Exploit
Host:
192.168.190.145
Nmap
PORT STATE SERVICE REASON VERSION
80/tcp open http syn-ack ttl 61 Apache httpd 2.4.29 ((Ubuntu))
| http-methods:
|_ Supported Methods: POST OPTIONS HEAD GET
|_http-server-header: Apache/2.4.29 (Ubuntu)
|_http-favicon: Unknown favicon MD5: FED84E16B6CCFE88EE7FFAAE5DFEFD34
|_http-title: APEX Hospital
445/tcp open netbios-ssn syn-ack ttl 61 Samba smbd 4.7.6-Ubuntu (workgroup: WORKGROUP)
3306/tcp open mysql syn-ack ttl 61 MySQL 5.5.5-10.1.48-MariaDB-0ubuntu0.18.04.1
| mysql-info:
| Protocol: 10
| Version: 5.5.5-10.1.48-MariaDB-0ubuntu0.18.04.1
| Thread ID: 71
| Capabilities flags: 63487
| Some Capabilities: ConnectWithDatabase, Support41Auth, ODBCClient, IgnoreSigpipes, SupportsLoadDataLocal, SupportsTransactions, LongColumnFlag, FoundRows, LongPassword, IgnoreSpaceBeforeParenthesis, DontAllowDatabaseTableColumn, Speaks41ProtocolOld, InteractiveClient, Speaks41ProtocolNew, SupportsCompression, SupportsMultipleStatments, SupportsAuthPlugins, SupportsMultipleResults
| Status: Autocommit
| Salt: &=Bo-/B@Wvl:z{|yl3T1
|_ Auth Plugin Name: mysql_native_password
UDP?
Last updated