$ nmap -p- --min-rate 4000 -Pn 192.168.168.100
Starting Nmap 7.93 ( https://nmap.org ) at 2023-07-10 13:52 +08
Nmap scan report for 192.168.168.100
Host is up (0.17s latency).
Not shown: 65526 closed tcp ports (conn-refused)
PORT STATE SERVICE
22/tcp open ssh
80/tcp open http
111/tcp open rpcbind
2049/tcp open nfs
7742/tcp open msss
33603/tcp open unknown
41637/tcp open unknown
42193/tcp open unknown
59253/tcp open unknown
Did a detailed scan in case:
$ sudo nmap -p 80,111,2049,7742,33603,41637 -sC -sV --min-rate 5000 -Pn 192.168.168.100
Starting Nmap 7.93 ( https://nmap.org ) at 2023-07-10 13:55 +08
Nmap scan report for 192.168.168.100
Host is up (0.21s latency).
PORT STATE SERVICE VERSION
80/tcp open http nginx
|_http-title: Site doesn't have a title (text/html).
111/tcp open rpcbind 2-4 (RPC #100000)
| rpcinfo:
| program version port/proto service
| 100000 2,3,4 111/tcp rpcbind
| 100000 2,3,4 111/udp rpcbind
| 100003 3 2049/udp nfs
| 100003 3,4 2049/tcp nfs
| 100005 1,2,3 41637/tcp mountd
| 100005 1,2,3 52180/udp mountd
| 100021 1,3,4 42193/tcp nlockmgr
| 100021 1,3,4 58389/udp nlockmgr
| 100227 3 2049/tcp nfs_acl
|_ 100227 3 2049/udp nfs_acl
2049/tcp open nfs_acl 3 (RPC #100227)
7742/tcp open http nginx
|_http-title: SORCERER
33603/tcp open mountd 1-3 (RPC #100005)
41637/tcp open mountd 1-3 (RPC #100005)
NFS and Port 7742 look the most promising.
NFS Enumeration -> Dead End
I first enumerated NFS to see if there was anything to mount:
$ showmount -e 192.168.168.100
Export list for 192.168.168.100:
There was nothing, so let's move on.
Web Enumeration -> Zipfiles
Port 7742 just shows us a login page:
I ran a gobuster directory scan while I tested some weak default passwords. I found a few directories present:
$ gobuster dir -w /usr/share/seclists/Discovery/Web-Content/directory-list-2.3-medium.txt -u http://192.168.168.100:7742/ -t 100
===============================================================
Gobuster v3.3
by OJ Reeves (@TheColonial) & Christian Mehlmauer (@firefart)
===============================================================
[+] Url: http://192.168.168.100:7742/
[+] Method: GET
[+] Threads: 100
[+] Wordlist: /usr/share/seclists/Discovery/Web-Content/directory-list-2.3-medium.txt
[+] Negative Status codes: 404
[+] User Agent: gobuster/3.3
[+] Timeout: 10s
===============================================================
2023/07/10 13:58:45 Starting gobuster in directory enumeration mode
===============================================================
/default (Status: 301) [Size: 178] [--> http://192.168.168.100:7742/default/]
/zipfiles (Status: 301) [Size: 178] [--> http://192.168.168.100:7742/zipfiles/]
The /zipfiles directory looks the most interesting. Within it, there were zip files named after the users on the machine:
max.zip was the largest and hence the only one I downloaded. When unzipped, it contained all the files like his SSH key: