![]() SF:\r\nFor\x20VPN\x20administrators:\r\n\r\n\tManage\x SF:r\nContent-Length:\x201999\r\nContent-Type:\x20text/html\r\nKeep-Alive: =NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)= If you know the service/version, please submit the following fingerprints at : | HTTP Server at 191.252.100.243 Port 5555Ģ services unrecognized despite returning data. |_ssl-date: TLS randomness does not represent time | ssl-cert: Subject: commonName=vps35002/organizationName=vps35002/countryName=US | requested URL /nice%20ports%2C/Tri%6Eity.txt%2ebak was not found on this server. | Content-Type: text/html charset=iso-8859-1 NOTE: The awesome artwork used in this article was created by wuzx.Nmap scan report for (191.252.100.243) Stay tuned for similar walkthroughs and much more coming up in the near future! Once the app lock is uninstalled, restart the machine, Now it will not ask for any password and we can read the final flag in the Messages App. In this case, I’ll be removing the app lock. Use the adb uninstallcommand followed by the app name to uninstall any app. We need to use adb again to remove this app. We can now access all apps inside the phone, but most of them are still protected by a third party app lock. Now when you restart the machine, the login screen does not appear. For this we need to delete the login key present in the system directory. We can bypass this login screen using adb. I tried entering the pin 6666666648637 but none of them worked. Next, I tried to use the android machine manually, The machine displays a lock screen and asks us to enter a pin. Now we can read our first flag present in the home directory. Once the device is connected, we can open a shell on the target machine via adb using adb shell command. You can install it by using the following command: $ sudo apt install adbĪfter installing, we can connect the target machine to adb by using the adb connect command followed by the IP of the machine and we can also see the connected devices using adb devices command. For connecting to this port you need to install adb. Then I moved to the next port 5555 for further enumeration. I started a gobuster scan in the background but that didn’t give me any interesting directory. Looking at it in the browser, there was some information but it was not clear. Nmap done: 1 IP address (1 host up) scanned in 112.06 seconds MAC Address: 08:00:27:B3:57:0D (Oracle VirtualBox virtual NIC) ![]() |_http-title: Welcome To UnderGround Sector nmap -sC -sV -oN nmap/initial 192.168.1.9Ĩ080/tcp open http PHP cli server 5.5 or later I started the enumeration by running a port scan with Nmap, checking default scripts.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |