Scanning and Enumeration
Scanning
root@kali:~# nmap -sC -sV -p21,80 10.10.10.5
Starting Nmap 7.91 ( https://nmap.org ) at 2020-11-19 22:23 EST
Nmap scan report for 10.10.10.5
Host is up (0.079s latency).
PORT STATE SERVICE VERSION
21/tcp open ftp Microsoft ftpd
| ftp-anon: Anonymous FTP login allowed (FTP code 230)
| 03-18-17 01:06AM <DIR> aspnet_client
| 11-23-20 01:25PM 38650 example.aspx
| 03-17-17 04:37PM 689 iisstart.htm
| 11-23-20 01:23PM 17 test.txt
| 11-23-20 01:21PM 38559 welcome.aspx
|_03-17-17 04:37PM 184946 welcome.png
| ftp-syst:
|_ SYST: Windows_NT
80/tcp open http Microsoft IIS httpd 7.5
| http-methods:
|_ Potentially risky methods: TRACE
|_http-server-header: Microsoft-IIS/7.5
|_http-title: IIS7
Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 9.60 seconds
Appears that we have anonymous FTP and Microsoft IIS httpd 7.5 running.
Enumeration
Port 21
Anonymous login, this means that we can upload and download files. Knowing this we can upload a malicious file and establish a reverse shell.
Port 80
Microsoft IIS httpd 7.5 is running
Based on the files on port 21, we can access them, based on this information is very likley that we can put a reverse shell to us.
Last updated
Was this helpful?