 -p- 10.10.212.161 Starting Nmap 7.93 ( https://nmap.org ) at 2023-12-05 03:27 UTC Nmap scan report for ip-10-10-212-161.eu-west-1.compute.internal (10.10.212.161) Host is up (0.0044s latency). Not shown: 65533 closed tcp ports (reset) PORT STATE SERVICE 21/tcp open ftp 22/tcp open ssh MAC Address: 02:77:28:55:D0:B3 (Unknown)
Nmap done: 1 IP address (1 host up) scanned in 3.46 seconds
nmap -sT -sV -sC -O -p21,22 10.10.212.161 Starting Nmap 7.93 ( https://nmap.org ) at 2023-12-05 03:29 UTC Nmap scan report for ip-10-10-212-161.eu-west-1.compute.internal (10.10.212.161) Host is up (0.00060s latency).
PORT STATE SERVICE VERSION 21/tcp open ftp vsftpd 3.0.3 | ftp-anon: Anonymous FTP login allowed (FTP code 230) |_drwxr-xr-x 2 ftp ftp 4096 Aug 28 2020 pub | ftp-syst: | STAT: | FTP server status: | Connected to ::ffff:10.10.209.109 | Logged in as ftp | TYPE: ASCII | No session bandwidth limit | Session timeout in seconds is 300 | Control connection is plain text | Data connections will be plain text | At session startup, client count was 1 | vsFTPd 3.0.3 - secure, fast, stable |_End of status 22/tcp open ssh OpenSSH 7.6p1 Ubuntu 4ubuntu0.3 (Ubuntu Linux; protocol 2.0) | ssh-hostkey: | 2048 d9918996afbc06b98d43df53dc1f8f12 (RSA) | 256 250bbea2f9643ef1e315e823b88ce516 (ECDSA) |_ 256 09599a84e66f01f3338e4844524914db (ED25519) MAC Address: 02:77:28:55:D0:B3 (Unknown) Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port Aggressive OS guesses: Linux 3.10 - 3.13 (95%), Linux 3.8 (95%), Linux 3.1 (95%), Linux 3.2 (95%), AXIS 210A or 211 Network Camera (Linux 2.6.17) (94%), ASUS RT-N56U WAP (Linux 3.4) (93%), Linux 3.16 (93%), Linux 2.6.32 (92%), Linux 2.6.39 - 3.2 (92%), Linux 3.1 - 3.2 (92%) No exact OS matches for host (test conditions non-ideal). Network Distance: 1 hop Service Info: OSs: Unix, Linux; CPE: cpe:/o:linux:linux_kernel
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 4.82 seconds
FTP
发现FTP能匿名登录,进去有三个文件,全部下载下来
有一个人名:paramore
以及一个流量包,但都是加密的流量,还有一个jokes但是没GET到
Getshell
有几条标红的TCP流量,说明流量是有问题的,而且都是由.131发往.128的
ip.addr==192.168.236.131
可以过滤出所有标红的TCP流量,得到源端口为7864 8273 9241 12007 60753
根据房间的knocking提示,大概率又是和之前打的房间一样需要knock来打开端口
knock 10.10.212.161 7864 8273 9241 12007 60753
再次用nmap扫描端口之后发现打开了8080端口
PORT STATE SERVICE VERSION 8080/tcp open ssl/http Werkzeug httpd 1.0.1 (Python 2.7.18) |_http-server-header: Werkzeug/1.0.1 Python/2.7.18 |_http-title: Misguided Ghosts |_ssl-date: TLS randomness does not represent time | ssl-cert: Subject: commonName=misguided_ghosts.thm/organizationName=Misguided Ghosts/stateOrProvinceName=Williamson Country/countryName=TN
gobuster dir -u https://10.10.212.161:8080/ -w /usr/share/wordlists/seclists/Discovery/Web-Content/directory-list-2.3-medium.txt -k