Recon
$ nmap -p- --min-rate=1000 -Pn 192.168.151.50 -v
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-08-14 06:04 CDT
Initiating Parallel DNS resolution of 1 host. at 06:04
Completed Parallel DNS resolution of 1 host. at 06:04, 0.02s elapsed
Initiating Connect Scan at 06:04
Scanning 192.168.151.50 [65535 ports]
Discovered open port 21/tcp on 192.168.151.50
Discovered open port 22/tcp on 192.168.151.50
Discovered open port 80/tcp on 192.168.151.50
Completed Connect Scan at 06:05, 24.81s elapsed (65535 total ports)
Nmap scan report for 192.168.151.50
Host is up (0.051s latency).
Not shown: 65532 closed tcp ports (conn-refused)
PORT STATE SERVICE
21/tcp open ftp
22/tcp open ssh
80/tcp open http
Read data files from: /usr/bin/../share/nmap
Nmap done: 1 IP address (1 host up) scanned in 24.94 seconds
$ nmap -p 21,22,80 -sC -sV -T5 -Pn 192.168.151.50
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-08-14 06:06 CDT
Nmap scan report for 192.168.151.50
Host is up (0.054s latency).
PORT STATE SERVICE VERSION
21/tcp open ftp vsftpd 3.0.3
| ftp-syst:
| STAT:
| FTP server status:
| Connected to ::ffff:192.168.45.204
| Logged in as ftp
| TYPE: ASCII
| No session bandwidth limit
| Session timeout in seconds is 300
| Control connection is plain text
| Data connections will be plain text
| At session startup, client count was 4
| vsFTPd 3.0.3 - secure, fast, stable
|_End of status
|_ftp-anon: Anonymous FTP login allowed (FTP code 230)
22/tcp open ssh OpenSSH 7.2p2 Ubuntu 4ubuntu2.1 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey:
| 2048 08:ee:e3:ff:31:20:87:6c:12:e7:1c:aa:c4:e7:54:f2 (RSA)
| 256 ad:e1:1c:7d:e7:86:76:be:9a:a8:bd:b9:68:92:77:87 (ECDSA)
|_ 256 0c:e1:eb:06:0c:5c:b5:cc:1b:d1:fa:56:06:22:31:67 (ED25519)
80/tcp open http Apache httpd 2.4.18 ((Ubuntu))
|_http-server-header: Apache/2.4.18 (Ubuntu)
| http-robots.txt: 1 disallowed entry
|_Hackers
|_http-title: Site doesn't have a title (text/html).
Service Info: OSs: Unix, Linux; CPE: cpe:/o:linux:linux_kernel
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 8.78 seconds
Last updated