Dataset Viewer
Auto-converted to Parquet
instruction
stringlengths
39
233
input
stringclasses
1 value
output
stringlengths
56
213
Host is up (0.0010s latency). PORT STATE SERVICE 80/tcp open http 443/tcp open https
nikto -h http://192.168.1.10 dirb http://192.168.1.10 wpscan --url https://192.168.1.10 --enumerate p
Host is up (0.0025s latency). PORT STATE SERVICE 21/tcp open ftp 22/tcp open ssh 3306/tcp open mysql
hydra -l root -P /path/to/wordlist.txt ssh://192.168.1.20 nmap --script=ftp-anon.nse -p 21 192.168.1.20 mysql -h 192.168.1.20 -u root -p
Host is up (0.0030s latency). PORT STATE SERVICE VERSION 80/tcp open http Apache httpd 2.4.29 443/tcp open https Apache httpd 2.4.29 8080/tcp open http-proxy Squid http proxy 3.5.27
nikto -h http://192.168.1.30 gobuster dir -u http://192.168.1.30 -w /path/to/wordlist.txt nmap --script=http-headers -p 80,443 192.168.1.30
Host is up (0.0012s latency). PORT STATE SERVICE 443/tcp open https
openssl s_client -connect 192.168.1.40:443 nikto -h https://192.168.1.40 nmap --script ssl-enum-ciphers -p 443 192.168.1.40
Host is up (0.0025s latency). PORT STATE SERVICE 53/tcp open domain
dnsrecon -d example.com -t axfr -n 192.168.1.50 nmap --script=dns-zone-transfer -p 53 192.168.1.50 dig @192.168.1.50 example.com AXFR
Host is up (0.0012s latency). PORT STATE SERVICE 21/tcp open ftp 22/tcp open ssh 80/tcp open http
hydra -l admin -P /path/to/wordlist.txt ftp://192.168.1.60 nmap --script ssh-brute -p 22 192.168.1.60 nikto -h http://192.168.1.60
Host is up (0.0031s latency). PORT STATE SERVICE 8080/tcp open http-proxy 8000/tcp open http-alt
gobuster dir -u http://192.168.1.70:8080 -w /path/to/wordlist.txt nmap --script=http-vuln-cve2014-0160 -p 8080 192.168.1.70 dirb http://192.168.1.70:8000
Host is up (0.0042s latency). PORT STATE SERVICE 1433/tcp open ms-sql-s
nmap --script=ms-sql-info -p 1433 192.168.1.80 sqlmap -u "http://192.168.1.80" --dbs hydra -l sa -P /path/to/wordlist.txt mssql://192.168.1.80
PORT STATE SERVICE 22/tcp open ssh 80/tcp open http
ssh user@<IPアドレス> curl http://<IPアドレス> gobuster dir -u http://<IPアドレス> -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt
PORT STATE SERVICE 445/tcp open microsoft-ds
smbclient -L //<IPアドレス>/ enum4linux <IPアドレス> crackmapexec smb <IPアドレス>
PORT STATE SERVICE 21/tcp open ftp
ftp <IPアドレス> hydra -l anonymous -P /usr/share/wordlists/rockyou.txt ftp://<IPアドレス> nmap --script ftp-anon.nse -p21 <IPアドレス>
PORT STATE SERVICE 3306/tcp open mysql
mysql -h <IPアドレス> -u root -p nmap --script mysql-enum.nse -p3306 <IPアドレス> hydra -l root -P /usr/share/wordlists/rockyou.txt mysql://<IPアドレス>
PORT STATE SERVICE 25/tcp open smtp
telnet <IPアドレス> 25 smtp-user-enum -M VRFY -U /usr/share/wordlists/usernames.txt -t <IPアドレス> msfconsole -q -x "use auxiliary/scanner/smtp/smtp_enum; set RHOSTS <IPアドレス>; run"
PORT STATE SERVICE 53/tcp open domain
dig @<IPアドレス> example.com axfr dnsrecon -d example.com -t axfr host example.com <IPアドレス>
PORT STATE SERVICE 3389/tcp open ms-wbt-server
rdesktop <IPアドレス> xfreerdp /v:<IPアドレス> /opt/impacket/examples/rpcdump.py <IPアドレス>
PORT STATE SERVICE 139/tcp open netbios-ssn 445/tcp open microsoft-ds
smbclient //10.10.10.5/share enum4linux <IPアドレス> crackmapexec smb <IPアドレス>
PORT STATE SERVICE VERSION 80/tcp open http Apache httpd 2.4.41 ((Ubuntu)) 443/tcp open ssl/http Apache httpd 2.4.41 ((Ubuntu))
