Hammer
Resumen
Información de la máquina
Nmap scan report for 10.10.55.194
Host is up (0.18s latency).
Not shown: 59998 closed tcp ports (reset)
PORT STATE SERVICE
22/tcp open ssh
1337/tcp open waste
|_http-title: Login
|_http-server-header: Apache/2.4.41 (Ubuntu)
| http-cookie-flags:
| /:
| PHPSESSID:
|_ httponly flag not set
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Aggressive OS guesses: Linux 3.1 (95%), Linux 3.2 (95%), AXIS 210A or 211 Network Camera (Linux 2.6.17) (95%), ASUS RT-N56U WAP (Linux 3.4) (93%), Linux 3.16 (93%), Adtran 424RG FTTH gateway (93%), Linux 2.6.32 (93%), Linux 2.6.39 - 3.2 (93%), Linux 3.1 - 3.2 (93%), Linux 3.11 (93%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 4 hops
TRACEROUTE (using port 1337/tcp)
HOP RTT ADDRESS
1 107.98 ms 10.6.0.1
2 ... 3
4 178.13 ms 10.10.55.194
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 29.97 secondsHallazgos Técnicos Detallados
1. Enumeración del servicio web
2. Acceso a logs internos
Logs

3. Fuerza bruta sobre código de recuperación
codigo
4. JWT con validación débil



Generacion de token admin
5. Escalada de privilegios y ejecución remota
Metodología de Explotación
Conclusiones Técnicas
Última actualización

