LazySysAdmin
Lets check the Victim Machine’s IP address ⤵️
1
IP : 192.168.249.131
Port Scan Results ➡️
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
┌──(kali㉿kali)-[~/Downloads/Proving_Ground/Lazysysadmin]
└─$ sudo nmap -sC -sV -p- -T4 -oN Nmap_results.txt 192.168.249.131
Starting Nmap 7.93 ( https://nmap.org ) at 2023-05-01 01:57 EDT
Nmap scan report for 192.168.249.131
Host is up (0.0028s latency).
Not shown: 65529 closed tcp ports (reset)
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 6.6.1p1 Ubuntu 2ubuntu2.8 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey:
| 1024 b538660fa1eecd41693b82cfada1f713 (DSA)
| 2048 585a6369d0dadd51ccc16e00fd7e61d0 (RSA)
| 256 6130f3551a0ddec86a595bc99cb49204 (ECDSA)
|_ 256 1f65c0dd15e6e421f2c19ba3b655a045 (ED25519)
80/tcp open http Apache httpd 2.4.7 ((Ubuntu))
|_http-server-header: Apache/2.4.7 (Ubuntu)
| http-robots.txt: 4 disallowed entries
|_/old/ /test/ /TR2/ /Backnode_files/
|_http-title: Backnode
|_http-generator: Silex v2.2.7
139/tcp open netbios-ssn Samba smbd 3.X - 4.X (workgroup: WORKGROUP)
445/tcp open netbios-ssn Samba smbd 4.3.11-Ubuntu (workgroup: WORKGROUP)
3306/tcp open mysql MySQL (unauthorized)
6667/tcp open irc InspIRCd
| irc-info:
| server: Admin.local
| users: 1
| servers: 1
| chans: 0
| lusers: 1
| lservers: 0
| source ident: nmap
| source host: 192.168.249.128
|_ error: Closing link: (nmap@192.168.249.128) [Client exited]
MAC Address: 00:0C:29:34:9D:0A (VMware)
Service Info: Hosts: LAZYSYSADMIN, Admin.local; OS: Linux; CPE: cpe:/o:linux:linux_kernel
Web Enumeration ➡️
Directory / Files Bruteforcing ⤵️
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
┌──(kali㉿kali)-[~/Downloads/Proving_Ground/Lazysysadmin]
└─$ feroxbuster -u http://192.168.249.131:80 -t 100 -k -o ferox_80 --depth 2 -C 403,404 -x php,js,html,txt,zip -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt
___ ___ __ __ __ __ __ ___
|__ |__ |__) |__) | / ` / \ \_/ | | \ |__
| |___ | \ | \ | \__, \__/ / \ | |__/ |___
by Ben "epi" Risher 🤓 ver: 2.9.1
───────────────────────────┬──────────────────────
🎯 Target Url │ http://192.168.249.131:80
🚀 Threads │ 100
📖 Wordlist │ /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt
💢 Status Code Filters │ [403, 404]
💥 Timeout (secs) │ 7
🦡 User-Agent │ feroxbuster/2.9.1
💉 Config File │ /etc/feroxbuster/ferox-config.toml
💾 Output File │ ferox_80
💲 Extensions │ [php, js, html, txt, zip]
🏁 HTTP methods │ [GET]
🔓 Insecure │ true
🔃 Recursion Depth │ 2
🎉 New Version Available │ https://github.com/epi052/feroxbuster/releases/latest
───────────────────────────┴──────────────────────
🏁 Press [ENTER] to use the Scan Management Menu™
──────────────────────────────────────────────────
200 GET 911l 1700w 36072c http://192.168.249.131/
200 GET 911l 1700w 36072c http://192.168.249.131/index.html
200 GET 927l 5044w 77179c http://192.168.249.131/info.php
301 GET 9l 28w 321c http://192.168.249.131/wordpress => http://192.168.249.131/wordpress/
301 GET 9l 28w 316c http://192.168.249.131/test => http://192.168.249.131/test/
301 GET 9l 28w 314c http://192.168.249.131/wp => http://192.168.249.131/wp/
301 GET 9l 28w 318c http://192.168.249.131/apache => http://192.168.249.131/apache/
