Algernon
Last updated
Last updated
Using wget -r --user="Anonymous" --password="anonymous" ftp://192.168.182.65/
to get all files Now to read all files in log folder: cat *
it is a mail service for sure and searching for the directory structure on google leads us to believe it is SmarterMail
Now targeting port 17001 for SmarterMail: Using this exploit https://packetstormsecurity.com/files/160416/SmarterMail-6985-Remote-Code-Execution.html Changing the Lhost and Host:
We are directly nt authority/system