Kiba
THM writeup for exploiting Kibana RCE
Target Details
Scan Target
$ nmap -sCV -Pn -oN nmap.txt 10.10.252.150
$ cat nmap.txt
Nmap scan report for 10.10.252.150
Host is up (0.39s latency).
Not shown: 998 closed tcp ports (conn-refused)
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 7.2p2 Ubuntu 4ubuntu2.8 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey:
| 2048 9df8d157132481b6185d048ed2384f90 (RSA)
| 256 e1e67aa1a11cbe03d24e271b0d0aecb1 (ECDSA)
|_ 256 2abae5c5fb51381745e7b154caa1a3fc (ED25519)
80/tcp open http Apache httpd 2.4.18 ((Ubuntu))
| http-methods:
|_ Supported Methods: GET HEAD POST OPTIONS
|_http-server-header: Apache/2.4.18 (Ubuntu)
|_http-title: Site doesn't have a title (text/html).
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
Read data files from: /opt/homebrew/bin/../share/nmap
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sat Apr 15 12:19:16 2023 -- 1 IP address (1 host up) scanned in 114.46 secondsPort
Service
Navigating Kibana


Searching for Kibana Vulnerabilities and Exploits

Exploiting Kibana RCE Vuln
Capturing Flags
Last updated