HackTheBox-Registry
ssooking Lv5

nmap扫描常见短裤,发现开启了22、80、443。

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
# nmap -T4 -sS -sV -sC 10.10.10.159
Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-05 21:49 EST
Nmap scan report for 10.10.10.159
Host is up (0.29s latency).
Not shown: 997 closed ports
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 7.6p1 Ubuntu 4ubuntu0.3 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey:
| 2048 72:d4:8d:da:ff:9b:94:2a:ee:55:0c:04:30:71:88:93 (RSA)
| 256 c7:40:d0:0e:e4:97:4a:4f:f9:fb:b2:0b:33:99:48:6d (ECDSA)
|_ 256 78:34:80:14:a1:3d:56:12:b4:0a:98:1f:e6:b4:e8:93 (ED25519)
80/tcp open http nginx 1.14.0 (Ubuntu)
|_http-server-header: nginx/1.14.0 (Ubuntu)
|_http-title: Welcome to nginx!
443/tcp open ssl/http nginx 1.14.0 (Ubuntu)
|_http-server-header: nginx/1.14.0 (Ubuntu)
|_http-title: 400 The plain HTTP request was sent to HTTPS port
| ssl-cert: Subject: commonName=docker.registry.htb
| Not valid before: 2019-05-06T21:14:35
|_Not valid after: 2029-05-03T21:14:35
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 108.43 seconds

在nmap的443端口输出信息中看到docker.registry.htb,加到/etc/hosts中后访问

https://mp.weixin.qq.com/s/6YP17AS2gnFoKVvHByx_Ew

  • Post title:HackTheBox-Registry
  • Post author:ssooking
  • Create time:2020-03-06 11:40:00
  • Post link:https://ssooking.github.io/2020/03/hackthebox-registry/
  • Copyright Notice:All articles in this blog are licensed under BY-NC-SA unless stating additionally.