Last active
January 4, 2021 07:58
-
-
Save milo2012/96ab77e05714915ea22f8c214f838aac to your computer and use it in GitHub Desktop.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
$ sudo python msfHelper1.py nmap__190723_132536.xml | |
[*] Launching Metasploit msfrpcd | |
[*] Reading from msfHelper.db | |
[*] Loaded 474 URI paths from msfHelper.db | |
[*] Loaded 2982 modules from Metasploit | |
[List of Unique Service Banners] | |
-------- ---------------------------------------------------------------------------- | |
21/tcp vsftpd version: 2.3.4 ostype: Unix | |
2049/tcp version: 2-4 extrainfo: RPC #100003 | |
512/tcp netkit-rsh rexecd ostype: Linux | |
6000/tcp extrainfo: access denied | |
3632/tcp distccd version: v1 extrainfo: (GNU) 4.2.4 (Ubuntu 4.2.4-1ubuntu4) | |
5900/tcp VNC extrainfo: protocol 3.3 | |
6667/tcp UnrealIRCd hostname: irc.Metasploitable.LAN | |
139/tcp Samba smbd version: 3.X - 4.X extrainfo: workgroup: WORKGROUP | |
445/tcp Samba smbd version: 3.X - 4.X extrainfo: workgroup: WORKGROUP | |
8787/tcp Ruby DRb RMI extrainfo: Ruby 1.8; path /usr/lib/ruby/1.8/drb | |
5432/tcp PostgreSQL DB version: 8.3.0 - 8.3.7 | |
25/tcp Postfix smtpd hostname: metasploitable.localdomain | |
22/tcp OpenSSH version: 4.7p1 Debian 8ubuntu1 extrainfo: protocol 2.0 ostype: Linux | |
3306/tcp MySQL version: 5.0.51a-3ubuntu5 | |
23/tcp Linux telnetd ostype: Linux | |
53/tcp ISC BIND version: 9.4.2 | |
1099/tcp GNU Classpath grmiregistry hostname: localhost | |
80/tcp Apache httpd version: 2.2.8 extrainfo: (Ubuntu) DAV/2 | |
-------- ---------------------------------------------------------------------------- | |
[Matching Ports with Metasploit] | |
+---------------------+--------------------------------------------------------------------------+ | |
| Targets | Metasploit Module | | |
+=====================+==========================================================================+ | |
| 172.16.164.218:512 | auxiliary/scanner/rservices/rexec_login | | |
+---------------------+--------------------------------------------------------------------------+ | |
| 172.16.164.218:513 | auxiliary/scanner/rservices/rlogin_login | | |
+---------------------+--------------------------------------------------------------------------+ | |
| 172.16.164.218:514 | auxiliary/scanner/rservices/rsh_login | | |
| | exploit/windows/misc/windows_rsh | | |
+---------------------+--------------------------------------------------------------------------+ | |
| 172.16.164.218:1099 | auxiliary/gather/java_rmi_registry | | |
| | auxiliary/scanner/misc/java_jmx_server | | |
| | auxiliary/scanner/misc/java_rmi_server | | |
| | exploit/linux/misc/opennms_java_serialize | | |
| | exploit/multi/misc/java_rmi_server | | |
+---------------------+--------------------------------------------------------------------------+ | |
| 172.16.164.218:6667 | exploit/multi/misc/legend_bot_exec | | |
| | exploit/multi/misc/pbot_exec | | |
| | exploit/multi/misc/ra1nx_pubcall_exec | | |
| | exploit/multi/misc/w3tw0rk_exec | | |
| | exploit/multi/misc/xdh_x_exec | | |
| | exploit/unix/irc/unreal_ircd_3281_backdoor | | |
+---------------------+--------------------------------------------------------------------------+ | |
| 172.16.164.218:2049 | exploit/windows/nfs/xlink_nfsd | | |
+---------------------+--------------------------------------------------------------------------+ | |
| 172.16.164.218:3306 | auxiliary/scanner/mysql/mysql_authbypass_hashdump | | |
| | auxiliary/scanner/mysql/mysql_file_enum | | |
| | auxiliary/scanner/mysql/mysql_hashdump | | |
| | auxiliary/scanner/mysql/mysql_login | | |
| | auxiliary/scanner/mysql/mysql_schemadump | | |
| | auxiliary/scanner/mysql/mysql_version | | |
| | auxiliary/scanner/mysql/mysql_writable_dirs | | |
| | exploit/linux/mysql/mysql_yassl_getname | | |
| | exploit/linux/mysql/mysql_yassl_hello | | |
| | exploit/multi/mysql/mysql_udf_payload | | |
| | exploit/windows/mysql/mysql_mof | | |
| | exploit/windows/mysql/mysql_start_up | | |
| | exploit/windows/mysql/mysql_yassl_hello | | |
+---------------------+--------------------------------------------------------------------------+ | |
| 172.16.164.218:139 | exploit/freebsd/samba/trans2open | | |
| | exploit/linux/samba/chain_reply | | |
| | exploit/linux/samba/trans2open | | |
| | exploit/multi/ids/snort_dce_rpc | | |
| | exploit/multi/samba/nttrans | | |
| | exploit/multi/samba/usermap_script | | |
| | exploit/osx/samba/trans2open | | |
| | exploit/solaris/samba/trans2open | | |
+---------------------+--------------------------------------------------------------------------+ | |
| 172.16.164.218:5900 | auxiliary/scanner/vnc/ard_root_pw | | |
| | auxiliary/scanner/vnc/vnc_login | | |
| | auxiliary/scanner/vnc/vnc_none_auth | | |
| | exploit/multi/vnc/vnc_keyboard_exec | | |
+---------------------+--------------------------------------------------------------------------+ | |
| 172.16.164.218:111 | auxiliary/gather/nis_bootparamd_domain | | |
| | auxiliary/gather/nis_ypserv_map | | |
| | auxiliary/scanner/misc/sunrpc_portmapper | | |
| | auxiliary/scanner/nfs/nfsmount | | |
| | auxiliary/scanner/portmap/portmap_amp | | |
| | exploit/aix/rpc_cmsd_opcode21 | | |
| | exploit/aix/rpc_ttdbserverd_realpath | | |
| | exploit/netware/sunrpc/pkernel_callit | | |
| | exploit/solaris/sunrpc/sadmind_adm_build_path | | |
| | exploit/solaris/sunrpc/sadmind_exec | | |
| | exploit/solaris/sunrpc/ypupdated_exec | | |
| | exploit/windows/brightstor/mediasrv_sunrpc | | |
| | exploit/windows/emc/networker_format_string | | |
+---------------------+--------------------------------------------------------------------------+ | |
| 172.16.164.218:80 | auxiliary/crawler/msfcrawler | | |
| | auxiliary/gather/advantech_webaccess_creds | | |
| | auxiliary/gather/avtech744_dvr_accounts | | |
| | auxiliary/gather/c2s_dvr_password_disclosure | | |
| | auxiliary/gather/cerberus_helpdesk_hash_disclosure | | |
| | auxiliary/gather/coldfusion_pwd_props | | |
| | auxiliary/gather/dolibarr_creds_sqli | | |
| | auxiliary/gather/doliwamp_traversal_creds | | |
| | auxiliary/gather/drupal_openid_xxe | | |
| | auxiliary/gather/external_ip | | |
| | auxiliary/gather/huawei_wifi_info | | |
| | auxiliary/gather/ibm_bigfix_sites_packages_enum | | |
| | auxiliary/gather/ipcamera_password_disclosure | | |
| | auxiliary/gather/jenkins_cred_recovery | | |
| | auxiliary/gather/joomla_com_realestatemanager_sqli | | |
| | auxiliary/gather/joomla_contenthistory_sqli | | |
| | auxiliary/gather/joomla_weblinks_sqli | | |
| | auxiliary/gather/mantisbt_admin_sqli | | |
| | auxiliary/gather/mongodb_js_inject_collection_enum | | |
| | auxiliary/gather/mybb_db_fingerprint | | |
| | auxiliary/gather/netgear_password_disclosure | | |
| | auxiliary/gather/oats_downloadservlet_traversal | | |
| | auxiliary/gather/pimcore_creds_sqli | | |
| | auxiliary/gather/rails_doubletap_file_read | | |
| | auxiliary/gather/vbulletin_vote_sqli | | |
| | auxiliary/gather/wp_all_in_one_migration_export | | |
| | auxiliary/gather/wp_ultimate_csv_importer_user_extract | | |
| | auxiliary/gather/wp_w3_total_cache_hash_extract | | |
| | auxiliary/gather/xerox_pwd_extract | | |
| | auxiliary/gather/xerox_workcentre_5xxx_ldap | | |
| | auxiliary/gather/zabbix_toggleids_sqli | | |
| | auxiliary/scanner/http/a10networks_ax_directory_traversal | | |
| | auxiliary/scanner/http/advantech_webaccess_login | | |
| | auxiliary/scanner/http/allegro_rompager_misfortune_cookie | | |
| | auxiliary/scanner/http/apache_mod_cgi_bash_env | | |
| | auxiliary/scanner/http/apache_optionsbleed | | |
| | auxiliary/scanner/http/apache_userdir_enum | | |
| | auxiliary/scanner/http/appletv_login | | |
| | auxiliary/scanner/http/backup_file | | |
| | auxiliary/scanner/http/bavision_cam_login | | |
| | auxiliary/scanner/http/binom3_login_config_pass_dump | | |
| | auxiliary/scanner/http/bitweaver_overlay_type_traversal | | |
| | auxiliary/scanner/http/blind_sql_query | | |
| | auxiliary/scanner/http/bmc_trackit_passwd_reset | | |
| | auxiliary/scanner/http/brute_dirs | | |
| | auxiliary/scanner/http/buffalo_login | | |
| | auxiliary/scanner/http/caidao_bruteforce_login | | |
| | auxiliary/scanner/http/canon_wireless | | |
| | auxiliary/scanner/http/cgit_traversal | | |
| | auxiliary/scanner/http/cisco_device_manager | | |
| | auxiliary/scanner/http/cisco_firepower_download | | |
| | auxiliary/scanner/http/cisco_firepower_login | | |
| | auxiliary/scanner/http/cisco_ios_auth_bypass | | |
| | auxiliary/scanner/http/clansphere_traversal | | |
| | auxiliary/scanner/http/cnpilot_r_web_login_loot | | |
| | auxiliary/scanner/http/coldfusion_locale_traversal | | |
| | auxiliary/scanner/http/coldfusion_version | | |
| | auxiliary/scanner/http/concrete5_member_list | | |
| | auxiliary/scanner/http/copy_of_file | | |
| | auxiliary/scanner/http/crawler | | |
| | auxiliary/scanner/http/dir_listing | | |
| | auxiliary/scanner/http/dir_scanner | | |
| | auxiliary/scanner/http/dir_webdav_unicode_bypass | | |
| | auxiliary/scanner/http/directadmin_login | | |
| | auxiliary/scanner/http/dlink_dir_300_615_http_login | | |
| | auxiliary/scanner/http/dlink_dir_615h_http_login | | |
| | auxiliary/scanner/http/dlink_dir_session_cgi_http_login | | |
| | auxiliary/scanner/http/dlink_user_agent_backdoor | | |
| | auxiliary/scanner/http/dnalims_file_retrieve | | |
| | auxiliary/scanner/http/dolibarr_login | | |
| | auxiliary/scanner/http/drupal_views_user_enum | | |
| | auxiliary/scanner/http/ektron_cms400net | | |
| | auxiliary/scanner/http/enum_wayback | | |
| | auxiliary/scanner/http/epmp1000_dump_config | | |
| | auxiliary/scanner/http/epmp1000_dump_hashes | | |
| | auxiliary/scanner/http/epmp1000_get_chart_cmd_exec | | |
| | auxiliary/scanner/http/epmp1000_ping_cmd_exec | | |
| | auxiliary/scanner/http/epmp1000_reset_pass | | |
| | auxiliary/scanner/http/epmp1000_web_login | | |
| | auxiliary/scanner/http/error_sql_injection | | |
| | auxiliary/scanner/http/etherpad_duo_login | | |
| | auxiliary/scanner/http/f5_bigip_virtual_server | | |
| | auxiliary/scanner/http/f5_mgmt_scanner | | |
| | auxiliary/scanner/http/file_same_name_dir | | |
| | auxiliary/scanner/http/files_dir | | |
| | auxiliary/scanner/http/fortinet_ssl_vpn | | |
| | auxiliary/scanner/http/frontpage_credential_dump | | |
| | auxiliary/scanner/http/gavazzi_em_login_loot | | |
| | auxiliary/scanner/http/git_scanner | | |
| | auxiliary/scanner/http/gitlab_login | | |
