┌──(root㉿kali)-[/miao/maze-sec/ajpsvr] └─# nmap -sn 192.168.2.0/24 Starting Nmap 7.94SVN ( https://nmap.org ) at 2025-07-17 10:51 CST Nmap scan report for 192.168.2.1 Host is up (0.0014s latency). MAC Address: 0A:00:27:00:00:0A (Unknown) Nmap scan report for 192.168.2.2 Host is up (0.0014s latency). MAC Address: 08:00:27:72:CB:61 (Oracle VirtualBox virtual NIC) Nmap scan report for 192.168.2.59 Host is up (0.00037s latency). MAC Address: 08:00:27:E0:D2:BE (Oracle VirtualBox virtual NIC) Nmap scan report for 192.168.2.4 Host is up. Nmap done: 256 IP addresses (4 hosts up) scanned in 2.22 seconds
靶机IP:192.168.2.59
二、端口扫描
1、全端口扫描
1 2 3 4 5 6 7 8 9 10 11 12 13
┌──(root㉿kali)-[/miao/maze-sec/ajpsvr] └─# nmap --min-rate 10000 -p- 192.168.2.59 Starting Nmap 7.94SVN ( https://nmap.org ) at 2025-07-17 10:51 CST Nmap scan report for 192.168.2.59 Host is up (0.00026s latency). Not shown: 65532 closed tcp ports (reset) PORT STATE SERVICE 22/tcp open ssh 80/tcp open http 8010/tcp open xmpp MAC Address: 08:00:27:E0:D2:BE (Oracle VirtualBox virtual NIC)
Nmap done: 1 IP address (1 host up) scanned in 20.25 seconds
┌──(root㉿kali)-[/miao/maze-sec/ajpsvr] └─# nmap --min-rate 10000 -sT -sV -sC -O -p22,80,8010 192.168.2.59 Starting Nmap 7.94SVN ( https://nmap.org ) at 2025-07-17 10:52 CST Nmap scan report for 192.168.2.59 Host is up (0.0077s latency).
PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 9.9 (protocol 2.0) | ssh-hostkey: | 256 fc:b2:88:5d:09:d8:06:40:81:cd:5a:5c:53:79:60:54 (ECDSA) |_ 256 5b:b9:4d:de:03:f0:ee:72:d3:e3:e9:9d:e8:f1:3f:bd (ED25519) 80/tcp open http nginx |_http-title: 403 Forbidden 8010/tcp open xmpp? | fingerprint-strings: | GenericLines: |_ ajpy 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service : SF-Port8010-TCP:V=7.94SVN%I=7%D=7/17%Time=68786573%P=x86_64-pc-linux-gnu%r SF:(GenericLines,8,"\x124\0\x04ajpy"); MAC Address: 08:00:27:E0:D2:BE (Oracle VirtualBox virtual NIC) Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port Device type: general purpose Running: Linux 4.X|5.X OS CPE: cpe:/o:linux:linux_kernel:4 cpe:/o:linux:linux_kernel:5 OS details: Linux 4.15 - 5.8 Network Distance: 1 hop
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 9.78 seconds
80显示403 8010开放的协议是xmpp
3、UDP端口扫描
1 2 3 4 5 6 7 8 9 10
┌──(root㉿kali)-[/miao/maze-sec/ajpsvr] └─# nmap -sU --top-ports 100 192.168.2.59 Starting Nmap 7.94SVN ( https://nmap.org ) at 2025-07-17 10:53 CST Nmap scan report for 192.168.2.59 Host is up (0.0013s latency). All 100 scanned ports on 192.168.2.59 are in ignored states. Not shown: 54 closed udp ports (port-unreach), 46 open|filtered udp ports (no-response) MAC Address: 08:00:27:E0:D2:BE (Oracle VirtualBox virtual NIC)
Nmap done: 1 IP address (1 host up) scanned in 50.77 seconds
┌──(root㉿kali)-[/miao/maze-sec/ajpsvr] └─# gobuster dir -u http://192.168.2.59 -w /usr/share/dirbuster/wordlists/directory-list-2.3-medium.txt -x php,txt,html,bak,md =============================================================== Gobuster v3.6 by OJ Reeves (@TheColonial) & Christian Mehlmauer (@firefart) =============================================================== [+] Url: http://192.168.2.59 [+] Method: GET [+] Threads: 10 [+] Wordlist: /usr/share/dirbuster/wordlists/directory-list-2.3-medium.txt [+] Negative Status codes: 404 [+] User Agent: gobuster/3.6 [+] Extensions: php,txt,html,bak,md [+] Timeout: 10s =============================================================== Starting gobuster in directory enumeration mode =============================================================== Progress: 1323360 / 1323366 (100.00%) =============================================================== Finished ===============================================================
没有任何东西,转8010端口
2、8010端口
访问8010端口,发现无法访问
1 2 3
┌──(root㉿kali)-[/miao/maze-sec/ajpsvr] └─# curl http://192.168.2.59:8010 curl: (1) Received HTTP/0.9 when not allowed
观察信息收集,发现8010端口可能开放着AJP (Apache JServ Protocol)服务
1 2 3 4 5 6 7
8010/tcp open xmpp? | fingerprint-strings: | GenericLines: |_ ajpy 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service : SF-Port8010-TCP:V=7.94SVN%I=7%D=7/17%Time=68786573%P=x86_64-pc-linux-gnu%r SF:(GenericLines,8,"\x124\0\x04ajpy");
localhost:~$ busybox nc 127.0.0.1 5000 Welcome to SignatureChain CTF over TCP! Type 'view', 'submit', 'hint', or 'exit' > view [ { "index": 1, "sender": "system", "recipient": "alice", "amount": 100, "signature": "14ed219616014b683ae66d1ec2e098c84ff09695b33fff0a7652505e260be0aa", "note": "1" }, { "index": 2, "sender": "alice", "recipient": "bob", "amount": 50, "signature": "08188ce485e280ba7d8c614a776a478d75ac2e985a535d1d126117ceb59ac952", "note": "2" } ] > hint [Hint 1] Use 'view' to inspect part of the blockchain. [Hint 2] The signature is just sha256(sender->recipient:amount). [Hint 3] Try forging a valid signature with this knowledge. [Hint 4] What if admin sent you 999 coins?