π‘solidstate
RSIP | POP3 | LEAK CREDENTIALS | rbash PRIV-ESC | COMMAND INJECTION IN PYTHON SCRIPT |
Recon & Enum
port scan
22/tcp open ssh
25/tcp open smtp
80/tcp open http
110/tcp open pop3
119/tcp open nntp
4555/tcp open rsipdirectory scan
/.html (Status: 403) [Size: 291]
/images (Status: 301) [Size: 311] [--> http://10.10.10.51/images/]
/index.html (Status: 200) [Size: 7776]
/services.html (Status: 200) [Size: 8404]
/about.html (Status: 200) [Size: 7183]
/assets (Status: 301) [Size: 311] [--> http://10.10.10.51/assets/]
/README.txt (Status: 200) [Size: 963]
/LICENSE.txt (Status: 200) [Size: 17128]
/.html (Status: 403) [Size: 291]
/server-status (Status: 403) [Size: 299]website
rsip
pop3
shell as mindy
privesc mindy => root
pspy32
Last updated