| | auxiliary/scanner/http/gitlab_user_enum | | |
| | auxiliary/scanner/http/goahead_traversal | | |
| | auxiliary/scanner/http/host_header_injection | | |
| | auxiliary/scanner/http/hp_sys_mgmt_login | | |
| | auxiliary/scanner/http/http_header | | |
| | auxiliary/scanner/http/http_login | | |
| | auxiliary/scanner/http/http_put | | |
| | auxiliary/scanner/http/http_traversal | | |
| | auxiliary/scanner/http/http_version | | |
| | auxiliary/scanner/http/httpbl_lookup | | |
| | auxiliary/scanner/http/httpdasm_directory_traversal | | |
| | auxiliary/scanner/http/iis_internal_ip | | |
| | auxiliary/scanner/http/iis_shortname_scanner | | |
| | auxiliary/scanner/http/ipboard_login | | |
| | auxiliary/scanner/http/jboss_vulnscan | | |
| | auxiliary/scanner/http/jenkins_command | | |
| | auxiliary/scanner/http/jenkins_enum | | |
| | auxiliary/scanner/http/joomla_bruteforce_login | | |
| | auxiliary/scanner/http/joomla_ecommercewd_sqli_scanner | | |
| | auxiliary/scanner/http/joomla_gallerywd_sqli_scanner | | |
| | auxiliary/scanner/http/joomla_pages | | |
| | auxiliary/scanner/http/joomla_plugins | | |
| | auxiliary/scanner/http/joomla_version | | |
| | auxiliary/scanner/http/kodi_traversal | | |
| | auxiliary/scanner/http/linknat_vos_traversal | | |
| | auxiliary/scanner/http/linksys_e1500_traversal | | |
| | auxiliary/scanner/http/litespeed_source_disclosure | | |
| | auxiliary/scanner/http/lucky_punch | | |
| | auxiliary/scanner/http/majordomo2_directory_traversal | | |
| | auxiliary/scanner/http/manageengine_desktop_central_login | | |
| | auxiliary/scanner/http/mediawiki_svg_fileaccess | | |
| | auxiliary/scanner/http/mod_negotiation_brute | | |
| | auxiliary/scanner/http/mod_negotiation_scanner | | |
| | auxiliary/scanner/http/ms09_020_webdav_unicode_bypass | | |
| | auxiliary/scanner/http/ms15_034_http_sys_memory_dump | | |
| | auxiliary/scanner/http/mybook_live_login | | |
| | auxiliary/scanner/http/netgear_sph200d_traversal | | |
| | auxiliary/scanner/http/nginx_source_disclosure | | |
| | auxiliary/scanner/http/novell_mdm_creds | | |
| | auxiliary/scanner/http/ntlm_info_enumeration | | |
| | auxiliary/scanner/http/octopusdeploy_login | | |
| | auxiliary/scanner/http/onion_omega2_login | | |
| | auxiliary/scanner/http/options | | |
| | auxiliary/scanner/http/phpmyadmin_login | | |
| | auxiliary/scanner/http/pocketpad_login | | |
| | auxiliary/scanner/http/prev_dir_same_name_file | | |
| | auxiliary/scanner/http/radware_appdirector_enum | | |
| | auxiliary/scanner/http/rails_json_yaml_scanner | | |
| | auxiliary/scanner/http/rails_mass_assignment | | |
| | auxiliary/scanner/http/rails_xml_yaml_scanner | | |
| | auxiliary/scanner/http/replace_ext | | |
| | auxiliary/scanner/http/rewrite_proxy_bypass | | |
| | auxiliary/scanner/http/rfcode_reader_enum | | |
| | auxiliary/scanner/http/rips_traversal | | |
| | auxiliary/scanner/http/riverbed_steelhead_vcx_file_read | | |
| | auxiliary/scanner/http/robots_txt | | |
| | auxiliary/scanner/http/s40_traversal | | |
| | auxiliary/scanner/http/scraper | | |
| | auxiliary/scanner/http/sentry_cdu_enum | | |
| | auxiliary/scanner/http/sevone_enum | | |
| | auxiliary/scanner/http/simple_webserver_traversal | | |
| | auxiliary/scanner/http/smt_ipmi_cgi_scanner | | |
| | auxiliary/scanner/http/smt_ipmi_url_redirect_traversal | | |
| | auxiliary/scanner/http/soap_xml | | |
| | auxiliary/scanner/http/squid_pivot_scanning | | |
| | auxiliary/scanner/http/squiz_matrix_user_enum | | |
| | auxiliary/scanner/http/ssl_version | | |
| | auxiliary/scanner/http/svn_scanner | | |
| | auxiliary/scanner/http/svn_wcdb_scanner | | |
| | auxiliary/scanner/http/symantec_web_gateway_login | | |
| | auxiliary/scanner/http/title | | |
| | auxiliary/scanner/http/totaljs_traversal | | |
| | auxiliary/scanner/http/tplink_traversal_noauth | | |
| | auxiliary/scanner/http/trace | | |
| | auxiliary/scanner/http/trace_axd | | |
| | auxiliary/scanner/http/typo3_bruteforce | | |
| | auxiliary/scanner/http/vcms_login | | |
| | auxiliary/scanner/http/verb_auth_bypass | | |
| | auxiliary/scanner/http/vhost_scanner | | |
| | auxiliary/scanner/http/web_vulndb | | |
| | auxiliary/scanner/http/webdav_internal_ip | | |
| | auxiliary/scanner/http/webdav_scanner | | |
| | auxiliary/scanner/http/webdav_website_content | | |
| | auxiliary/scanner/http/webpagetest_traversal | | |
| | auxiliary/scanner/http/wordpress_content_injection | | |
| | auxiliary/scanner/http/wordpress_cp_calendar_sqli | | |
| | auxiliary/scanner/http/wordpress_ghost_scanner | | |
| | auxiliary/scanner/http/wordpress_login_enum | | |
| | auxiliary/scanner/http/wordpress_multicall_creds | | |
| | auxiliary/scanner/http/wordpress_pingback_access | | |
| | auxiliary/scanner/http/wordpress_scanner | | |
| | auxiliary/scanner/http/wordpress_xmlrpc_login | | |
| | auxiliary/scanner/http/wp_arbitrary_file_deletion | | |
| | auxiliary/scanner/http/wp_contus_video_gallery_sqli | | |
| | auxiliary/scanner/http/wp_dukapress_file_read | | |
| | auxiliary/scanner/http/wp_gimedia_library_file_read | | |
| | auxiliary/scanner/http/wp_mobile_pack_info_disclosure | | |
| | auxiliary/scanner/http/wp_mobileedition_file_read | | |
| | auxiliary/scanner/http/wp_nextgen_galley_file_read | | |
| | auxiliary/scanner/http/wp_simple_backup_file_read | | |
| | auxiliary/scanner/http/wp_subscribe_comments_file_read | | |
| | auxiliary/scanner/http/xpath | | |
| | auxiliary/scanner/http/zabbix_login | | |
| | auxiliary/scanner/ip/ipidseq | | |
| | auxiliary/scanner/lotus/lotus_domino_hashes | | |
| | auxiliary/scanner/lotus/lotus_domino_login | | |
| | auxiliary/scanner/lotus/lotus_domino_version | | |
| | auxiliary/scanner/misc/dvr_config_disclosure | | |
| | auxiliary/scanner/rogue/rogue_recv | | |
| | auxiliary/scanner/rogue/rogue_send | | |
| | auxiliary/scanner/sap/sap_icm_urlscan | | |
| | auxiliary/scanner/sap/sap_soap_rfc_dbmcli_sxpg_call_system_command_exec | | |
| | auxiliary/scanner/sap/sap_soap_rfc_pfl_check_os_file_existence | | |
| | auxiliary/scanner/sap/sap_soap_rfc_rzl_read_dir | | |
| | auxiliary/scanner/scada/indusoft_ntwebserver_fileaccess | | |
| | auxiliary/voip/cisco_cucdm_call_forward | | |
| | auxiliary/voip/cisco_cucdm_speed_dials | | |
| | auxiliary/voip/telisca_ips_lock_control | | |
| | exploit/bsdi/softcart/mercantec_softcart | | |
| | exploit/linux/http/advantech_switch_bash_env_exec | | |
| | exploit/linux/http/astium_sqli_upload | | |
| | exploit/linux/http/atutor_filemanager_traversal | | |
| | exploit/linux/http/axis_srv_parhand_rce | | |
| | exploit/linux/http/centreon_sqli_exec | | |
| | exploit/linux/http/centreon_useralias_exec | | |
| | exploit/linux/http/cisco_firepower_useradd | | |
| | exploit/linux/http/cisco_rv130_rmi_rce | | |
| | exploit/linux/http/cpi_tararchive_upload | | |
| | exploit/linux/http/crypttech_cryptolog_login_exec | | |
| | exploit/linux/http/ddwrt_cgibin_exec | | |
| | exploit/linux/http/denyall_waf_exec | | |
| | exploit/linux/http/dlink_command_php_exec_noauth | | |
| | exploit/linux/http/dlink_dcs931l_upload | | |
| | exploit/linux/http/dlink_dcs_930l_authenticated_remote_command_execution | | |
| | exploit/linux/http/dlink_diagnostic_exec_noauth | | |
| | exploit/linux/http/dlink_dir300_exec_telnet | | |
| | exploit/linux/http/dlink_dir615_up_exec | | |
| | exploit/linux/http/dlink_dir850l_unauth_exec | | |
| | exploit/linux/http/dlink_dsl2750b_exec_noauth | | |
| | exploit/linux/http/dlink_dspw110_cookie_noauth_exec | | |
| | exploit/linux/http/dlink_hnap_header_exec_noauth | | |
| | exploit/linux/http/dnalims_admin_exec | | |
| | exploit/linux/http/dolibarr_cmd_exec | | |
| | exploit/linux/http/dreambox_openpli_shell | | |
| | exploit/linux/http/efw_chpasswd_exec | | |
| | exploit/linux/http/esva_exec | | |
| | exploit/linux/http/fritzbox_echo_exec | | |
| | exploit/linux/http/github_enterprise_secret | | |
| | exploit/linux/http/gitlist_exec | | |
| | exploit/linux/http/goahead_ldpreload | | |
| | exploit/linux/http/groundwork_monarch_cmd_exec | | |
| | exploit/linux/http/huawei_hg532n_cmdinject | | |
| | exploit/linux/http/kaltura_unserialize_cookie_rce | | |
| | exploit/linux/http/kaltura_unserialize_rce | | |
| | exploit/linux/http/librenms_addhost_cmd_inject | | |
| | exploit/linux/http/linksys_apply_cgi | | |
| | exploit/linux/http/linksys_e1500_apply_exec | | |
| | exploit/linux/http/linksys_themoon_exec | | |
| | exploit/linux/http/linksys_wrt110_cmd_exec | | |
| | exploit/linux/http/linksys_wrt160nv2_apply_exec | | |
| | exploit/linux/http/linksys_wrt54gl_apply_exec | | |
| | exploit/linux/http/linksys_wvbr0_user_agent_exec_noauth | | |
| | exploit/linux/http/logsign_exec | | |
| | exploit/linux/http/microfocus_secure_messaging_gateway | | |
| | exploit/linux/http/multi_ncc_ping_exec | | |
| | exploit/linux/http/mutiny_frontend_upload | | |
| | exploit/linux/http/mvpower_dvr_shell_exec | | |
| | exploit/linux/http/nagios_xi_chained_rce | | |
| | exploit/linux/http/nagios_xi_chained_rce_2_electric_boogaloo | | |
| | exploit/linux/http/nagios_xi_magpie_debug | | |
| | exploit/linux/http/netgear_dgn1000_setup_unauth_exec | | |
| | exploit/linux/http/netgear_dgn1000b_setup_exec | | |
| | exploit/linux/http/netgear_dgn2200b_pppoe_exec | | |
| | exploit/linux/http/netgear_dnslookup_cmd_exec | | |
| | exploit/linux/http/netgear_r7000_cgibin_exec | | |
| | exploit/linux/http/netgear_unauth_exec | | |
| | exploit/linux/http/netgear_wnr2000_rce | | |
| | exploit/linux/http/nginx_chunked_size | | |
| | exploit/linux/http/pandora_fms_sqli | | |
| | exploit/linux/http/php_imap_open_rce | | |
| | exploit/linux/http/piranha_passwd_exec | | |
| | exploit/linux/http/qnap_qcenter_change_passwd_exec | | |
| | exploit/linux/http/raidsonic_nas_ib5220_exec_noauth | | |
| | exploit/linux/http/railo_cfml_rfi | | |
| | exploit/linux/http/samsung_srv_1670d_upload_exec | | |
| | exploit/linux/http/seagate_nas_php_exec_noauth | | |
| | exploit/linux/http/symantec_web_gateway_exec | | |
| | exploit/linux/http/symantec_web_gateway_file_upload | | |
| | exploit/linux/http/symantec_web_gateway_lfi | | |
| | exploit/linux/http/symantec_web_gateway_pbcontrol | | |
| | exploit/linux/http/symantec_web_gateway_restore | | |
| | exploit/linux/http/tiki_calendar_exec | | |
| | exploit/linux/http/tp_link_sc2020n_authenticated_telnet_injection | | |
| | exploit/linux/http/trendmicro_imsva_widget_exec | | |
| | exploit/linux/http/trendmicro_sps_exec | | |
| | exploit/linux/http/trueonline_billion_5200w_rce | | |
| | exploit/linux/http/trueonline_p660hn_v1_rce | | |
| | exploit/linux/http/trueonline_p660hn_v2_rce | | |
| | exploit/linux/http/vap2500_tools_command_exec | | |
| | exploit/linux/http/vcms_upload | | |
| | exploit/linux/http/wanem_exec | | |
| | exploit/linux/http/wd_mycloud_multiupload_upload | | |
| | exploit/linux/http/webcalendar_settings_exec | | |
| | exploit/linux/http/webid_converter | | |
| | exploit/linux/http/webmin_packageup_rce | | |
| | exploit/linux/http/wipg1000_cmd_injection | | |
| | exploit/linux/http/xplico_exec | | |
| | exploit/linux/http/zabbix_sqli | | |
| | exploit/linux/http/zimbra_xxe_rce | | |
| | exploit/multi/http/activecollab_chat | | |
| | exploit/multi/http/ajaxplorer_checkinstall_exec | | |
| | exploit/multi/http/apache_mod_cgi_bash_env_exec | | |
| | exploit/multi/http/apprain_upload_exec | | |
| | exploit/multi/http/atutor_sqli | | |
| | exploit/multi/http/auxilium_upload_exec | | |
| | exploit/multi/http/bolt_file_upload | | |
| | exploit/multi/http/builderengine_upload_exec | | |
| | exploit/multi/http/caidao_php_backdoor_exec | | |
| | exploit/multi/http/cisco_dcnm_upload | | |
| | exploit/multi/http/clipbucket_fileupload_exec | | |
| | exploit/multi/http/cmsms_showtime2_rce | | |
| | exploit/multi/http/cmsms_upload_rename_rce | | |
| | exploit/multi/http/coldfusion_ckeditor_file_upload | | |
| | exploit/multi/http/coldfusion_rds | | |
| | exploit/multi/http/confluence_widget_connector | | |
| | exploit/multi/http/cuteflow_upload_exec | | |
| | exploit/multi/http/dexter_casinoloader_exec | | |
| | exploit/multi/http/drupal_drupageddon | | |
| | exploit/multi/http/extplorer_upload_exec | | |
| | exploit/multi/http/familycms_less_exec | | |
| | exploit/multi/http/freenas_exec_raw | | |
| | exploit/multi/http/gestioip_exec | | |
| | exploit/multi/http/getsimplecms_unauth_code_exec | | |
| | exploit/multi/http/git_client_command_exec | | |
| | exploit/multi/http/git_submodule_command_exec | | |
| | exploit/multi/http/git_submodule_url_exec | | |
| | exploit/multi/http/gitlab_shell_exec | | |
| | exploit/multi/http/gitlist_arg_injection | | |
| | exploit/multi/http/gitorious_graph | | |
| | exploit/multi/http/glossword_upload_exec | | |
| | exploit/multi/http/glpi_install_rce | | |
| | exploit/multi/http/horde_form_file_upload | | |
| | exploit/multi/http/horde_href_backdoor | | |
| | exploit/multi/http/ibm_openadmin_tool_soap_welcomeserver_exec | | |
| | exploit/multi/http/ispconfig_php_exec | | |
| | exploit/multi/http/jenkins_script_console | | |
| | exploit/multi/http/jira_hipchat_template | | |
| | exploit/multi/http/joomla_http_header_rce | | |
| | exploit/multi/http/kordil_edms_upload_exec | | |
| | exploit/multi/http/lcms_php_exec | | |
| | exploit/multi/http/log1cms_ajax_create_folder | | |
| | exploit/multi/http/magento_unserialize | | |
| | exploit/multi/http/makoserver_cmd_exec | | |
| | exploit/multi/http/mantisbt_manage_proj_page_rce | | |
| | exploit/multi/http/mantisbt_php_exec | | |
| | exploit/multi/http/mediawiki_syntaxhighlight | | |
| | exploit/multi/http/mediawiki_thumb | | |
| | exploit/multi/http/mma_backdoor_upload | | |
| | exploit/multi/http/mobilecartly_upload_exec | | |
| | exploit/multi/http/monstra_fileupload_exec | | |
| | exploit/multi/http/moodle_cmd_exec | | |
| | exploit/multi/http/movabletype_upgrade_exec | | |
| | exploit/multi/http/mutiny_subnetmask_exec | | |
| | exploit/multi/http/nas4free_php_exec | | |
| | exploit/multi/http/navigate_cms_rce | | |
| | exploit/multi/http/nibbleblog_file_upload | | |
| | exploit/multi/http/novell_servicedesk_rce | | |
| | exploit/multi/http/nuuo_nvrmini_upgrade_rce | | |
| | exploit/multi/http/openmediavault_cmd_exec | | |
| | exploit/multi/http/openx_backdoor_php | | |
| | exploit/multi/http/opmanager_socialit_file_upload | | |
| | exploit/multi/http/oracle_reports_rce | | |
| | exploit/multi/http/oscommerce_installer_unauth_code_exec | | |
| | exploit/multi/http/pandora_upload_exec | | |
| | exploit/multi/http/phoenix_exec | | |
| | exploit/multi/http/php_cgi_arg_injection | | |
| | exploit/multi/http/php_utility_belt_rce | | |
| | exploit/multi/http/php_volunteer_upload_exec | | |
| | exploit/multi/http/phpfilemanager_rce | | |
| | exploit/multi/http/phpldapadmin_query_engine | | |
| | exploit/multi/http/phpmailer_arg_injection | | |
| | exploit/multi/http/phpmoadmin_exec | | |
| | exploit/multi/http/phpmyadmin_3522_backdoor | | |
| | exploit/multi/http/phpmyadmin_lfi_rce | | |
| | exploit/multi/http/phpmyadmin_null_termination_exec | | |
| | exploit/multi/http/phpmyadmin_preg_replace | | |
| | exploit/multi/http/phpscheduleit_start_date | | |
| | exploit/multi/http/phptax_exec | | |
| | exploit/multi/http/phpwiki_ploticus_exec | | |
| | exploit/multi/http/pimcore_unserialize_rce | | |
| | exploit/multi/http/playsms_filename_exec | | |
| | exploit/multi/http/playsms_uploadcsv_exec | | |
| | exploit/multi/http/pmwiki_pagelist | | |
| | exploit/multi/http/polarcms_upload_exec | | |
| | exploit/multi/http/processmaker_exec | | |
| | exploit/multi/http/processmaker_plugin_upload | | |
| | exploit/multi/http/qdpm_upload_exec | | |
| | exploit/multi/http/rails_actionpack_inline_exec | | |
| | exploit/multi/http/rails_double_tap | | |
| | exploit/multi/http/rails_json_yaml_code_exec | | |
| | exploit/multi/http/rails_secret_deserialization | | |
| | exploit/multi/http/rails_xml_yaml_code_exec | | |
| | exploit/multi/http/sflog_upload_exec | | |
| | exploit/multi/http/shopware_createinstancefromnamedarguments_rce | | |
| | exploit/multi/http/simple_backdoors_exec | | |
| | exploit/multi/http/sit_file_upload | | |
| | exploit/multi/http/snortreport_exec | | |
| | exploit/multi/http/sonicwall_gms_upload | | |
| | exploit/multi/http/sonicwall_scrutinizer_methoddetail_sqli | | |
| | exploit/multi/http/spree_search_exec | | |
| | exploit/multi/http/spree_searchlogic_exec | | |
| | exploit/multi/http/stunshell_eval | | |
| | exploit/multi/http/stunshell_exec | | |
| | exploit/multi/http/sun_jsws_dav_options | | |
| | exploit/multi/http/testlink_upload_exec | | |
| | exploit/multi/http/tomcat_mgr_deploy | | |
| | exploit/multi/http/tomcat_mgr_upload | | |
| | exploit/multi/http/traq_plugin_exec | | |
| | exploit/multi/http/v0pcr3w_exec | | |
| | exploit/multi/http/vbseo_proc_deutf | | |
| | exploit/multi/http/vbulletin_unserialize | | |
| | exploit/multi/http/vtiger_install_rce | | |
| | exploit/multi/http/vtiger_logo_upload_exec | | |
| | exploit/multi/http/vtiger_php_exec | | |
| | exploit/multi/http/vtiger_soap_upload | | |
| | exploit/multi/http/webpagetest_upload_exec | | |
| | exploit/multi/http/werkzeug_debug_rce | | |
| | exploit/multi/http/wikka_spam_exec | | |
| | exploit/multi/http/wp_crop_rce | | |
| | exploit/multi/http/wp_ninja_forms_unauthenticated_file_upload | | |
| | exploit/multi/http/wp_responsive_thumbnail_slider_upload | | |
| | exploit/multi/http/x7chat2_php_exec | | |
| | exploit/multi/http/zabbix_script_exec | | |
| | exploit/multi/http/zemra_panel_rce | | |
| | exploit/multi/http/zpanel_information_disclosure_rce | | |
| | exploit/multi/php/php_unserialize_zval_cookie | | |
| | exploit/multi/php/wp_duplicator_code_inject | | |
| | exploit/multi/wyse/hagent_untrusted_hsdata | | |
| | exploit/unix/ftp/proftpd_modcopy_exec | | |
| | exploit/unix/http/contentkeeperweb_mimencode | | |
| | exploit/unix/http/ctek_skyrouter | | |
| | exploit/unix/http/dell_kace_k1000_upload | | |
| | exploit/unix/http/epmp1000_get_chart_cmd_shell | | |
| | exploit/unix/http/epmp1000_ping_cmd_shell | | |
| | exploit/unix/http/freepbx_callmenum | | |
| | exploit/unix/http/laravel_token_unserialize_exec | | |
| | exploit/unix/http/lifesize_room | | |
| | exploit/unix/http/pfsense_clickjacking | | |
| | exploit/unix/http/quest_kace_systems_management_rce | | |
| | exploit/unix/http/tnftp_savefile | | |
| | exploit/unix/http/twiki_debug_plugins | | |
| | exploit/unix/http/vmturbo_vmtadmin_exec_noauth | | |
| | exploit/unix/http/xdebug_unauth_exec | | |
| | exploit/unix/sonicwall/sonicwall_xmlrpc_rce | | |
| | exploit/unix/webapp/actualanalyzer_ant_cookie_exec | | |
| | exploit/unix/webapp/arkeia_upload_exec | | |
| | exploit/unix/webapp/awstats_configdir_exec | | |
| | exploit/unix/webapp/awstats_migrate_exec | | |
| | exploit/unix/webapp/awstatstotals_multisort | | |
| | exploit/unix/webapp/barracuda_img_exec | | |
| | exploit/unix/webapp/base_qry_common | | |
| | exploit/unix/webapp/basilic_diff_exec | | |
| | exploit/unix/webapp/cacti_graphimage_exec | | |
| | exploit/unix/webapp/cakephp_cache_corruption | | |
| | exploit/unix/webapp/carberp_backdoor_exec | | |
| | exploit/unix/webapp/clipbucket_upload_exec | | |
| | exploit/unix/webapp/coppermine_piceditor | | |
| | exploit/unix/webapp/datalife_preview_exec | | |
| | exploit/unix/webapp/dogfood_spell_exec | | |
| | exploit/unix/webapp/drupal_coder_exec | | |
| | exploit/unix/webapp/drupal_drupalgeddon2 | | |
| | exploit/unix/webapp/drupal_restws_exec | | |
| | exploit/unix/webapp/drupal_restws_unserialize | | |
| | exploit/unix/webapp/egallery_upload_exec | | |
| | exploit/unix/webapp/elfinder_php_connector_exiftran_cmd_injection | | |
| | exploit/unix/webapp/flashchat_upload_exec | | |
| | exploit/unix/webapp/foswiki_maketext | | |
| | exploit/unix/webapp/freepbx_config_exec | | |
| | exploit/unix/webapp/generic_exec | | |
| | exploit/unix/webapp/get_simple_cms_upload_exec | | |
| | exploit/unix/webapp/google_proxystylesheet_exec | | |
| | exploit/unix/webapp/graphite_pickle_exec | | |
| | exploit/unix/webapp/guestbook_ssi_exec | | |
| | exploit/unix/webapp/hastymail_exec | | |
| | exploit/unix/webapp/havalite_upload_exec | | |
| | exploit/unix/webapp/horde_unserialize_exec | | |
| | exploit/unix/webapp/hybridauth_install_php_exec | | |
| | exploit/unix/webapp/instantcms_exec | | |
| | exploit/unix/webapp/invision_pboard_unserialize_exec | | |
| | exploit/unix/webapp/joomla_akeeba_unserialize | | |
| | exploit/unix/webapp/joomla_comfields_sqli_rce | | |
| | exploit/unix/webapp/joomla_comjce_imgmanager | | |
| | exploit/unix/webapp/joomla_contenthistory_sqli_rce | | |
| | exploit/unix/webapp/joomla_media_upload_exec | | |
| | exploit/unix/webapp/joomla_tinybrowser | | |
| | exploit/unix/webapp/jquery_file_upload | | |
| | exploit/unix/webapp/kimai_sqli | | |
| | exploit/unix/webapp/libretto_upload_exec | | |
| | exploit/unix/webapp/maarch_letterbox_file_upload | | |
| | exploit/unix/webapp/mambo_cache_lite | | |
| | exploit/unix/webapp/mitel_awc_exec | | |
| | exploit/unix/webapp/moinmoin_twikidraw | | |
| | exploit/unix/webapp/mybb_backdoor | | |
| | exploit/unix/webapp/nagios3_history_cgi | | |
| | exploit/unix/webapp/nagios3_statuswml_ping | | |
| | exploit/unix/webapp/nagios_graph_explorer | | |
| | exploit/unix/webapp/narcissus_backend_exec | | |
| | exploit/unix/webapp/open_flash_chart_upload_exec | | |
| | exploit/unix/webapp/openemr_sqli_privesc_upload | | |
| | exploit/unix/webapp/openemr_upload_exec | | |
| | exploit/unix/webapp/opensis_modname_exec | | |
| | exploit/unix/webapp/openview_connectednodes_exec | | |
| | exploit/unix/webapp/openx_banner_edit | | |
| | exploit/unix/webapp/oscommerce_filemanager | | |
| | exploit/unix/webapp/pajax_remote_exec | | |
| | exploit/unix/webapp/php_charts_exec | | |
| | exploit/unix/webapp/php_eval | | |
| | exploit/unix/webapp/php_include | | |
| | exploit/unix/webapp/php_vbulletin_template | | |
| | exploit/unix/webapp/php_xmlrpc_eval | | |
| | exploit/unix/webapp/phpbb_highlight | | |
| | exploit/unix/webapp/phpcollab_upload_exec | | |
| | exploit/unix/webapp/phpmyadmin_config | | |
| | exploit/unix/webapp/piwik_superuser_plugin_upload | | |
| | exploit/unix/webapp/projectpier_upload_exec | | |
| | exploit/unix/webapp/projectsend_upload_exec | | |
| | exploit/unix/webapp/redmine_scm_exec | | |
| | exploit/unix/webapp/seportal_sqli_exec | | |
| | exploit/unix/webapp/simple_e_document_upload_exec | | |
| | exploit/unix/webapp/sixapart_movabletype_storable_exec | | |
| | exploit/unix/webapp/skybluecanvas_exec | | |
| | exploit/unix/webapp/sphpblog_file_upload | | |
| | exploit/unix/webapp/spip_connect_exec | | |
| | exploit/unix/webapp/squash_yaml_exec | | |
| | exploit/unix/webapp/sugarcrm_rest_unserialize_exec | | |
| | exploit/unix/webapp/sugarcrm_unserialize_exec | | |
| | exploit/unix/webapp/tikiwiki_graph_formula_exec | | |
| | exploit/unix/webapp/tikiwiki_jhot_exec | | |
| | exploit/unix/webapp/tikiwiki_unserialize_exec | | |
| | exploit/unix/webapp/tikiwiki_upload_exec | | |
| | exploit/unix/webapp/trixbox_langchoice | | |
| | exploit/unix/webapp/twiki_history | | |
| | exploit/unix/webapp/twiki_maketext | | |
| | exploit/unix/webapp/twiki_search | | |
| | exploit/unix/webapp/vbulletin_vote_sqli_exec | | |
| | exploit/unix/webapp/vicidial_manager_send_cmd_exec | | |
| | exploit/unix/webapp/vicidial_user_authorization_unauth_cmd_exec | | |
| | exploit/unix/webapp/webmin_upload_exec | | |
| | exploit/unix/webapp/webtester_exec | | |
| | exploit/unix/webapp/wp_admin_shell_upload | | |
| | exploit/unix/webapp/wp_advanced_custom_fields_exec | | |
| | exploit/unix/webapp/wp_ajax_load_more_file_upload | | |
| | exploit/unix/webapp/wp_asset_manager_upload_exec | | |
| | exploit/unix/webapp/wp_creativecontactform_file_upload | | |
| | exploit/unix/webapp/wp_downloadmanager_upload | | |
| | exploit/unix/webapp/wp_easycart_unrestricted_file_upload | | |
| | exploit/unix/webapp/wp_foxypress_upload | | |
| | exploit/unix/webapp/wp_frontend_editor_file_upload | | |
| | exploit/unix/webapp/wp_google_document_embedder_exec | | |
| | exploit/unix/webapp/wp_holding_pattern_file_upload | | |
| | exploit/unix/webapp/wp_inboundio_marketing_file_upload | | |
| | exploit/unix/webapp/wp_infusionsoft_upload | | |
| | exploit/unix/webapp/wp_lastpost_exec | | |
| | exploit/unix/webapp/wp_mobile_detector_upload_execute | | |
| | exploit/unix/webapp/wp_nmediawebsite_file_upload | | |
| | exploit/unix/webapp/wp_optimizepress_upload | | |
| | exploit/unix/webapp/wp_photo_gallery_unrestricted_file_upload | | |
| | exploit/unix/webapp/wp_phpmailer_host_header | | |
| | exploit/unix/webapp/wp_pixabay_images_upload | | |
| | exploit/unix/webapp/wp_platform_exec | | |
| | exploit/unix/webapp/wp_property_upload_exec | | |
| | exploit/unix/webapp/wp_reflexgallery_file_upload | | |
| | exploit/unix/webapp/wp_revslider_upload_execute | | |
| | exploit/unix/webapp/wp_slideshowgallery_upload | | |
| | exploit/unix/webapp/wp_symposium_shell_upload | | |
| | exploit/unix/webapp/wp_total_cache_exec | | |
| | exploit/unix/webapp/wp_worktheflow_upload | | |
| | exploit/unix/webapp/wp_wpshop_ecommerce_file_upload | | |
| | exploit/unix/webapp/wp_wptouch_file_upload | | |
| | exploit/unix/webapp/wp_wysija_newsletters_upload | | |
| | exploit/unix/webapp/xoda_file_upload | | |
| | exploit/unix/webapp/xymon_useradm_cmd_exec | | |
| | exploit/unix/webapp/zeroshell_exec | | |
| | exploit/unix/webapp/zoneminder_packagecontrol_exec | | |
| | exploit/unix/webapp/zpanel_username_exec | | |
| | exploit/windows/http/amlibweb_webquerydll_app | | |
| | exploit/windows/http/apache_chunked | | |
| | exploit/windows/http/apache_mod_rewrite_ldap | | |
| | exploit/windows/http/apache_modjk_overflow | | |
| | exploit/windows/http/avaya_ccr_imageupload_exec | | |
| | exploit/windows/http/badblue_ext_overflow | | |
| | exploit/windows/http/badblue_passthru | | |
| | exploit/windows/http/bea_weblogic_jsessionid | | |
| | exploit/windows/http/bea_weblogic_transfer_encoding | | |
| | exploit/windows/http/belkin_bulldog | | |
| | exploit/windows/http/cogent_datahub_command | | |
| | exploit/windows/http/coldfusion_fckeditor | | |
| | exploit/windows/http/disk_pulse_enterprise_get | | |
| | exploit/windows/http/easychatserver_seh | | |
| | exploit/windows/http/efs_easychatserver_username | | |
| | exploit/windows/http/ektron_xslt_exec | | |
| | exploit/windows/http/ektron_xslt_exec_ws | | |
| | exploit/windows/http/fdm_auth_header | | |
| | exploit/windows/http/generic_http_dll_injection | | |
| | exploit/windows/http/gitstack_rce | | |
| | exploit/windows/http/hp_mpa_job_acct | | |
| | exploit/windows/http/hp_nnm_getnnmdata_hostname | | |
| | exploit/windows/http/hp_nnm_getnnmdata_icount | | |
| | exploit/windows/http/hp_nnm_getnnmdata_maxage | | |
| | exploit/windows/http/hp_nnm_nnmrptconfig_nameparams | | |
| | exploit/windows/http/hp_nnm_nnmrptconfig_schdparams | | |
| | exploit/windows/http/hp_nnm_openview5 | | |
| | exploit/windows/http/hp_nnm_ovalarm_lang | | |
| | exploit/windows/http/hp_nnm_ovbuildpath_textfile | | |
| | exploit/windows/http/hp_nnm_ovwebhelp | | |
| | exploit/windows/http/hp_nnm_ovwebsnmpsrv_main | | |
| | exploit/windows/http/hp_nnm_ovwebsnmpsrv_ovutil | | |
| | exploit/windows/http/hp_nnm_ovwebsnmpsrv_uro | | |
| | exploit/windows/http/hp_nnm_snmp | | |
| | exploit/windows/http/hp_nnm_snmpviewer_actapp | | |
| | exploit/windows/http/hp_nnm_toolbar_01 | | |
| | exploit/windows/http/hp_nnm_toolbar_02 | | |
| | exploit/windows/http/hp_nnm_webappmon_execvp | | |
| | exploit/windows/http/hp_nnm_webappmon_ovjavalocale | | |
| | exploit/windows/http/hp_openview_insight_backdoor | | |
| | exploit/windows/http/hp_power_manager_filename | | |
| | exploit/windows/http/hp_power_manager_login | | |
| | exploit/windows/http/httpdx_handlepeer | | |
| | exploit/windows/http/httpdx_tolog_format | | |
| | exploit/windows/http/ia_webmail | | |
| | exploit/windows/http/ipswitch_wug_maincfgret | | |
| | exploit/windows/http/kaseya_uploader | | |
| | exploit/windows/http/kaseya_uploadimage_file_upload | | |
| | exploit/windows/http/kolibri_http | | |
| | exploit/windows/http/landesk_thinkmanagement_upload_asp | | |
| | exploit/windows/http/mailenable_auth_header | | |
| | exploit/windows/http/manage_engine_opmanager_rce | | |
| | exploit/windows/http/manageengine_appmanager_exec | | |
| | exploit/windows/http/minishare_get_overflow | | |
| | exploit/windows/http/navicopa_get_overflow | | |
| | exploit/windows/http/novell_mdm_lfi | | |
| | exploit/windows/http/oats_weblogic_console | | |
| | exploit/windows/http/octopusdeploy_deploy | | |
| | exploit/windows/http/oracle_beehive_evaluation | | |
| | exploit/windows/http/oracle_beehive_prepareaudiotoplay | | |
| | exploit/windows/http/privatewire_gateway | | |
| | exploit/windows/http/rejetto_hfs_exec | | |
| | exploit/windows/http/sambar6_search_results | | |
| | exploit/windows/http/savant_31_overflow | | |
| | exploit/windows/http/servu_session_cookie | | |
| | exploit/windows/http/shttpd_post | | |
| | exploit/windows/http/solarwinds_fsm_userlogin | | |
| | exploit/windows/http/sonicwall_scrutinizer_sqli | | |
| | exploit/windows/http/sysax_create_folder | | |
| | exploit/windows/http/tomcat_cgi_cmdlineargs | | |
| | exploit/windows/http/trackit_file_upload | | |
| | exploit/windows/http/trendmicro_officescan_widget_exec | | |
| | exploit/windows/http/umbraco_upload_aspx | | |
| | exploit/windows/http/webster_http | | |
| | exploit/windows/http/xampp_webdav_upload_php | | |
| | exploit/windows/http/xitami_if_mod_since | | |
| | exploit/windows/http/zenworks_uploadservlet | | |
| | exploit/windows/iis/iis_webdav_scstoragepathfromurl | | |
| | exploit/windows/iis/iis_webdav_upload_asp | | |
| | exploit/windows/iis/ms01_023_printer | | |
| | exploit/windows/iis/ms01_026_dbldecode | | |
| | exploit/windows/iis/ms01_033_idq | | |
| | exploit/windows/iis/ms02_018_htr | | |
| | exploit/windows/iis/ms02_065_msadc | | |
| | exploit/windows/iis/ms03_007_ntdll_webdav | | |
| | exploit/windows/iis/msadc | | |
| | exploit/windows/isapi/ms00_094_pbserver | | |
| | exploit/windows/isapi/ms03_022_nsiislog_post | | |
| | exploit/windows/isapi/ms03_051_fp30reg_chunked | | |
| | exploit/windows/isapi/rsa_webagent_redirect | | |
| | exploit/windows/isapi/w3who_query | | |
| | exploit/windows/lotus/domino_http_accept_language | | |
| | exploit/windows/misc/gh0st | | |
| | exploit/windows/mssql/ms09_004_sp_replwritetovarbin_sqli | | |
| | exploit/windows/mssql/mssql_payload_sqli | | |
| | exploit/windows/proxy/bluecoat_winproxy_host | | |
| | exploit/windows/proxy/qbik_wingate_wwwproxy | | |
| | exploit/windows/scada/advantech_webaccess_dashboard_file_upload | | |
| | exploit/windows/scada/ge_proficy_cimplicity_gefebt | | |
+---------------------+--------------------------------------------------------------------------+ | |
| 172.16.164.218:8787 | auxiliary/gather/solarwinds_orion_sqli | | |
| | exploit/linux/misc/drb_remote_codeexec | | |
+---------------------+--------------------------------------------------------------------------+ | |
| 172.16.164.218:3632 | exploit/unix/misc/distcc_exec | | |
+---------------------+--------------------------------------------------------------------------+ | |
| 172.16.164.218:53 | auxiliary/scanner/dns/dns_amp | | |
+---------------------+--------------------------------------------------------------------------+ | |
| 172.16.164.218:22 | auxiliary/scanner/ssh/cerberus_sftp_enumusers | | |
| | auxiliary/scanner/ssh/detect_kippo | | |
| | auxiliary/scanner/ssh/eaton_xpert_backdoor | | |
| | auxiliary/scanner/ssh/fortinet_backdoor | | |
| | auxiliary/scanner/ssh/juniper_backdoor | | |
| | auxiliary/scanner/ssh/libssh_auth_bypass | | |
| | auxiliary/scanner/ssh/ssh_enumusers | | |
| | auxiliary/scanner/ssh/ssh_identify_pubkeys | | |
| | auxiliary/scanner/ssh/ssh_login | | |
| | auxiliary/scanner/ssh/ssh_login_pubkey | | |
| | auxiliary/scanner/ssh/ssh_version | | |
| | exploit/apple_ios/ssh/cydia_default_ssh | | |
| | exploit/linux/ssh/ceragon_fibeair_known_privkey | | |
| | exploit/linux/ssh/exagrid_known_privkey | | |
| | exploit/linux/ssh/f5_bigip_known_privkey | | |
| | exploit/linux/ssh/loadbalancerorg_enterprise_known_privkey | | |
| | exploit/linux/ssh/mercurial_ssh_exec | | |
| | exploit/linux/ssh/quantum_dxi_known_privkey | | |
| | exploit/linux/ssh/quantum_vmpro_backdoor | | |
| | exploit/linux/ssh/symantec_smg_ssh | | |
| | exploit/linux/ssh/vmware_vdp_known_privkey | | |
| | exploit/multi/ssh/sshexec | | |
| | exploit/unix/ssh/array_vxag_vapv_privkey_privesc | | |
| | exploit/unix/ssh/tectia_passwd_changereq | | |
| | exploit/windows/ssh/freeftpd_key_exchange | | |
| | exploit/windows/ssh/freesshd_authbypass | | |
| | exploit/windows/ssh/freesshd_key_exchange | | |
| | exploit/windows/ssh/sysax_ssh_username | | |
+---------------------+--------------------------------------------------------------------------+ | |
| 172.16.164.218:23 | auxiliary/scanner/telnet/brocade_enable_login | | |
| | auxiliary/scanner/telnet/telnet_encrypt_overflow | | |
| | auxiliary/scanner/telnet/telnet_login | | |
| | auxiliary/scanner/telnet/telnet_ruggedcom | | |
| | auxiliary/scanner/telnet/telnet_version | | |
| | exploit/freebsd/telnet/telnet_encrypt_keyid | | |
| | exploit/linux/telnet/netgear_telnetenable | | |
| | exploit/linux/telnet/telnet_encrypt_keyid | | |
| | exploit/solaris/telnet/fuser | | |
| | exploit/solaris/telnet/ttyprompt | | |
| | exploit/unix/misc/polycom_hdx_auth_bypass | | |
| | exploit/unix/misc/polycom_hdx_traceroute_exec | | |
| | exploit/unix/polycom_hdx_auth_bypass | | |
| | exploit/windows/proxy/ccproxy_telnet_ping | | |
| | exploit/windows/scada/procyon_core_server | | |
| | exploit/windows/telnet/gamsoft_telsrv_username | | |
+---------------------+--------------------------------------------------------------------------+ | |
| 172.16.164.218:5432 | auxiliary/scanner/postgres/postgres_dbname_flag_injection | | |
| | auxiliary/scanner/postgres/postgres_hashdump | | |
| | auxiliary/scanner/postgres/postgres_login | | |
| | auxiliary/scanner/postgres/postgres_schemadump | | |
| | auxiliary/scanner/postgres/postgres_version | | |
| | exploit/linux/postgres/postgres_payload | | |
| | exploit/multi/postgres/postgres_copy_from_program_cmd_exec | | |
| | exploit/multi/postgres/postgres_createlang | | |
| | exploit/windows/postgres/postgres_payload | | |
+---------------------+--------------------------------------------------------------------------+ | |
| 172.16.164.218:25 | auxiliary/client/smtp/emailer | | |
| | auxiliary/scanner/smtp/smtp_enum | | |
| | auxiliary/scanner/smtp/smtp_ntlm_domain | | |
| | auxiliary/scanner/smtp/smtp_relay | | |
| | auxiliary/scanner/smtp/smtp_version | | |
| | auxiliary/vsploit/pii/email_pii | | |
| | exploit/apple_ios/email/mobilemail_libtiff | | |
| | exploit/linux/smtp/exim4_dovecot_exec | | |
| | exploit/osx/email/mailapp_image_exec | | |
| | exploit/unix/smtp/clamav_milter_blackhole | | |
| | exploit/unix/smtp/exim4_string_format | | |
| | exploit/unix/smtp/morris_sendmail_debug | | |
| | exploit/unix/smtp/qmail_bash_env_exec | | |
| | exploit/unix/webapp/squirrelmail_pgp_plugin | | |
| | exploit/windows/email/ms07_017_ani_loadimage_chunksize | | |
| | exploit/windows/email/ms10_045_outlook_ref_only | | |
| | exploit/windows/email/ms10_045_outlook_ref_resolve | | |
| | exploit/windows/lotus/domino_icalendar_organizer | | |
| | exploit/windows/lotus/lotusnotes_lzh | | |
| | exploit/windows/smtp/mailcarrier_smtp_ehlo | | |
| | exploit/windows/smtp/mercury_cram_md5 | | |
| | exploit/windows/smtp/ms03_046_exchange2000_xexch50 | | |
| | exploit/windows/smtp/wmailserver | | |
| | exploit/windows/smtp/ypops_overflow1 | | |
+---------------------+--------------------------------------------------------------------------+ | |
| 172.16.164.218:445 | auxiliary/gather/windows_deployment_services_shares | | |
| | auxiliary/scanner/smb/psexec_loggedin_users | | |
| | auxiliary/scanner/smb/smb1 | | |
| | auxiliary/scanner/smb/smb2 | | |
| | auxiliary/scanner/smb/smb_enum_gpp | | |
| | auxiliary/scanner/smb/smb_login | | |
| | auxiliary/scanner/smb/smb_ms17_010 | | |
| | exploit/linux/samba/is_known_pipename | | |
| | exploit/linux/samba/lsa_transnames_heap | | |
| | exploit/linux/samba/setinfopolicy_heap | | |
| | exploit/netware/smb/lsass_cifs | | |
| | exploit/osx/samba/lsa_transnames_heap | | |
| | exploit/solaris/samba/lsa_transnames_heap | | |
| | exploit/windows/brightstor/etrust_itm_alert | | |
| | exploit/windows/oracle/extjob | | |
| | exploit/windows/smb/ipass_pipe_exec | | |
| | exploit/windows/smb/ms03_049_netapi | | |
| | exploit/windows/smb/ms04_007_killbill | | |
| | exploit/windows/smb/ms04_011_lsass | | |
| | exploit/windows/smb/ms04_031_netdde | | |
| | exploit/windows/smb/ms05_039_pnp | | |
| | exploit/windows/smb/ms06_025_rasmans_reg | | |
| | exploit/windows/smb/ms06_025_rras | | |
| | exploit/windows/smb/ms06_040_netapi | | |
| | exploit/windows/smb/ms06_066_nwapi | | |
| | exploit/windows/smb/ms06_066_nwwks | | |
| | exploit/windows/smb/ms06_070_wkssvc | | |
| | exploit/windows/smb/ms07_029_msdns_zonename | | |
| | exploit/windows/smb/ms08_067_netapi | | |
| | exploit/windows/smb/ms09_050_smb2_negotiate_func_index | | |
| | exploit/windows/smb/ms10_061_spoolss | | |
| | exploit/windows/smb/ms17_010_eternalblue | | |
| | exploit/windows/smb/ms17_010_eternalblue_win8 | | |
| | exploit/windows/smb/ms17_010_psexec | | |
| | exploit/windows/smb/netidentity_xtierrpcpipe | | |
| | exploit/windows/smb/psexec | | |
| | exploit/windows/smb/psexec_psh | | |
| | exploit/windows/smb/webexec | | |
+---------------------+--------------------------------------------------------------------------+ | |
| 172.16.164.218:6000 | auxiliary/scanner/x11/open_x11 | | |
| | exploit/unix/x11/x11_keyboard_exec | | |
+---------------------+--------------------------------------------------------------------------+ | |
| 172.16.164.218:21 | auxiliary/scanner/ftp/anonymous | | |
| | auxiliary/scanner/ftp/bison_ftp_traversal | | |
| | auxiliary/scanner/ftp/colorado_ftp_traversal | | |
| | auxiliary/scanner/ftp/easy_file_sharing_ftp | | |
| | auxiliary/scanner/ftp/ftp_login | | |
| | auxiliary/scanner/ftp/ftp_version | | |
| | auxiliary/scanner/ftp/konica_ftp_traversal | | |
| | auxiliary/scanner/ftp/pcman_ftp_traversal | | |
| | auxiliary/scanner/ftp/titanftp_xcrc_traversal | | |
| | exploit/freebsd/ftp/proftp_telnet_iac | | |
| | exploit/linux/ftp/proftp_sreplace | | |
| | exploit/linux/ftp/proftp_telnet_iac | | |
| | exploit/mainframe/ftp/ftp_jcl_creds | | |
| | exploit/multi/ftp/pureftpd_bash_env_exec | | |
| | exploit/multi/ftp/wuftpd_site_exec_format | | |
| | exploit/osx/ftp/webstar_ftp_user | | |
| | exploit/unix/ftp/proftpd_133c_backdoor | | |
| | exploit/unix/ftp/vsftpd_234_backdoor | | |
| | exploit/windows/ftp/3cdaemon_ftp_user | | |
| | exploit/windows/ftp/ability_server_stor | | |
| | exploit/windows/ftp/cesarftp_mkd | | |
| | exploit/windows/ftp/comsnd_ftpd_fmtstr | | |
| | exploit/windows/ftp/dreamftp_format | | |
| | exploit/windows/ftp/easyfilesharing_pass | | |
| | exploit/windows/ftp/easyftp_cwd_fixret | | |
| | exploit/windows/ftp/easyftp_list_fixret | | |
| | exploit/windows/ftp/easyftp_mkd_fixret | | |
| | exploit/windows/ftp/filecopa_list_overflow | | |
| | exploit/windows/ftp/freefloatftp_user | | |
| | exploit/windows/ftp/freefloatftp_wbem | | |
| | exploit/windows/ftp/freeftpd_pass | | |
| | exploit/windows/ftp/freeftpd_user | | |
| | exploit/windows/ftp/globalscapeftp_input | | |
| | exploit/windows/ftp/httpdx_tolog_format | | |
| | exploit/windows/ftp/kmftp_utility_cwd | | |
| | exploit/windows/ftp/ms09_053_ftpd_nlst | | |
| | exploit/windows/ftp/netterm_netftpd_user | | |
| | exploit/windows/ftp/open_ftpd_wbem | | |
| | exploit/windows/ftp/pcman_put | | |
| | exploit/windows/ftp/pcman_stor | | |
| | exploit/windows/ftp/quickshare_traversal_write | | |
| | exploit/windows/ftp/sami_ftpd_list | | |
| | exploit/windows/ftp/sami_ftpd_user | | |
| | exploit/windows/ftp/servu_chmod | | |
| | exploit/windows/ftp/servu_mdtm | | |
| | exploit/windows/ftp/slimftpd_list_concat | | |
| | exploit/windows/ftp/vermillion_ftpd_port | | |
| | exploit/windows/ftp/warftpd_165_pass | | |
| | exploit/windows/ftp/warftpd_165_user | | |
| | exploit/windows/ftp/wftpd_size | | |
| | exploit/windows/ftp/wsftp_server_503_mkd | | |
| | exploit/windows/ftp/wsftp_server_505_xmd5 | | |
| | exploit/windows/ftp/xlink_server | | |
+---------------------+--------------------------------------------------------------------------+ | |
[+] Running: exploit/mainframe/ftp/ftp_jcl_creds - 172.16.164.218:21 | |
[+] Running: exploit/multi/ftp/wuftpd_site_exec_format - 172.16.164.218:21 | |
[+] Running: exploit/aix/rpc_cmsd_opcode21 - 172.16.164.218:111 | |
[+] Running: exploit/multi/ftp/pureftpd_bash_env_exec - 172.16.164.218:21 | |
[+] Running: exploit/apple_ios/ssh/cydia_default_ssh - 172.16.164.218:22 | |
[+] Running: exploit/aix/rpc_ttdbserverd_realpath - 172.16.164.218:111 | |
[+] Running: exploit/multi/ids/snort_dce_rpc - 172.16.164.218:139 | |
[+] Running: exploit/multi/samba/usermap_script - 172.16.164.218:139 | |
[+] Running: exploit/multi/mysql/mysql_udf_payload - 172.16.164.218:3306 | |
[+] Running: exploit/multi/samba/nttrans - 172.16.164.218:139 | |
[+] Running: exploit/multi/misc/java_rmi_server - 172.16.164.218:1099 | |
[+] Running: exploit/multi/postgres/postgres_copy_from_program_cmd_exec - 172.16.164.218:5432 | |
[+] Running: exploit/multi/postgres/postgres_createlang - 172.16.164.218:5432 | |
[+] Running: exploit/multi/misc/legend_bot_exec - 172.16.164.218:6667 | |
