Exploit
Host:
192.168.219.231
Nmap
Nmap scan report for 192.168.219.231
Host is up, received user-set (0.042s latency).
Scanned at 2024-07-25 21:16:51 IST for 152s
Not shown: 65531 filtered tcp ports (no-response)
PORT STATE SERVICE REASON VERSION
22/tcp open ssh syn-ack ttl 61 OpenSSH 7.9p1 Debian
80/tcp open http syn-ack ttl 61
|_http-favicon: Unknown favicon MD5: D41D8CD98F00B204E9800998ECF8427E
| http-title: Boolean
|_Requested resource was http://192.168.219.231/login
| fingerprint-strings:
| DNSStatusRequestTCP, DNSVersionBindReqTCP, DistCCD, GenericLines, Hello, Help, JavaRMI, Kerberos, LANDesk-RC, LDAPBindReq, LDAPSearchReq, LPDString, NCP, NessusTPv12, NotesRPC, RPCCheck, RTSPRequest, Radmin, SIPOptions, SMBProgNeg, SSLSessionReq, SSLv23SessionReq, TLSSessionReq, TerminalServer, TerminalServerCookie, X11Probe:
| HTTP/1.1 400 Bad Request
| FourOhFourRequest, GetRequest, HTTPOptions:
| HTTP/1.0 403 Forbidden
| Content-Type: text/html; charset=UTF-8
|_ Content-Length: 0
| http-methods:
|_ Supported Methods: GET HEAD POST OPTIONS
3000/tcp closed ppp reset ttl 61
33017/tcp open http syn-ack ttl 61 Apache httpd 2.4.38 ((Debian))
|_http-title: Development
| http-methods:
|_ Supported Methods: GET HEAD POST OPTIONS
|_http-server-header: Apache/2.4.38 (Debian)
Device type: general purpose|storage-misc|firewall
UDP?
Last updated