Dev
Enumeration
sudo netdiscover -r 10.0.2.0/24
10.0.2.8 08:00:27:2d:08:71 2 120 PCS Systemtechnik GmbH nmap
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 7.9p1 Debian 10+deb10u2 (protocol 2.0)
| ssh-hostkey:
| 2048 bd:96:ec:08:2f:b1:ea:06:ca:fc:46:8a:7e:8a:e3:55 (RSA)
| 256 56:32:3b:9f:48:2d:e0:7e:1b:df:20:f8:03:60:56:5e (ECDSA)
|_ 256 95:dd:20:ee:6f:01:b6:e1:43:2e:3c:f4:38:03:5b:36 (ED25519)
80/tcp open http Apache httpd 2.4.38 ((Debian))
|_http-server-header: Apache/2.4.38 (Debian)
|_http-title: Bolt - Installation error
111/tcp open rpcbind 2-4 (RPC #100000)
| rpcinfo:
| program version port/proto service
| 100000 2,3,4 111/tcp rpcbind
| 100000 2,3,4 111/udp rpcbind
| 100000 3,4 111/tcp6 rpcbind
| 100000 3,4 111/udp6 rpcbind
| 100003 3 2049/udp nfs
| 100003 3 2049/udp6 nfs
| 100003 3,4 2049/tcp nfs
| 100003 3,4 2049/tcp6 nfs
| 100005 1,2,3 33059/udp mountd
| 100005 1,2,3 45785/udp6 mountd
| 100005 1,2,3 49501/tcp mountd
| 100005 1,2,3 51005/tcp6 mountd
| 100021 1,3,4 34697/tcp nlockmgr
| 100021 1,3,4 35729/tcp6 nlockmgr
| 100021 1,3,4 51810/udp6 nlockmgr
| 100021 1,3,4 56408/udp nlockmgr
| 100227 3 2049/tcp nfs_acl
| 100227 3 2049/tcp6 nfs_acl
| 100227 3 2049/udp nfs_acl
|_ 100227 3 2049/udp6 nfs_acl
2049/tcp open nfs_acl 3 (RPC #100227)
8080/tcp open http Apache httpd 2.4.38 ((Debian))
| http-open-proxy: Potentially OPEN proxy.
|_Methods supported:CONNECTION
|_http-server-header: Apache/2.4.38 (Debian)
|_http-title: PHP 7.3.27-1~deb10u1 - phpinfo()
34697/tcp open nlockmgr 1-4 (RPC #100021)
35899/tcp open mountd 1-3 (RPC #100005)
49501/tcp open mountd 1-3 (RPC #100005)
54403/tcp open mountd 1-3 (RPC #100005)
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 10.29 secondsApache
FFUF
browse through interesting folders and apps discovered
NFS
Mount
Unzip file found
Try cracking ZIP password
Unzip again with the password java101
BOLTWIRE
https://www.exploit-db.com/exploits/48411
Need to register with a normal user first

This find with the id_rsa found before can be an indication
SSH
Since we have sudo without password we can look for sudo escalation using the ZIP command
Last updated