Hack. Eat. Sleep. Repeat!!!
Rustscan’s output
❯ rustscan -a 10.10.34.72 -- -sC -sV -Pn
.----. .-. .-. .----..---. .----. .---. .--. .-. .-.
| {} }| { } |{ {__ {_ _}{ {__ / ___} / {} \ | `| |
| .-. \| {_} |.-._} } | | .-._} }\ }/ /\ \| |\ |
`-' `-'`-----'`----' `-' `----' `---' `-' `-'`-' `-'
The Modern Day Port Scanner.
________________________________________
: https://discord.gg/GFrQsGy :
: https://github.com/RustScan/RustScan :
--------------------------------------
Please contribute more quotes to our GitHub https://github.com/rustscan/rustscan
[~] The config file is expected to be at "/home/sensei/.rustscan.toml"
[!] File limit is lower than default batch size. Consider upping with --ulimit. May cause harm to sensitive servers
[!] Your file limit is very small, which negatively impacts RustScan's speed. Use the Docker image, or up the Ulimit with '--ulimit 5000'.
Open 10.10.34.72:22
Open 10.10.34.72:111
Open 10.10.34.72:139
Open 10.10.34.72:445
Open 10.10.34.72:873
Open 10.10.34.72:2049
Open 10.10.34.72:6379
Open 10.10.34.72:36795
Open 10.10.34.72:38417
Open 10.10.34.72:45403
Open 10.10.34.72:51745
[~] Starting Script(s)
[>] Script to be run Some("nmap -vvv -p ")
Host discovery disabled (-Pn). All addresses will be marked 'up' and scan times may be slower.
[~] Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-09-09 04:37 EDT
NSE: Loaded 156 scripts for scanning.
NSE: Script Pre-scanning.
NSE: Starting runlevel 1 (of 3) scan.
Initiating NSE at 04:37
Completed NSE at 04:37, 0.00s elapsed
NSE: Starting runlevel 2 (of 3) scan.
Initiating NSE at 04:37
Completed NSE at 04:37, 0.00s elapsed
NSE: Starting runlevel 3 (of 3) scan.
Initiating NSE at 04:37
Completed NSE at 04:37, 0.00s elapsed
Initiating Parallel DNS resolution of 1 host. at 04:37
Completed Parallel DNS resolution of 1 host. at 04:37, 0.17s elapsed
DNS resolution of 1 IPs took 0.17s. Mode: Async [#: 1, OK: 0, NX: 1, DR: 0, SF: 0, TR: 1, CN: 0]
Initiating Connect Scan at 04:37
Scanning 10.10.34.72 [11 ports]
Discovered open port 139/tcp on 10.10.34.72
Discovered open port 111/tcp on 10.10.34.72
Discovered open port 22/tcp on 10.10.34.72
Discovered open port 445/tcp on 10.10.34.72
Discovered open port 6379/tcp on 10.10.34.72
Discovered open port 36795/tcp on 10.10.34.72
Discovered open port 873/tcp on 10.10.34.72
Discovered open port 45403/tcp on 10.10.34.72
Discovered open port 2049/tcp on 10.10.34.72
Discovered open port 51745/tcp on 10.10.34.72
Discovered open port 38417/tcp on 10.10.34.72
Completed Connect Scan at 04:37, 0.33s elapsed (11 total ports)
Initiating Service scan at 04:37
Scanning 11 services on 10.10.34.72
Completed Service scan at 04:37, 16.89s elapsed (11 services on 1 host)
NSE: Script scanning 10.10.34.72.
NSE: Starting runlevel 1 (of 3) scan.
Initiating NSE at 04:37
Completed NSE at 04:37, 6.26s elapsed
NSE: Starting runlevel 2 (of 3) scan.
Initiating NSE at 04:37
Completed NSE at 04:37, 0.86s elapsed
NSE: Starting runlevel 3 (of 3) scan.
Initiating NSE at 04:37
Completed NSE at 04:37, 0.01s elapsed
Nmap scan report for 10.10.34.72
Host is up, received user-set (0.17s latency).
