~/Documents/HTB/Bucket ❯ cat nmap/initial # Nmap 7.91 scan initiated Fri Nov 13 18:38:05 2020 as: nmap -sC -sV -oN nmap/initial -v 10.10.10.212 Nmap scan report for 10.10.10.212 Host is up (0.17s latency). Not shown: 998 closed ports PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 8.2p1 Ubuntu 4 (Ubuntu Linux; protocol 2.0) | ssh-hostkey: | 3072 48:ad:d5:b8:3a:9f:bc:be:f7:e8:20:1e:f6:bf:de:ae (RSA) | 256 b7:89:6c:0b:20:ed:49:b2:c1:86:7c:29:92:74:1c:1f (ECDSA) |_ 256 18:cd:9d:08:a6:21:a8:b8:b6:f7:9f:8d:40:51:54:fb (ED25519) 80/tcp open http Apache httpd 2.4.41 | http-methods: |_ Supported Methods: GET HEAD POST OPTIONS |_http-server-header: Apache/2.4.41 (Ubuntu) |_http-title: Did not follow redirect to http://bucket.htb/ Service Info: Host: 127.0.1.1; OS: Linux; CPE: cpe:/o:linux:linux_kernel
Read data files from: /usr/bin/../share/nmap Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . # Nmap done at Fri Nov 13 18:38:37 2020 -- 1 IP address (1 host up) scanned in 31.88 seconds
<article> <divclass="coffee"> <imgsrc="http://s3.bucket.htb/adserver/images/bug.jpg"alt="Bug"height="160"width="160"> </div> <divclass="description"> <h3>Bug Bounty and 0day Research</h3> <span>march 17, 2020 | Security</span> <p>Customised bug bounty and new 0day feeds. Feeds can be used on TV, mobile, desktop and web applications. Collecting security feeds from 100+ different trusted sources around the world.</p> </div> </article> <divclass="articles">
<article> <divclass="coffee"> <imgsrc="http://s3.bucket.htb/adserver/images/malware.png"alt="Malware"height="160"width="160"> </div> <divclass="description"> <h3>Ransomware Alerts</h3> <span>march 17, 2020 | Malware</span> <p>Run awareness ad campaigns on Ransomwares and other newly found malwares. Choose different types of malwares to fit for your campaign</p> </div> </article>
<article> <divclass="coffee"> <imgsrc="http://s3.bucket.htb/adserver/images/cloud.png"alt="cheer"height="160"width="160"> </div> <divclass="description"> <h3>Cloud Updates</h3> <span>march 17, 2020 | Cloud</span> <p>Stay tuned to cloud technology updates. A superior alternative to Push Notifications and SMS A2P alerts. </p> </div> </article>
<VirtualHost *:80> DocumentRoot /var/www/html RewriteEngine On RewriteCond %{HTTP_HOST} !^bucket.htb$ RewriteRule /.* http://bucket.htb/ [R] </VirtualHost> <VirtualHost *:80> # The ServerName directive sets the request scheme, hostname and port that # the server uses to identify itself. This is used when creating # redirection URLs. In the context of virtual hosts, the ServerName # specifies what hostname must appear in the request's Host: header to # match this virtual host. For the default virtual host (this file) this # value is not decisive as it is used as a last resort host regardless. # However, you must set it for any further virtual host explicitly. #ServerName www.example.com ProxyPreserveHost on ProxyPass / http://localhost:4566/ ProxyPassReverse / http://localhost:4566/ <Proxy *> Order deny,allow Allow from all </Proxy> ServerAdmin webmaster@localhost ServerName s3.bucket.htb # Available loglevels: trace8, ..., trace1, debug, info, notice, warn, # error, crit, alert, emerg. # It is also possible to configure the loglevel for particular # modules, e.g. #LogLevel info ssl:warn
# For most configuration files from conf-available/, which are # enabled or disabled at a global level, it is possible to # include a line for only one particular virtual host. For example the # following line enables the CGI configuration for this host only # after it has been globally disabled with "a2disconf". #Include conf-available/serve-cgi-bin.conf </VirtualHost>
System information as of Sat 14 Nov 2020 09:15:44 AM UTC
System load: 0.0 Usage of /: 39.9% of 19.56GB Memory usage: 27% Swap usage: 0% Processes: 198 Users logged in: 1 IPv4 address for br-bee97070fb20: 172.18.0.1 IPv4 address for docker0: 172.17.0.1 IPv4 address for ens160: 10.10.10.212 IPv6 address for ens160: dead:beef::250:56ff:feb9:24c3
91 updates can be installed immediately. 0 of these updates are security updates. To see these additional updates run: apt list --upgradable
The list of available updates is more than a week old. To check for new updates run: sudo apt update Failed to connect to https://changelogs.ubuntu.com/meta-release-lts. Check your Internet connection or proxy settings
Last login: Tue Oct 13 10:25:01 2020 root@bucket:~# wc -c root.txt 33 root.txt root@bucket:~#