old htb folders
This commit is contained in:
2023-08-29 21:53:22 +02:00
parent 62ab804867
commit 82b0759f1e
21891 changed files with 6277643 additions and 0 deletions

View File

@@ -0,0 +1,92 @@
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE nmaprun>
<?xml-stylesheet href="file:///usr/bin/../share/nmap/nmap.xsl" type="text/xsl"?>
<!-- Nmap 7.93 scan initiated Mon Jan 23 02:12:55 2023 as: nmap -vv -&#45;reason -Pn -T4 -sV -p 80 &quot;-&#45;script=banner,(http* or ssl*) and not (brute or broadcast or dos or external or http-slowloris* or fuzzer)&quot; -oN /home/kali/htb/investigation/results/scans/tcp80/tcp_80_http_nmap.txt -oX /home/kali/htb/investigation/results/scans/tcp80/xml/tcp_80_http_nmap.xml 10.129.138.192 -->
<nmaprun scanner="nmap" args="nmap -vv -&#45;reason -Pn -T4 -sV -p 80 &quot;-&#45;script=banner,(http* or ssl*) and not (brute or broadcast or dos or external or http-slowloris* or fuzzer)&quot; -oN /home/kali/htb/investigation/results/scans/tcp80/tcp_80_http_nmap.txt -oX /home/kali/htb/investigation/results/scans/tcp80/xml/tcp_80_http_nmap.xml 10.129.138.192" start="1674457975" startstr="Mon Jan 23 02:12:55 2023" version="7.93" xmloutputversion="1.05">
<scaninfo type="connect" protocol="tcp" numservices="1" services="80"/>
<verbose level="2"/>
<debugging level="0"/>
<taskbegin task="NSE" time="1674457975"/>
<taskend task="NSE" time="1674457975"/>
<taskbegin task="NSE" time="1674457975"/>
<taskend task="NSE" time="1674457975"/>
<taskbegin task="NSE" time="1674457975"/>
<taskend task="NSE" time="1674457975"/>
<taskbegin task="Connect Scan" time="1674457975"/>
<taskend task="Connect Scan" time="1674457975" extrainfo="1 total ports"/>
<taskbegin task="Service scan" time="1674457975"/>
<taskend task="Service scan" time="1674457982" extrainfo="1 service on 1 host"/>
<taskbegin task="NSE" time="1674457982"/>
<taskprogress task="NSE" time="1674458013" percent="99.02" remaining="1" etc="1674458013"/>
<taskprogress task="NSE" time="1674458043" percent="99.67" remaining="1" etc="1674458043"/>
<taskprogress task="NSE" time="1674458073" percent="99.67" remaining="1" etc="1674458073"/>
<taskprogress task="NSE" time="1674458103" percent="99.67" remaining="1" etc="1674458103"/>
<taskprogress task="NSE" time="1674458133" percent="99.67" remaining="1" etc="1674458133"/>
<taskend task="NSE" time="1674458148"/>
<taskbegin task="NSE" time="1674458148"/>
<taskend task="NSE" time="1674458148"/>
<taskbegin task="NSE" time="1674458148"/>
<taskend task="NSE" time="1674458148"/>
<host starttime="1674457975" endtime="1674458148"><status state="up" reason="user-set" reason_ttl="0"/>
<address addr="10.129.138.192" addrtype="ipv4"/>
<hostnames>
<hostname name="eforenzics.htb" type="PTR"/>
</hostnames>