301 GET 9l 28w 315c http://192.168.249.131/old => http://192.168.249.131/old/
301 GET 9l 28w 322c http://192.168.249.131/javascript => http://192.168.249.131/javascript/
200 GET 7l 10w 92c http://192.168.249.131/robots.txt
301 GET 9l 28w 332c http://192.168.249.131/wordpress/wp-content => http://192.168.249.131/wordpress/wp-content/
200 GET 385l 3179w 19935c http://192.168.249.131/wordpress/license.txt
301 GET 9l 28w 333c http://192.168.249.131/wordpress/wp-includes => http://192.168.249.131/wordpress/wp-includes/
200 GET 98l 844w 7413c http://192.168.249.131/wordpress/readme.html
301 GET 9l 28w 330c http://192.168.249.131/wordpress/wp-admin => http://192.168.249.131/wordpress/wp-admin/
301 GET 9l 28w 322c http://192.168.249.131/phpmyadmin => http://192.168.249.131/phpmyadmin/
200 GET 24l 149w 12497c http://192.168.249.131/phpmyadmin/webapp.php
200 GET 25l 318w 8269c http://192.168.249.131/phpmyadmin/navigation.php
200 GET 25l 318w 8266c http://192.168.249.131/phpmyadmin/license.php
200 GET 25l 318w 8265c http://192.168.249.131/phpmyadmin/export.php
401 GET 14l 54w 461c http://192.168.249.131/phpmyadmin/setup
200 GET 25l 318w 8262c http://192.168.249.131/phpmyadmin/sql.php
301 GET 9l 28w 332c http://192.168.249.131/javascript/prototype => http://192.168.249.131/javascript/prototype/
405 GET 1l 6w 42c http://192.168.249.131/wordpress/xmlrpc.php
301 GET 9l 28w 329c http://192.168.249.131/phpmyadmin/locale => http://192.168.249.131/phpmyadmin/locale/
200 GET 25l 318w 8272c http://192.168.249.131/phpmyadmin/server_status.php
[####################] - 11m 11909484/11909484 0s found:26 errors:851498
[####################] - 9m 1323276/1323276 2411/s http://192.168.249.131:80/
[####################] - 9m 1323276/1323276 2222/s http://192.168.249.131/
[####################] - 10m 1323276/1323276 2128/s http://192.168.249.131/wordpress/
[####################] - 0s 1323276/1323276 0/s http://192.168.249.131/test/ => Directory listing (add -e to scan)
[####################] - 0s 1323276/1323276 0/s http://192.168.249.131/wp/ => Directory listing (add -e to scan)
[####################] - 0s 1323276/1323276 0/s http://192.168.249.131/apache/ => Directory listing (add -e to scan)
[####################] - 0s 1323276/1323276 0/s http://192.168.249.131/old/ => Directory listing (add -e to scan)
[####################] - 11m 1323276/1323276 1957/s http://192.168.249.131/javascript/
[####################] - 9m 1323276/1323276 2260/s http://192.168.249.131/phpmyadmin/
Now Lets check the wordpress site now ⤵️
Now I get a username as togie
so lets try ssh brute force ➡️
Let’s SSH now ⤵️
Now see what this user can do ➡️
Proof.txt file ⬇️
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
root@LazySysAdmin:/root# cat proof.txt
WX6k7NJtA8gfk*w5J3&T@*Ga6!0o5UP89hMVEQ#PT9851
Well done :)
Hope you lear not a few things along the way.
Regards,
Togie Mcdogie
Enjoy some random strings
WX6k7NJtA8gfk*w5J3&T@*Ga6!0o5UP89hMVEQ#PT9851
2d2v#X6x9%D6!DDf4xC1ds6YdOEjug3otDmc1$#slTET7
pf%&1nRpaj^68ZeV2St9GkdoDkj48Fl$MI97Zt2nebt02
bhO!5Je65B6Z0bhZhQ3W64wL65wonnQ$@yw%Zhy0U19pu
root@LazySysAdmin:/root#
If you have any questions or suggestions, please leave a comment below. Thank You !
This post is licensed under CC BY 4.0 by the author.