Kioptrix Level 1
https://download.vulnhub.com/kioptrix/Kioptrix_Level_1.rar实战操作
┌──(root💀kali)-[~/Desktop]
└─# netdiscover
Currently scanning: 192.168.47.0/16 | Screen View: Unique Hosts
16 Captured ARP Req/Rep packets, from 4 hosts. Total size: 960
_____________________________________________________________________________
IP At MAC Address Count Len MAC Vendor / Hostname
-----------------------------------------------------------------------------
192.168.32.1 00:50:56:c0:00:08 13 780 VMware, Inc.
192.168.32.2 00:50:56:e9:76:da 1 60 VMware, Inc.
192.168.32.135 00:0c:29:8f:d5:ec 1 60 VMware, Inc.
192.168.32.254 00:50:56:e1:f0:69 1 60 VMware, Inc. ┌──(root💀kali)-[~/Desktop]
└─# nmap 192.168.32.135 -sV
Starting Nmap 7.91 ( https://nmap.org ) at 2021-12-11 08:22 EST
Nmap scan report for 192.168.32.135
Host is up (0.0026s latency).
Not shown: 994 closed ports
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 2.9p2 (protocol 1.99)
80/tcp open http Apache httpd 1.3.20 ((Unix) (Red-Hat/Linux) mod_ssl/2.8.4 OpenSSL/0.9.6b)
111/tcp open rpcbind 2 (RPC #100000)
139/tcp open netbios-ssn Samba smbd (workgroup: ZMYGROUP)
443/tcp open ssl/https Apache/1.3.20 (Unix) (Red-Hat/Linux) mod_ssl/2.8.4 OpenSSL/0.9.6b
32768/tcp open status 1 (RPC #100024)
MAC Address: 00:0C:29:8F:D5:EC (VMware)
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 7.53 seconds
mod_ssl RCE



smb RCE
call_trans2open(RBO)
最后更新于