nikto -h http://<IPアドレス> gobuster dir -u http://<IPアドレス> -w /usr/share/wordlists/dirbuster/directory-list-medium.txt sslscan https://<IPアドレス>]
PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 7.6p1 Ubuntu (Ubuntu Linux; protocol 2.0) 80/tcp open http Apache httpd 2.4.29 ((Ubuntu))
ssh user@<IPアドレス> curl http://<IPアドレス> gobuster dir -u http://<IPアドレス> -w /usr/share/wordlists/dirbuster/directory-list-medium.txt
PORT STATE SERVICE VERSION 21/tcp open ftp vsftpd 3.0.3 80/tcp open http Apache httpd 2.4.29 ((Ubuntu)) 443/tcp open ssl/http Apache httpd 2.4.29 ((Ubuntu))
ftp <IPアドレス> nikto -h https://<IPアドレス> gobuster dir -u https://<IPアドレス> -w /usr/share/wordlists/dirbuster/directory-list-medium.txt
PORT STATE SERVICE VERSION 23/tcp open telnet Linux telnetd 80/tcp open http Apache httpd 2.4.41 ((Ubuntu)) 443/tcp open ssl/http Apache httpd 2.4.41 ((Ubuntu))
telnet <IPアドレス> nikto -h https://<IPアドレス> gobuster dir -u https://<IPアドレス> -w /usr/share/wordlists/dirbuster/directory-list-medium.txt
PORT STATE SERVICE VERSION 5000/tcp open upnp Portable SDK for UPnP devices (Linux) 80/tcp open http Apache httpd 2.4.41 ((Ubuntu)) 443/tcp open ssl/http Apache httpd 2.4.41 ((Ubuntu))
curl http://<IPアドレス>:5000 nikto -h https://<IPアドレス>:5000 gobuster dir -u https://<IPアドレス>:5000 -w /usr/share/wordlists/dirbuster/directory-list-medium.txt
PORT STATE SERVICE VERSION 8080/tcp open http-proxy Squid http proxy 80/tcp open http Apache httpd 443/tcp open ssl/http Apache httpd
curl --proxy <IP>:8080 http://example.com gobuster dir --proxy <IP>:8080 --url=http://example.com nikto --proxy=http://<ip>:8080 --host=http://example.com
PORT STATE SERVICE VERSION 111/tcp open rpcbind 2049/tcp open nfs_acl 80/tcp open http 443/tcp open ssl/http
showmount -e <ip> /opt/impacket/examples/rpcdump.py <ip>
PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 8.4p1 Debian (protocol 2.0) 80/tcp open http Apache httpd 2.4.41 ((Ubuntu))
ssh user@<IPアドレス> curl http://<IPアドレス> gobuster dir -u http://<IPアドレス> -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt
PORT STATE SERVICE VERSION 445/tcp open microsoft-ds Windows XP microsoft-ds 139/tcp open netbios-ssn Microsoft Windows netbios-ssn
smbclient -L //<IPアドレス>/ enum4linux <IPアドレス> msfconsole -q -x "use exploit/windows/smb/ms08_067_netapi; set RHOSTS <IPアドレス>; run"
PORT STATE SERVICE VERSION 3306/tcp open mysql MySQL 5.7.29
mysql -h <IPアドレス> -u root -p nmap --script mysql-enum.nse -p3306 <IPアドレス> hydra -l root -P /usr/share/wordlists/rockyou.txt mysql://<IPアドレス>
PORT STATE SERVICE VERSION 21/tcp open ftp vsftpd 3.0.3
ftp <IPアドレス> nmap --script ftp-anon.nse -p21 <IPアドレス> hydra -l anonymous -P /usr/share/wordlists/rockyou.txt ftp://<IPアドレス>
PORT STATE SERVICE VERSION 25/tcp open smtp Postfix smtpd
telnet <IPアドレス> 25 smtp-user-enum -M VRFY -U /usr/share/wordlists/usernames.txt -t <IPアドレス> nmap --script smtp-enum-users.nse -p25 <IPアドレス>
PORT STATE SERVICE VERSION 53/tcp open domain ISC BIND 9.11.3-1ubuntu1.13 (Ubuntu Linux)
dig axfr @<IPアドレス> example.com dnsrecon -d example.com -t axfr host example.com <IPアドレス>
PORT STATE SERVICE VERSION 3389/tcp open ms-wbt-server Microsoft Terminal Services
rdesktop <IPアドレス> xfreerdp /v:<IPアドレス> /opt/impacket/examples/rpcdump.py <IPアドレス>
PORT STATE SERVICE VERSION 8080/tcp open http-proxy Squid http proxy 80/tcp open http Apache httpd 443/tcp open ssl/http Apache httpd
curl --proxy <IP>:8080 http://example.com gobuster dir --proxy <IP>:8080 --url=http://example.com nikto --proxy=http://<ip>:8080 --host=http://example.com
PORT STATE SERVICE VERSION 5000/tcp open http Werkzeug httpd 0.16.1 (Python 3.8) 80/tcp open http Apache httpd 443/tcp open ssl/http Apache httpd
curl http://<IPアドレス>:5000 nikto -h https://<IPアドレス>:5000 gobuster dir -u https://<IPアドレス>:5000 -w /usr/share/wordlists/dirbuster/directory-list-medium.txt
PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 7.2p2 Ubuntu (protocol 2.0) 80/tcp open http Apache httpd 443/tcp open ssl/http Apache httpd 2222/tcp open ssh OpenSSH (protocol 2.0)
ssh user@<IPアドレス> -p2222 curl https://<IPアドレス> gobuster dir -u https://<IPアドレス> -w /usr/share/wordlists/dirbuster/directory-list-medium.txt
PORT STATE SERVICE VERSION 111/tcp open rpcbind 2049/tcp open nfs_acl 80/tcp open http 443/tcp open ssl/http
showmount -e <ip> /opt/impacket/examples/rpcdump.py <ip> nmap --script nfs-ls,nfs-statfs,nfs-showmount.nse -p2049 <ip>
PORT STATE SERVICE VERSION 23/tcp open telnet Linux telnetd 80/tcp open http Apache httpd 443/tcp open ssl/http Apache httpd
telnet <IPアドレス> nikto -h https://<IPアドレス> gobuster dir -u https://<IPアドレス> -w /usr/share/wordlists/dirbuster/directory-list-medium.txt
PORT STATE SERVICE VERSION 21/tcp open ftp vsftpd 3.0.3 80/tcp open http Apache httpd 443/tcp open ssl/http Apache httpd 22/tcp open ssh OpenSSH (protocol 2.0)
ftp <IPアドレス> nikto -h https://<IPアドレス> gobuster dir -u https://<IPアドレス> -w /usr/share/wordlists/dirbuster/directory-list-medium.txt
PORT STATE SERVICE VERSION 135/tcp open msrpc Microsoft Windows RPC 139/tcp open netbios Microsoft Windows netbios 445/tcp open smb Microsoft Windows SMB
smbclient //10.x.x.x/share enum4linux <ip address> /opt/impacket/examples/smbclient.py <ip address>
PORT STATE SERVICE VERSION 3306/tcp open mysql MySQL v5.x.x 80/tcp open http Apache httpd 443/tcp open ssl/http Apache httpd 22/tcp open ssh OpenSSH (protocol v2)
/opt/impacket/examples/mysqlclient.py root:<password>@<ip address>
PORT STATE SERVICE VERSION 80/tcp open http Apache httpd 2.4.41 ((Ubuntu)) 22/tcp open ssh OpenSSH 7.6p1 Ubuntu (Ubuntu Linux; protocol 2.0)
curl http://<IPアドレス> gobuster dir -u http://<IPアドレス> -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt ssh user@<IPアドレス>
PORT STATE SERVICE VERSION 21/tcp open ftp vsftpd 3.0.3 80/tcp open http Apache httpd 2.4.29 ((Ubuntu))
ftp <IPアドレス> nikto -h http://<IPアドレス> gobuster dir -u http://<IPアドレス> -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt
PORT STATE SERVICE VERSION 139/tcp open netbios-ssn Microsoft Windows netbios-ssn 445/tcp open microsoft-ds Windows XP microsoft-ds
smbclient -L //<IPアドレス>/ enum4linux <IPアドレス> crackmapexec smb <IPアドレス>
PORT STATE SERVICE VERSION 3306/tcp open mysql MySQL 5.7.29 80/tcp open http Apache httpd 2.4.41 ((Ubuntu))
mysql -h <IPアドレス> -u root -p nmap --script mysql-enum.nse -p3306 <IPアドレス> hydra -l root -P /usr/share/wordlists/rockyou.txt mysql://<IPアドレス>
PORT STATE SERVICE VERSION 25/tcp open smtp Postfix smtpd 80/tcp open http Apache httpd
telnet <IPアドレス> 25 smtp-user-enum -M VRFY -U /usr/share/wordlists/usernames.txt -t <IPアドレス> nmap --script smtp-enum-users.nse -p25 <IPアドレス>
PORT STATE SERVICE VERSION 53/tcp open domain ISC BIND 9.11.3 (Ubuntu Linux) 80/tcp open http Apache httpd
dig axfr @<IPアドレス> example.com dnsrecon -d example.com -t axfr host example.com <IPアドレス>
PORT STATE SERVICE VERSION 3389/tcp open ms-wbt-server Microsoft Terminal Services 80/tcp open http Apache httpd 443/tcp open ssl/http Apache httpd
rdesktop <IPアドレス> xfreerdp /v:<IPアドレス> /opt/impacket/examples/rpcdump.py <IPアドレス>
PORT STATE SERVICE VERSION 8080/tcp open http-proxy Squid http proxy 80/tcp open http Apache httpd 443/tcp open ssl/http Apache httpd
curl --proxy <IP>:8080 http://example.com gobuster dir --proxy <IP>:8080 --url=http://example.com nikto --proxy=http://<ip>:8080 --host=http://example.com
PORT STATE SERVICE VERSION 5000/tcp open Werkzeug Python web server (Flask) 80/tcp open Apache HTTPD 443/tcp open ssl/http Apache HTTPD
curl http://<IPアドレス>:5000 nikto -h https://<IPアドレス>:5000 gobuster dir -u https://<IPアドレス>:5000 -w /usr/share/wordlists/dirbuster/directory-list-medium.txt
PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH (protocol v2) 80/tcp open http Apache HTTPD 443/tcp open ssl/http Apache HTTPD 2222/tcp open ssh OpenSSH (protocol v2)
ssh user@<IPアドレス> -p2222 curl https://<IPアドレス> gobuster dir -u https://<IPアドレス> -w /usr/share/wordlists/dirbuster/directory-list-medium.txt
PORT STATE SERVICE VERSION 111/tcp open rpcbind 2049/tcp open nfs_acl 80/tcp open http 443/tcp open ssl/http
showmount -e <ip> /opt/impacket/examples/rpcdump.py <ip> nmap --script nfs-ls,nfs-statfs,nfs-showmount.nse -p2049 <ip>
PORT STATE SERVICE VERSION 23/tcp open telnet Linux telnetd 80/tcp open http Apache HTTPD 443/tcp open ssl/http Apache HTTPD 22/tcp open ssh OpenSSH (protocol v2)
telnet <IPアドレス> nikto -h https://<IPアドレス> gobuster dir -u https://<IPアドレス> -w /usr/share/wordlists/dirbuster/directory-list-medium.txt
PORT STATE SERVICE VERSION 21/tcp open ftp vsftpd v3.x.x 80/tcp open http Apache HTTPD 443/tcp open ssl/http Apache HTTPD 22/tcp open ssh OpenSSH (protocol v2)
ftp <IPアドレス> nikto -h https://<IPアドレス> gobuster dir -u https://<IPアドレス> -w /usr/share/wordlists/dirbuster/directory-list-medium.txt
PORT STATE SERVICE VERSION 135/tcp open msrpc Microsoft Windows RPC 139/tcp open netbios Microsoft Windows netbios 445/tcp open smb Microsoft Windows SMB
/opt/impacket/examples/smbclient.py //10.x.x.x/share /opt/impacket/examples/rpcdump.py @10.x.x.x /opt/impacket/examples/smbexec.py [email protected]
PORT STATE SERVICE VERSION 3306/tcp open mysql MySQL v5.x.x 80/tcp open http Apache HTTPD 443/tcp open ssl/http Apache HTTPD 22/tcp open ssh OpenSSH (protocol v2)
/opt/impacket/examples/smbclient.py //10.x.x.x/share /opt/impacket/examples/rpcdump.py @10.x.x.x /opt/impacket/examples/smbexec.py [email protected]
PORT STATE SERVICE VERSION 80/tcp open http Apache httpd 2.4.41 ((Ubuntu)) 22/tcp open ssh OpenSSH 7.6p1 Ubuntu (Ubuntu Linux; protocol 2.0)
curl http://<IPアドレス> gobuster dir -u http://<IPアドレス> -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt ssh user@<IPアドレス>
PORT STATE SERVICE VERSION 21/tcp open ftp vsftpd 3.0.3 80/tcp open http Apache httpd 2.4.29 ((Ubuntu))
