PORT STATE SERVICE VERSION
80/tcp open http Microsoft IIS httpd 8.5
| http-methods:
|_ Potentially risky methods: TRACE
|_http-server-header: Microsoft-IIS/8.5
|_http-title: IIS Windows Server
135/tcp open msrpc Microsoft Windows RPC
139/tcp open netbios-ssn Microsoft Windows netbios-ssn
445/tcp open microsoft-ds Microsoft Windows Server 2008 R2 - 2012 microsoft-ds
1521/tcp open oracle-tns Oracle TNS listener 11.2.0.2.0 (unauthorized)
5985/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
|_http-title: Not Found
|_http-server-header: Microsoft-HTTPAPI/2.0
47001/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
|_http-server-header: Microsoft-HTTPAPI/2.0
|_http-title: Not Found
49152/tcp open msrpc Microsoft Windows RPC
49153/tcp open msrpc Microsoft Windows RPC
49154/tcp open msrpc Microsoft Windows RPC
49155/tcp open msrpc Microsoft Windows RPC
49159/tcp open oracle-tns Oracle TNS listener (requires service name)
49160/tcp open msrpc Microsoft Windows RPC
49161/tcp open msrpc Microsoft Windows RPC
49162/tcp open msrpc Microsoft Windows RPC
Service Info: OSs: Windows, Windows Server 2008 R2 - 2012; CPE: cpe:/o:microsoft:windows
Host script results:
| smb-security-mode:
| authentication_level: user
| challenge_response: supported
|_ message_signing: supported
| smb2-security-mode:
| 3:0:2:
|_ Message signing enabled but not required
| smb2-time:
| date: 2023-12-19T02:09:00
|_ start_date: 2023-12-19T02:04:17
First i like to check if services allow for anonymous authenitcation
But what is also interesting is the Oracle TNS Listener could be foothold there
But first
SMB
check for anonymous logins
crackmapexec smb 10.10.10.82 -u anonymous -p ''
auth failed but we do have the hostname SILO and Domain name SILO well add the domain name to our hosts file
RPC
check for anonymous login
rpcclient -N -U anonymous 10.10.10.82
failed
Lets check out the web server
HTTP
looks like it consists of the default IIS web page
we can perform some feroxbusting and see if we can find anything interesting with both the asp and aspx file extentions
while we wait for that lets investigate the Oracle TNS listener
Firstly What is oracle
it is a RDBMS (Relational multi-model database) produced and marketed by oracle
By default the Oracle database listens on port 1521
Within our nmap scan we can see the listener is described as "unauthorized" typically suggests that there are connections or activities occurring that are not permitted or expected
We can use the tool odat for brute-forcing the Oracle database TNS SIDs (Server ID)
odat sidguesser -s 10.10.10.82 -p1521
When we look at the tools output we can see the following
We have discovered an SID called XE , Now our next move is to find valid credentials on this server
We have found valid credentials for the user scott
scott/tiger
Now that we have the server id XE and the credntials for the user scott we can utilise these and upload a .exe reverseshell onto the system and gain acess to do this lets generate a reverse shell with msfvenom