Reconstruction
Gaining Access
$ nmap -p- --min-rate 3000 192.168.183.103
Starting Nmap 7.93 ( https://nmap.org ) at 2023-07-12 00:04 +08
Nmap scan report for 192.168.183.103
Host is up (0.17s latency).
Not shown: 65532 closed tcp ports (conn-refused)
PORT STATE SERVICE
21/tcp open ftp
22/tcp open ssh
8080/tcp open http-proxyAnonymous FTP -> Wireshark Password
$ ftp 192.168.183.103
Connected to 192.168.183.103.
220 (vsFTPd 3.0.3)
Name (192.168.183.103:kali): anonymous
331 Please specify the password.
Password:
230 Login successful.
Remote system type is UNIX.
Using binary mode to transfer files.
ftp> ls
229 Entering Extended Passive Mode (|||49037|)
150 Here comes the directory listing.
drwxr-xr-x 2 0 0 4096 Apr 29 2020 WebSOC
-rw-r--r-- 1 0 0 137 Apr 29 2020 note.txt
ftp> cd WebSOC
250 Directory successfully changed.
ftp> ls
229 Entering Extended Passive Mode (|||32250|)
150 Here comes the directory listing.
-rw-r--r-- 1 0 0 3086771 Apr 29 2020 1.05.2020.pcap
-rw-r--r-- 1 0 0 869677 Apr 29 2020 29.04.2020.pcap
-rw-r--r-- 1 0 0 14579662 Apr 29 2020 30.04.2020.pcap

Web Enum -> LFI








Werkzeug PIN Calculation -> RCE







Privilege Escalation
Jack Creds

Powershell -> Root Creds

Last updated