Skip to main content

Twiggy

Enumeration

  • Finding open ports and running nmap scripts.
┌──(kali㉿kali)-[~]
└─$ nmap -p- 192.168.159.62 -v -T5 | grep open
Discovered open port 80/tcp on 192.168.159.62
Discovered open port 22/tcp on 192.168.159.62
Discovered open port 53/tcp on 192.168.159.62
Discovered open port 4505/tcp on 192.168.159.62
Discovered open port 8000/tcp on 192.168.159.62
Discovered open port 4506/tcp on 192.168.159.62
22/tcp open ssh
53/tcp open domain
80/tcp open http
4505/tcp open unknown
4506/tcp open unknown
8000/tcp open http-alt

┌──(kali㉿kali)-[~]
└─$ nmap -p22,53,80,4505,4506,8000 192.168.159.62 -sCV
Starting Nmap 7.95 ( https://nmap.org ) at 2025-11-12 17:18 AEDT
Nmap scan report for 192.168.159.62
Host is up (0.11s latency).

PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 7.4 (protocol 2.0)
| ssh-hostkey:
| 2048 44:7d:1a:56:9b:68:ae:f5:3b:f6:38:17:73:16:5d:75 (RSA)
| 256 1c:78:9d:83:81:52:f4:b0:1d:8e:32:03:cb:a6:18:93 (ECDSA)
|_ 256 08:c9:12:d9:7b:98:98:c8:b3:99:7a:19:82:2e:a3:ea (ED25519)
53/tcp open domain NLnet Labs NSD
80/tcp open http nginx 1.16.1
|_http-server-header: nginx/1.16.1
|_http-title: Home | Mezzanine
4505/tcp open zmtp ZeroMQ ZMTP 2.0
4506/tcp open zmtp ZeroMQ ZMTP 2.0
8000/tcp open http nginx 1.16.1
|_http-open-proxy: Proxy might be redirecting requests
|_http-title: Site doesn't have a title (application/json).
|_http-server-header: nginx/1.16.1

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 21.52 seconds
  • We see 8000,4505,4506 are some unusual ports open on this machine
  • Checking port 8000.

  • Searching this response on google.

  • This is a Salt REST API
  • Let's use curl to get more information

Vulnareblity Discovery

  • Search for exploit for salt-api/3000-1

  • Mirror the code

  • Start nc listener with rlwrap, and execute exploit as per readme

  • Firewall is blocking ports other than already open ports. Using one of the open ports

  • We got the revshell as root.
  • Submit the flag