03.CROCODILE (FTP & WEB FORM LOGIN)

root@oco:~$ sudo openvpn ~/Downloads/starting_point.ovpn

ENUMERATE SERVICES

root@htb:~$ sudo nmap -sV -T4 {targetIP} -p-
 PORT     STATE SERVICE       VERSION
 21/tcp open  ftp     vsftpd 3.0.3
 80/tcp open  http    Apache httpd 2.4.41 ((Ubuntu))
 
 * Typically '-sV' is used with Nmap to determine versions, but that's not always enough. 
    - adding the -sC is another good way to determine service versions
       - the -sC option will run safe scripts which are designed to provide useful 
         information without being too intrusive or causing harm to the target systems.

VULNERABILITY SCANNING

root@htb:~$ nmap -sV -sC -T4 {targetIP} -p 21,80
 PORT   STATE SERVICE VERSION
 21/tcp open  ftp     vsftpd 3.0.3
 | ftp-anon: Anonymous FTP login allowed (FTP code 230)
 | -rw-r--r--    1 ftp      ftp            33 Jun 08  2021 allowed.userlist
 |_-rw-r--r--    1 ftp      ftp            62 Apr 20  2021 allowed.userlist.passwd
 | ftp-syst: 
 |   STAT: 
 | FTP server status:
 |      Connected to ::ffff:10.10.14.51
 |      Logged in as ftp
 |      TYPE: ASCII
 |      No session bandwidth limit
 |      Session timeout in seconds is 300
 |      Control connection is plain text
 |      Data connections will be plain text
 |      At session startup, client count was 2
 |      vsFTPd 3.0.3 - secure, fast, stable
 |_End of status
 80/tcp open  http    Apache httpd 2.4.41 ((Ubuntu))
 |_http-server-header: Apache/2.4.41 (Ubuntu)
 |_http-title: Smash - Bootstrap Business Template
 Service Info: OS: Unix

 * the -SC runs the default set of Nmap scripts (NSE scripts), which typically include
   scripts for service enumeration, version detection, and other basic checks.
   
root@htb:~$ sudo nmap --script=vuln 10.129.1.15 -p 21,80
 PORT   STATE SERVICE
 21/tcp open  ftp
 80/tcp open  http
 | http-cookie-flags: 
 |   /login.php: 
 |     PHPSESSID: 
 |_      httponly flag not set
 |_http-stored-xss: Couldn't find any stored XSS vulnerabilities.
 |_http-dombased-xss: Couldn't find any DOM based XSS.
 | http-csrf: 
 | Spidering limited to: maxdepth=3; maxpagecount=20; withinhost=10.129.1.15
 |   Found the following possible CSRF vulnerabilities: 
 |     
 |     Path: http://10.129.1.15:80/
 |     Form id: contact-form
 |     Form action: assets/contact.php
 |     
 |     Path: http://10.129.1.15:80/index.html
 |     Form id: contact-form
 |_    Form action: assets/contact.php
 | http-enum: 
 |   /login.php: Possible admin folder
 |   /css/: Potentially interesting directory w/ listing on 'apache/2.4.41 (ubuntu)'
 |_  /js/: Potentially interesting directory w/ listing on 'apache/2.4.41 (ubuntu)'

 * the --script=vuln will run scripts that focus specifically on detecting known 
   vulnerabilities in the service running on port 6379
    - e.g., weak configurations, or known vulnerabilities in the redis service
       - if no results are found then the service may be fully patched!

FOOTHOLD/COMPROMISE

Submit root flag

Last updated