Blunder
Enumeration
nmap
$ nmap -sC -sV -oN nmap.txt 10.10.10.191
Starting Nmap 7.80 ( https://nmap.org ) at 2020-08-16 21:56 BST
Nmap scan report for 10.10.10.191
Host is up (0.066s latency).
Not shown: 998 filtered ports
PORT STATE SERVICE VERSION
21/tcp closed ftp
80/tcp open http Apache httpd 2.4.41 ((Ubuntu))
|_http-generator: Blunder
|_http-server-header: Apache/2.4.41 (Ubuntu)
|_http-title: Blunder | A blunder of interesting facts
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 17.28 secondsdirsearch
wfuzz


Potential username: fergus
After some extensive enumeration, the only usefull information found was the "todo.txt" file which contains a possible username ("fergus").
Creating wordlist with cewl
$ cewl -w wordlists.txt -d 10 -m 1 10.10.10.191/
Bruteforcing login cred

Exploitation
Metasploit
PivEsc


Getting user.txt

Getting root.txt


Last updated
Was this helpful?