┌──(mikannse㉿kali)-[~/HTB/writeup] └─$ sudo nmap --min-rate=10000 -p- 10.10.10.138 Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-09-02 22:35 CST Nmap scan report for 10.10.10.138 Host is up (0.068s latency). Not shown: 65533 filtered tcp ports (no-response) PORT STATE SERVICE 22/tcp open ssh 80/tcp open http
Nmap done: 1 IP address (1 host up) scanned in 13.52 seconds
┌──(mikannse㉿kali)-[~/HTB/writeup] └─$ sudo nmap --min-rate=10000 -p- 10.10.10.138 Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-09-02 22:35 CST Nmap scan report for 10.10.10.138 Host is up (0.068s latency). Not shown: 65533 filtered tcp ports (no-response) PORT STATE SERVICE 22/tcp open ssh 80/tcp open http
Nmap done: 1 IP address (1 host up) scanned in 13.52 seconds ┌──(mikannse㉿kali)-[~/HTB/writeup] └─$ sudo nmap -sT -sV -sC -O -p22,80 10.10.10.138 Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-09-02 22:36 CST Nmap scan report for 10.10.10.138 Host is up (0.080s latency).
PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 9.2p1 Debian 2+deb12u1 (protocol 2.0) | ssh-hostkey: | 256 37:2e:14:68:ae:b9:c2:34:2b:6e:d9:92:bc:bf:bd:28 (ECDSA) |_ 256 93:ea:a8:40:42:c1:a8:33:85:b3:56:00:62:1c:a0:ab (ED25519) 80/tcp open http Apache httpd 2.4.25 ((Debian)) |_http-title: Nothing here yet. | http-robots.txt: 1 disallowed entry |_/writeup/ Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port Device type: general purpose|specialized|storage-misc Running (JUST GUESSING): Linux 5.X (91%), Crestron 2-Series (86%), HP embedded (85%) OS CPE: cpe:/o:linux:linux_kernel:5.0 cpe:/o:crestron:2_series cpe:/h:hp:p2000_g3 Aggressive OS guesses: Linux 5.0 (91%), Crestron XPanel control system (86%), HP P2000 G3 NAS device (85%) No exact OS matches for host (test conditions non-ideal). Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 20.62 seconds
Web
显然只能从/writeup/目录入手,是一个博客界面,一共也就几个页面,尝试了一下目录穿越但是似乎没有,插件监测出来了是一个名叫:cms made simple的CMS,查看源码得知是2004-2019,那么尝试php/webapps/46635.py,是一个sql注入的漏洞