Scanned at 2024-09-09 04:37:32 EDT for 25s
PORT STATE SERVICE REASON VERSION
22/tcp open ssh syn-ack OpenSSH 7.6p1 Ubuntu 4ubuntu0.3 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey:
| 2048 5e:27:8f:48:ae:2f:f8:89:bb:89:13:e3:9a:fd:63:40 (RSA)
| ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDagA3GVO7hKpJpO1Vr6+z3Y9xjoeihZFWXSrBG2MImbpPH6jk+1KyJwQpGmhMEGhGADM1LbmYf3goHku11Ttb0gbXaCt+mw1Ea+K0H00jA0ce2gBqev+PwZz0ysxCLUbYXCSv5Dd1XSa67ITSg7A6h+aRfkEVN2zrbM5xBQiQv6aBgyaAvEHqQ73nZbPdtwoIGkm7VL9DATomofcEykaXo3tmjF2vRTN614H0PpfZBteRpHoJI4uzjwXeGVOU/VZcl7EMBd/MRHdspvULJXiI476ID/ZoQLT2zQf5Q2vqI3ulMj5CB29ryxq58TVGSz/sFv1ZBPbfOl9OvuBM5BTBV
| 256 f4:fe:0b:e2:5c:88:b5:63:13:85:50:dd:d5:86:ab:bd (ECDSA)
| ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBNM0XfxK0hrF7d4C5DCyQGK3ml9U0y3Nhcvm6N9R+qv2iKW21CNEFjYf+ZEEi7lInOU9uP2A0HZG35kEVmuideE=
| 256 82:ea:48:85:f0:2a:23:7e:0e:a9:d9:14:0a:60:2f:ad (ED25519)
|_ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIJPRO3XCBfxEo0XhViW8m/V+IlTWehTvWOyMDOWNJj+i
111/tcp open rpcbind syn-ack 2-4 (RPC #100000)
| rpcinfo:
| program version port/proto service
| 100000 2,3,4 111/tcp rpcbind
| 100000 2,3,4 111/udp rpcbind
| 100000 3,4 111/tcp6 rpcbind
| 100000 3,4 111/udp6 rpcbind
| 100003 3 2049/udp nfs
| 100003 3 2049/udp6 nfs
| 100003 3,4 2049/tcp nfs
| 100003 3,4 2049/tcp6 nfs
| 100005 1,2,3 33319/udp mountd
| 100005 1,2,3 38004/udp6 mountd
| 100005 1,2,3 45403/tcp mountd
| 100005 1,2,3 54025/tcp6 mountd
| 100021 1,3,4 36795/tcp nlockmgr
| 100021 1,3,4 45263/tcp6 nlockmgr
| 100021 1,3,4 45833/udp nlockmgr
| 100021 1,3,4 47826/udp6 nlockmgr
| 100227 3 2049/tcp nfs_acl
| 100227 3 2049/tcp6 nfs_acl
| 100227 3 2049/udp nfs_acl
|_ 100227 3 2049/udp6 nfs_acl
139/tcp open netbios-ssn syn-ack Samba smbd 3.X - 4.X (workgroup: WORKGROUP)
445/tcp open netbios-ssn syn-ack Samba smbd 4.7.6-Ubuntu (workgroup: WORKGROUP)
873/tcp open rsync syn-ack (protocol version 31)
2049/tcp open nfs syn-ack 3-4 (RPC #100003)
6379/tcp open redis syn-ack Redis key-value store
36795/tcp open nlockmgr syn-ack 1-4 (RPC #100021)
38417/tcp open mountd syn-ack 1-3 (RPC #100005)
45403/tcp open mountd syn-ack 1-3 (RPC #100005)
51745/tcp open mountd syn-ack 1-3 (RPC #100005)
Service Info: Host: VULNNET-INTERNAL; OS: Linux; CPE: cpe:/o:linux:linux_kernel
Host script results:
| smb2-time:
| date: 2024-09-09T08:37:31
|_ start_date: N/A
|_clock-skew: mean: -40m20s, deviation: 1h09m16s, median: -21s
| p2p-conficker:
| Checking for Conficker.C or higher...
| Check 1 (port 28299/tcp): CLEAN (Couldn't connect)
| Check 2 (port 22898/tcp): CLEAN (Couldn't connect)
| Check 3 (port 59608/udp): CLEAN (Failed to receive data)
| Check 4 (port 48785/udp): CLEAN (Failed to receive data)
|_ 0/4 checks are positive: Host is CLEAN or ports are blocked
| nbstat: NetBIOS name: VULNNET-INTERNA, NetBIOS user: <unknown>, NetBIOS MAC: <unknown> (unknown)
| Names:
| VULNNET-INTERNA<00> Flags: <unique><active>
| VULNNET-INTERNA<03> Flags: <unique><active>
| VULNNET-INTERNA<20> Flags: <unique><active>
| WORKGROUP<00> Flags: <group><active>
| WORKGROUP<1e> Flags: <group><active>
| Statistics:
| 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00
| 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00
|_ 00:00:00:00:00:00:00:00:00:00:00:00:00:00
| smb2-security-mode:
| 3:1:1:
|_ Message signing enabled but not required
| smb-os-discovery:
| OS: Windows 6.1 (Samba 4.7.6-Ubuntu)
| Computer name: vulnnet-internal
| NetBIOS computer name: VULNNET-INTERNAL\x00
| Domain name: \x00
| FQDN: vulnnet-internal
|_ System time: 2024-09-09T10:37:31+02:00
| smb-security-mode:
| account_used: guest
| authentication_level: user
| challenge_response: supported
|_ message_signing: disabled (dangerous, but default)
139
and 445
[smb&&netbios] with enum4linux
shows listing access to a smb share shares
.temp
and data
.The directories also contain files which I downloaded to my machine with the get
keyword.showmount
to check for shares and got one /opt/conf
redis-cli -h [host]
.Then, AUTH [password]
to access the db.KEYS *
and discovered base64 encoded values in a key authlist
rsync
service.879
rsync
. I enumerated the directories with rsync [host]::
.We have write access to .ssh
of the home user sys-internal
.~/.ssh/id_rsa.pub
to authorized keys in user sys-internal
.ssh directory.ps aux
to check for running processes,I discovered team city running as root on the server.ss -atur
and spotted a service on 8111.I used to nc
to test the server and discovered it is an http server.I summed up that team city is running on that service.ONE-LINER-:grep -rni 'authentication token' TeamCity/logs 2</dev/null
I followed the steps in this site to spawn a revshell.
Create a new project, pick “manually”
command line
and copy any bash reverse shell code and save