$ nmap -p- 10.10.10.232 Starting Nmap 7.91 ( https://nmap.org ) at 2021-05-11 14:39 CST Nmap scan report for 10.10.10.232 Host is up (0.067s latency). Not shown: 65532 closed ports PORT STATE SERVICE 22/tcp open ssh 80/tcp open http 8953/tcp open ub-dns-control
Nmap done: 1 IP address (1 host up) scanned in 914.51 seconds
$ nmap -sC -sV -Pn -p22,80,8953 10.10.10.232
Host discovery disabled (-Pn). All addresses will be marked 'up' and scan times will be slower. Starting Nmap 7.91 ( https://nmap.org ) at 2021-05-11 15:08 CST WARNING: Service 10.10.10.232:80 had already soft-matched http, but now soft-matched rtsp; ignoring second value WARNING: Service 10.10.10.232:80 had already soft-matched http, but now soft-matched rtsp; ignoring second value Nmap scan report for employees.crossfit.htb (10.10.10.232) Host is up (0.067s latency).
PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 8.4 (protocol 2.0) | ssh-hostkey: | 3072 35:0a:81:06:de:be:8c:d8:d7:27:66:db:96:94:fd:52 (RSA) | 256 94:60:55:35:9a:1a:a8:45:a1:ae:19:cd:61:05:ec:3f (ECDSA) |_ 256 a2:c8:6b:6e:11:b6:70:69:db:d2:60:2e:2f:d1:2f:ab (ED25519) 80/tcp open http (PHP 7.4.12) | fingerprint-strings: | GetRequest, HTTPOptions: | HTTP/1.0 200 OK | Connection: close | Connection: close | Content-type: text/html; charset=UTF-8 | Date: Tue, 11 May 2021 07:08:01 GMT | Server: OpenBSD httpd | X-Powered-By: PHP/7.4.12 | <!DOCTYPE html> | <html lang="zxx"> | <head> | <meta charset="UTF-8"> | <meta name="description" content="Yoga StudioCrossFit"> | <meta name="keywords" content="Yoga, unica, creative, html"> | <meta name="viewport" content="width=device-width, initial-scale=1.0"> | <meta http-equiv="X-UA-Compatible" content="ie=edge"> | <title>CrossFit</title> | <!-- Google Font --> | <link href="https://fonts.googleapis.com/css?family=PT+Sans:400,700&display=swap" rel="stylesheet"> | <link href="https://fonts.googleapis.com/css?family=Oswald:400,500,600,700&display=swap" rel="stylesheet"> | <!-- Css Styles --> | <link rel="stylesheet" href="css/bootstrap.min.css" type="text/css"> |_ <link rel="styleshe |_http-server-header: OpenBSD httpd |_http-title: Login 8953/tcp open ssl/ub-dns-control? | ssl-cert: Subject: commonName=unbound | Not valid before: 2021-01-11T07:01:10 |_Not valid after: 2040-09-28T07:01:10 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service : SF-Port80-TCP:V=7.91%I=7%D=5/11%Time=609A2D63%P=x86_64-apple-darwin19.6.0% SF:r(GetRequest,3541,"HTTP/1\.0\x20200\x20OK\r\nConnection:\x20close\r\nCo SF:nnection:\x20close\r\nContent-type:\x20text/html;\x20charset=UTF-8\r\nD SF:ate:\x20Tue,\x2011\x20May\x202021\x2007:08:01\x20GMT\r\nServer:\x20Open SF:BSD\x20httpd\r\nX-Powered-By:\x20PHP/7\.4\.12\r\n\r\n<!DOCTYPE\x20html> SF:\n<html\x20lang=\"zxx\">\n\n<head>\n\x20\x20\x20\x20<meta\x20charset=\" SF:UTF-8\">\n\x20\x20\x20\x20<meta\x20name=\"description\"\x20content=\"Yo SF:ga\x20StudioCrossFit\">\n\x20\x20\x20\x20<meta\x20name=\"keywords\"\x20 SF:content=\"Yoga,\x20unica,\x20creative,\x20html\">\n\x20\x20\x20\x20<met SF:a\x20name=\"viewport\"\x20content=\"width=device-width,\x20initial-scal SF:e=1\.0\">\n\x20\x20\x20\x20<meta\x20http-equiv=\"X-UA-Compatible\"\x20c SF:ontent=\"ie=edge\">\n\x20\x20\x20\x20<title>CrossFit</title>\n\n\x20\x2 SF:0\x20\x20<!--\x20Google\x20Font\x20-->\n\x20\x20\x20\x20<link\x20href=\ SF:"https://fonts\.googleapis\.com/css\?family=PT\+Sans:400,700&display=sw SF:ap\"\x20rel=\"stylesheet\">\n\x20\x20\x20\x20<link\x20href=\"https://fo SF:nts\.googleapis\.com/css\?family=Oswald:400,500,600,700&display=swap\"\ SF:x20rel=\"stylesheet\">\n\n\x20\x20\x20\x20<!