02.VULNERABILITY ASSESSMENT
root@htb:~$ sudo nmap --script=vuln {targetIP} -p 22,6789,8080,8443,8843,8880
PORT STATE SERVICE
22/tcp open ssh
80/tcp open http
| http-csrf:
| Spidering limited to: maxdepth=3; maxpagecount=20; withinhost=10.129.141.59
| Found the following possible CSRF vulnerabilities:
|
| Path: http://10.129.141.59:80/
| Form id: name
| Form action: forms/contact.php
|
| Path: http://10.129.141.59:80/
| Form id:
| Form action:
|
| Path: http://10.129.141.59:80/login/login.php
| Form id: login-form
| Form action:
|
| Path: http://10.129.141.59:80/login/login.php
| Form id:
| Form action:
|
| Path: http://10.129.141.59:80/index.html
| Form id: name
| Form action: forms/contact.php
|
| Path: http://10.129.141.59:80/index.html
| Form id:
|_ Form action:
|_http-internal-ip-disclosure: ERROR: Script execution failed (use -d to debug)
|_http-stored-xss: Couldn't find any stored XSS vulnerabilities.
| http-sql-injection:
| Possible sqli for queries:
| http://10.129.141.59:80/login/?C=S%3BO%3DA%27%20OR%20sqlspider
| http://10.129.141.59:80/login/?C=M%3BO%3DA%27%20OR%20sqlspider
| http://10.129.141.59:80/login/?C=D%3BO%3DA%27%20OR%20sqlspider
| http://10.129.141.59:80/login/?C=N%3BO%3DD%27%20OR%20sqlspider
| http://10.129.141.59:80/login/?C=M%3BO%3DA%27%20OR%20sqlspider
| http://10.129.141.59:80/login/?C=D%3BO%3DA%27%20OR%20sqlspider
| http://10.129.141.59:80/login/?C=S%3BO%3DD%27%20OR%20sqlspider
|_ http://10.129.141.59:80/login/?C=N%3BO%3DA%27%20OR%20sqlspider
|_http-dombased-xss: Couldn't find any DOM based XSS.
| http-enum:
| /login/: Login page
|_ /forms/: Potentially interesting directory w/ listing on 'apache/2.4.29 (ubuntu)'
* the --script=vuln will run scripts that focus specifically on detecting known
vulnerabilities in the service running on port 6379
- e.g., weak configurations, or known vulnerabilities in the redis service
- if no results are found then the service may be fully patched!
Last updated