ip - 192.168.57.5

nmap

22/ ssh

80/ http

111/ rpcbind

139/ netbios-ssn

443/ https

apache server on 443 et 80

on first link

Untitled

repport

metasploit search

103 auxiliary/scanner/smb/smb_version

192.168.57.5:139 - SMB Detected (versions:) (preferred dialect:) (signatures:optional)

192.168.57.5:139 - Host could not be identified: Unix (Samba 2.2.1a)

mod_ssl/2.8.4 - mod_ssl 2.8.7 and lower are vulnerable to a remote buffer overflow which may allow a remote shell. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0082, OSVDB-756.

Generated by Webalizer Version 2.01. → http://192.168.57.5/usage/usage_200909.html

ssh OpenSSH 2.9p2 (protocol 1.99)


Potential Vulnerabilities

80/443 - https://www.exploit-db.com/exploits/764 : buffer overflow for mod_ssl 2.8.7 https://github.com/heltonWernik/OpenLuck

139 : smb

80: Webalizer

22 : ssh