Codify
Description
Automated Scanning
NMap Scan
# Nmap 7.94SVN scan initiated Sat Mar 2 01:20:47 2024 as: nmap -sC -sV -vvv -T4 -oN Data/Machines/codify/nmap.txt 10.10.11.239
Increasing send delay for 10.10.11.239 from 0 to 5 due to 210 out of 524 dropped probes since last increase.
Increasing send delay for 10.10.11.239 from 5 to 10 due to 11 out of 20 dropped probes since last increase.
Nmap scan report for codify.htb (10.10.11.239)
Host is up, received conn-refused (0.087s latency).
Scanned at 2024-03-02 01:20:47 EST for 33s
Not shown: 997 closed tcp ports (conn-refused)
PORT STATE SERVICE REASON VERSION
22/tcp open ssh syn-ack OpenSSH 8.9p1 Ubuntu 3ubuntu0.4 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey:
| 256 96:07:1c:c6:77:3e:07:a0:cc:6f:24:19:74:4d:57:0b (ECDSA)
| ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBN+/g3FqMmVlkT3XCSMH/JtvGJDW3+PBxqJ+pURQey6GMjs7abbrEOCcVugczanWj1WNU5jsaYzlkCEZHlsHLvk=
| 256 0b:a4:c0:cf:e2:3b:95:ae:f6:f5:df:7d:0c:88:d6:ce (ED25519)
|_ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIIm6HJTYy2teiiP6uZoSCHhsWHN+z3SVL/21fy6cZWZi
80/tcp open http syn-ack Apache httpd 2.4.52
|_http-title: Codify
|_http-server-header: Apache/2.4.52 (Ubuntu)
| http-methods:
|_ Supported Methods: GET HEAD POST OPTIONS
3000/tcp open http syn-ack Node.js Express framework
|_http-title: Codify
| http-methods:
|_ Supported Methods: GET HEAD POST OPTIONS
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
Read data files from: /usr/bin/../share/nmap
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sat Mar 2 01:21:20 2024 -- 1 IP address (1 host up) scanned in 32.81 seconds
Gobuster (DNS) Scan
DirBuster Scan
No Results
Nuclei Scan
[caa-fingerprint] [dns] [info] codify.htb
[options-method] [http] [info] http://codify.htb ["GET,HEAD"]
[apache-detect] [http] [info] http://codify.htb ["Apache/2.4.52 (Ubuntu)"]
[tech-detect:bootstrap] [http] [info] http://codify.htb
[tech-detect:express] [http] [info] http://codify.htb
[http-missing-security-headers:cross-origin-resource-policy] [http] [info] http://codify.htb
[http-missing-security-headers:content-security-policy] [http] [info] http://codify.htb
[http-missing-security-headers:referrer-policy] [http] [info] http://codify.htb
[http-missing-security-headers:clear-site-data] [http] [info] http://codify.htb
[http-missing-security-headers:cross-origin-embedder-policy] [http] [info] http://codify.htb
[http-missing-security-headers:cross-origin-opener-policy] [http] [info] http://codify.htb
[http-missing-security-headers:strict-transport-security] [http] [info] http://codify.htb
[http-missing-security-headers:permissions-policy] [http] [info] http://codify.htb
[http-missing-security-headers:x-frame-options] [http] [info] http://codify.htb
[http-missing-security-headers:x-content-type-options] [http] [info] http://codify.htb
[http-missing-security-headers:x-permitted-cross-domain-policies] [http] [info] http://codify.htb
[waf-detect:apachegeneric] [http] [info] http://codify.htb/
[waf-detect:securesphere] [http] [info] http://codify.htb/
[ssh-auth-methods] [javascript] [info] codify.htb:22 ["[\"publickey\",\"password\"]"]
[ssh-password-auth] [javascript] [info] codify.htb:22
[ssh-server-enumeration] [javascript] [info] codify.htb:22 ["SSH-2.0-OpenSSH_8.9p1 Ubuntu-3ubuntu0.4"]
[ssh-sha1-hmac-algo] [javascript] [info] codify.htb:22
Automation Summary
NMap Scan: - The scan reveals three open ports on the target machine: 22 (SSH), 80 (HTTP), and 3000 (HTTP). - SSH is running OpenSSH 8.9p1 on Ubuntu. - Both port 80 and port 3000 are serving HTTP, with the Apache HTTP server running on port 80 and a Node.js Express framework on port 3000. - Some basic information about the services and server software versions is obtained.
Nuclei Scan: - Several potential security headers are missing from the HTTP responses, which might indicate vulnerabilities or misconfigurations. - Detection of various web technologies such as Apache, Bootstrap, and Express. - Identification of SSH-related information like available authentication methods and server enumeration.
Insights: - The absence of certain security headers on the web server might indicate potential security weaknesses, such as vulnerability to cross-site scripting (XSS) or clickjacking attacks. - Running services like SSH could potentially pose security risks, especially if weak authentication methods are enabled. - The presence of Apache and Node.js suggests a diverse technology stack, which could provide multiple attack vectors for exploitation. - Further enumeration and exploitation based on the identified vulnerabilities and service versions could lead to gaining unauthorized access to the target system.
AI Generated
User Own
Root Own
Summary
AI Generated