ftp <IPアドレス> nikto -h http://<IPアドレス> gobuster dir -u http://<IPアドレス> -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt
PORT STATE SERVICE VERSION 139/tcp open netbios-ssn Microsoft Windows netbios-ssn 445/tcp open microsoft-ds Windows XP microsoft-ds
smbclient -L //<IPアドレス>/ enum4linux <IPアドレス> crackmapexec smb <IPアドレス>
PORT STATE SERVICE VERSION 3306/tcp open mysql MySQL 5.7.29 80/tcp open http Apache httpd 2.4.41 ((Ubuntu))
mysql -h <IPアドレス> -u root -p nmap --script mysql-enum.nse -p3306 <IPアドレス> hydra -l root -P /usr/share/wordlists/rockyou.txt mysql://<IPアドレス>
PORT STATE SERVICE VERSION 25/tcp open smtp Postfix smtpd 80/tcp open http Apache httpd
telnet <IPアドレス> 25 smtp-user-enum -M VRFY -U /usr/share/wordlists/usernames.txt -t <IPアドレス> nmap --script smtp-enum-users.nse -p25 <IPアドレス>
PORT STATE SERVICE VERSION 53/tcp open domain ISC BIND 9.11.3 (Ubuntu Linux) 80/tcp open http Apache httpd
dig axfr @<IPアドレス> example.com dnsrecon -d example.com -t axfr host example.com <IPアドレス>
PORT STATE SERVICE VERSION 3389/tcp open ms-wbt-server Microsoft Terminal Services 80/tcp open http Apache httpd 443/tcp open ssl/http Apache httpd
rdesktop <IPアドレス> xfreerdp /v:<IPアドレス> /opt/impacket/examples/rpcdump.py <IPアドレス>
PORT STATE SERVICE VERSION 8080/tcp open http-proxy Squid http proxy 80/tcp open http Apache httpd 443/tcp open ssl/http Apache httpd
curl --proxy <IP>:8080 http://example.com gobuster dir --proxy <IP>:8080 --url=http://example.com nikto --proxy=http://<ip>:8080 --host=http://example.com
PORT STATE SERVICE VERSION 5000/tcp open Werkzeug Python web server (Flask) 80/tcp open Apache HTTPD 443/tcp open ssl/http Apache HTTPD
curl http://<IPアドレス>:5000 nikto -h https://<IPアドレス>:5000 gobuster dir -u https://<IPアドレス>:5000 -w /usr/share/wordlists/dirbuster/directory-list-medium.txt
PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH (protocol v2) 80/tcp open http Apache HTTPD 443/tcp open ssl/http Apache HTTPD 2222/tcp open ssh OpenSSH (protocol v2)
ssh user@<IPアドレス> -p2222 curl https://<IPアドレス> gobuster dir -u https://<IPアドレス> -w /usr/share/wordlists/dirbuster/directory-list-medium.txt
PORT STATE SERVICE VERSION 111/tcp open rpcbind 2049/tcp open nfs_acl 80/tcp open http 443/tcp open ssl/http
showmount -e <ip> /opt/impacket/examples/rpcdump.py <ip> nmap --script nfs-ls,nfs-statfs,nfs-showmount.nse -p2049 <ip>
PORT STATE SERVICE VERSION 23/tcp open telnet Linux telnetd 80/tcp open http Apache HTTPD 443/tcp open ssl/http Apache HTTPD 22/tcp open ssh OpenSSH (protocol v2)
telnet <IPアドレス> nikto -h https://<IPアドレス> gobuster dir -u https://<IPアドレス> -w /usr/share/wordlists/dirbuster/directory-list-medium.txt
PORT STATE SERVICE VERSION 21/tcp open ftp vsftpd v3.x.x 80/tcp open http Apache HTTPD 443/tcp open ssl/http Apache HTTPD 22/tcp open ssh OpenSSH (protocol v2)
ftp <IPアドレス> nikto -h https://<IPアドレス> gobuster dir -u https://<IPアドレス> -w /usr/share/wordlists/dirbuster/directory-list-medium.txt
PORT STATE SERVICE VERSION 135/tcp open msrpc Microsoft Windows RPC 139/tcp open netbios Microsoft Windows netbios 445/tcp open smb Microsoft Windows SMB
/opt/impacket/examples/smbclient.py //10.x.x.x/share /opt/impacket/examples/rpcdump.py @10.x.x.x /opt/impacket/examples/smbexec.py [email protected]
PORT STATE SERVICE VERSION 3306/tcp open mysql MySQL v5.x.x 80/tcp open http Apache HTTPD 443/tcp open ssl/http Apache HTTPD 22/tcp open ssh OpenSSH (protocol v2)
/opt/impacket/examples/smbclient.py //10.x.x.x/share /opt/impacket/examples/rpcdump.py @10.x.x.x /opt/impacket/examples/smbexec.py [email protected]
Host is up (0.0034s latency). PORT STATE SERVICE VERSION 21/tcp open ftp vsftpd 2.3.4 | ftp-vsftpd-backdoor: | Backdoor exists, send the command `USER anonymous`. | Backdoor confirmed, exit with command `QUIT`.
hydra -l anonymous -P /path/to/wordlist.txt ftp://10.10.10.20 searchsploit vsftpd 2.3.4 nmap --script=ftp-vsftpd-backdoor -p 21 10.10.10.20
Host is up (0.0022s latency). PORT STATE SERVICE VERSION 21/tcp open ftp vsftpd 2.3.4 22/tcp open ssh OpenSSH 4.7p1 Debian 8ubuntu1 80/tcp open http Apache httpd 2.2.8 ... OS details: Linux 2.6.24 - 2.6.33
searchsploit metasploitable 2 nmap --script=smb-vuln-ms17-010 -p 445 10.10.10.30 hydra -l root -P /path/to/wordlist.txt ssh://10.10.10.30
Host is up (0.0010s latency). PORT STATE SERVICE 8443/tcp open https | ssl-cert: Subject: commonName=Unifi Controller |_ Issuer: commonName=Unifi
nikto -h https://10.10.10.40:8443 searchsploit unifi controller gobuster dir -u https://10.10.10.40:8443 -w /path/to/wordlist.txt
Host is up (0.0012s latency). PORT STATE SERVICE VERSION 21/tcp open ftp ProFTPD 1.3.5
hydra -l anonymous -P /path/to/wordlist.txt ftp://10.10.10.50 searchsploit proftpd 1.3.5 nmap --script=ftp-bounce -p 21 10.10.10.50
Host is up (0.0034s latency). PORT STATE SERVICE VERSION 3389/tcp open ms-wbt-server | rdp-vuln-ms12-020: | VULNERABLE: RDP vulnerability CVE-2012-020 | State: VULNERABLE ... OS details: Microsoft Windows Server 2008 R2
msfconsole -q -x "use exploit/windows/rdp/ms12_020_maxchannelids; set RHOST 10.10.10.60; run" nmap --script=smb-vuln-ms17-010 -p 445 10.10.10.60 hydra -l Administrator -P /path/to/wordlist.txt rdp://10.10.10.60
Host is up (0.0021s latency). PORT STATE SERVICE 88/tcp open kerberos-sec 139/tcp open netbios-ssn 445/tcp open microsoft-ds OS details: Microsoft Windows Server 2012 R2
nmap --script=smb-os-fingerprint -p 445 10.10.10.70 crackmapexec smb 10.10.10.70 -u 'user' -p 'password' hydra -l user -P /path/to/wordlist.txt rdp://10.10.10.70
Host is up (0.0010s latency). PORT STATE SERVICE VERSION 139/tcp open netbios-ssn 445/tcp open microsoft-ds OS details: Microsoft Windows XP SP2
nmap --script=smb-vuln-ms17-010 -p 445 10.10.10.80 searchsploit ms08-067 hydra -l Administrator -P /path/to/wordlist.txt smb://10.10.10.80
Host is up (0.0022s latency). PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 7.6p1 Ubuntu 4ubuntu0.3 80/tcp open http Apache httpd 2.4.29 OS details: Linux 4.15 - 5.0
nmap --script=ssh-brute -p 22 10.10.10.90 nikto -h http://10.10.10.90 gobuster dir -u http://10.10.10.90 -w /path/to/wordlist.txt
Host is up (0.0031s latency). PORT STATE SERVICE VERSION 80/tcp open http Apache httpd 2.4.49 | http-methods: |_ Supported Methods: GET POST OPTIONS
nmap --script=http-vuln-cve2017-5638 -p 80 10.10.10.100 nikto -h http://10.10.10.100 gobuster dir -u http://10.10.10.100 -w /path/to/wordlist.txt
Host is up (0.0022s latency). PORT STATE SERVICE 21/tcp open ftp | ftp-vsftpd-backdoor: | Backdoor exists, send the command `USER anonymous`. | Backdoor confirmed, exit with command `QUIT`.
hydra -l anonymous -P /path/to/wordlist.txt ftp://10.10.10.130 nmap --script=ftp-vsftpd-backdoor -p 21 10.10.10.130 searchsploit vsftpd 2.3.4
Host is up (0.0013s latency). PORT STATE SERVICE VERSION 3389/tcp open ms-wbt-server | rdp-vuln-ms12-020: | VULNERABLE: RDP vulnerability CVE-2012-020 | State: VULNERABLE ... OS details: Microsoft Windows Server 2008 R2
msfconsole -q -x "use exploit/windows/rdp/ms12_020_maxchannelids; set RHOST 10.10.10.140; run" nmap --script=smb-vuln-ms17-010 -p 445 10.10.10.140 hydra -l Administrator -P /path/to/wordlist.txt rdp://10.10.10.140
Host is up (0.0012s latency). PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 7.6p1 Debian 4ubuntu0.3
hydra -l user -P /path/to/wordlist.txt ssh://10.10.10.150 nmap --script=ssh-brute -p 22 10.10.10.150 searchsploit openssh 7.6
Host is up (0.0021s latency). PORT STATE SERVICE VERSION 80/tcp open http Apache httpd 2.4.29 | http-methods: |_ Supported Methods: GET POST OPTIONS
nmap --script=http-vuln-cve2017-5638 -p 80 10.10.10.160 nikto -h http://10.10.10.160 gobuster dir -u http://10.10.10.160 -w /path/to/wordlist.txt
Host is up (0.0010s latency). PORT STATE SERVICE VERSION 3306/tcp open mysql MySQL 5.5.60-0+deb8u1
nmap --script=mysql-info -p 3306 10.10.10.170 mysql -u root -h 10.10.10.170 -p # パスワードがわかる場合 searchsploit mysql 5.5.60
Host is up (0.0021s latency). PORT STATE SERVICE VERSION 445/tcp open microsoft-ds OS details: Microsoft Windows 10 Home Edition
nmap --script=smb-vuln-ms17-010 -p 445 10.10.10.180 smbclient -L //10.10.10.180 -U user hydra -l user -P /path/to/wordlist.txt smb://10.10.10.180
Host is up (0.0023s latency). PORT STATE SERVICE VERSION 8080/tcp open http Apache Tomcat 8.5.29
nmap --script=http-tomcat-users -p 8080 10.10.10.190 searchsploit apache tomcat 8.5.29 gobuster dir -u http://10.10.10.190:8080 -w /path/to/wordlist.txt
Host is up (0.0010s latency). PORT STATE SERVICE VERSION 27017/tcp open mongodb 3.4.10
nmap --script=mongodb-databases -p 27017 10.10.10.200 mongo 10.10.10.200 --port 27017 searchsploit mongodb 3.4.10
Host is up (0.0022s latency). PORT STATE SERVICE VERSION 1194/tcp open openvpn OpenVPN 2.4.7
nmap --script=openvpn-version -p 1194 10.10.10.210 searchsploit openvpn 2.4.7 hydra -l user -P /path/to/wordlist.txt openvpn://10.10.10.210
Host is up (0.0012s latency). PORT STATE SERVICE 8443/tcp open https | ssl-cert: Subject: commonName=Unifi Controller |_ Issuer: commonName=Unifi
nikto -h https://10.10.10.220:8443 gobuster dir -u https://10.10.10.220:8443 -w /path/to/wordlist.txt searchsploit unifi controller
Host is up (0.0011s latency). PORT STATE SERVICE 22/tcp open ssh OpenSSH 7.4 80/tcp open http Apache httpd 2.4.18
gobuster dir -u http://10.10.10.230 -w /path/to/wordlist.txt searchsploit apache 2.4.18 hydra -l root -P /path/to/wordlist.txt ssh://10.10.10.230
