Flasky
Gaining Access
$ nmap -p- --min-rate 3000 -Pn 192.168.201.141
Starting Nmap 7.93 ( https://nmap.org ) at 2023-07-15 14:02 +08
Nmap scan report for 192.168.201.141
Host is up (0.17s latency).
Not shown: 65531 closed tcp ports (conn-refused)
PORT STATE SERVICE
22/tcp open ssh
5555/tcp open freeciv
20202/tcp open ipdtp-port$ sudo nmap -p 5555,20202 -sC -sV --min-rate 3000 192.168.201.141
[sudo] password for kali:
Starting Nmap 7.93 ( https://nmap.org ) at 2023-07-15 14:03 +08
Nmap scan report for 192.168.201.141
Host is up (0.17s latency).
PORT STATE SERVICE VERSION
5555/tcp open http nginx 1.18.0 (Ubuntu)
|_http-title: Calculator
|_http-server-header: nginx/1.18.0 (Ubuntu)
20202/tcp open http nginx 1.18.0 (Ubuntu)
|_http-server-header: nginx/1.18.0 (Ubuntu)
|_http-title: Site doesn't have a title (text/html; charset=utf-8).Web Enum -> JWT Exploit







Config -> SSH Creds



Privilege Escalation
Calculator Backup -> Root


Last updated