Surf
Gaining Access
$ nmap -p- --min-rate 4000 192.168.175.171
Starting Nmap 7.93 ( https://nmap.org ) at 2023-07-01 16:06 +08
Nmap scan report for 192.168.175.171
Host is up (0.17s latency).
Not shown: 41614 filtered tcp ports (no-response), 23919 closed tcp ports (conn-refused)
PORT STATE SERVICE
22/tcp open ssh
80/tcp open httpSurfing Blog -> Login Bypass
$ gobuster dir -w /usr/share/seclists/Discovery/Web-Content/directory-list-2.3-medium.txt -u http://192.168.175.171 -t 100
===============================================================
Gobuster v3.3
by OJ Reeves (@TheColonial) & Christian Mehlmauer (@firefart)
===============================================================
[+] Url: http://192.168.175.171
[+] Method: GET
[+] Threads: 100
[+] Wordlist: /usr/share/seclists/Discovery/Web-Content/directory-list-2.3-medium.txt
[+] Negative Status codes: 404
[+] User Agent: gobuster/3.3
[+] Timeout: 10s
===============================================================
2023/07/01 16:19:50 Starting gobuster in directory enumeration mode
===============================================================
/assets (Status: 301) [Size: 319] [--> http://192.168.175.171/assets/]
/css (Status: 301) [Size: 316] [--> http://192.168.175.171/css/]
/js (Status: 301) [Size: 315] [--> http://192.168.175.171/js/]
/administration (Status: 301) [Size: 327] [--> http://192.168.175.171/administration/]


SSRF -> RCE



Privilege Escalation
James Creds

Sudo Privileges


Last updated