Exploit
Host:
192.168.56.100
Nmap
PORT STATE SERVICE REASON VERSION
22/tcp open ssh syn-ack ttl 61 OpenSSH 7.9p1 Debian 10+deb10u2
80/tcp open http syn-ack ttl 61 nginx
| http-methods:
|_ Supported Methods: GET HEAD
|_http-title: Site doesn't have a title (text/html).
111/tcp open rpcbind syn-ack ttl 61 2-4 (RPC #100000)
| rpcinfo:
| program version port/proto service
| 100000 2,3,4 111/tcp rpcbind
| 100000 2,3,4 111/udp rpcbind
| 100003 3 2049/udp nfs
| 100003 3,4 2049/tcp nfs
| 100005 1,2,3 38921/tcp mountd
| 100005 1,2,3 53150/udp mountd
| 100021 1,3,4 37464/udp nlockmgr
| 100021 1,3,4 40685/tcp nlockmgr
| 100227 3 2049/tcp nfs_acl
|_ 100227 3 2049/udp nfs_acl
2049/tcp open nfs syn-ack ttl 61 3-4 (RPC #100003)
7742/tcp open http syn-ack ttl 61 nginx
| http-methods:
|_ Supported Methods: GET HEAD POST OPTIONS
|_http-title: SORCERER
8080/tcp open http syn-ack ttl 61 Apache Tomcat 7.0.4
|_http-title: Apache Tomcat/7.0.4
| http-methods:
|_ Supported Methods: GET HEAD POST OPTIONS
|_http-favicon: Apache Tomcat
|_http-open-proxy: Proxy might be redirecting requests
38921/tcp open mountd syn-ack ttl 61 1-3 (RPC #100005)
39103/tcp open mountd syn-ack ttl 61 1-3 (RPC #100005)
40685/tcp open nlockmgr syn-ack ttl 61 1-4 (RPC #100021)
54405/tcp open mountd syn-ack ttl 61 1-3 (RPC #100005)
UDP?
Could potentially use scp_wrapper.sh
Last updated