Port |
State
(toggle closed [0] | filtered [0])
|
Service |
Reason |
Product |
Version |
Extra info |
21 |
tcp |
open |
ftp |
syn-ack |
vsftpd |
2.3.4 |
|
|
ftp-anon |
Anonymous FTP login allowed (FTP code 230) |
22 |
tcp |
open |
ssh |
syn-ack |
OpenSSH |
4.7p1 Debian 8ubuntu1 |
protocol 2.0 |
|
ssh-hostkey |
1024 60:0f:cf:e1:c0:5f:6a:74:d6:90:24:fa:c4:d5:6c:cd (DSA)
2048 56:56:24:0f:21:1d:de:a7:2b:ae:61:b1:24:3d:e8:f3 (RSA) |
23 |
tcp |
open |
telnet |
syn-ack |
Linux telnetd |
|
|
25 |
tcp |
open |
smtp |
syn-ack |
Postfix smtpd |
|
|
|
ssl-cert |
Subject: commonName=ubuntu804-base.localdomain/organizationName=OCOSA/stateOrProvinceName=There is no such thing outside US/countryName=XX
Not valid before: 2010-03-17 14:07:45
Not valid after: 2010-04-16 14:07:45 |
|
smtp-commands |
metasploitable.localdomain, PIPELINING, SIZE 10240000, VRFY, ETRN, STARTTLS, ENHANCEDSTATUSCODES, 8BITMIME, DSN, |
|
smtp-enum-users |
Method RCPT returned a unhandled status code.
|
|
smtp-vuln-cve2010-4344 |
The SMTP server is not Exim: NOT VULNERABLE
|
|
smtp-open-relay |
Server doesn't seem to be an open relay, all tests failed |
53 |
tcp |
open |
domain |
syn-ack |
ISC BIND |
9.4.2 |
|
|
dns-nsid |
bind.version: 9.4.2
|
80 |
tcp |
open |
http |
syn-ack |
Apache httpd |
2.2.8 |
(Ubuntu) DAV/2 |
|
citrix-brute-xml |
FAILED: No domain specified (use ntdomain argument) |
|
http-google-malware |
[ERROR] No API key found. Update the variable APIKEY in http-google-malware or set it in the argument http-google-malware.api |
|
http-trace |
TRACE is enabled |
|
http-title |
Metasploitable2 - Linux |
|
http-vuln-cve2012-1823 |
VULNERABLE:
PHP-CGI Remote code execution and source code disclosure
State: VULNERABLE (Exploitable)
IDs: CVE:2012-1823
Description:
According to PHP's website, "PHP is a widely-used general-purpose
scripting language that is especially suited for Web development and
can be embedded into HTML." When PHP is used in a CGI-based setup
(such as Apache's mod_cgid), the php-cgi receives a processed query
string parameter as command line arguments which allows command-line
switches, such as -s, -d or -c to be passed to the php-cgi binary,
which can be exploited to disclose source code and obtain arbitrary
code execution.
Disclosure date: 2012-05-3
Extra information:
Proof of Concept:/index.php?-s
<code><span style="color: #000000">
<html><head><title>Metasploitable2 - Linux</title></head><body><br /><pre><br /><br /> _ _ _ _ _ _ ____ <br /> _ __ ___ ___| |_ __ _ ___ _ __ | | ___ (_) |_ __ _| |__ | | ___|___ \ <br />| '_ ` _ \ / _ \ __/ _` / __| '_ \| |/ _ \| | __/ _` | '_ \| |/ _ \ __) |<br />| | | | | | __/ || (_| \__ \ |_) | | (_) | | || (_| | |_) | | __// __/ <br />|_| |_| |_|\___|\__\__,_|___/ .__/|_|\___/|_|\__\__,_|_.__/|_|\___|_____|<br /> |_| <br /><br /><br />Warning: Never expose this VM to an untrusted network!<br /><br />Contact: msfdev[at]metasploit.com<br /><br />Login with msfadmin/msfadmin to get started<br /><br /><br /></pre><br /><ul><br /><li><a href="/twiki/">TWiki</a></li><br /><li><a href="/phpMyAdmin/">phpMyAdmin</a></li><br /><li><a href="/mutillidae/">Mutillidae</a></li><br /><li><a href="/dvwa/">DVWA</a></li><br /><li><a href="/dav/">WebDAV</a></li><br /></ul><br /></body><br /></html><br /><br /></span>
</code>
References:
http://eindbazen.net/2012/05/php-cgi-advisory-cve-2012-1823/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=2012-1823
http://ompldr.org/vZGxxaQ
|
|
http-methods |
No Allow or Public header in OPTIONS response (status code 200) |
|
http-domino-enum-passwords |
ERROR: No valid credentials were found (see domino-enum-passwords.username and domino-enum-passwords.password) |
|
http-enum |
/tikiwiki/: Tikiwiki
/test/: Test page
/phpMyAdmin/: phpMyAdmin
/doc/: Potentially interesting directory w/ listing on 'apache/2.2.8 (ubuntu) dav/2'
/icons/: Potentially interesting folder w/ directory listing
/index/: Potentially interesting folder
|
111 |
tcp |
open |
rpcbind |
syn-ack |
|
2 |
rpc #100000 |
|
rpcinfo |
program version port/proto service
100000 2 111/tcp rpcbind
100000 2 111/udp rpcbind
100003 2,3,4 2049/tcp nfs
100003 2,3,4 2049/udp nfs
100005 1,2,3 33649/udp mountd
100005 1,2,3 37000/tcp mountd
100021 1,3,4 44501/tcp nlockmgr
100021 1,3,4 58930/udp nlockmgr
100024 1 48701/udp status
100024 1 57176/tcp status
|
139 |
tcp |
open |
netbios-ssn |
syn-ack |
Samba smbd |
3.X |
workgroup: WORKGROUP |
445 |
tcp |
open |
netbios-ssn |
syn-ack |
Samba smbd |
3.X |
workgroup: WORKGROUP |
512 |
tcp |
open |
exec |
syn-ack |
netkit-rsh rexecd |
|
|
513 |
tcp |
open |
login |
syn-ack |
|
|
|
514 |
tcp |
open |
shell |
syn-ack |
|
|
|
1099 |
tcp |
open |
java-rmi |
syn-ack |
Java RMI Registry |
|
|
1524 |
tcp |
open |
ingreslock |
syn-ack |
|
|
|
2049 |
tcp |
open |
nfs |
syn-ack |
|
2-4 |
rpc #100003 |
2121 |
tcp |
open |
ftp |
syn-ack |
ProFTPD |
1.3.1 |
|
3306 |
tcp |
open |
mysql |
syn-ack |
MySQL |
5.0.51a-3ubuntu5 |
|
|
mysql-info |
Protocol: 10
Version: 5.0.51a-3ubuntu5
Thread ID: 15776
Some Capabilities: Connect with DB, Compress, SSL, Transactions, Secure Connection
Status: Autocommit
Salt: v9W+lc*E]'Hr'gURy.t!
