Enumeration
nmap
open ports
First, I’d like to see what ports are open.
nmap -sS -p- --open 10.10.11.248 | tee nmap/nmap_open_ports_TCP
-sS for TCP SYN scan
I’d also want to run a UDP scan separately just in case.
nmap -sU -p- --open --min-rate 10000 10.10.11.248 | tee nmap/nmap_open_ports_UDP
-sU for UDP scan
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-10-24 11:34 +08
Nmap scan report for 10.10.11.248
Host is up (0.25s latency).
Not shown: 65530 closed tcp ports (reset)
PORT     STATE SERVICE
22/tcp   open  ssh
80/tcp   open  http
389/tcp  open  ldap
443/tcp  open  https
5667/tcp open  unknown
Nmap done: 1 IP address (1 host up) scanned in 71.41 seconds
TCP service scan
While the UDP scan runs, I parse the open TCP ports so that I only get the port numbers separated by commas.
cat nmap/nmap_open_ports_TCP | grep ' open ' | awk -F"/" '{print $1}' | paste -sd, > nmap/open_ports_TCP
And then I supply those ports in an nmap service scan.
nmap -sV -sC -p$(cat nmap/open_ports_TCP) 10.10.11.248 | tee nmap/nmap_service_scan_TCP
PORT     STATE SERVICE    VERSION
22/tcp   open  ssh        OpenSSH 8.4p1 Debian 5+deb11u3 (protocol 2.0)
| ssh-hostkey:
|   3072 61:e2:e7:b4:1b:5d:46:dc:3b:2f:91:38:e6:6d:c5:ff (RSA)
|   256 29:73:c5:a5:8d:aa:3f:60:a9:4a:a3:e5:9f:67:5c:93 (ECDSA)
|_  256 6d:7a:f9:eb:8e:45:c2:02:6a:d5:8d:4d:b3:a3:37:6f (ED25519)
80/tcp   open  http       Apache httpd 2.4.56
|_http-server-header: Apache/2.4.56 (Debian)
|_http-title: Did not follow redirect to https://nagios.monitored.htb/
389/tcp  open  ldap       OpenLDAP 2.2.X - 2.3.X
443/tcp  open  ssl/http   Apache httpd 2.4.56 ((Debian))
| tls-alpn:
|_  http/1.1
|_ssl-date: TLS randomness does not represent time
|_http-title: Nagios XI
|_http-server-header: Apache/2.4.56 (Debian)
| ssl-cert: Subject: commonName=nagios.monitored.htb/organizationName=Monitored/stateOrProvinceName=Dorset/countryName=UK
| Not valid before: 2023-11-11T21:46:55
|_Not valid after:  2297-08-25T21:46:55
5667/tcp open  tcpwrapped
Service Info: Host: nagios.monitored.htb; OS: Linux; CPE: cpe:/o:linux:linux_kernel
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 27.31 seconds
22 - ssh
KIV.
80 / 443
Nmap scan states that port 80, i.e. http://10.10.11.248, redirects to https://nagios.monitored.htb, i.e. port 443, and that it is running Nagios XI.
Apache Server version
Here, we also note the Apache HTTP Server version: 2.4.56.
389 - ldap
KIV.
5667
KIV.
UDP service scan
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-11-01 11:36 +08
Warning: 10.10.11.248 giving up on port because retransmission cap hit (10).
Nmap scan report for nagios.monitored.htb (10.10.11.248)
Host is up (0.39s latency).
Not shown: 65445 open|filtered udp ports (no-response), 88 closed udp ports (port-unreach)
PORT    STATE SERVICE
123/udp open  ntp
161/udp open  snmp
Nmap done: 1 IP address (1 host up) scanned in 85.33 seconds
After the UDP scan is done, I run a service scan with the open UDP ports.
cat nmap/nmap_open_ports_UDP | grep ' open ' | awk -F"/" '{print $1}' | paste -sd, > nmap/open_ports_UDP
nmap -sU -sV -sC -pU:$(cat nmap/open_ports_UDP) --min-rate 10000 10.10.11.248 | tee nmap/nmap_service_scan_UDP
UDP scans take a while but we can see that there are 2 UDP ports open.
123 - ntp
KIV, in case we need to sync clocks.
PORT    STATE SERVICE VERSION
123/udp open  ntp     NTP v4 (unsynchronized)
161 - snmp
KIV.
PORT    STATE SERVICE VERSION
161/udp open  snmp    SNMPv1 server; net-snmp SNMPv3 server (public)
| snmp-interfaces:
|   lo
|     IP address: 127.0.0.1  Netmask: 255.0.0.0
|     Type: softwareLoopback  Speed: 10 Mbps
|     Traffic stats: 376.55 Kb sent, 376.55 Kb received
|   VMware VMXNET3 Ethernet Controller
|     IP address: 10.10.11.248  Netmask: 255.255.254.0
|     MAC address: 00:50:56:b0:df:a5 (VMware)
|     Type: ethernetCsmacd  Speed: 4 Gbps
|_    Traffic stats: 30.87 Mb sent, 63.88 Mb received
| snmp-info:
|   enterprise: net-snmp
|   engineIDFormat: unknown
|   engineIDData: 6f3fa7421af94c6500000000
|   snmpEngineBoots: 36
|_  snmpEngineTime: 55m01s
| snmp-sysdescr: Linux monitored 5.10.0-28-amd64 #1 SMP Debian 
...<truncated>...
port 80 / 443
We almost always start looking into web ports when we see them.
Nagios XI
After adding nagios.monitored.htb (and monitored.htb just in case) to /etc/hosts file, we see the Nagios XI page.

An extensible, enterprise-level infrastructure monitoring solution with time-saving, easy-to-use features.
https://monitored.htb also shows the same page.

default credentials
I like to Google the default credentials and try them.
 Here it says the default SSH creds is
Here it says the default SSH creds is root:nagiosxi and the web default username is nagiosadmin while the password will be set upon first access.
trying default creds
No harm trying.

The creds don’t work for the web login as well.

directory enumeration
Before I try any exploits, I wanted to continue enumerating.
ffuf
I am using 2 different wordlists just in case.
ffuf -u 'http://monitored.htb/FUZZ' -ac -w /usr/share/wordlists/seclists/Discovery/Web-Content/directory-list-2.3-big.txt

Nothing. Which is kinda expected since it’s not a custom software.