[+] Running: exploit/multi/vnc/vnc_keyboard_exec - 172.16.164.218:5900 | |
[WORKING] 172.16.164.218:139 exploit/multi/samba/usermap_script | |
[WORKING] 172.16.164.218:1099 exploit/multi/misc/java_rmi_server | |
[+] Running: exploit/multi/misc/ra1nx_pubcall_exec - 172.16.164.218:6667 | |
[+] Running: exploit/multi/misc/pbot_exec - 172.16.164.218:6667 | |
[+] Running: exploit/multi/misc/w3tw0rk_exec - 172.16.164.218:6667 | |
[+] Running: exploit/multi/misc/xdh_x_exec - 172.16.164.218:6667 | |
[+] Running: auxiliary/scanner/ftp/anonymous - 172.16.164.218:21 | |
[+] Running: auxiliary/scanner/ftp/ftp_version - 172.16.164.218:21 | |
[+] Running: auxiliary/scanner/ssh/eaton_xpert_backdoor - 172.16.164.218:22 | |
[+] Running: auxiliary/scanner/ftp/bison_ftp_traversal - 172.16.164.218:21 | |
[+] Running: auxiliary/scanner/ftp/konica_ftp_traversal - 172.16.164.218:21 | |
[+] Running: auxiliary/scanner/ssh/fortinet_backdoor - 172.16.164.218:22 | |
[+] Running: auxiliary/scanner/ftp/colorado_ftp_traversal - 172.16.164.218:21 | |
[+] Running: auxiliary/scanner/ftp/pcman_ftp_traversal - 172.16.164.218:21 | |
[+] Running: auxiliary/scanner/ssh/juniper_backdoor - 172.16.164.218:22 | |
[+] Running: auxiliary/scanner/ftp/easy_file_sharing_ftp - 172.16.164.218:21 | |
[+] Running: auxiliary/scanner/ftp/titanftp_xcrc_traversal - 172.16.164.218:21 | |
[+] Running: auxiliary/scanner/ssh/libssh_auth_bypass - 172.16.164.218:22 | |
[+] Running: auxiliary/scanner/ftp/ftp_login - 172.16.164.218:21 | |
[+] Running: auxiliary/scanner/ssh/detect_kippo - 172.16.164.218:22 | |
[+] Running: auxiliary/scanner/ssh/ssh_enumusers - 172.16.164.218:22 | |
[+] Running: auxiliary/scanner/ssh/ssh_login - 172.16.164.218:22 | |
[+] Running: auxiliary/scanner/telnet/telnet_ruggedcom - 172.16.164.218:23 | |
[+] Running: auxiliary/scanner/smtp/smtp_relay - 172.16.164.218:25 | |
[+] Running: auxiliary/scanner/ssh/ssh_version - 172.16.164.218:22 | |
[+] Running: auxiliary/scanner/telnet/telnet_version - 172.16.164.218:23 | |
[+] Running: auxiliary/scanner/smtp/smtp_version - 172.16.164.218:25 | |
[+] Running: auxiliary/scanner/telnet/brocade_enable_login - 172.16.164.218:23 | |
[+] Running: auxiliary/client/smtp/emailer - 172.16.164.218:25 | |
[+] Running: auxiliary/scanner/dns/dns_amp - 172.16.164.218:53 | |
[+] Running: auxiliary/scanner/telnet/telnet_encrypt_overflow - 172.16.164.218:23 | |
[+] Running: auxiliary/scanner/smtp/smtp_enum - 172.16.164.218:25 | |
[+] Running: auxiliary/scanner/misc/sunrpc_portmapper - 172.16.164.218:111 | |
[+] Running: auxiliary/scanner/telnet/telnet_login - 172.16.164.218:23 | |
[+] Running: auxiliary/scanner/smtp/smtp_ntlm_domain - 172.16.164.218:25 | |
[+] Running: auxiliary/scanner/nfs/nfsmount - 172.16.164.218:111 | |
[+] Running: auxiliary/scanner/portmap/portmap_amp - 172.16.164.218:111 | |
[+] Running: auxiliary/scanner/smb/smb_login - 172.16.164.218:445 | |
[+] Running: auxiliary/gather/java_rmi_registry - 172.16.164.218:1099 | |
[+] Running: auxiliary/scanner/smb/psexec_loggedin_users - 172.16.164.218:445 | |
[+] Running: auxiliary/scanner/smb/smb_ms17_010 - 172.16.164.218:445 | |
[+] Running: auxiliary/scanner/misc/java_jmx_server - 172.16.164.218:1099 | |
[+] Running: auxiliary/scanner/smb/smb1 - 172.16.164.218:445 | |
[+] Running: auxiliary/scanner/rservices/rexec_login - 172.16.164.218:512 | |
[+] Running: auxiliary/scanner/misc/java_rmi_server - 172.16.164.218:1099 | |
[+] Running: auxiliary/scanner/smb/smb2 - 172.16.164.218:445 | |
[+] Running: auxiliary/scanner/rservices/rlogin_login - 172.16.164.218:513 | |
[+] Running: auxiliary/scanner/mysql/mysql_authbypass_hashdump - 172.16.164.218:3306 | |
[+] Running: auxiliary/scanner/smb/smb_enum_gpp - 172.16.164.218:445 | |
[+] Running: auxiliary/scanner/rservices/rsh_login - 172.16.164.218:514 | |
[+] Running: auxiliary/scanner/mysql/mysql_hashdump - 172.16.164.218:3306 | |
[+] Running: auxiliary/scanner/mysql/mysql_login - 172.16.164.218:3306 | |
[+] Running: auxiliary/scanner/mysql/mysql_schemadump - 172.16.164.218:3306 | |
[+] Running: auxiliary/scanner/mysql/mysql_version - 172.16.164.218:3306 | |
[+] Running: auxiliary/scanner/postgres/postgres_dbname_flag_injection - 172.16.164.218:5432 | |
[+] Running: auxiliary/scanner/postgres/postgres_hashdump - 172.16.164.218:5432 | |
[+] Running: auxiliary/scanner/postgres/postgres_login - 172.16.164.218:5432 | |
[+] Running: auxiliary/scanner/postgres/postgres_schemadump - 172.16.164.218:5432 | |
[+] Running: auxiliary/scanner/postgres/postgres_version - 172.16.164.218:5432 | |
[+] Running: auxiliary/scanner/vnc/ard_root_pw - 172.16.164.218:5900 | |
[+] Running: auxiliary/scanner/vnc/vnc_login - 172.16.164.218:5900 | |
[+] Running: auxiliary/scanner/vnc/vnc_none_auth - 172.16.164.218:5900 | |
[+] Running: auxiliary/scanner/x11/open_x11 - 172.16.164.218:6000 | |
[+] Running: auxiliary/gather/solarwinds_orion_sqli - 172.16.164.218:8787 | |
[List of Modules to Run Manually] | |
+---------------------+-----------------------------------------------------------------+---------------------------+ | |
| Targets | Metasploit Module | Module Parameters | | |
+=====================+=================================================================+===========================+ | |
| 172.16.164.218:25 | auxiliary/vsploit/pii/email_pii | MAILTO|SUBJECT | | |
| | auxiliary/apple_ios/email/mobilemail_libtiff | MAILTO|SUBJECT | | |
| | auxiliary/osx/email/mailapp_image_exec | MAILTO|SUBJECT | | |
| | auxiliary/unix/webapp/squirrelmail_pgp_plugin | MAILTO|SUBJECT | | |
| | auxiliary/windows/email/ms07_017_ani_loadimage_chunksize | MAILTO|SUBJECT | | |
| | auxiliary/windows/email/ms10_045_outlook_ref_only | MAILTO|SUBJECT | | |
| | auxiliary/windows/email/ms10_045_outlook_ref_resolve | MAILTO|SUBJECT | | |
| | auxiliary/windows/lotus/domino_icalendar_organizer | MAILFROM|MAILTO | | |
| | auxiliary/windows/lotus/lotusnotes_lzh | MAILTO|SUBJECT | | |
| | auxiliary/windows/smtp/mailcarrier_smtp_ehlo | LHOST | | |
+---------------------+-----------------------------------------------------------------+---------------------------+ | |
| 172.16.164.218:22 | auxiliary/scanner/ssh/cerberus_sftp_enumusers | USER_FILE | | |
| | auxiliary/scanner/ssh/ssh_identify_pubkeys | KEY_FILE | | |
| | auxiliary/scanner/ssh/ssh_login_pubkey | KEY_PATH | | |
| | auxiliary/linux/ssh/mercurial_ssh_exec | SSH_PRIV_KEY_FILE | | |
| | auxiliary/multi/ssh/sshexec | PASSWORD | | |
+---------------------+-----------------------------------------------------------------+---------------------------+ | |
| 172.16.164.218:445 | auxiliary/windows/smb/ms06_070_wkssvc | DOMAIN | | |
| | auxiliary/windows/smb/ms17_010_eternalblue | CheckScanner | | |
| | auxiliary/windows/smb/ms17_010_psexec | CheckScanner | | |
+---------------------+-----------------------------------------------------------------+---------------------------+ | |
| 172.16.164.218:111 | auxiliary/gather/nis_bootparamd_domain | CLIENT | | |
| | auxiliary/gather/nis_ypserv_map | DOMAIN | | |
+---------------------+-----------------------------------------------------------------+---------------------------+ | |
| 172.16.164.218:3306 | auxiliary/scanner/mysql/mysql_file_enum | FILE_LIST | | |
| | auxiliary/scanner/mysql/mysql_writable_dirs | DIR_LIST | | |
| | auxiliary/windows/mysql/mysql_mof | USERNAME|PASSWORD | | |
| | auxiliary/windows/mysql/mysql_start_up | USERNAME|PASSWORD | | |
+---------------------+-----------------------------------------------------------------+---------------------------+ | |
| 172.16.164.218:80 | auxiliary/gather/oats_downloadservlet_traversal | OATSPASSWORD | | |
| | auxiliary/gather/pimcore_creds_sqli | APIKEY | | |
| | auxiliary/gather/xerox_workcentre_5xxx_ldap | NewLDAPServer | | |
| | auxiliary/scanner/http/apache_mod_cgi_bash_env | TARGETURI | | |
| | auxiliary/scanner/http/cgit_traversal | REPO | | |
| | auxiliary/scanner/http/enum_wayback | DOMAIN | | |
| | auxiliary/scanner/http/httpbl_lookup | HTTPBL_APIKEY | | |
| | auxiliary/scanner/http/litespeed_source_disclosure | PATH_SAVE | | |
| | auxiliary/scanner/http/nginx_source_disclosure | PATH_SAVE | | |
| | auxiliary/scanner/http/squid_pivot_scanning | RANGE | | |
| | auxiliary/scanner/http/vhost_scanner | DOMAIN | | |
| | auxiliary/scanner/http/web_vulndb | VULNCSV | | |
| | auxiliary/scanner/http/wp_arbitrary_file_deletion | USERNAME|PASSWORD | | |
| | auxiliary/scanner/http/wp_nextgen_galley_file_read | WP_USER|WP_PASS | | |
| | auxiliary/scanner/http/wp_subscribe_comments_file_read | WP_USER|WP_PASS | | |
| | auxiliary/scanner/rogue/rogue_send | EHOST | | |
| | auxiliary/voip/telisca_ips_lock_control | PHONENAME | | |
| | auxiliary/linux/http/efw_chpasswd_exec | EFW_PASSWORD|EFW_USERNAME | | |
| | auxiliary/linux/http/kaltura_unserialize_cookie_rce | ENTRYID | | |
| | auxiliary/linux/http/librenms_addhost_cmd_inject | USERNAME|PASSWORD | | |
| | auxiliary/linux/http/linksys_wrt160nv2_apply_exec | LHOST | | |
| | auxiliary/linux/http/nagios_xi_magpie_debug | RSRVHOST | | |
| | auxiliary/linux/http/netgear_dnslookup_cmd_exec | USERNAME|PASSWORD | | |
| | auxiliary/linux/http/symantec_web_gateway_restore | USERNAME|PASSWORD | | |
| | auxiliary/linux/http/trueonline_p660hn_v2_rce | LHOST | | |
| | auxiliary/linux/http/webmin_packageup_rce | USERNAME|PASSWORD | | |
| | auxiliary/multi/http/activecollab_chat | PASS|USER | | |
| | auxiliary/multi/http/apache_mod_cgi_bash_env_exec | TARGETURI | | |
| | auxiliary/multi/http/bolt_file_upload | PASSWORD|USERNAME | | |
| | auxiliary/multi/http/cmsms_showtime2_rce | USERNAME | | |
| | auxiliary/multi/http/cmsms_upload_rename_rce | USERNAME|PASSWORD | | |
| | auxiliary/multi/http/confluence_widget_connector | SRVHOST | | |
| | auxiliary/multi/http/horde_form_file_upload | USERNAME|PASSWORD | | |
| | auxiliary/multi/http/monstra_fileupload_exec | USERNAME|PASSWORD | | |
| | auxiliary/multi/http/moodle_cmd_exec | PASSWORD | | |
| | auxiliary/multi/http/nibbleblog_file_upload | USERNAME|PASSWORD | | |
| | auxiliary/multi/http/pimcore_unserialize_rce | USERNAME | | |
| | auxiliary/multi/http/qdpm_upload_exec | PASSWORD|USERNAME | | |
| | auxiliary/multi/http/rails_secret_deserialization | SECRET | | |
| | auxiliary/multi/http/sit_file_upload | USERNAME|PASSWORD | | |
| | auxiliary/multi/http/vtiger_logo_upload_exec | PASSWORD | | |
| | auxiliary/multi/http/wikka_spam_exec | USERNAME|PASSWORD|PAGE | | |