Host is up (0.0010s latency). PORT STATE SERVICE 445/tcp open microsoft-ds 139/tcp open netbios-ssn
responder -I eth0 # ネットワーク上でのLLMNR/NBNS/MDNSポイズニング nmap --script=smb-vuln-ms17-010 -p 445 10.10.10.240 smbclient -L //10.10.10.240 -U guest
Host is up (0.0012s latency). PORT STATE SERVICE VERSION 80/tcp open http Apache httpd 2.4.25
nikto -h http://10.10.10.250 searchsploit apache 2.4.25 gobuster dir -u http://10.10.10.250 -w /path/to/wordlist.txt
Host is up (0.0010s latency). PORT STATE SERVICE VERSION 3306/tcp open mysql MySQL 5.7.31-0ubuntu0.18.04.1
nmap --script=mysql-info -p 3306 10.10.10.260 mysql -u root -h 10.10.10.260 -p # パスワードがわかる場合 searchsploit mysql 5.7.31
Host is up (0.0013s latency). PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 7.6p1 Ubuntu 4ubuntu0.3 80/tcp open http Apache httpd 2.4.29 OS details: Linux 4.15 - 5.0
nmap --script=ssh-brute -p 22 10.10.10.270 nikto -h http://10.10.10.270 gobuster dir -u http://10.10.10.270 -w /path/to/wordlist.txt
Host is up (0.0012s latency). PORT STATE SERVICE VERSION 8080/tcp open http Jenkins 2.150.1
nmap --script=jenkins-version -p 8080 10.10.10.280 searchsploit jenkins 2.150.1 gobuster dir -u http://10.10.10.280:8080 -w /path/to/wordlist.txt
Host is up (0.0022s latency). PORT STATE SERVICE VERSION 6379/tcp open redis Redis 4.0.14
nmap --script=redis-info -p 6379 10.10.10.290 redis-cli -h 10.10.10.290 searchsploit redis 4.0.14
Host is up (0.0012s latency). PORT STATE SERVICE VERSION 1194/tcp open openvpn OpenVPN 2.4.7
nmap --script=openvpn-version -p 1194 10.10.10.300 searchsploit openvpn 2.4.7 hydra -l user -P /path/to/wordlist.txt openvpn://10.10.10.300
Host is up (0.0031s latency). PORT STATE SERVICE VERSION 80/tcp open http Apache httpd 2.4.38 | http-title: WordPress |_ HTTP/1.1 200 OK
wpscan --url http://10.10.10.310 --enumerate u searchsploit wordpress gobuster dir -u http://10.10.10.310 -w /path/to/wordlist.txt
Host is up (0.0023s latency). PORT STATE SERVICE VERSION 80/tcp open http Nginx 1.17.9
nikto -h http://10.10.10.320 searchsploit nginx 1.17.9 gobuster dir -u http://10.10.10.320 -w /path/to/wordlist.txt
Host is up (0.0010s latency). PORT STATE SERVICE VERSION 5432/tcp open postgresql PostgreSQL 9.6.10
nmap --script=pgsql-info -p 5432 10.10.10.330 psql -h 10.10.10.330 -U postgres searchsploit postgresql 9.6.10
Host is up (0.0011s latency). PORT STATE SERVICE VERSION 21/tcp open ftp ProFTPD 1.3.5
hydra -l anonymous -P /path/to/wordlist.txt ftp://10.10.10.340 nmap --script=ftp-proftpd-backdoor -p 21 10.10.10.340 searchsploit proftpd 1.3.5
Host is up (0.0022s latency). PORT STATE SERVICE VERSION 27017/tcp open mongodb MongoDB 4.0.10
nmap --script=mongodb-databases -p 27017 10.10.10.350 mongo 10.10.10.350 --port 27017 searchsploit mongodb 4.0.10
End of preview. Expand in Data Studio

No dataset card yet

Downloads last month
1