<ports><port protocol="tcp" portid="80"><state state="open" reason="syn-ack" reason_ttl="0"/><service name="http" product="Apache httpd" version="2.4.41" hostname="eforenzics.htb" method="probed" conf="10"><cpe>cpe:/a:apache:http_server:2.4.41</cpe></service><script id="http-litespeed-sourcecode-download" output="Request with null byte did not work. This web server might not be vulnerable"/><script id="http-devframework" output="Couldn&apos;t determine the underlying framework or CMS. Try increasing &apos;httpspider.maxpagecount&apos; value to spider more pages."/><script id="http-csrf" output="&#xa;Spidering limited to: maxdepth=3; maxpagecount=20; withinhost=eforenzics.htb&#xa; Found the following possible CSRF vulnerabilities: &#xa; &#xa; Path: http://eforenzics.htb:80/service.html&#xa; Form id: &#xa; Form action: upload.php&#xa;"/><script id="http-useragent-tester" output="&#xa; Status for browser useragent: 200&#xa; Allowed User Agents: &#xa; Mozilla/5.0 (compatible; Nmap Scripting Engine; https://nmap.org/book/nse.html)&#xa; libwww&#xa; lwp-trivial&#xa; libcurl-agent/1.0&#xa; PHP/&#xa; Python-urllib/2.5&#xa; GT::WWW&#xa; Snoopy&#xa; MFC_Tear_Sample&#xa; HTTP::Lite&#xa; PHPCrawl&#xa; URI::Fetch&#xa; Zend_Http_Client&#xa; http client&#xa; PECL::HTTP&#xa; Wget/1.13.4 (linux-gnu)&#xa; WWW-Mechanize/1.34"><elem key="Status for browser useragent">200</elem>
<table key="Allowed User Agents">
<elem>Mozilla/5.0 (compatible; Nmap Scripting Engine; https://nmap.org/book/nse.html)</elem>
<elem>libwww</elem>
<elem>lwp-trivial</elem>
<elem>libcurl-agent/1.0</elem>
<elem>PHP/</elem>
<elem>Python-urllib/2.5</elem>
<elem>GT::WWW</elem>
<elem>Snoopy</elem>
<elem>MFC_Tear_Sample</elem>
<elem>HTTP::Lite</elem>
<elem>PHPCrawl</elem>
<elem>URI::Fetch</elem>
<elem>Zend_Http_Client</elem>
<elem>http client</elem>
<elem>PECL::HTTP</elem>
<elem>Wget/1.13.4 (linux-gnu)</elem>
<elem>WWW-Mechanize/1.34</elem>
</table>
</script><script id="http-chrono" output="Request times for /; avg: 160.74ms; min: 150.93ms; max: 169.60ms"/><script id="http-security-headers" output=""></script><script id="http-referer-checker" output="Couldn&apos;t find any cross-domain scripts."/><script id="http-errors" output="Couldn&apos;t find any error pages."/><script id="http-sitemap-generator" output="&#xa; Directory structure:&#xa; /&#xa; Other: 1&#xa; Longest directory structure:&#xa; Depth: 0&#xa; Dir: /&#xa; Total files found (by extension):&#xa; Other: 1&#xa;"/><script id="http-exif-spider" output="ERROR: Script execution failed (use -d to debug)"/><script id="http-fileupload-exploiter" output="&#xa; &#xa; Couldn&apos;t find a file-type field.&#xa; &#xa; Failed to upload and execute a payload.&#xa; &#xa; Failed to upload and execute a payload.&#xa; &#xa; Failed to upload and execute a payload.&#xa; &#xa; Failed to upload and execute a payload."><table>
<elem>Couldn&apos;t find a file-type field.</elem>
</table>
<table>
<elem>Failed to upload and execute a payload.</elem>
</table>
<table>
<elem>Failed to upload and execute a payload.</elem>
</table>
<table>
<elem>Failed to upload and execute a payload.</elem>
</table>
<table>
<elem>Failed to upload and execute a payload.</elem>
</table>
</script><script id="http-dombased-xss" output="Couldn&apos;t find any DOM based XSS."/><script id="http-vhosts" output="&#xa;squid.htb&#xa;127 names had status 301"/><script id="http-stored-xss" output="Couldn&apos;t find any stored XSS vulnerabilities."/><script id="http-fetch" output="Please enter the complete path of the directory to save data in."><elem key="ERROR">Please enter the complete path of the directory to save data in.</elem>
</script><script id="http-jsonp-detection" output="Couldn&apos;t find any JSONP endpoints."/><script id="http-title" output="eForenzics - Premier Digital Forensics"><elem key="title">eForenzics - Premier Digital Forensics</elem>
</script><script id="http-comments-displayer" output="&#xa;Spidering limited to: maxdepth=3; maxpagecount=20; withinhost=eforenzics.htb&#xa; &#xa; Path: http://eforenzics.htb:80/assets/css/efore.css&#xa; Line number: 11390&#xa; Comment: &#xa; /* Page Navbar*/&#xa; &#xa; Path: http://eforenzics.htb:80/assets/css/efore.css&#xa; Line number: 11356&#xa; Comment: &#xa; /* forms */&#xa; &#xa; Path: http://eforenzics.htb:80/assets/css/efore.css&#xa; Line number: 11294&#xa; Comment: &#xa; /* Testemonial */&#xa; &#xa; Path: http://eforenzics.htb:80/assets/js/efore.js&#xa; Line number: 15&#xa; Comment: &#xa; &#xa; // smooth scroll&#xa; &#xa; Path: http://eforenzics.htb:80/assets/vendors/bootstrap/bootstrap.affix.js&#xa; Line number: 14&#xa; Comment: &#xa; // ======================&#xa; &#xa; Path: http://eforenzics.htb:80/assets/css/efore.css&#xa; Line number: 11015&#xa; Comment: &#xa; /* bg-img */&#xa; &#xa; Path: http://eforenzics.htb:80/assets/js/efore.js&#xa; Line number: 1&#xa; Comment: &#xa; /*!&#xa; =========================================================&#xa; * Rubic Landing page&#xa; =========================================================&#xa; &#xa; * Copyright: 2019 DevCRUD (https://devcrud.com)&#xa; * Licensed: (https://devcrud.com/licenses)&#xa; * Coded by www.devcrud.com&#xa; &#xa; =========================================================&#xa; &#xa; * The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.&#xa; */&#xa; &#xa; Path: http://eforenzics.htb:80/assets/css/efore.css&#xa; Line number: 11106&#xa; Comment: &#xa; /* social wrapper*/&#xa; &#xa; Path: http://eforenzics.htb:80/assets/vendors/bootstrap/bootstrap.affix.js&#xa; Line number: 116&#xa; Comment: &#xa; // AFFIX PLUGIN DEFINITION&#xa; &#xa; Path: http://eforenzics.htb:80/assets/vendors/bootstrap/bootstrap.affix.js&#xa; Line number: 136&#xa; Comment: &#xa; // AFFIX NO CONFLICT&#xa; &#xa; Path: http://eforenzics.htb:80/assets/vendors/bootstrap/bootstrap.affix.js&#xa; Line number: 137&#xa; Comment: &#xa; // =================&#xa; &#xa; Path: http://eforenzics.htb:80/assets/vendors/bootstrap/bootstrap.affix.js&#xa; Line number: 13&#xa; Comment: &#xa; // AFFIX CLASS DEFINITION&#xa; &#xa; Path: http://eforenzics.htb:80/assets/vendors/bootstrap/bootstrap.affix.js&#xa; Line number: 145&#xa; Comment: &#xa; // AFFIX DATA-API&#xa; &#xa; Path: http://eforenzics.htb:80/assets/vendors/bootstrap/bootstrap.affix.js&#xa; Line number: 146&#xa; Comment: &#xa; // ==============&#xa; &#xa; Path: http://eforenzics.htb:80/assets/css/efore.css&#xa; Line number: 11213&#xa; Comment: &#xa; /* Pricing cards */&#xa; &#xa; Path: http://eforenzics.htb:80/assets/vendors/bootstrap/bootstrap.affix.js&#xa; Line number: 117&#xa; Comment: &#xa; // =======================&#xa; &#xa; Path: http://eforenzics.htb:80/assets/vendors/bootstrap/bootstrap.affix.js&#xa; Line number: 1&#xa; Comment: &#xa; /* ========================================================================&#xa; * Bootstrap: affix.js v3.3.6&#xa; * http://getbootstrap.com/javascript/#affix&#xa; * ========================================================================&#xa; * Copyright 2011-2015 Twitter, Inc.