┌──(kali㉿kali)-[~] └─$ nmap 10.10.10.134 -sV Starting Nmap 7.92 ( https://nmap.org ) at 2022-03-23 03:04 EDT Nmap scan report for 10.10.10.134 Host is up (0.068s latency). Not shown: 993 closed tcp ports (conn-refused) PORT STATE SERVICE VERSION 21/tcp open ftp Pure-FTPd 22/tcp open ssh OpenSSH 7.4 (protocol 2.0) 80/tcp open http nginx 81/tcp open http nginx 888/tcp open http nginx 3306/tcp open mysql MySQL (unauthorized) 8888/tcp open http nginx
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 11.54 seconds
# Name Disclosure Date Rank Check Description - ---- --------------- ---- ----- ----------- 0 post/multi/recon/local_exploit_suggester normal No Multi Recon Local Exploit Suggester
Interact with a module by name or index. For example info 0, use 0 or use post/multi/recon/local_exploit_suggester
msf6 auxiliary(server/socks_proxy) > use 0 msf6 post(multi/recon/local_exploit_suggester) > options
Name Current Setting Required Description ---- --------------- -------- ----------- SESSION yes The session to run this modu le on SHOWDESCRIPTION false yes Displays a detailed descript ion for the available exploi ts
[*] 10.10.10.134 - Collecting local exploits for x64/linux... [*] 10.10.10.134 - 41 exploit checks are being tried... [+] 10.10.10.134 - exploit/linux/local/network_manager_vpnc_username_priv_esc: The service is running, but could not be validated. [+] 10.10.10.134 - exploit/linux/local/ptrace_traceme_pkexec_helper: The target appears to be vulnerable. [+] 10.10.10.134 - exploit/linux/local/sudo_baron_samedit: The target appears to be vulnerable. sudo 1.8.23 is a vulnerable build. [*] Post module execution completed msf6 post(multi/recon/local_exploit_suggester) >
[!] SESSION may not be compatible with this module (incompatible session platform: linux) [*] Running module against localhost.localdomain [*] Searching for subnets to autoroute. [+] Route added to subnet 10.0.20.0/255.255.255.0 from host's routing table. [+] Route added to subnet 10.10.10.0/255.255.255.0 from host's routing table.