HTB — Base
Nmap扫描结果显示base.htb开放了SSH和HTTP服务,未检测到XSS漏洞但可能存在CSRF风险,系统为Linux。 2025-7-19 13:16:17 Author: infosecwriteups.com(查看原文) 阅读量:21 收藏

How based are you?

Dfaults

Photo by Jeswin Thomas on Unsplash
└──╼ [★]$ nmap -T5 -p- -sCV --script exploit base.htb
Starting Nmap 7.94SVN ( <https://nmap.org> ) at 2025-07-09 07:29 CDT
Nmap scan report for base.htb (10.129.95.184)
Host is up (0.086s latency).
Not shown: 65533 closed tcp ports (reset)
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 7.6p1 Ubuntu 4ubuntu0.7 (Ubuntu Linux; protocol 2.0)
80/tcp open http Apache httpd 2.4.29 ((Ubuntu))
|_http-server-header: Apache/2.4.29 (Ubuntu)
|_http-dombased-xss: Couldn't find any DOM based XSS.
|_http-stored-xss: Couldn't find any stored XSS vulnerabilities.
| http-csrf:
| Spidering limited to: maxdepth=3; maxpagecount=20; withinhost=base.htb
| Found the following possible CSRF vulnerabilities:
|
| Path: <http://base.htb:80/>
| Form id: name
| Form action: forms/contact.php
|
| Path: <http://base.htb:80/>
| Form id:
| Form action:
|
| Path: <http://base.htb:80/index.html>
| Form id: name
| Form action: forms/contact.php
|
| Path: <http://base.htb:80/index.html>
| Form id:
| Form action:
|
| Path: <http://base.htb:80/login/login.php>
| Form id: login-form
| Form action:
|
| Path: <http://base.htb:80/login/login.php>
| Form id:
|_ Form action:
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel…

文章来源: https://infosecwriteups.com/htb-base-d19c43f25362?source=rss----7b722bfd1b8d---4
如有侵权请联系:admin#unsafe.sh