Members Login
Username 
 
Password 
    Remember Me  
Post Info TOPIC: Ports and Vulnerabilities


Senior Member

Status: Offline
Posts: 326
Date:
Ports and Vulnerabilities
Permalink Closed


9EEDDu.png

FTP

FTP (File Transfer Protocol) Turkish This service, which is a file transfer protocol, is used to transfer files to the server, as its name suggests. You may have used it in Windows tools such as Filezilla, a hostname, password and username are required, but in some cases anonymous may be open for some reasons and can be entered with anonymous:anonymous information, of course do not expect an authorized person, but sometimes it can be, but I have never seen it, only in ctfs. In the video, we did a bruteforce test, we detected the vulnerable application, we found its exploit, we ran this exploit in metasploit and I also used an exploit I found on github.

9EEDDu.png



SSH
SSH is actually a bit of a long topic because there is a lot to do with cracking id_rsa keys. I performed a bruteforce test in the video and got a shell. You usually can't be root the first time, but you can be www-data and with that you can increase your authority, which is a completely different topic, and you can be root. With SSH, you enter the system's command line, that is, we can say that entering the terminal where everything is done, i.e. ssh, means entering the site.

9EEDDu.png

Telnet
It is the same as Port 22 and performs the same functions. However,

9EEDDu.png

Samba
It is a file sharing port, this portused for networked printers, cameras, etc. The networks connected to this system

9EEDDu.png

Rlogin

9EEDDu.png

Java-rmi


9EEDDu.png

Backdoor
Do not expect this port to be open in real life, it is almost impossible. 

9EEDDu.png

MySQL
It is a database control port, which generally allows




9EEDDu.png

VNC


9EEDDu.png

IRC


9EEDDu.png

Tomcat
Tomcat, which is a web application that usually runs on port 8080, may have a vulnerability like this: we can find the default passwords and throw shells, of course we can find them with wordlists, but only if a good wordlist is prepared.
9EEDDu.png

All Ports : Source


__________________
Page 1 of 1  sorted by
 
Quick Reply

Please log in to post quick replies.

Tweet this page Post to Digg Post to Del.icio.us


Create your own FREE Forum
Report Abuse
Powered by ActiveBoard