Exploit

Host:

192.168.190.145

Nmap

PORT     STATE SERVICE     REASON         VERSION
80/tcp   open  http        syn-ack ttl 61 Apache httpd 2.4.29 ((Ubuntu))
| http-methods: 
|_  Supported Methods: POST OPTIONS HEAD GET
|_http-server-header: Apache/2.4.29 (Ubuntu)
|_http-favicon: Unknown favicon MD5: FED84E16B6CCFE88EE7FFAAE5DFEFD34
|_http-title: APEX Hospital
445/tcp  open  netbios-ssn syn-ack ttl 61 Samba smbd 4.7.6-Ubuntu (workgroup: WORKGROUP)
3306/tcp open  mysql       syn-ack ttl 61 MySQL 5.5.5-10.1.48-MariaDB-0ubuntu0.18.04.1
| mysql-info: 
|   Protocol: 10
|   Version: 5.5.5-10.1.48-MariaDB-0ubuntu0.18.04.1
|   Thread ID: 71
|   Capabilities flags: 63487
|   Some Capabilities: ConnectWithDatabase, Support41Auth, ODBCClient, IgnoreSigpipes, SupportsLoadDataLocal, SupportsTransactions, LongColumnFlag, FoundRows, LongPassword, IgnoreSpaceBeforeParenthesis, DontAllowDatabaseTableColumn, Speaks41ProtocolOld, InteractiveClient, Speaks41ProtocolNew, SupportsCompression, SupportsMultipleStatments, SupportsAuthPlugins, SupportsMultipleResults
|   Status: Autocommit
|   Salt: &=Bo-/B@Wvl:z{|yl3T1
|_  Auth Plugin Name: mysql_native_password

UDP?

Last updated