Walkthru:
http://www.blackroomsec.com/quaoar-write-up/ [wordpress, php reverse vulnerability, multiple open ports 22,53,80,110,139,143,445,993,995]
Notes:
Nmap scan report for 192.168.117.5
Host is up (0.00038s latency).
Not shown: 991 closed ports
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 5.9p1 Debian 5ubuntu1 (Ubuntu Linux; protocol 2.0)
53/tcp open domain ISC BIND 9.8.1-P1
80/tcp open http Apache httpd 2.2.22 ((Ubuntu))
110/tcp open pop3 Dovecot pop3d
139/tcp open netbios-ssn Samba smbd 3.X - 4.X (workgroup: WORKGROUP)
143/tcp open imap Dovecot imapd
445/tcp open netbios-ssn Samba smbd 3.X - 4.X (workgroup: WORKGROUP)
993/tcp open ssl/imap Dovecot imapd
995/tcp open ssl/pop3 Dovecot pop3d [ssl/pop3 Dovecot pop3d
]
MAC Address: 08:00:27:34:58:0D (Oracle VirtualBox virtual NIC)
Device type: general purpose
Running: Linux 2.6.X|3.X
OS CPE: cpe:/o:linux:linux_kernel:2.6 cpe:/o:linux:linux_kernel:3
OS details: Linux 2.6.32 - 3.5
Network Distance: 1 hop
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sun Jul 22 18:02:24 2018 -- 1 IP address (1 host up) scanned in 13.34 seconds
00000000000000000000000000000000000
see enum4linux_192.168.117.5
00000000000000000000000000000000000
And root pwd is in the “wp-config.php” file, I find the root username and password!
00000000000000000000000000000000000
http://www.blackroomsec.com/quaoar-write-up/ [wordpress, php reverse vulnerability, multiple open ports 22,53,80,110,139,143,445,993,995]
Notes:
Nmap scan report for 192.168.117.5
Host is up (0.00038s latency).
Not shown: 991 closed ports
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 5.9p1 Debian 5ubuntu1 (Ubuntu Linux; protocol 2.0)
53/tcp open domain ISC BIND 9.8.1-P1
80/tcp open http Apache httpd 2.2.22 ((Ubuntu))
110/tcp open pop3 Dovecot pop3d
139/tcp open netbios-ssn Samba smbd 3.X - 4.X (workgroup: WORKGROUP)
143/tcp open imap Dovecot imapd
445/tcp open netbios-ssn Samba smbd 3.X - 4.X (workgroup: WORKGROUP)
993/tcp open ssl/imap Dovecot imapd
995/tcp open ssl/pop3 Dovecot pop3d [ssl/pop3 Dovecot pop3d
]
MAC Address: 08:00:27:34:58:0D (Oracle VirtualBox virtual NIC)
Device type: general purpose
Running: Linux 2.6.X|3.X
OS CPE: cpe:/o:linux:linux_kernel:2.6 cpe:/o:linux:linux_kernel:3
OS details: Linux 2.6.32 - 3.5
Network Distance: 1 hop
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sun Jul 22 18:02:24 2018 -- 1 IP address (1 host up) scanned in 13.34 seconds
see enum4linux_192.168.117.5
00000000000000000000000000000000000
nikto shows /wordress
login as admin/admin
added php RS under themes
http://192.168.0.29/wordpress/wp-content/themes/twentyfourteen/404.php
www-data
Linux Quaoar 3.2.0-23-generic-pae #36-Ubuntu SMP Tue Apr 10 22:19:09 UTC 2012 i686 i686 i386 GNU/Linux
/
00000000000000000000000000000000000
login as admin/admin
added php RS under themes
http://192.168.0.29/wordpress/wp-content/themes/twentyfourteen/404.php
www-data
Linux Quaoar 3.2.0-23-generic-pae #36-Ubuntu SMP Tue Apr 10 22:19:09 UTC 2012 i686 i686 i386 GNU/Linux
/
And root pwd is in the “wp-config.php” file, I find the root username and password!
00000000000000000000000000000000000
OS a
00000000000000000000000000000000000
00000000000000000000000000000000000
Comments
Post a Comment