Splodge
Gaining Access
$ nmap -p- --min-rate 3000 -Pn 192.168.157.108
Starting Nmap 7.93 ( https://nmap.org ) at 2023-07-16 10:08 +08
Nmap scan report for 192.168.157.108
Host is up (0.17s latency).
Not shown: 65530 filtered tcp ports (no-response)
PORT STATE SERVICE
22/tcp open ssh
80/tcp open http
1337/tcp open waste
5432/tcp open postgresql
8080/tcp open http-proxy$ sudo nmap -p 80,1337,8080 -sC -sV --min-rate 3000 192.168.157.108
[sudo] password for kali:
Starting Nmap 7.93 ( https://nmap.org ) at 2023-07-16 10:09 +08
Nmap scan report for 192.168.157.108
Host is up (0.17s latency).
PORT STATE SERVICE VERSION
80/tcp open http nginx 1.16.1
|_http-server-header: nginx/1.16.1
| http-git:
| 192.168.157.108:80/.git/
| Git repository found!
| .gitignore matched patterns 'bug' 'key'
| .git/config matched patterns 'user'
| Repository description: Unnamed repository; edit this file 'description' to name the...
| Last commit message: initial commit
|_ Project type: node.js application (guessed from .gitignore)
|_http-title: 403 Forbidden
1337/tcp open http nginx 1.16.1
|_http-server-header: nginx/1.16.1
|_http-title: Commando
8080/tcp open http nginx 1.16.1
|_http-title: Splodge | Home
|_http-server-header: nginx/1.16.1
Service detection performed. Please report any incorrect results at https://nmap.org/submitGit Repo -> Creds
Web Enum + Source Code -> RCE






Privilege Escalation
PostgresSQL Creds -> User Shell


Root

Last updated