Nmap - результат скана

Discussion in 'Песочница' started by disbeliever, 14 Aug 2013.

  1. disbeliever

    disbeliever New Member

    Joined:
    22 Jan 2010
    Messages:
    7
    Likes Received:
    2
    Reputations:
    5
    Сканирую определенный сервер Nmap'ом и вот результат. В какой порт ломиться проще всего? Информации в интернете много, но какой путь проще понять не могу. Судя по всему все упирается в Fortigate файрвол.

    Также там показаны ключи SSH. Они мне как то могут помочь?

    Code:
    Starting Nmap 6.25 ( [url]http://nmap.org[/url] ) at 2013-08-13 13:00 UTC Nmap scan report for lin9.nictr.com (93.187.204.153) Host is up (0.0023s latency). Not shown: 982 closed ports PORT     STATE SERVICE               VERSION 21/tcp   open  ftp                   ProFTPD 1.3.3c 22/tcp   open  ssh                   OpenSSH 4.3 (protocol 2.0) | ssh-hostkey: 1024 b8:a4:15:73:00:b2:e8:c1:19:9d:1f:a6:3d:8e:d7:ce (DSA) |_2048 67:fe:74:41:06:a2:b6:ab:8f:d7:3e:12:3e:2e:68:9c (RSA) 25/tcp   open  smtp                  Exim smtpd 4.77 | smtp-commands: lin9.nictr.com Hello lin9.nictr.com [82.222.164.91], SIZE 20971520, PIPELINING, AUTH PLAIN LOGIN, STARTTLS, HELP,  |_ Commands supported: AUTH STARTTLS HELO EHLO MAIL RCPT DATA NOOP QUIT RSET HELP  |_ssl-cert: ERROR: Script execution failed (use -d to debug) |_ssl-date: 2013-08-13T12:54:16+00:00; -8m27s from local time. 53/tcp   open  domain                ISC BIND 9.3.6-20.P1.el5_8.5 | dns-nsid:  |_  bind.version: 9.3.6-P1-RedHat-9.3.6-20.P1.el5_8.5 80/tcp   open  http                  Apache httpd 2 |_http-title: Site doesn't have a title (text/html). 110/tcp  open  pop3                  Dovecot DirectAdmin pop3d |_pop3-capabilities: SASL(PLAIN) USER STLS RESP-CODES CAPA UIDL 111/tcp  open  rpcbind               2 (RPC #100000) | rpcinfo:  |   program version   port/proto  service |   100000  2            111/tcp  rpcbind |   100000  2            111/udp  rpcbind |   100024  1            915/udp  status |_  100024  1            918/tcp  status 119/tcp  open  tcpwrapped 143/tcp  open  imap                  Dovecot imapd |_imap-capabilities: ENABLE IMAP4rev1 more have Pre-login SASL-IR post-login listed capabilities LITERAL+ ID OK AUTH=PLAINA0001 STARTTLS LOGIN-REFERRALS IDLE 443/tcp  open  ssl/http              Apache httpd 2 |_http-title: Site doesn't have a title (text/html). |_ssl-cert: ERROR: Script execution failed (use -d to debug) |_ssl-date: 2013-08-13T12:54:14+00:00; -8m26s from local time. 465/tcp  open  ssl/smtps? |_smtp-commands: Couldn't establish connection on port 465 |_ssl-date: 2013-08-13T13:02:46+00:00; +4s from local time. 587/tcp  open  smtp                  Exim smtpd 4.77 | smtp-commands: lin9.nictr.com Hello lin9.nictr.com [82.222.164.91], SIZE 20971520, PIPELINING, AUTH PLAIN LOGIN, STARTTLS, HELP,  |_ Commands supported: AUTH STARTTLS HELO EHLO MAIL RCPT DATA NOOP QUIT RSET HELP  |_ssl-cert: ERROR: Script execution failed (use -d to debug) |_ssl-date: 2013-08-13T12:54:15+00:00; -8m27s from local time. 993/tcp  open  ssl/imaps? |_ssl-date: 2013-08-13T13:02:44+00:00; +3s from local time. 995/tcp  open  pop3s? |_ssl-date: 2013-08-13T13:02:44+00:00; +3s from local time. 2222/tcp open  hbase-master          Apache Hadoop Hbase 1.43.0 (Registered to Nictr Internet Tescil) | flume-master-info:  |   Flume nodes: |   Zookeeper Master: |   Hbase Master Master: |   Enviroment:  |_  Config:  |_http-git: 0 |_http-methods: No Allow or Public header in OPTIONS response (status code 404) |_http-title: DirectAdmin Login 3306/tcp open  mysql                 