➡️ nmap - utility for network discovery and security auditing
nmap--help
# Scan everything and all ports, Output to all file typessudonmap-T4-p--A192.168.31.130-oAkioptrix# Stealth scanning everything and all portssudonmap-sS-T4-p--A192.168.31.130
Look for open sports and what is running on those ports
-Niktov2.5.0---------------------------------------------------------------------------+TargetIP:192.168.31.130+TargetHostname:192.168.31.130+TargetPort:80+StartTime:2024-07-0717:01:46 (GMT2)---------------------------------------------------------------------------+Server:Apache/1.3.20 (Unix) (Red-Hat/Linux) mod_ssl/2.8.4 OpenSSL/0.9.6b+/:ServermayleakinodesviaETags,headerfoundwithfile/,inode:34821,size:2890,mtime:ThuSep605:12:462001.See:http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-1418+/:Theanti-clickjackingX-Frame-Optionsheaderisnotpresent.See:https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/X-Frame-Options+/:TheX-Content-Type-Optionsheaderisnotset.ThiscouldallowtheuseragenttorenderthecontentofthesiteinadifferentfashiontotheMIMEtype.See:https://www.netsparker.com/web-vulnerability-scanner/vulnerabilities/missing-content-type-header/+Apache/1.3.20appearstobeoutdated (current isatleastApache/2.4.54). Apache 2.2.34 is the EOL for the 2.x branch.+OpenSSL/0.9.6bappearstobeoutdated (current isatleast3.0.7). OpenSSL 1.1.1s is current for the 1.x branch and will be supported until Nov 11 2023.+mod_ssl/2.8.4appearstobeoutdated (current isatleast2.9.6) (maydependonserverversion).+/:ApacheisvulnerabletoXSSviatheExpectheader.See:http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3918+Apache/1.3.20-Apache1.xup1.2.34arevulnerabletoaremoteDoSandpossiblecodeexecution.+Apache/1.3.20-Apache1.3below1.3.27arevulnerabletoalocalbufferoverflowwhichallowsattackerstokillanyprocessonthesystem.+Apache/1.3.20-Apache1.3below1.3.29arevulnerabletooverflowsinmod_rewriteandmod_cgi.+mod_ssl/2.8.4-mod_ssl2.8.7andlowerarevulnerabletoaremotebufferoverflowwhichmayallowaremoteshell.+OPTIONS:AllowedHTTPMethods:GET,HEAD,OPTIONS,TRACE.+/:HTTPTRACEmethodisactivewhichsuggeststhehostisvulnerabletoXST.See:https://owasp.org/www-community/attacks/Cross_Site_Tracing+///etc/hosts:Theserverinstallallowsreadingofanysystemfilebyaddinganextra'/'totheURL.+/usage/:Webalizermaybeinstalled.Versionslowerthan2.01-09vulnerabletoCrossSiteScripting (XSS). See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0835+/manual/:Directoryindexingfound.+/manual/:Webservermanualfound.+/icons/:Directoryindexingfound.+/icons/README:Apachedefaultfilefound.See:https://www.vntweb.co.uk/apache-restricting-access-to-iconsreadme/+/test.php:Thismightbeinteresting.+/wp-content/themes/twentyeleven/images/headers/server.php?filesrc=/etc/hosts:APHPbackdoorfilemanagerwasfound.+/wordpress/wp-content/themes/twentyeleven/images/headers/server.php?filesrc=/etc/hosts:APHPbackdoorfilemanagerwasfound.+/wp-includes/Requests/Utility/content-post.php?filesrc=/etc/hosts:APHPbackdoorfilemanagerwasfound.+/wordpress/wp-includes/Requests/Utility/content-post.php?filesrc=/etc/hosts:APHPbackdoorfilemanagerwasfound.+/wp-includes/js/tinymce/themes/modern/Meuhy.php?filesrc=/etc/hosts:APHPbackdoorfilemanagerwasfound.+/wordpress/wp-includes/js/tinymce/themes/modern/Meuhy.php?filesrc=/etc/hosts:APHPbackdoorfilemanagerwasfound.+/assets/mobirise/css/meta.php?filesrc=:APHPbackdoorfilemanagerwasfound.+/login.cgi?cli=aa%20aa%27cat%20/etc/hosts:SomeD-Linkrouterremotecommandexecution.+/shell?cat+/etc/hosts:Abackdoorwasidentified.+/#wp-config.php#:#wp-config.php# file found. This file contains the credentials.+8908requests:0error(s) and30item(s) reportedonremotehost+EndTime:2024-07-0717:05:49 (GMT2) (243seconds)---------------------------------------------------------------------------+1host(s) tested
dirbuster
➡️ dirbuster (GUI) - multi threaded java application designed to brute force directories and files names on web/application servers