Base
RECONOCIMIENTO
nmap -p- -n -vvv -sSVC -Pn --open --min-rate 5000 192.168.153.55 -oN escaneo.txt# Nmap 7.94SVN scan initiated Tue Sep 17 18:09:11 2024 as: nmap -p- -n -vvv -sSVC -Pn --open --min-rate 5000 -oN escaneo.txt 192.168.153.55
Nmap scan report for 192.168.153.55
Host is up, received arp-response (0.0026s latency).
Scanned at 2024-09-17 18:09:12 -03 for 10s
Not shown: 65532 closed tcp ports (reset)
PORT STATE SERVICE REASON VERSION
22/tcp open ssh syn-ack ttl 64 OpenSSH 9.2p1 Debian 2+deb12u3 (protocol 2.0)
| ssh-hostkey:
| 256 c8:5f:17:62:8c:26:0a:7b:b2:c6:07:33:31:64:84:30 (ECDSA)
| ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBPc+sW2rJ9spBEuudmTE24Jhc7h4M+q77B8rG7d1f/L4H1Yc5TfhsQgYpm9JkS1liOTn8pBNyt2RZgjE3KdDDAU=
| 256 e3:92:58:d8:50:ac:00:5a:49:02:d7:e9:33:18:47:8c (ED25519)
|_ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIO0KQXb6whCSXP4pzCxG0CRwQ0Z9OGz4zu9PHRMS5498
80/tcp open http syn-ack ttl 64 Apache httpd 2.4.62 ((Debian))
|_http-favicon: Unknown favicon MD5: 315957B26C1BD8805590E36985990754
|_http-generator: FlatPress fp-1.2.1
|_http-title: FlatPress
| http-methods:
|_ Supported Methods: GET HEAD POST OPTIONS
|_http-server-header: Apache/2.4.62 (Debian)
8080/tcp open http syn-ack ttl 64 Apache httpd 2.4.62 ((Debian))
|_http-title: Search Page
|_http-open-proxy: Proxy might be redirecting requests
| http-methods:
|_ Supported Methods: GET HEAD POST OPTIONS
|_http-server-header: Apache/2.4.62 (Debian)
MAC Address: 08:00:27:C5:86:BC (Oracle VirtualBox virtual NIC)
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
Read data files from: /usr/bin/../share/nmap
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Tue Sep 17 18:09:23 2024 -- 1 IP address (1 host up) scanned in 11.51 seconds


INTRUSION
ESCALADA DE PRIVIEGIOS
www-data
Pedro
Flate

Última actualización