EvilZone

Hacking and Security => Hacking and Security => : @R7un August 25, 2014, 05:37:49 PM

: Real World Scenario
: @R7un August 25, 2014, 05:37:49 PM
So i am testing against my own server:
NMAP(output)

PORT     STATE SERVICE
21/tcp   open  ftp
25/tcp   open  smtp
80/tcp   open  http
443/tcp  open  https
1248/tcp open  hermes
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Device type: general purpose
Running (JUST GUESSING): Microsoft Windows Vista|7|2008 (89%)
OS CPE: cpe:/o:microsoft:windows_vista::sp2 cpe:/o:microsoft:windows_7::sp1 cpe:/o:microsoft:windows_server_2008
Aggressive OS guesses: Microsoft Windows Vista SP2, Windows 7 SP1, or Windows Server 2008 (89%), Microsoft Windows Server 2008 R2 (89%)

SMTP grabbing:
SG2NW8SHG132.sin2.gdhosting.gdg Microsoft ESMTP MAIL Service, Version: 7.0.6002.18264



i would like to find the vulnerabilities as well as exploits or any other hack so that i can get a shell...
: Re: Real World Scenario
: ande August 25, 2014, 05:52:32 PM
This is absolutely nothing nothing for us to go on. Like someone said in a similar thread, we are not wizards.

A port number dosent mean much, you will need a service signature or at least a confirmation that port x is in fact protocol x and then go from there.
: Re: Real World Scenario
: Architect August 25, 2014, 06:08:41 PM
This type of thing really pisses me off. When I see Nmap scans I immediately think this:
"Why the hell doesn't he just use NeXpose to scan, then exploit or report from there?"
Nmap scans tell you very little and I've stopped doing them most of the time for pentests.
: Re: Real World Scenario
: @R7un August 25, 2014, 07:53:53 PM
i did some research:
it runs windows NT (after ftp grabbing)
server windows IIS/7.0- no vulnerability found..
runs Microsoft FTP  ver-7.0
 running throgh nessus as well as openvas
what more can i do??

also i want to try default password on ftp, but i'm unable to find default password and username of Microsoft IIS 7.0??

Staff note: I can see you can use the modify button, then why the fuck did you doublepost nigga?
: Re: Real World Scenario
: Kulverstukas August 25, 2014, 08:02:42 PM
With what you had given us, all I can say is... metasploit autopwn.
: Re: Real World Scenario
: @R7un August 25, 2014, 08:10:41 PM
so from where would you have started lets say the server is [redacted] what scans would you ahve performed and how you would have proceeded?? I'm a noob right now..forgive me for my mistakes...
: Re: Real World Scenario
: proxx August 26, 2014, 03:26:07 PM
so from where would you have started lets say the server is [redacted] what scans would you ahve performed and how you would have proceeded?? I'm a noob right now..forgive me for my mistakes...
You proceed by sitting the fuck down and go read some books.
Learn basics of windows/linux/networking/exploitation/coding and come back in 6 months.
The patience these days, jeez. There aint no pwn button, sry bro.
: Re: Real World Scenario
: M1lak0 August 28, 2014, 02:50:15 PM
Ok I can only help by telling you what can be done here!
See Nmap scan you are using not only give results for port scans. It does hell lots of things!
Ok so now scan for the version of the open port via nmap. Yes it also give results to get the version. So now you got the version. Google the exploit of the version the server is running! You might not get much but dig and see if you get something! There are many ways to hack into a box.
Also see the version server is running. Google for the exploit of the server version, try your luck there too. See if any misconfigured file there on the server! Its a Windows server I guess so msf will help you if you use it correctly! ;)
Best Luck pal (Y) A cookie please,  if you find this informative! :D
: Re: Real World Scenario
: @R7un August 28, 2014, 08:15:13 PM
thanks man you helped me find the path... :D
: Re: Real World Scenario
: M1lak0 August 28, 2014, 08:45:17 PM
thanks man you helped me find the path... :D
I am glad it helped you! Now a cookie! :P