Nmap's UDP script scanning on 192.168.43.3 is completed successfully. Nmap's TCP script scanning on 192.168.43.3 is completed successfully. Starting to scan 192.168.43.3 for TCP interesting stuff. Starting to scan 192.168.43.3 for UDP interesting stuff. Directory created at: /HaGashash_Projects/Stapler/192.168.43.3. Starting to scan 192.168.43.10 for UDP interesting stuff. Starting to scan 192.168.43.10 for TCP interesting stuff. Directory created at: /HaGashash_Projects/Stapler/192.168.43.10. Starting to scan 192.168.43.2 for UDP interesting stuff. Starting to scan 192.168.43.2 for TCP interesting stuff. Directory created at: /HaGashash_Projects/Stapler/192.168.43.2. Starting to scan 192.168.43.1 for UDP interesting stuff. Starting to scan 192.168.43.1 for TCP interesting stuff. Directory created at: /HaGashash_Projects/Stapler/192.168.43.1. Dependencies check is completed successfully. ![]() ifconfig executable is in '/usr/bin/ifconfig' ![]() # go run go/src//Gandosha/HaGashash/main.go -project=Stapler -subnet=true -interface=enp0s3 Stapler: 1 Service discovery -> FTP with anonymous access -> Samba users and shares enumeration -> Web directories fuzzing -> Local File Inclusion -> Webshell upload via mysql -> Privilege Escalation (cronjob manipulation) VM: įirst, I fired up HaGashash in order to gain some information about which host to attack and what interesting services run there.
0 Comments
Leave a Reply. |