192.168.10.233:22 open 192.168.10.233:8080 open 192.168.10.10:3306 open 192.168.10.10:445 open 192.168.10.10:139 open 192.168.10.10:135 open [+] 192.168.10.10 CVE-2020-0796 SmbGhost Vulnerable [*] WebTitle:http://192.168.10.233:8080 code:400 len:0 title:None [*] WebTitle:https://192.168.10.233:8080 code:404 len:19 title:None 192.168.20.10:445 open 192.168.20.30:139 open 192.168.20.30:88 open 192.168.20.10:3306 open 192.168.20.30:445 open 192.168.20.20:139 open 192.168.20.20:445 open 192.168.20.10:139 open 192.168.20.30:135 open 192.168.20.20:135 open 192.168.20.10:135 open 192.168.20.20:3306 open NetInfo: [*]192.168.20.20 [->]cyberweb [->]192.168.20.20 [+] 192.168.20.10 CVE-2020-0796 SmbGhost Vulnerable NetInfo: [*]192.168.20.30 [->]WIN-7NRTJO59O7N [->]192.168.20.30 [*] 192.168.20.20 CYBERSTRIKELAB\CYBERWEB Windows Server 2012 R2 Standard 9600 [*] 192.168.20.30 [+]DC __MSBROWSE__\WIN-7NRTJO59O7N 192.168.20.30:88 open 192.168.20.30:53 open 192.168.20.20:139 open 192.168.20.30:139 open 192.168.20.10:139 open 192.168.20.20:135 open 192.168.20.30:135 open 192.168.20.10:135 open 192.168.20.30:389 open 192.168.20.20:445 open 192.168.20.30:445 open 192.168.20.10:445 open 192.168.20.30:464 open 192.168.20.30:593 open 192.168.20.30:636 open 192.168.20.30:3269 open 192.168.20.30:3268 open 192.168.20.20:3306 open 192.168.20.10:3306 open 192.168.20.10:3590 open 192.168.20.10:5040 open 192.168.20.20:5985 open 192.168.20.20:8055 open
突然想起来,flag2题目中有提示,主页有木马,盲猜在index.php
用CS做个代理转发,并在攻击机kali上设置代理sudo vim /etc/proxychains4.conf