ip - 192.168.57.5
nmap
22/ ssh
80/ http
111/ rpcbind
139/ netbios-ssn
443/ https
apache server on 443 et 80
on first link

metasploit search
103 auxiliary/scanner/smb/smb_version
192.168.57.5:139 - SMB Detected (versions:) (preferred dialect:) (signatures:optional)
192.168.57.5:139 - Host could not be identified: Unix (Samba 2.2.1a)
mod_ssl/2.8.4 - mod_ssl 2.8.7 and lower are vulnerable to a remote buffer overflow which may allow a remote shell. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0082, OSVDB-756.
Generated by Webalizer Version 2.01. → http://192.168.57.5/usage/usage_200909.html
ssh OpenSSH 2.9p2 (protocol 1.99)
80/443 - https://www.exploit-db.com/exploits/764 : buffer overflow for mod_ssl 2.8.7 https://github.com/heltonWernik/OpenLuck
139 : smb
80: Webalizer
22 : ssh