rustcan
rustscan -a 10.10.242.254
Output:
PORT STATE SERVICE REASON
21/tcp open ftp syn-ack
80/tcp open http syn-ack
10000/tcp open snet-sensor-mgmt syn-ack
55007/tcp open unknown syn-ack
FTP
ftp 10.10.242.254

Let’s download it.


You can decode it: https://www.dcode.fr/rot-13-cipher
Just wanted to see if you find it. Lol. Remember: Enumeration is the key!
Nothing int he ftp.
Robots.txt
http://10.10.242.254/robots.txt




kidding
Port 10000
Change the /etc/hosts

gobuster
gobuster dir -u http://10.10.242.254/ -x txt,html,php -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt

gobuster dir -u http://10.10.242.254/joomla -x txt,html,php -w /usr/share/wordlists/dirb/common.txt

Get shell
https://www.exploit-db.com/exploits/47204

Enum
inside log.txtsuperduperp@$$




Into backup.sh:

superduperp@$$no1knows