Recon

$ nmap -p- --min-rate=1000 -Pn -v 192.168.165.61
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-08-16 16:39 CDT
Initiating Parallel DNS resolution of 1 host. at 16:39
Completed Parallel DNS resolution of 1 host. at 16:39, 0.02s elapsed
Initiating Connect Scan at 16:39
Scanning 192.168.165.61 [65535 ports]
Discovered open port 445/tcp on 192.168.165.61
Discovered open port 80/tcp on 192.168.165.61
Increasing send delay for 192.168.165.61 from 0 to 5 due to 11 out of 24 dropped probes since last increase.
Increasing send delay for 192.168.165.61 from 5 to 10 due to 25 out of 83 dropped probes since last increase.
Increasing send delay for 192.168.165.61 from 10 to 20 due to 16 out of 53 dropped probes since last increase.
Discovered open port 139/tcp on 192.168.165.61
Discovered open port 21/tcp on 192.168.165.61
Discovered open port 135/tcp on 192.168.165.61
Discovered open port 8081/tcp on 192.168.165.61
Discovered open port 49668/tcp on 192.168.165.61
Discovered open port 49669/tcp on 192.168.165.61
Connect Scan Timing: About 46.43% done; ETC: 16:41 (0:00:36 remaining)
Discovered open port 49664/tcp on 192.168.165.61
Discovered open port 49665/tcp on 192.168.165.61
Discovered open port 5040/tcp on 192.168.165.61
Discovered open port 49667/tcp on 192.168.165.61
Discovered open port 7680/tcp on 192.168.165.61
Discovered open port 49666/tcp on 192.168.165.61
Completed Connect Scan at 16:41, 65.77s elapsed (65535 total ports)
Nmap scan report for 192.168.165.61
Host is up (0.048s latency).
Not shown: 65521 closed tcp ports (conn-refused)
PORT      STATE SERVICE
21/tcp    open  ftp
80/tcp    open  http
135/tcp   open  msrpc
139/tcp   open  netbios-ssn
445/tcp   open  microsoft-ds
5040/tcp  open  unknown
7680/tcp  open  pando-pub
8081/tcp  open  blackice-icecap
49664/tcp open  unknown
49665/tcp open  unknown
49666/tcp open  unknown
49667/tcp open  unknown
49668/tcp open  unknown
49669/tcp open  unknown

Read data files from: /usr/bin/../share/nmap
Nmap done: 1 IP address (1 host up) scanned in 65.90 seconds
$ nmap -sC -sV -T5 --script=vuln -Pn -p 21,80,135,445,5040,7680,8081,49664-49669 192.168.165.61
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-08-16 16:56 CDT
Stats: 0:07:14 elapsed; 0 hosts completed (1 up), 1 undergoing Script Scan
NSE: Active NSE Script Threads: 1 (1 waiting)
NSE Timing: About 99.93% done; ETC: 17:04 (0:00:00 remaining)
Nmap scan report for 192.168.165.61
Host is up (0.045s latency).
Scanned at 2024-08-16 16:57:08 CDT for 427s

PORT      STATE  SERVICE       VERSION
21/tcp    open   ftp           Microsoft ftpd
80/tcp    open   http          Microsoft IIS httpd 10.0
|_http-dombased-xss: Couldn't find any DOM based XSS.
| http-phpmyadmin-dir-traversal: 
|   VULNERABLE:
|   phpMyAdmin grab_globals.lib.php subform Parameter Traversal Local File Inclusion
|     State: LIKELY VULNERABLE
|     IDs:  CVE:CVE-2005-3299
|       PHP file inclusion vulnerability in grab_globals.lib.php in phpMyAdmin 2.6.4 and 2.6.4-pl1 allows remote attackers to include local files via the $__redirect parameter, possibly involving the subform array.
|       
|     Disclosure date: 2005-10-nil
|     Extra information:
|       ../../../../../etc/passwd not found.
|   
|     References:
|       http://www.exploit-db.com/exploits/1244/
|_      https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3299
|_http-stored-xss: Couldn't find any stored XSS vulnerabilities.
|_http-server-header: Microsoft-IIS/10.0
|_http-majordomo2-dir-traversal: ERROR: Script execution failed (use -d to debug)
|_http-csrf: Couldn't find any CSRF vulnerabilities.
|_http-vuln-cve2017-1001000: ERROR: Script execution failed (use -d to debug)
135/tcp   open   msrpc         Microsoft Windows RPC
445/tcp   open   microsoft-ds?
5040/tcp  open   unknown
7680/tcp  closed pando-pub
8081/tcp  open   http          Jetty 9.4.18.v20190429
| vulners: 
|   Jetty 9.4.18.v20190429: 
|_    	CVE-2024-22201	7.5	https://vulners.com/cve/CVE-2024-22201
|_http-dombased-xss: Couldn't find any DOM based XSS.
| http-fileupload-exploiter: 
|   
|_    Couldn't find a file-type field.
|_http-stored-xss: Couldn't find any stored XSS vulnerabilities.
|_http-csrf: Couldn't find any CSRF vulnerabilities.
|_http-server-header: Nexus/3.21.0-05 (OSS)
| http-enum: 
|_  /robots.txt: Robots file
49664/tcp open   msrpc         Microsoft Windows RPC
49665/tcp open   msrpc         Microsoft Windows RPC
49666/tcp open   msrpc         Microsoft Windows RPC
49667/tcp open   msrpc         Microsoft Windows RPC
49668/tcp open   msrpc         Microsoft Windows RPC
49669/tcp open   msrpc         Microsoft Windows RPC
Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows

Host script results:
|_smb-vuln-ms10-054: false
|_samba-vuln-cve-2012-1182: Could not negotiate a connection:SMB: Failed to receive bytes: ERROR
|_smb-vuln-ms10-061: Could not negotiate a connection:SMB: Failed to receive bytes: ERROR
Final times for host: srtt: 44897 rttvar: 2894  to: 56473

NSE: Script Post-scanning.
NSE: Starting runlevel 1 (of 2) scan.
NSE: Starting runlevel 2 (of 2) scan.
Read from /usr/bin/../share/nmap: nmap-protocols nmap-service-probes nmap-services.
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 437.63 seconds

Last updated