Enumeration

We begin with the usual port scan revealing three open ports ie. 22, 80 and 443.

/tmp/tmp.W0d5S9Lwfc ❯ hping3 -S --scan 1-65535 10.10.11.143 | grep -v "Not" 
Scanning 10.10.11.143 (10.10.11.143), port 1-65535
65535 ports to scan, use -V to see all the replies
+----+-----------+---------+---+-----+-----+-----+
|port| serv name |  flags  |ttl| id  | win | len |
+----+-----------+---------+---+-----+-----+-----+
All replies received. Done.
   22 ssh        : .S..A...  63     0 29200    44
   80 http       : .S..A...  63     0 29200    44
  443 https      : .S..A...  63     0 29200    44

A targeted nmap safe scan reveals nothing of consequence.

/tmp/tmp.W0d5S9Lwfc ❯ nmap -A -p22,80,443 -oA general/nmap/safe_scan 10.10.11.143                                         root@kali
Starting Nmap 7.92 ( <https://nmap.org> ) at 2024-06-15 15:22 NZST
Nmap scan report for target (10.10.11.143)
Host is up (0.047s latency).

PORT    STATE SERVICE  VERSION
22/tcp  open  ssh      OpenSSH 8.0 (protocol 2.0)
| ssh-hostkey:
|   2048 10:05:ea:50:56:a6:00:cb:1c:9c:93:df:5f:83:e0:64 (RSA)
|   256 58:8c:82:1c:c6:63:2a:83:87:5c:2f:2b:4f:4d:c3:79 (ECDSA)
|_  256 31:78:af:d1:3b:c4:2e:9d:60:4e:eb:5d:03:ec:a0:22 (ED25519)
80/tcp  open  http     Apache httpd 2.4.37 ((centos) OpenSSL/1.1.1k mod_fcgid/2.3.9)
| http-methods:
|_  Potentially risky methods: TRACE
|_http-generator: HTML Tidy for HTML5 for Linux version 5.7.28
|_http-title: HTTP Server Test Page powered by CentOS
|_http-server-header: Apache/2.4.37 (centos) OpenSSL/1.1.1k mod_fcgid/2.3.9
443/tcp open  ssl/http Apache httpd 2.4.37 ((centos) OpenSSL/1.1.1k mod_fcgid/2.3.9)
| http-methods:
|_  Potentially risky methods: TRACE
|_http-title: HTTP Server Test Page powered by CentOS
|_http-generator: HTML Tidy for HTML5 for Linux version 5.7.28
| ssl-cert: Subject: commonName=localhost.localdomain/organizationName=Unspecified/countryName=US
| Subject Alternative Name: DNS:localhost.localdomain
| Not valid before: 2021-07-03T08:52:34
|_Not valid after:  2022-07-08T10:32:34
|_ssl-date: TLS randomness does not represent time
|_http-server-header: Apache/2.4.37 (centos) OpenSSL/1.1.1k mod_fcgid/2.3.9
| tls-alpn:
|_  http/1.1
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Aggressive OS guesses: Linux 3.2 - 4.9 (95%), Linux 3.1 (95%), Linux 3.2 (95%), AXIS 210A or 211 Network Camera (Linux 2.6.17) (94%), Linux 3.18 (94%), Linux 3.16 (93%), ASUS RT-N56U WAP (Linux 3.4) (93%), Linux 5.1 (93%), Oracle VM Server 3.4.2 (Linux 4.1) (93%), Android 4.1.1 (93%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 2 hops

TRACEROUTE (using port 80/tcp)
HOP RTT      ADDRESS
1   54.91 ms 10.10.16.1
2   28.09 ms target (10.10.11.143)

Port 80

10.10.11.143

Visiting the page hosted at the target ip reveals the Centos apache httpd test page.

Untitled

Running whatweb exposes the hostname office.paper in addition to other server technology-related information such as the kernel version of the server(5.7.28) which was released in circa 2020.

/tmp/tmp.W0d5S9Lwfc ❯ whatweb -v 10.10.11.143 | tee 80/whatweb                                                        24s root@kali
curl -s <http://10.10.11.143/robots.txt> | tee 80/robots.txt
WhatWeb report for <http://10.10.11.143>
Status    : 403 Forbidden
Title     : HTTP Server Test Page powered by CentOS
IP        : 10.10.11.143
Country   : RESERVED, ZZ

Summary   : Apache[2.4.37][mod_fcgid/2.3.9], Email[[email protected]], HTML5, HTTPServer[CentOS][Apache/2.4.37 (centos) OpenSSL/1.1.1k mod_fcgid/2.3.9], MetaGenerator[HTML Tidy for HTML5 for Linux version 5.7.28], OpenSSL[1.1.1k], PoweredBy[CentOS], UncommonHeaders[x-backend-server], X-Backend[office.paper]

Adding the hostname to the hosts file

/tmp/tmp.W0d5S9Lwfc ❯ echo "10.10.11.143 office.paper" >> /etc/hosts    
/tmp/tmp.W0d5S9Lwfc ❯ cat /etc/hosts                                                                                  17s root@kali
127.0.0.1       localhost
127.0.1.1       kali.lan        kali

#The following lines are desirable for IPv6 capable hosts
::1     localhost ip6-localhost ip6-loopback
ff02::1 ip6-allnodes
ff02::2 ip6-allrouters
10.10.11.143 office.paper

office.paper