![]() ![]() |_http-server-header: Apache/2.4.46 (Unix)ĩ008/tcp open java-object Java Object Serializationĩ009/tcp open ssh OpenSSH 7.6p1 Ubuntu 4ubuntu0.3 (Ubuntu Linux protocol 2. |_http-title: Site doesn't have a title (text/html charset=utf-8).ĩ007/tcp open http Apache httpd 2.4.46 ((Unix)) |_http-title: Did not follow redirect to Ĩ888/tcp open http Werkzeug httpd 1.0.1 (Python 3.8.5)ĩ000/tcp open http WEBrick httpd 1.6.0 (Ruby 2.7.0 ()) ![]() ![]() |_http-title: Site doesn't have a title (text/html charset=UTF-8).Ĩ101/tcp open http Apache httpd 2.4.38 ((Debian))Ĩ123/tcp open http WSGIServer 0.2 (Python 3.8.5)Ĩ200/tcp open http Apache httpd 2.4.38 ((Debian)) They usually use port numbers that match the services of the corresponding TCP or UDP implementation, if they exist. The Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP) only need one port duplex, bidirectional traffic. |_http-title: Site doesn't have a title (text/html).Ĩ092/tcp open http Apache httpd 2.4.38 ((Debian)) This is a list of TCP and UDP port numbers used by protocols for operation of network applications. |_http-server-header: Apache/2.4.38 (Debian) |_http-open-proxy: Proxy might be redirecting requests |_http-server-header: WSGIServer/0.2 CPython/3.8.5Ĩ080/tcp open http Apache httpd 2.4.38 ((Debian)) |_http-server-header: SimpleHTTP/0.6 Python/3.8.5Ħ868/tcp open http WSGIServer 0.2 (Python 3.8.5) | GenericLines, GetRequest, HTTPOptions, RTSPRequest:Ĥ545/tcp open http SimpleHTTPServer 0.6 (Python 3.8.5) Here, actually /sdcard is a symlink 1 to /storage/emulated/0 2Īfter inspecting how the PoC works, we can see that the poc.py is POSTing data/payload on port 59777. We can see the /sdcard is the starting directory, i.e. We run the poc.py from the Github repo on our target. The proof-of-concept is also listed on this post:ĮS File Explorer Open Port Vulnerability - CVE-2019-6447 The application starts an HTTP server every time the app is launched. ![]() This post explains how a vulnerability in ES File Explorer application exposes user data. Severity CVSS Version 3.x CVSS Version 2.0 CVSS 3. We search for android port 59777 and we get Android file manager app exposing user data through open port as 1st result. CVE-2020-25988 Detail Description UPNP Service listening on port 5555 in Genexis Platinum 4410 Router V2.1 (P4410-V21.34H) has an action 'XGetAccess' which leaks the credentials of 'admin', provided that the attacker is network adjacent. Hence open ports are: 59777, 42135, 2222, 5555įoothold # Open Port Vuln in popular app # # Nmap done at Sun Jul 4 11:16:39 2021 - 1 IP address (1 host up) scanned in 28.09 seconds If you know the service/version, please submit the following fingerprint at : , InfoSeek Personal Agent, HP OpenView Storage Data Protector (formerly HP OmniBack), McAfee EndPoint Encryption Database Server, SAP RainMachine automatic irrigation. # Nmap 7.80 scan initiated Sun Jul 4 11:16:11 2021 as: nmap -sC -sV -oN 10.10.10.247 10.10.10.247 Nmap scan report for 10.10.10.247Ģ222/tcp open ssh (protocol 2.0 ) | fingerprint-strings: Port(s) Protocol Service Details Source 5555 : tcp: ms-crm: SoftEther VPN (Ethernet over HTTPS) uses TCP Ports 443, 9 Port also used by Freeciv gaming protocol. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |