Comprehensive Guide to Scanning and Exploiting vsftpd 3.0.3: Ports, Services, and Vulnerability Analysis

Network security

Contents hide

1. Asset Discovery with vsftpd 3.0.3

1.1. Services Offered: Host Discovery with vsftpd 3.0.3

In this target range, SEPPUKU[1], the IP address is specified, so the host discovery process is not involved while using vsftpd 3.0.3.

1.2. Service Discovery (Port, Service, Component, Version)

Using the command sudo -u root nmap 172.16.33.62 -n -Pn -p- --reason -sV -sC -O, we discovered the open ports on the host, the services provided, the components used, and the versions of those components.

Certainly! Please provide the original heading, and I’ll rewrite it to include the keyword “vsftpd 3.0.3” along with “Services Provided.”

vsftpd 3.0.3> />vsftpd 3.0.3> />

Using the command sudo -u root nmap 172.16.33.62 -n -Pn -sU –reason -sV -sC, we discovered the open ports on the host, the services provided, the components used, and the versions of those components.

The final summary is as follows:

Open Ports

Services Provided

Components Used

Component Versions

21/tcp

ftp

vsftpd

3.0.3

22/tcp

ssh

OpenSSH

7.9p1

80/tcp

http

nginx

1.14.2

137/udp

netbios-ns

Samba nmbd

?

139/tcp

netbios-ssn

Samba smbd

3.X – 4.X

445/tcp

netbios-ssn

Samba smbd

4.9.5

7080/tcp

ssl/http

LiteSpeed httpd

?

7601/tcp

http

Apache httpd

2.4.38

8088/tcp

http

LiteSpeed httpd

?

os

Windows

6.1

2. Vulnerability Discovery (Privilege Escalation)

The host has nine open ports, which can be categorized into four types. Based on the frequency and criticality of common vulnerabilities in target ranges, the order is:

  1. File Storage: Port 21;
  2. Web Applications: Ports 80, 7080, 7601, 8088;
  3. File Sharing: Ports 137, 139, 445;
  4. Operations Management: Port 22.

This ordering differs from real-world scenarios. In real-world scenarios, the order is 1-4-3-2, prioritizing non-web applications because they are generally not exposed to the internet, and vulnerabilities in these applications are typically easier to exploit and have a greater impact.

2.1. Port 21/FTP Service with vsftpd 3.0.3

2.1.1. vsftpd 3.0.3 Component Vulnerabilities

Using the command searchsploit vsftpd 3.0.3, no 0-day vulnerabilities were found for the vsftpd 3.0.3 component.

Certainly! Please provide the original heading, and I’ll rewrite it to include the keyword “vsftpd 3.0.3” along with “Services Provided.”

2.1.2. Services Provided: Password Vulnerability Assessment for vsftpd 3.0.3

Using the command ftp 172.16.33.62 to connect to the FTP service, attempting login with the anonymous account anonymous and a blank password resulted in failure. The bye command was then used to exit the FTP service.

Certainly! Please provide the original heading, and I’ll rewrite it to include the keyword “vsftpd 3.0.3” along with “Services Provided.”

Using the command hydra -C /usr/share/seclists/Passwords/Default-Credentials/ssh-betterdefaultpasslist.txt 172.16.33.62 ftp to brute-force the FTP service also failed.

Certainly! Please provide the original heading, and I’ll rewrite it to include the keyword “vsftpd 3.0.3” along with “Services Provided.”

2.2. Services Provided by Port 80/HTTP

2.2.1. Services Provided: Component Vulnerabilities

0x01. Web Middleware

Using the command searchsploit nginx 1., no 0-day vulnerabilities were found for the nginx 1.14.2 web middleware.

Certainly! Please provide the original heading, and I’ll rewrite it to include the keyword “vsftpd 3.0.3” along with “Services Provided.”

0x02. Web Framework

Using the browser plugin Wappalyzer, no web frameworks with 0-day vulnerabilities were found.

Certainly! Please provide the original heading, and I’ll rewrite it to include the keyword “vsftpd 3.0.3” along with “Services Provided.”