|
|
mysql-empty-password |
root account has empty password
|
|
mysql-users |
debian-sys-maint
guest
root
|
5432 |
tcp |
open |
postgresql |
syn-ack |
PostgreSQL DB |
8.3.0 - 8.3.7 |
|
5900 |
tcp |
open |
vnc |
syn-ack |
VNC |
|
protocol 3.3 |
|
vnc-info |
Protocol version: 3.3
Security types:
Unknown security type (33554432)
|
6000 |
tcp |
open |
X11 |
syn-ack |
|
|
access denied |
6667 |
tcp |
open |
irc |
syn-ack |
Unreal ircd |
|
|
|
irc-unrealircd-backdoor |
Looks like trojaned version of unrealircd. See http://seclists.org/fulldisclosure/2010/Jun/277 |
|
irc-info |
Server: irc.Metasploitable.LAN
Version: Unreal3.2.8.1. irc.Metasploitable.LAN
Lservers/Lusers: 0/1
Uptime: 1 days, 8:50:46
Source host: AF59FDED.97684684.FFFA6D49.IP
Source ident: OK nmap
|
8009 |
tcp |
open |
ajp13 |
syn-ack |
Apache Jserv |
|
Protocol v1.3 |
8180 |
tcp |
open |
http |
syn-ack |
Apache Tomcat/Coyote JSP engine |
1.1 |
|
|
http-google-malware |
[ERROR] No API key found. Update the variable APIKEY in http-google-malware or set it in the argument http-google-malware.api |
|
http-favicon |
Apache Tomcat |
|
http-title |
Apache Tomcat/5.5 |
|
http-domino-enum-passwords |
ERROR: No valid credentials were found (see domino-enum-passwords.username and domino-enum-passwords.password) |
|
http-default-accounts |
[Apache Tomcat] credentials found -> tomcat:tomcat Path:/manager/html/ |
|
http-methods |
No Allow or Public header in OPTIONS response (status code 200) |
|
http-enum |
/admin/: Possible admin folder
/admin/index.html: Possible admin folder
/admin/login.html: Possible admin folder
/admin/admin.html: Possible admin folder
/admin/account.html: Possible admin folder
/admin/admin_login.html: Possible admin folder
/admin/home.html: Possible admin folder
/admin/admin-login.html: Possible admin folder
/admin/adminLogin.html: Possible admin folder
/admin/controlpanel.html: Possible admin folder
/admin/cp.html: Possible admin folder
/admin/index.jsp: Possible admin folder
/admin/login.jsp: Possible admin folder
/admin/admin.jsp: Possible admin folder
/admin/home.jsp: Possible admin folder
/admin/controlpanel.jsp: Possible admin folder
/admin/admin-login.jsp: Possible admin folder
/admin/cp.jsp: Possible admin folder
/admin/account.jsp: Possible admin folder
/admin/admin_login.jsp: Possible admin folder
/admin/adminLogin.jsp: Possible admin folder
/manager/html/upload: Apache Tomcat (401 Unauthorized)
/manager/html: Apache Tomcat (401 Unauthorized)
/admin/view/javascript/fckeditor/editor/filemanager/connectors/test.html: OpenCart/FCKeditor File upload
/admin/includes/FCKeditor/editor/filemanager/upload/test.html: ASP Simple Blog / FCKeditor File Upload
/admin/jscript/upload.html: Lizard Cart/Remote File upload
/webdav/: Potentially interesting folder
|
44501 |
tcp |
open |
nlockmgr |
syn-ack |
|
1-4 |
rpc #100021 |
Script Name |
Output |
smb-os-discovery |
OS: Unix (Samba 3.0.20-Debian)
NetBIOS computer name:
Workgroup: WORKGROUP
System time: 2012-08-16 23:15:40 UTC-4
|
nbstat |
NetBIOS name: METASPLOITABLE, NetBIOS user: <unknown>, NetBIOS MAC: <unknown> |
smb-enum-users |
Domain: METASPLOITABLE; Users: backup, bin, bind, daemon, dhcp, distccd, ftp, games, gnats, irc, klog, libuuid, list, lp, mail, man, msfadmin, mysql, news, nobody, postfix, postgres, proftpd, proxy, root, service, sshd, sync, sys, syslog, telnetd, tomcat55, user, uucp, www-data
|