| | auxiliary/multi/http/wp_crop_rce | USERNAME|PASSWORD | | |
| | auxiliary/multi/http/wp_ninja_forms_unauthenticated_file_upload | FORM_PATH | | |
| | auxiliary/multi/http/wp_responsive_thumbnail_slider_upload | WPPASSWORD | | |
| | auxiliary/multi/http/x7chat2_php_exec | PASSWORD|USERNAME | | |
| | auxiliary/unix/webapp/get_simple_cms_upload_exec | USERNAME|PASSWORD | | |
| | auxiliary/unix/webapp/hastymail_exec | PASS|USER | | |
| | auxiliary/unix/webapp/joomla_media_upload_exec | USERNAME|PASSWORD | | |
| | auxiliary/unix/webapp/nagios_graph_explorer | PASSWORD | | |
| | auxiliary/unix/webapp/openemr_sqli_privesc_upload | PASS|USER | | |
| | auxiliary/unix/webapp/opensis_modname_exec | USERNAME|PASSWORD | | |
| | auxiliary/unix/webapp/openx_banner_edit | USERNAME|PASSWORD | | |
| | auxiliary/unix/webapp/piwik_superuser_plugin_upload | USERNAME|PASSWORD | | |
| | auxiliary/unix/webapp/sugarcrm_unserialize_exec | USERNAME|PASSWORD | | |
| | auxiliary/unix/webapp/webmin_upload_exec | USERNAME|PASSWORD | | |
| | auxiliary/unix/webapp/wp_admin_shell_upload | USERNAME|PASSWORD | | |
| | auxiliary/unix/webapp/wp_ajax_load_more_file_upload | WP_PASSWORD|WP_USERNAME | | |
| | auxiliary/unix/webapp/wp_photo_gallery_unrestricted_file_upload | USERNAME|PASSWORD | | |
| | auxiliary/unix/webapp/wp_slideshowgallery_upload | WP_USER|WP_PASSWORD | | |
| | auxiliary/unix/webapp/wp_wptouch_file_upload | PASSWORD|USER | | |
| | auxiliary/unix/webapp/xymon_useradm_cmd_exec | PASSWORD|USERNAME | | |
| | auxiliary/unix/webapp/zpanel_username_exec | USERNAME|PASSWORD | | |
| | auxiliary/windows/http/oats_weblogic_console | OATSPASSWORD | | |
| | auxiliary/windows/http/sysax_create_folder | SysaxUSER|SysaxPASS | | |
+---------------------+-----------------------------------------------------------------+---------------------------+ | |
[*] 1 HTTP servers found | |
[*] 0 HTTPs servers found | |
[Bruteforcing URI Paths] | |
[+] Checking: http://172.16.164.218:80/portal - 404 | |
[+] Checking: http://172.16.164.218:80/stmeetings - 404 | |
[+] Checking: http://172.16.164.218:80/_all_dbs - 404 | |
[+] Checking: http://172.16.164.218:80/cgi-bin/config.exp - 404 | |
[+] Checking: http://172.16.164.218:80/courier/intermediate_login.html - 404 | |
[+] Checking: http://172.16.164.218:80/dolibarr - 404 | |
[+] Checking: http://172.16.164.218:80/admin/index.jsp - 404 | |
[+] Checking: http://172.16.164.218:80/crowd/services - 404 | |
[+] Checking: http://172.16.164.218:80/drupal - 404 | |
[+] Checking: http://172.16.164.218:80/axis2/services/listServices - 404 | |
[+] Checking: http://172.16.164.218:80/userinfo/search - 404 | |
[+] Checking: http://172.16.164.218:80/axis2/axis2-admin/login - 404 | |
[+] Checking: http://172.16.164.218:80/clansphere_2011.3 - 404 | |
[+] Checking: http://172.16.164.218:80/cgi-mod/view_help.cgi - 404 | |
[+] Checking: http://172.16.164.218:80/data/login - 404 | |
[+] Checking: http://172.16.164.218:80/index.php?age=50[NoSQLi] - 200 | |
[+] Checking: http://172.16.164.218:80/cgi-bin/dna - 404 | |
[+] Checking: http://172.16.164.218:80/bitweaver - 404 | |
[+] Checking: http://172.16.164.218:80/caidao.php - 404 | |
[+] Checking: http://172.16.164.218:80/dolibarr/ - 404 | |
[+] Checking: http://172.16.164.218:80/cgit - 404 | |
[+] Checking: http://172.16.164.218:80/.git - 404 | |
[+] Checking: http://172.16.164.218:80/forum - 404 | |
[+] Checking: http://172.16.164.218:80/imc - 404 | |
[+] Checking: http://172.16.164.218:80/status - 404 | |
[+] Checking: http://172.16.164.218:80/opennms - 404 | |
[+] Checking: http://172.16.164.218:80/jenkins - 404 | |
[+] Checking: http://172.16.164.218:80/SiteScope - 404 | |
[+] Checking: http://172.16.164.218:80/zabbix - 404 | |
[+] Checking: http://172.16.164.218:80/jenkins/ - 404 | |
[+] Checking: http://172.16.164.218:80/SiteScope/ - 404 | |
[+] Checking: http://172.16.164.218:80/admin.php - 404 | |
[+] Checking: http://172.16.164.218:80/eng - 404 | |
[+] Checking: http://172.16.164.218:80/VPortal/mgtconsole/CheckPassword.jsp - 404 | |
[+] Checking: http://172.16.164.218:80/api/users/login - 404 | |
[+] Checking: http://172.16.164.218:80/mediawiki - 404 | |
[+] Checking: http://172.16.164.218:80/s40 - 404 | |
[+] Checking: http://172.16.164.218:80/provision/index.php - 404 | |
[+] Checking: http://172.16.164.218:80/www - 404 | |
[+] Checking: http://172.16.164.218:80/.svn - 404 | |
[+] Checking: http://172.16.164.218:80/session - 404 | |
[+] Checking: http://172.16.164.218:80/admin/j_security_check - 404 | |
[+] Checking: http://172.16.164.218:80/index.php - 200 | |
[+] Checking: http://172.16.164.218:80/sap/bc/soap/rfc - 404 | |
[+] Checking: http://172.16.164.218:80/manager/html - 404 | |
[+] Checking: http://172.16.164.218:80/vcms2 - 404 | |
[+] Checking: http://172.16.164.218:80/bvsmweb - 404 | |
[+] Checking: http://172.16.164.218:80/rips - 404 | |
[+] Checking: http://172.16.164.218:80/ATutor - 404 | |
[+] Checking: http://172.16.164.218:80/iControl/iControlPortal.cgi - 404 | |
[+] Checking: http://172.16.164.218:80/centreon - 404 | |
[+] Checking: http://172.16.164.218:80/admin2769gx8k3 - 404 | |
[+] Checking: http://172.16.164.218:80/components/system/configuration/functions.php - 404 | |
[+] Checking: http://172.16.164.218:80/pws/impcli - 404 | |
[+] Checking: http://172.16.164.218:80/swimtemp - 404 | |
[+] Checking: http://172.16.164.218:80/qcenter - 404 | |
[+] Checking: http://172.16.164.218:80/ping.ccp - 404 | |
[+] Checking: http://172.16.164.218:80/v2/apps - 404 | |
[+] Checking: http://172.16.164.218:80/boardDataWW.php - 404 | |
[+] Checking: http://172.16.164.218:80/railo-context - 404 | |
[+] Checking: http://172.16.164.218:80/cgi-bin/dna/ - 404 | |
[+] Checking: http://172.16.164.218:80/pandora_console - 404 | |
[+] Checking: http://172.16.164.218:80/v1/projects - 404 | |
[+] Checking: http://172.16.164.218:80/cgi-bin/chpasswd.cgi - 404 | |
[+] Checking: http://172.16.164.218:80/cmsms - 404 | |
[+] Checking: http://172.16.164.218:80/RPC2 - 404 | |
[+] Checking: http://172.16.164.218:80/AjaXplorer-2.5.5 - 404 | |
[+] Checking: http://172.16.164.218:80/spywall/pbcontrol.php - 404 | |
[+] Checking: http://172.16.164.218:80/roller - 404 | |
[+] Checking: http://172.16.164.218:80/cuteflow_v.2.11.2 - 404 | |
[+] Checking: http://172.16.164.218:80/com_extplorer_2.1.0 - 404 | |
[+] Checking: http://172.16.164.218:80/appRain-q-0.1.5 - 404 | |
[+] Checking: http://172.16.164.218:80/vcms - 404 | |
[+] Checking: http://172.16.164.218:80/WebCalendar-1.2.4 - 404 | |
[+] Checking: http://172.16.164.218:80/gestioip - 404 | |
[+] Checking: http://172.16.164.218:80/ATutor/ - 404 | |
[+] Checking: http://172.16.164.218:80/glossword/1.8 - 404 | |
[+] Checking: http://172.16.164.218:80/WeBid - 404 | |
[+] Checking: http://172.16.164.218:80/Auxiliumpetratepro - 404 | |
[+] Checking: http://172.16.164.218:80/jira - 404 | |
[+] Checking: http://172.16.164.218:80/glpi - 404 | |
[+] Checking: http://172.16.164.218:80/mma.php - 404 | |
[+] Checking: http://172.16.164.218:80/kordil_edms - 404 | |
[+] Checking: http://172.16.164.218:80/openadmin - 404 | |
[+] Checking: http://172.16.164.218:80/jmx-console - 404 | |
[+] Checking: http://172.16.164.218:80/mobilecartly - 404 | |
[+] Checking: http://172.16.164.218:80/log1cms2.0 - 404 | |
[+] Checking: http://172.16.164.218:80/moodle - 404 | |
[+] Checking: http://172.16.164.218:80/invoker/JMXInvokerServlet - 404 | |
[+] Checking: http://172.16.164.218:80/mt - 404 | |
[+] Checking: http://172.16.164.218:80/admin-console/login.seam - 404 | |
[+] Checking: http://172.16.164.218:80/mantisbt - 404 | |
[+] Checking: http://172.16.164.218:80/navigate - 404 | |
[+] Checking: http://172.16.164.218:80/interface - 404 | |
[+] Checking: http://172.16.164.218:80/openx - 404 | |
[+] Checking: http://172.16.164.218:80/wiki - 404 | |
[+] Checking: http://172.16.164.218:80/wls-wsat/CoordinatorPortType - 404 | |
[+] Checking: http://172.16.164.218:80/pandora_console/ - 404 | |
[+] Checking: http://172.16.164.218:80/Phoenix/includes/geoip.php - 404 | |
[+] Checking: http://172.16.164.218:80/php-utility-belt/ajax.php - 404 | |
[+] Checking: http://172.16.164.218:80/phptax - 404 | |
[+] Checking: http://172.16.164.218:80/sflog - 404 | |
[+] Checking: http://172.16.164.218:80/bf102 - 404 | |
[+] Checking: http://172.16.164.218:80/phpwiki - 404 | |
[+] Checking: http://172.16.164.218:80/struts2-showcase/integration/saveGangster.action - 404 | |
[+] Checking: http://172.16.164.218:80/polarbearcms - 404 | |
[+] Checking: http://172.16.164.218:80/phpFileManager-0.9.8/index.php - 404 | |
[+] Checking: http://172.16.164.218:80/struts2-showcase - 404 | |
[+] Checking: http://172.16.164.218:80/phpmyadmin - 404 | |
[+] Checking: http://172.16.164.218:80/qdPM - 404 | |
[+] Checking: http://172.16.164.218:80/struts2-rest-showcase/orders/3 - 404 | |
[+] Checking: http://172.16.164.218:80/missing404 - 404 | |
[+] Checking: http://172.16.164.218:80/phpmyadmin/ - 404 | |
[+] Checking: http://172.16.164.218:80/struts2-blank/example/HelloWorld.action - 404 | |
[+] Checking: http://172.16.164.218:80/manager - 404 | |
[+] Checking: http://172.16.164.218:80/blank-struts2/login.action - 404 | |
[+] Checking: http://172.16.164.218:80/console - 404 | |
[+] Checking: http://172.16.164.218:80/IDC.php - 404 | |
[+] Checking: http://172.16.164.218:80/jos.php - 404 | |
[+] Checking: http://172.16.164.218:80/wikka - 404 | |
[+] Checking: http://172.16.164.218:80/sysaid - 404 | |
[+] Checking: http://172.16.164.218:80/vtigercrm - 404 | |
[+] Checking: http://172.16.164.218:80/x7chat2 - 404 | |
[+] Checking: http://172.16.164.218:80/testlink-1.9.3 - 404 | |
[+] Checking: http://172.16.164.218:80/zabbix/ - 404 | |
[+] Checking: http://172.16.164.218:80/vtigercrm/ - 404 | |
[+] Checking: http://172.16.164.218:80/Zemra/Panel/Zemra/system/command.php - 404 | |
[+] Checking: http://172.16.164.218:80/zenworks - 404 | |
[+] Checking: http://172.16.164.218:80/www/ - 404 | |
[+] Checking: http://172.16.164.218:80/do/view/Main/WebHome - 404 | |
[+] Checking: http://172.16.164.218:80/zpanel - 404 | |
[+] Checking: http://172.16.164.218:80/lite - 404 | |
[+] Checking: http://172.16.164.218:80/chat - 404 | |
[+] Checking: http://172.16.164.218:80/_async/AsyncResponseService - 404 | |
[+] Checking: http://172.16.164.218:80/GetSimpleCMS - 404 | |
[+] Checking: http://172.16.164.218:80/basilic-1.5.14 - 404 | |