--\x20Css\x20Styles\x20-->\ SF:n\x20\x20\x20\x20<link\x20rel=\"stylesheet\"\x20href=\"css/bootstrap\.m SF:in\.css\"\x20type=\"text/css\">\n\x20\x20\x20\x20<link\x20rel=\"stylesh SF:e")%r(HTTPOptions,3541,"HTTP/1\.0\x20200\x20OK\r\nConnection:\x20close\ SF:r\nConnection:\x20close\r\nContent-type:\x20text/html;\x20charset=UTF-8 SF:\r\nDate:\x20Tue,\x2011\x20May\x202021\x2007:08:01\x20GMT\r\nServer:\x2 SF:0OpenBSD\x20httpd\r\nX-Powered-By:\x20PHP/7\.4\.12\r\n\r\n<!DOCTYPE\x20 SF:html>\n<html\x20lang=\"zxx\">\n\n<head>\n\x20\x20\x20\x20<meta\x20chars SF:et=\"UTF-8\">\n\x20\x20\x20\x20<meta\x20name=\"description\"\x20content SF:=\"Yoga\x20StudioCrossFit\">\n\x20\x20\x20\x20<meta\x20name=\"keywords\ SF:"\x20content=\"Yoga,\x20unica,\x20creative,\x20html\">\n\x20\x20\x20\x2 SF:0<meta\x20name=\"viewport\"\x20content=\"width=device-width,\x20initial SF:-scale=1\.0\">\n\x20\x20\x20\x20<meta\x20http-equiv=\"X-UA-Compatible\" SF:\x20content=\"ie=edge\">\n\x20\x20\x20\x20<title>CrossFit</title>\n\n\x SF:20\x20\x20\x20<!--\x20Google\x20Font\x20-->\n\x20\x20\x20\x20<link\x20h SF:ref=\"https://fonts\.googleapis\.com/css\?family=PT\+Sans:400,700&displ SF:ay=swap\"\x20rel=\"stylesheet\">\n\x20\x20\x20\x20<link\x20href=\"https SF:://fonts\.googleapis\.com/css\?family=Oswald:400,500,600,700&display=sw SF:ap\"\x20rel=\"stylesheet\">\n\n\x20\x20\x20\x20<!--\x20Css\x20Styles\x2 SF:0-->\n\x20\x20\x20\x20<link\x20rel=\"stylesheet\"\x20href=\"css/bootstr SF:ap\.min\.css\"\x20type=\"text/css\">\n\x20\x20\x20\x20<link\x20rel=\"st SF:yleshe");
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 32.06 seconds
# # Sample login.conf file. See login.conf(5) for details. #
# # Standard authentication styles: # # passwd Use only the local password file # chpass Do not authenticate, but change user's password (change # the YP password if the user has one, else change the #local password) # lchpass Do not login; change user's local password instead # radius Use radius authentication # reject Use rejected authentication # skey Use S/Key authentication # activ ActivCard X9.9 token authentication # crypto CRYPTOCard X9.9 token authentication # snk Digital Pathways SecureNet Key authentication # tis TIS Firewall Toolkit authentication # token Generic X9.9 token authentication # yubikey YubiKey authentication #
# Default allowed authentication styles for authentication type ftp auth-ftp-defaults:auth-ftp=passwd:
# # The default values # To alter the default authentication types change the line: # :tc=auth-defaults:\ # to read something like: (enables passwd, "myauth", and activ) # :auth=passwd,myauth,activ:\ # Any value changed in the daemon class should be reset in default # class. # default:\ :path=/usr/bin /bin /usr/sbin /sbin /usr/X11R6/bin /usr/local/bin /usr/local/sbin:\ :umask=022:\ :datasize-max=768M:\ :datasize-cur=768M:\ :maxproc-max=256:\ :maxproc-cur=128:\ :openfiles-max=102400:\ :openfiles-cur=102400:\ :stacksize-cur=4M:\ :localcipher=blowfish,a:\ :tc=auth-defaults:\ :tc=auth-ftp-defaults:
# # Settings used by /etc/rc and root # This must be set properly for daemons started as root by inetd as well. # Be sure to reset these values to system defaults in the default class! # daemon:\ :ignorenologin:\ :datasize=infinity:\ :maxproc=infinity:\ :openfiles-max=102400:\ :openfiles-cur=102400:\ :stacksize-cur=8M:\ :auth-ssh=yubikey:\ :auth-su=reject:\ :tc=default:
# # Staff have fewer restrictions and can login even when nologins are set. # staff:\ :datasize-cur=1536M:\ :datasize-max=infinity:\ :maxproc-max=512:\ :maxproc-cur=256:\ :ignorenologin:\ :requirehome@:\ :tc=default:
# # Authpf accounts get a special motd and shell # authpf:\ :welcome=/etc/motd.authpf:\ :shell=/usr/sbin/authpf:\ :tc=default:
# # Building ports with DPB uses raised limits # pbuild:\ :datasize-max=infinity:\ :datasize-cur=8192M:\ :maxproc-max=1024:\ :maxproc-cur=384:\ :priority=5:\ :tc=default:
# # Override resource limits for certain daemons started by rc.d(8) # bgpd:\ :openfiles=512:\ :tc=daemon:
# This is the sshd server system-wide configuration file. See # sshd_config(5) for more information.
# The strategy used for options in the default sshd_config shipped with # OpenSSH is to specify options with their default value where # possible, but leave them commented. Uncommented options override the # default value.
#Port 22 #AddressFamily any #ListenAddress 0.0.0.0 #ListenAddress ::
# The default is to check both .ssh/authorized_keys and .ssh/authorized_keys2 # but this is overridden so installations will only check .ssh/authorized_keys AuthorizedKeysFile .ssh/authorized_keys
# For this to work you will also need host keys in /etc/ssh/ssh_known_hosts #HostbasedAuthentication no # Change to yes if you don't trust ~/.ssh/known_hosts for # HostbasedAuthentication #IgnoreUserKnownHosts no # Don't read the user's ~/.rhosts and ~/.shosts files #IgnoreRhosts yes
# To disable tunneled clear text passwords, change to no here! #PasswordAuthentication yes #PermitEmptyPasswords no
# Change to no to disable s/key passwords #ChallengeResponseAuthentication yes
#AllowAgentForwarding yes #AllowTcpForwarding yes #GatewayPorts no #X11Forwarding no #X11DisplayOffset 10 #X11UseLocalhost yes #PermitTTY yes #PrintMotd yes #PrintLastLog yes #TCPKeepAlive yes #PermitUserEnvironment no #Compression delayed #ClientAliveInterval 0 #ClientAliveCountMax 3 #UseDNS no #PidFile /var/run/sshd.pid #MaxStartups 10:30:100 #PermitTunnel no #ChrootDirectory none #VersionAddendum none
# no default banner path #Banner none
# override default of no subsystems Subsystem sftp /usr/libexec/sftp-server
# Example of overriding settings on a per-user basis #Match User anoncvs # X11Forwarding no # AllowTcpForwarding no # PermitTTY no # ForceCommand cvs server
Match User root AuthenticationMethods publickey,password Match User *,!root AuthenticationMethods password
table<1>{127.0.0.1} table<2>{127.0.0.1} table<3>{127.0.0.1} table<4>{127.0.0.1} http protocol web{ pass request quick header "Host" value "*crossfit-club.htb" forward to <3> pass request quick header "Host" value "*employees.crossfit.htb" forward to <2> match request path "/*" forward to <1> match request path "/ws*" forward to <4> http websockets }
table<5>{127.0.0.1} table<6>{127.0.0.1 127.0.0.2 127.0.0.3 127.0.0.4} http protocol portal{ pass request quick path "/" forward to <5> pass request quick path "/index.html" forward to <5> pass request quick path "/home" forward to <5> pass request quick path "/login" forward to <5> pass request quick path "/chat" forward to <5> pass request quick path "/js/*" forward to <5> pass request quick path "/css/*" forward to <5> pass request quick path "/fonts/*" forward to <5> pass request quick path "/images/*" forward to <5> pass request quick path "/favicon.ico" forward to <5> pass forward to <6> http websockets }
relay web{ listen on "0.0.0.0" port 80 protocol web forward to <1> port 8000 forward to <2> port 8001 forward to <3> port 9999 forward to <4> port 4419 }
relay portal{ listen on 127.0.0.1 port 9999 protocol portal forward to <5> port 8002 forward to <6> port 5000 mode source-hash }
# $OpenBSD: changelist,v 1.127 2020/09/13 10:03:46 ajacoutot Exp $ # # List of files which the security script backs up and checks # for modifications. # # Files prefixed with a '+' will have their checksums stored, # not the actual files. #