10.1 : Web app exploitation - Recon (Part I)

Cracking XSS & MySQL File Vul lab

Before we start cracking Web app, lets try to crack XSS Mysql File vul lab.

Download here, xss_and_mysql_file.iso , mount as live CD
https://www.vulnhub.com/entry/pentester-lab-xss-and-mysql-file,66/

Recon

We can use the traditional nmap or netdiscover

root@kali:~# nmap 192.168.56.0/24
Starting Nmap 7.80 ( https://nmap.org ) at 2019-11-05 19:15 PST
Nmap scan report for 192.168.56.1
Host is up (0.00015s latency).
Not shown: 999 closed ports
PORT   STATE SERVICE
22/tcp open  ssh
MAC Address: 0A:00:27:00:00:00 (Unknown)

Nmap scan report for 192.168.56.100
Host is up (0.000067s latency).
All 1000 scanned ports on 192.168.56.100 are filtered
MAC Address: 08:00:27:75:46:19 (Oracle VirtualBox virtual NIC)

Nmap scan report for 192.168.56.104
Host is up (0.00012s latency).
Not shown: 998 closed ports
PORT   STATE SERVICE
22/tcp open  ssh
80/tcp open  http
MAC Address: 08:00:27:B0:86:4D (Oracle VirtualBox virtual NIC)

Nmap scan report for 192.168.56.101
Host is up (0.0000040s latency).
Not shown: 998 closed ports
PORT    STATE SERVICE
22/tcp  open  ssh
111/tcp open  rpcbind

Nmap done: 256 IP addresses (4 hosts up) scanned in 19.44 seconds


netdiscover
 Currently scanning: 192.168.216.0/16   |   Screen View: Unique Hosts

 3 Captured ARP Req/Rep packets, from 3 hosts.   Total size: 180
 _____________________________________________________________________________
   IP            At MAC Address     Count     Len  MAC Vendor / Hostname
 -----------------------------------------------------------------------------
 192.168.56.1    0a:00:27:00:00:00      1      60  Unknown vendor
 192.168.56.100  08:00:27:75:46:19      1      60  PCS Systemtechnik GmbH
 192.168.56.104  08:00:27:b0:86:4d      1      60  PCS Systemtechnik GmbH

Found that 192.168.56.104 is our target.

lets dig deeper by nmap -sSV --version-intensity 9

root@kali:~# nmap -sSV --version-intensity 9 192.168.56.104 -p 1-10000
Starting Nmap 7.80 ( https://nmap.org ) at 2019-11-05 19:21 PST
Nmap scan report for 192.168.56.104
Host is up (0.00011s latency).
Not shown: 9998 closed ports
PORT   STATE SERVICE VERSION
22/tcp open  ssh     OpenSSH 5.5p1 Debian 6+squeeze4 (protocol 2.0)
80/tcp open  http    Apache httpd 2.2.16 ((Debian))
MAC Address: 08:00:27:B0:86:4D (Oracle VirtualBox virtual NIC)
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 12.38 seconds

Our target has 2 open attack vector, ssh & the apache.