author: sysevil
OS: Windows Difficult: Easy ip: 10.10.11.249
Port Scan nmap -p- -T4 --min-rate=10000 10.10.11.249 -oG open_ports_full Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-02-15 13:34 -03 Nmap scan report for 10.10.11.249 (10.10.11.249) Host is up (0.13s latency). Not shown: 65533 filtered tcp ports (no-response) PORT STATE SERVICE 80/tcp open http 25565/tcp open minecraft Nmap done: 1 IP address (1 host up) scanned in 13.58 seconds nmap -sV -sC -A -p 80,25565 -T4 --min-rate=1000 10.
The Proof of Concept (PoC) for CVE-2023-23752 is available here.
Overview CVE-2023-23752 represents a vulnerability in Joomla’s microservice API service, disclosed on February 13, 2023. Discovered by Zewei Zhang from NSFOCUS TIANJI Lab, the vulnerability has been assigned a base score of 5.3 (Medium). It allows unauthorized disclosure of plaintext passwords and Personally Identifiable Information (PII) of users. This article provides an analysis of the vulnerability.
The Vulnerability CVE-2023-23752 is characterized by an improper access control flaw that permits unauthorized access to webservice endpoints without authentication.
author: sysevil
OS: Linux Difficult: Easy
Port Scanner sudo nmap -p- -v -oG fullscan -T4 10.10.11.221 Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-02-14 18:19 -03 Initiating Ping Scan at 18:19 Scanning 10.10.11.221 [4 ports] Completed Ping Scan at 18:19, 0.15s elapsed (1 total hosts) Initiating SYN Stealth Scan at 18:19 Scanning 2million.htb (10.10.11.221) [65535 ports] Discovered open port 80/tcp on 10.10.11.221 Discovered open port 22/tcp on 10.10.11.221 SYN Stealth Scan Timing: About 22.
IP: 10.10.11.10 OS: Linux Difficult: medium
Port Scanner sudo nmap --min-rate 1000 -p- -T4 -sV 10.10.11.10 -oG full_scan [sudo] password for parallels: Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-02-12 20:17 -03 Nmap scan report for 10.10.11.10 (10.10.11.10) Host is up (0.13s latency). Not shown: 65533 closed tcp ports (reset) PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 8.9p1 Ubuntu 3ubuntu0.6 (Ubuntu Linux; protocol 2.0) 8080/tcp open http Jetty 10.
#obfiz IP: 10.10.11.252
Port Scan sudo nmap --min-rate 1000 -p- -T4 -sV 10.10.11.252 -oG full_scan [sudo] password for parallels: Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-02-05 18:25 -03 Warning: 10.10.11.252 giving up on port because retransmission cap hit (6). Nmap scan report for 10.10.11.252 (10.10.11.252) Host is up (0.13s latency). Not shown: 65290 closed tcp ports (reset), 241 filtered tcp ports (no-response) PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 8.
Machine: Linux Difficult: Easy #Kubernetes #cloud IP: 10.10.14.149
PortScanner Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-02-14 08:33 -03 Nmap scan report for 10.10.11.133 (10.10.11.133) Host is up (0.13s latency). Not shown: 65529 closed tcp ports (reset) PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 7.9p1 Debian 10+deb10u2 (protocol 2.0) 2379/tcp open ssl/etcd-client? 2380/tcp open ssl/etcd-server? 8443/tcp open ssl/https-alt 10249/tcp open http Golang net/http server (Go-IPFS json-rpc or InfluxDB API) 10250/tcp open ssl/http Golang net/http server (Go-IPFS json-rpc or InfluxDB API) DirScanner _|.