2.2.2. URL Vulnerabilities (Directory, File)

0x01. Direct Access

Accessing http://172.16.33.62/ directly with a browser revealed that HTTP Basic Authentication is required.

Certainly! Please provide the original heading, and I’ll rewrite it to include the keyword “vsftpd 3.0.3” along with “Services Provided.”

Services Provided: A Quick Attempt with Weak Credentials admin:admin Failed

Certainly! Please provide the original heading, and I’ll rewrite it to include the keyword “vsftpd 3.0.3” along with “Services Provided.”

Brute-forcing HTTP Basic Authentication with the dictionary /usr/share/seclists/Passwords/Default-Credentials/ssh-betterdefaultpasslist.txt also failed.

0x02. Directory Scanning

Using the command dirsearch -u http://172.16.33.62/ to scan the website’s directories and files revealed the /info.php file.

Accessing the /info.php file, the information gathered was insufficient to obtain system privileges, but it revealed that the operating system is Debian Linux 4.19.118-2, not Windows 6.1 as previously obtained by nmap via Samba.

0x03. Fuzzing

Based on the current information, there is no need to fuzz the website’s directories and files.

2.3. Port 7080/HTTPS Service

2.3.1. Services Provided: Component Vulnerabilities

0x01. Web Middleware

Using the command searchsploit LiteSpeed, no 0-day vulnerabilities were found for the LiteSpeed httpd web middleware.

0x02. Web Framework

Using the browser plugin Wappalyzer, no web frameworks with 0-day vulnerabilities were found.

2.3.2. URL Vulnerabilities (Directory, File)

0x01. Direct Access

Accessing http://172.16.33.62/ directly with a browser only resulted in a 404 error.

Certainly! Please provide the original heading, and I’ll rewrite it to include the keyword “vsftpd 3.0.3” along with “Services Provided.”

0x02. Directory Scanning

Using the command dirsearch -u https://172.16.33.62:7080/ -x 403 to scan the website’s directories and files revealed the /docs/ directory and the /lib/ directory.

Accessing the /docs/ directory revealed the user manual page for the OpenLiteSpeed Web Server 1.6 web framework. Using the command searchsploit OpenLiteSpeed, no 0-day vulnerabilities were found.

Accessing the /lib/ directory also resulted in a 404 error.

0x03. Fuzzing

Based on the current information, there is no need to fuzz the website’s directories and files.

2.4. Port 7601/HTTP Service

2.4.1. Component Vulnerabilities

0x01. Web Middleware

Using the command searchsploit Apache httpd 2.4., no 0-day vulnerabilities were found for the Apache httpd 2.4.38 web middleware.

0x02. Web Framework

Using the browser plugin Wappalyzer, no web frameworks with 0-day vulnerabilities were found.

2.4.2. URL Vulnerabilities (Directory, File)

0x01. Direct Access

Accessing http://172.16.33.62:7601/ directly with a browser revealed only a strange image.

0x02. Directory Scanning

Using the command dirsearch -u http://172.16.33.62:7601/ -x 403 to scan the website’s directories and files revealed the /ckeditor/ directory, the /ckeditor/samples/ directory, and the /secret/ directory.

The /ckeditor/ directory is the welcome page for the CKEditor 4 web framework, and the /ckeditor/samples/ directory is a test page. Both are common pages, so let’s check for 0-day vulnerabilities.

Using the command searchsploit CKEditor 4, no vulnerabilities were found in the CKEditor 4 web framework that could grant system privileges. Only XSS-type vulnerabilities were found.

The /secret/ directory is more interesting; it lists all the files in the directory.

After downloading them locally, the passwd.bak file revealed that the root and rabbit-hole users could log in to the SSH service. The shadow.bak file revealed the SSH password for the r@bbit-hole user.

Despite the “rabbit hole” hint, let’s try it. Using the command john shadow.bak --format=crypt yielded the SSH password a1b2c3. However, login attempts with the rabbit-hole and r@bbit-hole accounts failed.

Share this