Check for anonymous login
Check if the version is vulnerable to some exploit (highly unlikely)
You won't be able to interact with SSH initially. Try to find the password and username by enumerating other ports.
If you can only find the username then use that username and brute-force ssh login with hydra.
If you have read permissions on /root/.ssh, then copy the id_rsa (private key) to your machine. Give the permission as 600 and then ssh with it.
ssh root@IP -i id_rsa
nslookup
> server 10.10.10.10
> 10.10.10.10
dig axfr cronos.htb @10.10.10.10
gobuster dns -d cronos.htb -w /usr/share/seclists/Discovery/DNS/bitquark-subdomains-top100000.txt
TCP 79: Sun Solaris fingerd
Enumerate users: https://raw.githubusercontent.com/pentestmonkey/finger-user-enum/master/finger-user-enum.pl
LOGIN- Weak Credentials, Default Login, SQLi, Bruteforce
Google(Searchsploit)- Application Name or any Keyword
The default community string is "public" (You might get it from nmap scan)
TCP 139 & 445: SMB
TCP 1433: MSSQL
Oracle TNS listener 11.2.0.2.0
You will need a tool: https://github.com/quentinhardy/odat#installation-optional-for-development-version
Step 1: Enumerate Oracle System ID.
It will give you a list of strings such as "XE,XEXDB"
Step 2: Enumerate valid credentials.
If accounts dir doesn't work then use oracle_default_userpass.txt
Step 3: Create reverse shell.
Step 4: Upload the shell to database.
If you get an error while uploading then check if user is given sysdba priv.
Step 5: Run the shell on target machine.
TCP 4555: JAMES Remote Admin
TCP 5984: CouchDB 1.6.0
TCP 6379: Redis key-value store 4.0.9
Automated: https://github.com/Avinash-acid/Redis-Server-Exploit/blob/master/redis.py
Manual: https://medium.com/@bigb0ss/htb-postman-write-up-34bc4fe5daa
UnrealIRC
Tomcat Login Page: 10.10.10.10/manager/html
Login to this page with credentials found. Then upload to war file to get a reverse shell
Apache Tomcat < 9.0.1 (Beta) / < 8.5.23 / < 8.0.47 / < 7.0.8 - JSP Upload Bypass / Remote Code Execution (1)
curl -X PUT http://IP:8080/shell.jsp/ -d @- < shell.jsp
Apache Tomcat < 9.0.1 (Beta) / < 8.5.23 / < 8.0.47 / < 7.0.8 - JSP Upload Bypass / Remote Code Execution (2)
python 42966.py -u http://IP:8080 -p pwn
TCP 9256: AChat
BoF exploit on eploitdb. Modify it to get shell