3.1.2. 使用nmap扫描firmadyne虚拟环境运行的防火墙 root@aflfuzz:~/firmadyne# nmap -O -sV 10.0.0.100 Starting Nmap 7.40SVN ( 65eK9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6F1L8h3q4H3i4K6u0W2L8%4u0Y4i4K6t1$3L8X3u0K6M7q4)9K6b7W2)9J5z5h3q4@1 2017-04-20 11:13 CST Nmap scan report for localhost (10.0.0.100) Host is up (0.0011s latency). Not shown: 997 closed ports PORT STATE SERVICE VERSION 22/tcp open ssh Dropbear sshd 0.51 (protocol 2.0) 80/tcp open http lighttpd 1.4.18 443/tcp open ssl/http lighttpd 1.4.18 MAC Address: 52:54:00:12:34:56 (QEMUvirtual NIC) Device type: general purpose Running: Linux 2.6.X OS CPE: cpe:/o:linux:linux_kernel:2.6.32 OS details: Linux 2.6.32 Network Distance: 1 hop Service Info: OS: Linux; CPE:cpe:/o:linux:linux_kernel OS and Service detection performed. Pleasereport any incorrect results at 152K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6F1L8h3q4H3i4K6u0W2L8%4u0Y4i4K6u0r3M7%4g2T1L8h3W2@1i4K6u0r3i4K6t1$3L8X3u0K6M7q4)9K6b7W2)9J5k6b7`.`. Nmap done: 1 IP address (1 host up) scannedin 68.30 seconds 3.1.3. 使用nmap vuln脚本探测防火墙漏洞 root@aflfuzz:~/firmadyne# nmap--script=vuln -O -sV 10.0.0.100 Starting Nmap 7.40SVN ( a44K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6F1L8h3q4H3i4K6u0W2L8%4u0Y4i4K6t1$3L8X3u0K6M7q4)9K6b7W2)9J5z5h3q4@1 2017-04-20 11:22 CST Pre-scan script results: | broadcast-avahi-dos: | Discovered hosts: | 224.0.0.251 | After NULL UDP avahi packet DoS (CVE-2011-1002). |_ Hosts are all up (not vulnerable). Nmap scan report for localhost (10.0.0.100) Host is up (0.0014s latency). Not shown: 997 closed ports PORT STATE SERVICE VERSION 22/tcp open ssh Dropbear sshd 0.51 (protocol 2.0) 80/tcp open http lighttpd 1.4.18 | http-cookie-flags: | /: | PHPSESSID: |_ httponly flag not set |_http-csrf: Couldn't find any CSRFvulnerabilities. |_http-dombased-xss: Couldn't find any DOMbased XSS. | http-enum: |_ /test.php: Test page |_http-phpself-xss: ERROR: Script executionfailed (use -d to debug) |_http-server-header: lighttpd/1.4.18 | http-slowloris-check: | VULNERABLE: | Slowloris DOS attack | State: LIKELY VULNERABLE | IDs: CVE:CVE-2007-6750 | Slowloris tries to keep many connections to the target web server openand hold | them open as long as possible. Itaccomplishes this by opening connections to | the target web server and sending a partial request. By doing so, itstarves | the http server's resources causing Denial Of Service. | | Disclosure date: 2009-09-17 | References: | 359K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6U0N6X3g2Q4x3X3g2E0K9i4c8J5k6g2)9J5k6h3!0J5k6#2)9J5c8X3y4Y4K9g2)9J5k6r3u0A6L8W2)9J5c8X3y4$3k6h3&6S2L8h3g2Q4x3X3g2U0k6$3W2Q4x3@1k6F1j5h3#2W2i4K6y4p5b7#2k6q4i4K6u0V1x3U0l9H3y4#2)9J5k6o6j5%4y4e0l9`. |_ a51K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3S2S2i4K6u0W2j5$3E0W2M7Y4y4Q4x3X3g2G2M7X3N6Q4x3V1k6K6L8r3!0%4L8r3!0J5K9i4y4Q4x3V1j5`. |_http-stored-xss: Couldn't find any storedXSS vulnerabilities. 443/tcp open ssl/http lighttpd 1.4.18 |_http-aspnet-debug: ERROR: Scriptexecution failed (use -d to debug) | http-cookie-flags: | /: | PHPSESSID: |_ httponly flag not set |_http-csrf: Couldn't find any CSRFvulnerabilities. |_http-dombased-xss: Couldn't find any DOMbased XSS. | http-enum: |_ /test.php: Test page |_http-phpself-xss: ERROR: Script executionfailed (use -d to debug) |_http-server-header: lighttpd/1.4.18 | http-slowloris-check: | VULNERABLE: | Slowloris DOS attack | State: LIKELY VULNERABLE | IDs: CVE:CVE-2007-6750 | Slowloris tries to keep many connections to the target web server openand hold | them open as long as possible. Itaccomplishes this by opening connections to | the target web server and sending a partial request. By doing so, itstarves | the http server's resources causing Denial Of Service. | | Disclosure date: 2009-09-17 | References: | 22dK9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6U0N6X3g2Q4x3X3g2E0K9i4c8J5k6g2)9J5k6h3!0J5k6#2)9J5c8X3y4Y4K9g2)9J5k6r3u0A6L8W2)9J5c8X3y4$3k6h3&6S2L8h3g2Q4x3X3g2U0k6$3W2Q4x3@1k6F1j5h3#2W2i4K6y4p5b7#2k6q4i4K6u0V1x3U0l9H3y4#2)9J5k6o6j5%4y4e0l9`. |_ f95K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3S2S2i4K6u0W2j5$3E0W2M7Y4y4Q4x3X3g2G2M7X3N6Q4x3V1k6K6L8r3!0%4L8r3!0J5K9i4y4Q4x3V1j5`. |_http-stored-xss: Couldn't find any storedXSS vulnerabilities. | ssl-ccs-injection: | VULNERABLE: | SSL/TLS MITM vulnerability (CCS Injection) | State: VULNERABLE | Risk factor: High | OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h | does not properly restrict processing of ChangeCipherSpec messages, | which allows man-in-the-middle attackers to trigger use of a zero | length master key in certain OpenSSL-to-OpenSSL communications, and | consequently hijack sessions or obtain sensitive information, via | a crafted TLS handshake, aka the "CCS Injection"vulnerability. | | References: | 648K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3!0H3k6h3&6K6M7$3I4Q4x3X3g2G2M7X3N6Q4x3V1k6F1k6i4N6K6i4K6u0r3M7$3g2U0j5h3c8$3i4K6g2X3x3U0l9I4y4o6l9$3x3o6g2Q4x3X3g2@1P5s2b7`. | 2c7K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3y4$3k6h3c8W2N6r3q4A6L8s2y4Q4x3X3g2U0L8$3#2Q4x3V1k6U0N6X3g2Q4x3V1j5J5x3o6p5@1i4K6u0V1x3o6t1J5y4l9`.`. |_ b51K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6U0N6X3g2Q4x3X3g2E0K9i4c8J5k6g2)9J5k6h3!0J5k6#2)9J5c8X3y4Y4K9g2)9J5k6r3u0A6L8W2)9J5c8X3y4$3k6h3&6S2L8h3g2Q4x3X3g2U0k6$3W2Q4x3@1k6F1j5h3#2W2i4K6y4p5b7#2k6q4i4K6u0V1x3U0l9I4y4q4)9J5k6o6l9J5x3U0b7`. | ssl-poodle: | VULNERABLE: | SSL POODLE information leak | State: VULNERABLE | IDs: CVE:CVE-2014-3566 OSVDB:113251 | The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other | products, uses nondeterministic CBC padding, which makes it easier | for man-in-the-middle attackers to obtain cleartext data via a | padding-oracle attack, aka the "POODLE" issue. | Disclosure date: 2014-10-14 | Check results: | TLS_RSA_WITH_AES_128_CBC_SHA | References: | 9f0K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6%4N6%4N6Q4x3X3g2G2M7r3g2F1M7%4y4D9i4K6u0W2L8%4u0Y4i4K6u0r3i4K6N6q4j5X3!0V1L8#2)9J5c8Y4y4K6L8q4)9J5k6s2m8G2L8$3c8D9k6g2)9J5k6i4m8V1k6R3`.`. | 761K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6%4N6%4N6Q4x3X3g2A6L8i4m8W2M7X3W2S2L8s2k6A6L8$3I4W2N6q4)9J5k6h3!0J5k6#2)9J5c8U0t1H3x3e0c8Q4x3V1j5I4x3q4)9J5c8U0p5@1i4K6u0r3M7r3!0G2k6r3I4W2i4K6u0W2K9s2c8E0L8l9`.`. | b22K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3!0K6N6X3c8T1i4K6u0W2L8%4u0Y4i4K6u0r3x3e0p5K6x3U0f1I4 |_ 07aK9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6U0N6X3g2Q4x3X3g2E0K9i4c8J5k6g2)9J5k6h3!0J5k6#2)9J5c8X3y4Y4K9g2)9J5k6r3u0A6L8W2)9J5c8X3y4$3k6h3&6S2L8h3g2Q4x3X3g2U0k6$3W2Q4x3@1k6F1j5h3#2W2i4K6y4p5b7#2k6q4i4K6u0V1x3U0l9I4y4q4)9J5k6o6x3#2y4U0j5`. | sslv2-drown: | ciphers: | SSL2_RC2_128_CBC_WITH_MD5 | SSL2_DES_64_CBC_WITH_MD5 | SSL2_DES_192_EDE3_CBC_WITH_MD5 | SSL2_RC4_128_WITH_MD5 | SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 | SSL2_RC4_128_EXPORT40_WITH_MD5 | vulns: | CVE-2016-0703: | title: OpenSSL: Divide-and-conquer session key recovery in SSLv2 | state: VULNERABLE | ids: | CVE:CVE-2016-0703 | description: | The get_client_master_keyfunction in s2_srvr.c in the SSLv2 implementation in | OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and1.0.2 before | 1.0.2a accepts a nonzero CLIENT-MASTER-KEY CLEAR-KEY-LENGTH value for anarbitrary | cipher, which allows man-in-the-middle attackers to determine theMASTER-KEY value | and decrypt TLS ciphertext data by leveraging a Bleichenbacher RSApadding oracle, a | related issue to CVE-2016-0800. | | refs: | e27K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6%4N6%4N6Q4x3X3g2G2M7r3g2F1M7%4y4D9i4K6u0W2L8%4u0Y4i4K6u0r3L8X3g2%4M7#2)9J5c8Y4y4W2j5$3q4V1N6W2)9J5c8U0t1H3x3e0j5H3x3K6l9I4i4K6u0W2N6s2S2@1 | 164K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6U0N6X3g2Q4x3X3g2E0K9i4c8J5k6g2)9J5k6h3!0J5k6#2)9J5c8X3y4Y4K9g2)9J5k6r3u0A6L8W2)9J5c8X3y4$3k6h3&6S2L8h3g2Q4x3X3g2U0k6$3W2Q4x3@1k6F1j5h3#2W2i4K6y4p5b7#2k6q4i4K6u0V1x3U0l9I4y4W2)9J5k6o6l9%4x3o6x3`. | CVE-2016-0800: | title: OpenSSL: Cross-protocol attack on TLS using SSLv2 (DROWN) | state: VULNERABLE | ids: | CVE:CVE-2016-0800 | description: | The SSLv2 protocol, as used inOpenSSL before 1.0.1s and 1.0.2 before 1.0.2g and | other products, requires a server to send a ServerVerify message beforeestablishing | that a client possesses certain plaintext RSA data, which makes iteasier for remote | attackers to decrypt TLS ciphertext data by leveraging a BleichenbacherRSA padding | oracle, aka a "DROWN" attack. | | refs: | c3aK9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6U0N6X3g2Q4x3X3g2E0K9i4c8J5k6g2)9J5k6h3!0J5k6#2)9J5c8X3y4Y4K9g2)9J5k6r3u0A6L8W2)9J5c8X3y4$3k6h3&6S2L8h3g2Q4x3X3g2U0k6$3W2Q4x3@1k6F1j5h3#2W2i4K6y4p5b7#2k6q4i4K6u0V1x3U0l9I4y4W2)9J5k6o6l9^5x3o6l9`. |_ ed7K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6%4N6%4N6Q4x3X3g2G2M7r3g2F1M7%4y4D9i4K6u0W2L8%4u0Y4i4K6u0r3L8X3g2%4M7#2)9J5c8Y4y4W2j5$3q4V1N6W2)9J5c8U0t1H3x3e0j5H3x3K6l9I4i4K6u0W2N6s2S2@1 MAC Address: 52:54:00:12:34:56 (QEMUvirtual NIC) Device type: general purpose Running: Linux 2.6.X OS CPE: cpe:/o:linux:linux_kernel:2.6.32 OS details: Linux 2.6.32 Network Distance: 1 hop Service Info: OS: Linux; CPE:cpe:/o:linux:linux_kernel OS and Service detection performed. Pleasereport any incorrect results at eadK9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6F1L8h3q4H3i4K6u0W2L8%4u0Y4i4K6u0r3M7%4g2T1L8h3W2@1i4K6u0r3i4K6t1$3L8X3u0K6M7q4)9K6b7W2)9J5k6b7`.`. Nmap done: 1 IP address (1 host up) scannedin 192.14 seconds 3.1.4. firmadyne对防火墙使用msf进行渗透 runExploits.py会自动使用metasploit中存在的路由器的攻击脚本进行自动攻击,执行结果会存储在exploits目录 root@aflfuzz:~/firmadyne# chmod +xanalyses/*.py root@aflfuzz:~/firmadyne#mkdir exploits; root@aflfuzz:~/firmadyne#./analyses/runExploits.py-t 192.168.0.100 -o exploits/exploit -e x (requires Metasploit Framework)