&#xa; * Licensed under MIT (https://github.com/twbs/bootstrap/blob/master/LICENSE)&#xa; * ======================================================================== */&#xa; &#xa; Path: http://eforenzics.htb:80/assets/css/efore.css&#xa; Line number: 11592&#xa; Comment: &#xa; /*Tabs nav section*/&#xa; &#xa; Path: http://eforenzics.htb:80/assets/css/efore.css&#xa; Line number: 11361&#xa; Comment: &#xa; /*utilities*/&#xa;"/><script id="http-feed" output="Couldn&apos;t find any feeds."/><script id="http-server-header" output="Apache/2.4.41 (Ubuntu)"><elem>Apache/2.4.41 (Ubuntu)</elem>
</script><script id="http-mobileversion-checker" output="No mobile version detected."/><script id="http-wordpress-enum" output="Nothing found amongst the top 100 resources,use -&#45;script-args search-limit=&lt;number|all&gt; for deeper analysis)"/><script id="http-drupal-enum" output="Nothing found amongst the top 100 resources,use -&#45;script-args number=&lt;number|all&gt; for deeper analysis)"/><script id="http-php-version" output="Logo query returned unknown hash 5ff22d31895aaf40b681ff9fe332249c&#xa;Credits query returned unknown hash 5ff22d31895aaf40b681ff9fe332249c"/><script id="http-headers" output="&#xa; Date: Mon, 23 Jan 2023 07:13:02 GMT&#xa; Server: Apache/2.4.41 (Ubuntu)&#xa; Upgrade: h2&#xa; Connection: Upgrade, close&#xa; Last-Modified: Sat, 01 Oct 2022 00:31:36 GMT&#xa; ETag: &quot;2acd-5e9ee3baeb4fd&quot;&#xa; Accept-Ranges: bytes&#xa; Content-Length: 10957&#xa; Vary: Accept-Encoding&#xa; Content-Type: text/html&#xa; &#xa; (Request type: HEAD)&#xa;"/><script id="http-methods" output="&#xa; Supported Methods: GET HEAD POST"><table key="Supported Methods">
<elem>GET</elem>
<elem>HEAD</elem>
<elem>POST</elem>
</table>
</script><script id="http-malware-host" output="Host appears to be clean"/><script id="http-wordpress-users" output="[Error] Wordpress installation was not found. We couldn&apos;t find wp-login.php"/><script id="http-config-backup" output="ERROR: Script execution failed (use -d to debug)"/><script id="http-date" output="Mon, 23 Jan 2023 07:13:04 GMT; 0s from local time."><elem key="date">2023-01-23T07:13:04+00:00</elem>
<elem key="delta">0.0</elem>
</script></port>
</ports>
<times srtt="26149" rttvar="26149" to="130745"/>
</host>
<taskbegin task="NSE" time="1674458148"/>
<taskend task="NSE" time="1674458148"/>
<taskbegin task="NSE" time="1674458148"/>
<taskend task="NSE" time="1674458148"/>
<taskbegin task="NSE" time="1674458148"/>
<taskend task="NSE" time="1674458148"/>
<runstats><finished time="1674458148" timestr="Mon Jan 23 02:15:48 2023" summary="Nmap done at Mon Jan 23 02:15:48 2023; 1 IP address (1 host up) scanned in 173.32 seconds" elapsed="173.32" exit="success"/><hosts up="1" down="0" total="1"/>
</runstats>
</nmaprun>