Nmap scan report for dc-2 (192.168.92.135) Host is up (0.00068s latency). Not shown: 999 closed tcp ports (reset) PORT STATE SERVICE VERSION 80/tcp open http Apache httpd 2.4.10 ((Debian)) |_http-server-header: Apache/2.4.10 (Debian) |_http-generator: WordPress 4.7.10 |_http-title: DC-2 – Just another WordPress site MAC Address: 00:0C:29:67:A5:C2 (VMware) Device type: general purpose Running: Linux 3.X|4.X OS CPE: cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4 OS details: Linux 3.2 - 4.9 Network Distance: 1 hop
1
nmap -p- 192.168.92.135
1 2 3 4 5 6 7 8
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-12-07 00:33 EST Nmap scan report for dc-2 (192.168.92.135) Host is up (0.00066s latency). Not shown: 65533 closed tcp ports (reset) PORT STATE SERVICE 80/tcp open http 7744/tcp open raqmon-pdu MAC Address: 00:0C:29:67:A5:C2 (VMware)
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-12-07 00:35 EST Nmap scan report for dc-2 (192.168.92.135) Host is up (0.00058s latency).
PORT STATE SERVICE 80/tcp open http |_http-stored-xss: Couldn't find any stored XSS vulnerabilities. | http-csrf: | Spidering limited to: maxdepth=3; maxpagecount=20; withinhost=dc-2 | Found the following possible CSRF vulnerabilities: | | Path: http://dc-2:80/index.php/what-we-do/%5C%22 | Form id: search-form-6750e7244cc64 | Form action: http://dc-2/ | | Path: http://dc-2:80/index.php/our-people/%5C%22 | Form id: search-form-6750e724c5c81 |_ Form action: http://dc-2/ | http-wordpress-users: | Username found: admin | Username found: tom | Username found: jerry |_Search stopped at ID #25. Increase the upper limit if necessary with 'http-wordpress-users.limit' |_http-dombased-xss: Couldn't find any DOM based XSS. | http-enum: | /wp-login.php: Possible admin folder | /readme.html: Wordpress version: 2 | /: WordPress version: 4.7.10 | /wp-includes/images/rss.png: Wordpress version 2.2 found. | /wp-includes/js/jquery/suggest.js: Wordpress version 2.5 found. | /wp-includes/images/blank.gif: Wordpress version 2.6 found. | /wp-includes/js/comment-reply.js: Wordpress version 2.7 found. | /wp-login.php: Wordpress login page. | /wp-admin/upgrade.php: Wordpress login page. |_ /readme.html: Interesting, a readme. 7744/tcp open raqmon-pdu MAC Address: 00:0C:29:67:A5:C2 (VMware)
Nmap done: 1 IP address (1 host up) scanned in 31.00 seconds
1 2 3 4 5
关键: | http-wordpress-users: | Username found: admin | Username found: tom | Username found: jerry
find / -name hosts vim /etc/hosts 192.168.92.135 dc-2 访问http://dc-2/
1 2 3 4 5 6
Flag 1:
Your usual wordlists probably won’t work, so instead, maybe you just need to be cewl. More passwords is always better, but sometimes you just can’t win them all. Log in as one to see the next flag. If you can’t find it, log in as another.
Cewl介绍 Cewl是一款采用Ruby开发的应用程序,你可以给它的爬虫指定URL地址和爬取深度,还可以添额外的外部链接,接下来Cewl会给你返回一个字典文件,你可以把字典用到类似John the Ripper这样的密码破解工具中。除此之外,Cewl还提供了命令行工具。 使用:
If you can't exploit WordPress and take a shortcut, there is another way. Hope you found another entry point.
除了80端口还有7744端口 详细扫描7744段口:
1
nmap -A -p7744 192.168.92.135
1 2 3 4 5 6 7 8 9 10 11
PORT STATE SERVICE VERSION 7744/tcp open ssh OpenSSH 6.7p1 Debian 5+deb8u7 (protocol 2.0) | ssh-hostkey: | 1024 52:51:7b:6e:70:a4:33:7a:d2:4b:e1:0b:5a:0f:9e:d7 (DSA) | 2048 59:11:d8:af:38:51:8f:41:a7:44:b3:28:03:80:99:42 (RSA) | 256 df:18:1d:74:26:ce:c1:4f:6f:2f:c1:26:54:31:51:91 (ECDSA) |_ 256 d9:38:5f:99:7c:0d:64:7e:1d:46:f6:e9:7c:c6:37:17 (ED25519) MAC Address: 00:0C:29:67:A5:C2 (VMware) Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port Device type: general purpose Running: Linux 3.X|4.X
7744是ssh端口 Username: jerry, Password: adipiscing Username: tom, Password: parturient 尝试ssh登录