MySQL (unauthorized) 8008/tcp open  http? |_http-methods: No Allow or Public header in OPTIONS response (status code 302) |_http-title: Did not follow redirect to [url]https://lin9.nictr.com:8010/[/url] 8010/tcp open  ssl/hadoop-jobtracker Apache Hadoop | flume-master-info:  |   Flume nodes: |   Zookeeper Master: |   Hbase Master Master: |   Enviroment:  |_  Config:  |_http-git: 0 |_http-methods: No Allow or Public header in OPTIONS response (status code 200) |_http-title: Web Filter Block Override | ssl-cert: Subject: commonName=Fortigate/organizationName=Fortinet/stateOrProvinceName=California/countryName=US | Not valid before: 2006-01-27T19:44:14+00:00 |_Not valid after:  2026-03-13T19:44:14+00:00 |_ssl-date: 2013-08-13T13:02:44+00:00; +3s from local time. |_sslv2: server still supports SSLv2 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at [url]http://www.insecure.org/cgi-bin/servicefp-submit.cgi[/url] : SF-Port8008-TCP:V=6.25%I=7%D=8/13%Time=520A2E00%P=i686-pc-linux-gnu%r(GetR SF:equest,43,"HTTP/1\.1\x20302\x20Found\r\nLocation:\x20https://:8010/\r\n SF:Connection:\x20close\r\n\r\n")%r(FourOhFourRequest,66,"HTTP/1\.1\x20302 SF:\x20Found\r\nLocation:\x20https://:8010/nice%20ports%2C/Tri%6Eity\.txt% SF:2ebak\r\nConnection:\x20close\r\n\r\n")%r(GenericLines,42,"HTTP/1\.1\x2 SF:0302\x20Found\r\nLocation:\x20https://:8010\r\nConnection:\x20close\r\n SF:\r\n")%r(HTTPOptions,42,"HTTP/1\.1\x20302\x20Found\r\nLocation:\x20http SF:s://:8010\r\nConnection:\x20close\r\n\r\n")%r(RTSPRequest,42,"HTTP/1\.1 SF:\x20302\x20Found\r\nLocation:\x20https://:8010\r\nConnection:\x20close\ SF:r\n\r\n")%r(SIPOptions,42,"HTTP/1\.1\x20302\x20Found\r\nLocation:\x20ht SF:tps://:8010\r\nConnection:\x20close\r\n\r\n"); Aggressive OS guesses: Linux 2.6.15 - 2.6.26 (95%), Linux 2.6.18 (95%), Netgear ReadyNAS Duo NAS device (RAIDiator 4.1.4) (95%), Vyatta router (Linux 2.6.26) (94%), Linux 2.6.28 (94%), Lexmark Z2400 printer (93%), Linux 2.6.16 - 2.6.28 (91%), Linux 3.2 (91%), Linux 3.2.0 (90%), Cisco Unified Communications Manager VoIP adapter (90%) No exact OS matches for host (test conditions non-ideal). Network Distance: 1 hop Service Info: OSs: Unix, Red Hat Enterprise Linux; Device: firewall; CPE: cpe:/o:redhat:enterprise_linux  TRACEROUTE (using port 113/tcp) HOP RTT     ADDRESS 1   0.33 ms lin9.nictr.com (93.187.204.153)  OS and Service detection performed. Please report any incorrect results at [url]http://nmap.org/submit/[/url] . Nmap done: 1 IP address (1 host up) scanned in 152.10 seconds
     
    #1 disbeliever, 14 Aug 2013
    Last edited: 14 Aug 2013
  2. RoksHD

    RoksHD New Member

    Joined:
    28 May 2012
    Messages:
    36
    Likes Received:
    3
    Reputations:
    2
    Версия ProFTPD 1.3.3c возможно уязвима. В metasploit есть эксплойт под него. Если прокатит, то получишь root удаленно. Удачи!

    http://www.exploit-db.com/exploits/16921/
     
  3. disbeliever

    disbeliever New Member

    Joined:
    22 Jan 2010
    Messages:
    7
    Likes Received:
    2
    Reputations:
    5
    Спасибо. Только эксплоит обрывается на "Sending Backdoor Command" . Как я понял проблема с локальным IP и портом 4444.

    Локальный хост это мой компьютер. То есть в модеме должен быть открыт порт 4444 и перенаправлен на мой локальный адрес (192.168.*.*) да?
     
  4. RoksHD

    RoksHD New Member

    Joined:
    28 May 2012
    Messages:
    36
    Likes Received:
    3
    Reputations:
    2
    Думаю, что да.
     
Loading...
Similar Threads - Nmap результат скана
  1. Dobi768
    Replies:
    2
    Views:
    2,407