➡️ nmap - utility for network discovery and security auditing
nmap--help
# Scan everything and all ports, Output to all file typessudonmap-T4-p--A192.168.31.130-oAkioptrix# Stealth scanning everything and all portssudonmap-sS-T4-p--A192.168.31.130
Look for open sports and what is running on those ports
-Niktov2.5.0---------------------------------------------------------------------------+TargetIP:192.168.31.130+TargetHostname:192.168.31.130+TargetPort:80+StartTime:2024-07-0717:01:46 (GMT2)---------------------------------------------------------------------------+Server:Apache/1.3.20 (Unix) (Red-Hat/Linux) mod_ssl/2.8.4 OpenSSL/0.9.6b+ /: Server may leak inodes via ETags, header found with file /, inode: 34821, size: 2890, mtime: Thu Sep 6 05:12:46 2001. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-1418
+ /: The anti-clickjacking X-Frame-Options header is not present. See: https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/X-Frame-Options
+ /: The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type. See: https://www.netsparker.com/web-vulnerability-scanner/vulnerabilities/missing-content-type-header/
+ Apache/1.3.20 appears to be outdated (current is at least Apache/2.4.54). Apache 2.2.34 is the EOL for the 2.x branch.
+ OpenSSL/0.9.6b appears to be outdated (current is at least 3.0.7). OpenSSL 1.1.1s is current for the 1.x branch and will be supported until Nov 11 2023.
+mod_ssl/2.8.4appearstobeoutdated (current isatleast2.9.6) (maydependonserverversion).+ /: Apache is vulnerable to XSS via the Expect header. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3918
+Apache/1.3.20-Apache1.xup1.2.34arevulnerabletoaremoteDoSandpossiblecodeexecution.+ Apache/1.3.20 - Apache 1.3 below 1.3.27 are vulnerable to a local buffer overflow which allows attackers to kill any process on the system.
+Apache/1.3.20-Apache1.3below1.3.29arevulnerabletooverflowsinmod_rewriteandmod_cgi.+mod_ssl/2.8.4-mod_ssl2.8.7andlowerarevulnerabletoaremotebufferoverflowwhichmayallowaremoteshell.+OPTIONS:AllowedHTTPMethods:GET,HEAD,OPTIONS,TRACE.+ /: HTTP TRACE method is active which suggests the host is vulnerable to XST. See: https://owasp.org/www-community/attacks/Cross_Site_Tracing
+///etc/hosts:Theserverinstallallowsreadingofanysystemfilebyaddinganextra'/'totheURL.+ /usage/: Webalizer may be installed. Versions lower than 2.01-09 vulnerable to Cross Site Scripting (XSS). See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0835
+/manual/:Directoryindexingfound.+/manual/:Webservermanualfound.+/icons/:Directoryindexingfound.+/icons/README:Apachedefaultfilefound.See:https://www.vntweb.co.uk/apache-restricting-access-to-iconsreadme/+/test.php:Thismightbeinteresting.+/wp-content/themes/twentyeleven/images/headers/server.php?filesrc=/etc/hosts:APHPbackdoorfilemanagerwasfound.+ /wordpress/wp-content/themes/twentyeleven/images/headers/server.php?filesrc=/etc/hosts: A PHP backdoor file manager was found.
+/wp-includes/Requests/Utility/content-post.php?filesrc=/etc/hosts:APHPbackdoorfilemanagerwasfound.+/wordpress/wp-includes/Requests/Utility/content-post.php?filesrc=/etc/hosts:APHPbackdoorfilemanagerwasfound.+/wp-includes/js/tinymce/themes/modern/Meuhy.php?filesrc=/etc/hosts:APHPbackdoorfilemanagerwasfound.+/wordpress/wp-includes/js/tinymce/themes/modern/Meuhy.php?filesrc=/etc/hosts:APHPbackdoorfilemanagerwasfound.+/assets/mobirise/css/meta.php?filesrc=:APHPbackdoorfilemanagerwasfound.+/login.cgi?cli=aa%20aa%27cat%20/etc/hosts:SomeD-Linkrouterremotecommandexecution.+/shell?cat+/etc/hosts:Abackdoorwasidentified.+/#wp-config.php#:#wp-config.php# file found. This file contains the credentials.+8908requests:0error(s) and30item(s) reportedonremotehost+EndTime:2024-07-0717:05:49 (GMT2) (243seconds)---------------------------------------------------------------------------+1host(s) tested
dirbuster
➡️ dirbuster (GUI) - multi threaded java application designed to brute force directories and files names on web/application servers