当前位置:网站首页>HTB-Lame
HTB-Lame
2022-07-01 03:03:00 【H0ne】
nmap Common commands
nmap -iflist : Check the interface information and routing information of the local host
-A : The option is used to scan in an offensive way
3.-T4: Specify the timing used in the scanning process , There is always 6 A level (0-5), The higher the level , The faster the scan , But it's also easy to be firewall or IDS Detect and screen out , It is recommended to use... When the network communication is in good condition T4
-oX test.xml: Generate scan results test.xml file , If interrupted , The result is not to open
-oA test.xml: Generate scan results test.xml file , After interruption , The results can also be saved
-oG test.txt: Generate scan results test.txt file
-sn : Only host discovery , No port scan
-O : Appoint Nmap Scan the system version
-sV: Assign to Nmap Scan the service version
-p : Scan the specified port
-sS/sT/sA/sW/sM: Specify the use of TCP SYN/Connect()/ACK/Window/Maimonscans To scan the target host
-sU: Specify the use of UDP Scan mode to determine the target host's UDP Port status
-script
nmap -sT 192.168.52.141 scanning tcp port
-sU scanning udp port
nmap Script scan
Nmap Allow users to write their own scripts for automated scanning operations , Or expand Nmap Existing function scripts , The default directory for script placement is : /usr/share/nmap/scripts, It's probably close inside 600 Built in scripts with different categories and functions .Nmap The script functions of are mainly divided into the following categories :
auth: Handle authentication certificate ( Bypass authentication ) Script for
broadcast: Probe more services on LAN , Such as dhcp/dns/sqlserver Etc
brute: Provide violence ** The way , For common applications such as http/snmp etc.
default: Use -sC or - A The default script for option bar tracing , Provides basic script scanning capabilities
discovery: More information about the Internet , Such as SMB enumeration 、SNMP Query etc.
dos: Used for denial of service attacks
exploit: Exploit known vulnerability to invade system
external: Using third party databases or resources , For example, to whois analysis
fuzzer: The script for the fuzzy test , Send abnormal package to target machine , Detect potential vulnerabilities
intrusive: Invasive scripts , Such scripts may bow | Send it to the other party IDS/IPS Recording or shielding of
malware: Detect if the target machine is infected with a virus 、 Open the back door and other information
safe: Such and intrusive contrary , Belongs to security script
version: Responsible for enhanced services and version scanning ( Version Detection ) Function script
vuln: Responsible for checking whether the target machine has common vulnerabilities ( Vulnerability ) , If there is MS08_ 067
1. Default script scan , It mainly scans the information of various application services .
nmap --script=default 192.168.52.141
2. Scan for common vulnerabilities .
nmap --script=vuln 192.168.52.141
Lame
First step : Scan the network ```
nmap -sV -O -F --version-light 10.10.10.3
-sV: Probe open ports to determine Services / Version information
-O: Enable operating system detection
-F: Fast mode - Scan fewer ports than the default
–version-light: Limit the most likely detection ( Forced crossing 2)
See four open ports :
PORT STATE SERVICE VERSION
21/tcp open ftp vsftpd 2.3.4 ( File transfer protocol FTP Control command )
22/tcp open ssh OpenSSH 4.7p1 Debian 8ubuntu1 (protocol 2.0) ( Safety enclosure SSH, Secure login , File transfer (scp,sftp) And port forwarding
139/tcp open netbios-ssn Samba smbd 3.X - 4.X (workgroup: WORKGROUP)(NetBIOS Session services )
445/tcp open netbios-ssn Samba smbd 3.X - 4.X (workgroup: WORKGROUP) (Miscrosoft-DS( A directory service )SMB File sharing )
The second step : Vulnerable FTP
searchsploit Check vsftpd2.3.4 Are there any known vulnerabilities on ,searchsploit yes exploit database Command line search tool for
searchsploit vsftpd 2.3.4
We will use metasploit, This is a penetration testing framework , It is a necessary tool for attackers and defenders
use msfconsole Command start framework 
search vsftpd 2.3.4 Use this command to find all useful payloads 
We use this attack module
use exploit/unix/ftp/vsftpd_234_backdoor
Enable exploit , View the available options displayed 
You can see the remote host (RHOSTS) Not set yet , We will set up the remote host and target , Because these two information are necessary for trial operation of vulnerability exploitation
We now set up the remote host
set RHOSTS 10.10.10.3
Set target to 0
run The attack 
But it was found that no session was created , The vulnerability has been fixed as described in the vulnerability description
This module uses to add to VSFTPD Download the malicious backdoor in the archive . According to the latest information available , This back door is in 2011 year 6 month 30 solstice 2011 year 7 month 1 Date is introduced vsftpd-2.3.4.tar.gz The archive . The back door was opened on 2011 year 7 month 3 The sun is removed .
The third step :samba
We need to find another way , The second cloth doesn't work
nmap -sV -sT -sC 10.10.10.3
searchsploit Samba 3.0.20
start-up msfconsole
searchsploit Samba 3.0.20
Start the attack module Show available options

Set up the remote host
set RHOSTS 10.10.10.3
run Start the attack module 
边栏推荐
- Poj-3486-computers[dynamic planning]
- Druid monitoring statistics source
- JS to find duplicate elements in two arrays
- Druid监控统计数据源
- [QT] add knowledge supplement of third-party database
- 限流组件设计实战
- Youmeng (a good helper for real-time monitoring of software exceptions: crash) access tutorial (the easiest tutorial for Xiaobai with some foundation)
- robots.txt限制搜索引擎收录
- 【小程序项目开发--京东商城】uni-app之自定义搜索组件(上)
- Densenet network paper learning notes
猜你喜欢

咱就是说 随便整几千个表情包为我所用一下

XXL job User Guide
![Install vcenter6.7 [vcsa6.7 (vCenter server appliance 6.7)]](/img/83/e3c9d8eda9d5351d4c54928d3b090b.png)
Install vcenter6.7 [vcsa6.7 (vCenter server appliance 6.7)]

So easy 将程序部署到服务器

Record a service deployment failure troubleshooting

Restcloud ETL WebService data synchronization to local

php批量excel转word

Optimal Transport系列1

Cloud native annual technology inventory is released! Ride the wind and waves at the right time

Contrastive learning of Class-agnostic Activation Map for Weakly Supervised Object Localization and
随机推荐
产业互联网中,「小」程序有「大」作为
鼠标悬停效果六
Evaluation of the entry-level models of 5 mainstream smart speakers: apple, Xiaomi, Huawei, tmall, Xiaodu, who is better?
MySQL index --01--- design principle of index
Lenovo x86 server restart management controller (xclarity controller) or TSM method
【EXSI】主机间传输文件
Metadata in NFT
Restcloud ETL practice to realize incremental data synchronization without identification bit
An article explaining the publisher subscriber model and the observer model
VMware vSphere 6.7 virtualization cloud management 12. Vcsa6.7 update vCenter server license
鼠标悬停效果八
If a parent class defines a parameterless constructor, is it necessary to call super ()?
Big orange crazy blog move notice
Huawei operator level router configuration example | configuration optionA mode cross domain LDP VPLS example
基于Pytorch完整的训练一个神经网络并进行验证
Record a service deployment failure troubleshooting
Huawei operator level router configuration example | BGP VPLS and LDP VPLS interworking example
STM32 - DS18B20 temperature sampling of first-line protocol
Codeforces Round #416 (Div. 2) C. Vladik and Memorable Trip
HTB-Lame