Skyfall
Description
Automated Scanning
NMap Scan
# Nmap 7.94SVN scan initiated Fri Mar 1 14:07:09 2024 as: nmap -sC -sV -vvv -T4 -oN Data/Machines/skyfall/nmap.txt 10.10.11.254
Nmap scan report for skyfall.htb (10.10.11.254)
Host is up, received syn-ack (0.090s latency).
Scanned at 2024-03-01 14:07:09 EST for 20s
Not shown: 998 closed tcp ports (conn-refused)
PORT STATE SERVICE REASON VERSION
22/tcp open ssh syn-ack OpenSSH 8.9p1 Ubuntu 3ubuntu0.6 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey:
| 256 65:70:f7:12:47:07:3a:88:8e:27:e9:cb:44:5d:10:fb (ECDSA)
| ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBCVqvI8vGs8EIUAAUiRze8kfKmYh9ETTUei3zRd1wWWLRBjSm+soBLfclIUP69cNtQOa961nyt2/BOwuR35cLR4=
| 256 74:48:33:07:b7:88:9d:32:0e:3b:ec:16:aa:b4:c8:fe (ED25519)
|_ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAINk0VgEkDNZoIJwcG5LEVZDZkEeSRHLBmAOtd/pduzRW
80/tcp open http syn-ack nginx 1.18.0 (Ubuntu)
|_http-favicon: Unknown favicon MD5: FED84E16B6CCFE88EE7FFAAE5DFEFD34
|_http-server-header: nginx/1.18.0 (Ubuntu)
| http-methods:
|_ Supported Methods: GET HEAD
|_http-title: Skyfall - Introducing Sky Storage!
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
Read data files from: /usr/bin/../share/nmap
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Fri Mar 1 14:07:29 2024 -- 1 IP address (1 host up) scanned in 20.69 seconds
Gobuster (DNS) Scan
DirBuster Scan
No Results
Nuclei Scan
[caa-fingerprint] [dns] [info] skyfall.htb
[email-extractor] [http] [info] http://skyfall.htb ["contact@skyfall.com"]
[nginx-version] [http] [info] http://skyfall.htb ["nginx/1.18.0"]
[tech-detect:lightbox] [http] [info] http://skyfall.htb
[tech-detect:bootstrap] [http] [info] http://skyfall.htb
[tech-detect:google-font-api] [http] [info] http://skyfall.htb
[tech-detect:nginx] [http] [info] http://skyfall.htb
[http-missing-security-headers:strict-transport-security] [http] [info] http://skyfall.htb
[http-missing-security-headers:content-security-policy] [http] [info] http://skyfall.htb
[http-missing-security-headers:referrer-policy] [http] [info] http://skyfall.htb
[http-missing-security-headers:clear-site-data] [http] [info] http://skyfall.htb
[http-missing-security-headers:cross-origin-embedder-policy] [http] [info] http://skyfall.htb
[http-missing-security-headers:cross-origin-resource-policy] [http] [info] http://skyfall.htb
[http-missing-security-headers:permissions-policy] [http] [info] http://skyfall.htb
[http-missing-security-headers:x-frame-options] [http] [info] http://skyfall.htb
[http-missing-security-headers:x-content-type-options] [http] [info] http://skyfall.htb
[http-missing-security-headers:x-permitted-cross-domain-policies] [http] [info] http://skyfall.htb
[http-missing-security-headers:cross-origin-opener-policy] [http] [info] http://skyfall.htb
[waf-detect:nginxgeneric] [http] [info] http://skyfall.htb/
[ssh-auth-methods] [javascript] [info] skyfall.htb:22 ["[\"publickey\",\"password\",\"keyboard-interactive\"]"]
[ssh-password-auth] [javascript] [info] skyfall.htb:22
[ssh-server-enumeration] [javascript] [info] skyfall.htb:22 ["SSH-2.0-OpenSSH_8.9p1 Ubuntu-3ubuntu0.6"]
[ssh-sha1-hmac-algo] [javascript] [info] skyfall.htb:22
Automation Summary
- NMap Scan Summary:
- Target system has SSH (port 22) and HTTP (port 80) services running.
- SSH service is identified as OpenSSH 8.9p1 on Ubuntu.
- HTTP service is identified as nginx 1.18.0 on Ubuntu.
-
Web server hosts an application titled "Skyfall - Introducing Sky Storage!".
-
Nuclei Scan Insights:
- Various technologies and headers are detected on the HTTP service, including Nginx, Lightbox, Bootstrap, Google Font API, etc.
- Multiple missing security headers are found, indicating potential vulnerabilities in the web application's security posture.
- WAF detection suggests the presence of a generic Nginx Web Application Firewall.
- SSH-related information reveals supported authentication methods, password authentication, and SSH server version.
Overall, the scans provide insights into the services and potential vulnerabilities present on the target machine, indicating areas for further exploration and potential exploitation.
AI Generated
User Own
Root Own
Summary
AI Generated