Ports
TCP 21: FTP
Check for anonymous login
Check if the version is vulnerable to some exploit (highly unlikely)
TCP 22: SSH
You won't be able to interact with SSH initially. Try to find the password and username by enumerating other ports.
If you can only find the username then use that username and brute-force ssh login with hydra.
If you have read permissions on /root/.ssh, then copy the id_rsa (private key) to your machine. Give the permission as 600 and then ssh with it.
TCP 53: DNS
TCP 79: Sun Solaris fingerd
TCP 80 & 443
Directory Bruteforce
Nikto
Source Code
LFI/RFI
LOGIN- Weak Credentials, Default Login, SQLi, Bruteforce
Google(Searchsploit)- Application Name or any Keyword
TCP 110: POP3
UDP 116: SNMP
The default community string is "public" (You might get it from nmap scan)
TCP 139 & 445: SMB
TCP 389: LDAP
TCP 1433: MSSQL
TCP 1521
Oracle TNS listener 11.2.0.2.0
Step 1: Enumerate Oracle System ID.
It will give you a list of strings such as "XE,XEXDB"
Step 2: Enumerate valid credentials.
If accounts dir doesn't work then use oracle_default_userpass.txt
Step 3: Create reverse shell.
Step 4: Upload the shell to database.
If you get an error while uploading then check if user is given sysdba priv.
Step 5: Run the shell on target machine.
TCP 4555: JAMES Remote Admin
TCP 5984: CouchDB 1.6.0
TCP 6379: Redis key-value store 4.0.9
TCP 8067: irc
UnrealIRC
TCP 8080
Tomcat Login Page: 10.10.10.10/manager/html
Login to this page with credentials found. Then upload to war file to get a reverse shell
Apache Tomcat < 9.0.1 (Beta) / < 8.5.23 / < 8.0.47 / < 7.0.8 - JSP Upload Bypass / Remote Code Execution (1)
curl -X PUT http://IP:8080/shell.jsp/ -d @- < shell.jsp
Apache Tomcat < 9.0.1 (Beta) / < 8.5.23 / < 8.0.47 / < 7.0.8 - JSP Upload Bypass / Remote Code Execution (2)
python 42966.py -u http://IP:8080 -p pwn
TCP 9256: AChat
BoF exploit on eploitdb. Modify it to get shell
Last updated
Was this helpful?