[+] Checking: http://172.16.164.218:80/installer.php - 404 | |
[+] Checking: http://172.16.164.218:80/hastymail2 - 404 | |
[+] Checking: http://172.16.164.218:80/forums - 404 | |
[+] Checking: http://172.16.164.218:80/sample - 404 | |
[+] Checking: http://172.16.164.218:80/horde - 404 | |
[+] Checking: http://172.16.164.218:80/elFinder - 404 | |
[+] Checking: http://172.16.164.218:80/joomla - 404 | |
[+] Checking: http://172.16.164.218:80/hybridauth - 404 | |
[+] Checking: http://172.16.164.218:80/jQuery-File-Upload - 404 | |
[+] Checking: http://172.16.164.218:80/kimai - 404 | |
[+] Checking: http://172.16.164.218:80/librettoCMS_v.2.2.2 - 404 | |
[+] Checking: http://172.16.164.218:80/nagios3/cgi-bin/history.cgi - 404 | |
[+] Checking: http://172.16.164.218:80/simple_e_document_v_1_31 - 404 | |
[+] Checking: http://172.16.164.218:80/php-charts_v1.0 - 404 | |
[+] Checking: http://172.16.164.218:80/cgi-bin/mt - 404 | |
[+] Checking: http://172.16.164.218:80/narcissus-master - 404 | |
[+] Checking: http://172.16.164.218:80/phpcollab - 404 | |
[+] Checking: http://172.16.164.218:80/sugarcrm - 404 | |
[+] Checking: http://172.16.164.218:80/php-ofc-library - 404 | |
[+] Checking: http://172.16.164.218:80/pp088 - 404 | |
[+] Checking: http://172.16.164.218:80/sugarcrm/ - 404 | |
[+] Checking: http://172.16.164.218:80/openemr - 404 | |
[+] Checking: http://172.16.164.218:80/ProjectSend - 404 | |
[+] Checking: http://172.16.164.218:80/tiki - 404 | |
[+] Checking: http://172.16.164.218:80/opensis - 404 | |
[+] Checking: http://172.16.164.218:80/seportal - 404 | |
[+] Checking: http://172.16.164.218:80/zimbraAdmin - 404 | |
[+] Checking: http://172.16.164.218:80/autopass - 404 | |
[+] Checking: http://172.16.164.218:80/tiki/ - 404 | |
[+] Checking: http://172.16.164.218:80/zm - 404 | |
[+] Checking: http://172.16.164.218:80/vicidial - 404 | |
[+] Checking: http://172.16.164.218:80/ws/control - 404 | |
[+] Checking: http://172.16.164.218:80/webtester5 - 404 | |
[+] Checking: http://172.16.164.218:80/cms400min - 404 | |
[+] Checking: http://172.16.164.218:80/ctc/servlet - 404 | |
[+] Checking: http://172.16.164.218:80/xoda - 404 | |
[+] Checking: http://172.16.164.218:80/d4d/statusFilter.php - 404 | |
[+] Checking: http://172.16.164.218:80/cms400min/ - 404 | |
[+] Checking: http://172.16.164.218:80/TrackItWeb - 404 | |
[+] Checking: http://172.16.164.218:80/cgi-bin/function.php?argument= - 404 | |
[+] Checking: http://172.16.164.218:80/xymon-seccgi - 404 | |
[+] Checking: http://172.16.164.218:80/status/Status_Basic.asp - 404 | |
[+] Checking: http://172.16.164.218:80/umbraco - 404 | |
[+] Checking: http://172.16.164.218:80/errorInSignUp.htm - 404 | |
[+] Checking: http://172.16.164.218:80/cgi-bin/luci - 404 | |
[+] Checking: http://172.16.164.218:80/Login.jsp - 404 | |
[+] Checking: http://172.16.164.218:80/vtapi/v2/file/scan - 404 | |
[+] Checking: http://172.16.164.218:80/common/index.jsf - 404 | |
[+] Checking: http://172.16.164.218:80/ChangePhoto.jsp - 404 | |
[+] Checking: http://172.16.164.218:80/HtmlAdaptor - 404 | |
[+] Checking: http://172.16.164.218:80/version - 404 | |
[+] Checking: http://172.16.164.218:80/login.jsf - 404 | |
[+] Checking: http://172.16.164.218:80/gw_login.php - 404 | |
[+] Checking: http://172.16.164.218:80/goform/websLogin - 404 | |
[+] Checking: http://172.16.164.218:80/gw_admin.php?a=edit-own&t=users - 404 | |
[+] Checking: http://172.16.164.218:80/console/login/LoginForm.jsp - 404 | |
[+] Checking: http://172.16.164.218:80/global_group_login.php - 404 | |
[+] Checking: http://172.16.164.218:80/userpictures - 404 | |
[+] Checking: http://172.16.164.218:80/servlets/FileUploadServlet - 404 | |
[+] Checking: http://172.16.164.218:80/jsp - 404 | |
[+] Checking: http://172.16.164.218:80/appliance/applianceMainPage - 404 | |
[+] Checking: http://172.16.164.218:80/appliance - 404 | |
[+] Checking: http://172.16.164.218:80/admin/ - 404 | |
[+] Checking: http://172.16.164.218:80/wizards/post2file.php - 404 | |
[+] Checking: http://172.16.164.218:80/login_page.php - 404 | |
[+] Checking: http://172.16.164.218:80/theme - 404 | |
[+] Checking: http://172.16.164.218:80/ajax/jsonQuery.php - 404 | |
[+] Checking: http://172.16.164.218:80/en-US/manager/appinstall/_upload - 404 | |
[+] Checking: http://172.16.164.218:80/mods/documents/uploads/ - 404 | |
[+] Checking: http://172.16.164.218:80/readme - 404 | |
[+] Checking: http://172.16.164.218:80/main.php - 404 | |
[+] Checking: http://172.16.164.218:80/proxy/ssllogin - 404 | |
[+] Checking: http://172.16.164.218:80/actions/beats_uploader.php - 404 | |
[+] Checking: http://172.16.164.218:80/www/delivery/fc.php - 404 | |
[+] Checking: http://172.16.164.218:80/actions/pdir/pname - 404 | |
[+] Checking: http://172.16.164.218:80/login.php - 404 | |
[+] Checking: http://172.16.164.218:80/etc/apps/phpmyadmin/index.php - 404 | |
[+] Checking: http://172.16.164.218:80/upload_area - 404 | |
[+] Checking: http://172.16.164.218:80/etc/apps/phpmyadmin/import.php - 404 | |
[+] Checking: http://172.16.164.218:80/upload_area/nodes_hierarchy - 404 | |
[+] Checking: http://172.16.164.218:80/servlet/com.me.opmanager.extranet.remote.communication.fw.fe.FileCollector - 404 | |
[+] Checking: http://172.16.164.218:80/event/index3.do - 404 | |
[+] Checking: http://172.16.164.218:80/admin/libraries/ajaxfilemanager/ajax_create_folder.php - 404 | |
[+] Checking: http://172.16.164.218:80/index.php?loggedout - 200 | |
[+] Checking: http://172.16.164.218:80/event/agentUpload - 404 | |
[+] Checking: http://172.16.164.218:80/admin/libraries/ajaxfilemanager/inc/data.php - 404 | |
[+] Checking: http://172.16.164.218:80/agentUpload - 404 | |
[+] Checking: http://172.16.164.218:80/files/php_pagename - 404 | |
[+] Checking: http://172.16.164.218:80/olt/Login.do/../../olt/UploadFileUpload.do - 404 | |
[+] Checking: http://172.16.164.218:80/new - 404 | |
[+] Checking: http://172.16.164.218:80/jetspeed/login/redirector - 404 | |
[+] Checking: http://172.16.164.218:80/images/../jsp/ProcessFileUpload.jsp - 404 | |
[+] Checking: http://172.16.164.218:80/jetspeed/portal/Administrative/site.psml - 404 | |
[+] Checking: http://172.16.164.218:80/Admin/archive/ArchiveCache - 404 | |
[+] Checking: http://172.16.164.218:80/Admin/archive/upload.jsp - 404 | |
[+] Checking: http://172.16.164.218:80/examples/save.lsp - 404 | |
[+] Checking: http://172.16.164.218:80/themes/dashboard/assets/plugins/jquery-file-upload/server/php - 404 | |
[+] Checking: http://172.16.164.218:80/includes/jquery.uploadify/upload.php - 404 | |
[+] Checking: http://172.16.164.218:80/includes/jquery.uploadify/upload.php?folder=#{upload_dir} - 404 | |
[+] Checking: http://172.16.164.218:80/LiveTime/WebObjects/LiveTime.woa - 404 | |
[+] Checking: http://172.16.164.218:80/images/.. - 200 | |
[+] Checking: http://172.16.164.218:80/LiveTime - 404 | |
[+] Checking: http://172.16.164.218:80/addons/uploadify/uploadify.php - 404 | |
[+] Checking: http://172.16.164.218:80/rails - 404 | |
[+] Checking: http://172.16.164.218:80/public/uploads/pay_name - 404 | |
[+] Checking: http://172.16.164.218:80/wizards - 404 | |
[+] Checking: http://172.16.164.218:80/admin/Login.do - 404 | |
[+] Checking: http://172.16.164.218:80/install.php - 404 | |
[+] Checking: http://172.16.164.218:80/axis2-admin/login - 404 | |
[+] Checking: http://172.16.164.218:80/test/logo - 404 | |
[+] Checking: http://172.16.164.218:80/images - 404 | |
[+] Checking: http://172.16.164.218:80/wikka.php - 404 | |
[+] Checking: http://172.16.164.218:80/my_view_page.php - 404 | |
[+] Checking: http://172.16.164.218:80/library/openflashchart/tmp-upload-images - 404 | |
[+] Checking: http://172.16.164.218:80/spamlog.txt.php - 404 | |
[+] Checking: http://172.16.164.218:80/SGPAdmin/fileRequest - 404 | |
[+] Checking: http://172.16.164.218:80/ajax-load-more/core/repeater - 404 | |
[+] Checking: http://172.16.164.218:80/servlet/Main - 404 | |
[+] Checking: http://172.16.164.218:80/_search - 404 | |
[+] Checking: http://172.16.164.218:80/j_security_check - 404 | |
[+] Checking: http://172.16.164.218:80/scripts/upload.php - 404 | |
[+] Checking: http://172.16.164.218:80/interface/login/login.php - 404 | |
[+] Checking: http://172.16.164.218:80/mods/_core/modules - 404 | |
[+] Checking: http://172.16.164.218:80/library/openflashchart/php-ofc-library/ofc_upload_image.php - 404 | |
[+] Checking: http://172.16.164.218:80/havalite/upload.php - 404 | |
[+] Checking: http://172.16.164.218:80/foxypress/uploadify/uploadify.php - 404 | |
[+] Checking: http://172.16.164.218:80/upload.php - 404 | |
[+] Checking: http://172.16.164.218:80/cgi-bin/kerbynet - 404 | |
[+] Checking: http://172.16.164.218:80/affiliate_images - 404 | |
[+] Checking: http://172.16.164.218:80/ofc_upload_image.php - 404 | |
[+] Checking: http://172.16.164.218:80/sites/default/images - 404 | |
[+] Checking: http://172.16.164.218:80/staticpages.php - 404 | |
[+] Checking: http://172.16.164.218:80/egallery/uploadify.php - 404 | |
[+] Checking: http://172.16.164.218:80/interface/main/main_screen.php - 404 | |
[+] Checking: http://172.16.164.218:80/config.php - 404 | |
[+] Checking: http://172.16.164.218:80/interface/new/new_comprehensive_save.php - 404 | |
[+] Checking: http://172.16.164.218:80/admin/downloads.php - 404 | |
[+] Checking: http://172.16.164.218:80/admincp/ - 404 | |
[+] Checking: http://172.16.164.218:80/interface/super/manage_site_files.php - 404 | |
[+] Checking: http://172.16.164.218:80/data/down_media - 404 | |
[+] Checking: http://172.16.164.218:80/uploads/slideshow-gallery - 404 | |
[+] Checking: http://172.16.164.218:80/nagiosxi/includes/components/graphexplorer/visApi.php - 404 | |
[+] Checking: http://172.16.164.218:80/nagiosxi/index.php - 404 | |
[+] Checking: http://172.16.164.218:80/admin/CHANGES - 404 | |
[+] Checking: http://172.16.164.218:80/service/v4/rest.php - 404 | |
[+] Checking: http://172.16.164.218:80/install2.php - 404 | |
[+] Checking: http://172.16.164.218:80/admin/config.php - 404 | |
[+] Checking: http://172.16.164.218:80/admin_area/charts/ofc-library/ofc_upload_image.php - 404 | |
[+] Checking: http://172.16.164.218:80/system_groupmanager.php - 404 | |
[+] Checking: http://172.16.164.218:80/admin_area/charts/tmp-upload-images - 404 | |
[+] Checking: http://172.16.164.218:80/infusionsoft/Infusionsoft/utilities/code_generator.php - 404 | |
[+] Checking: http://172.16.164.218:80/cgi-bin/vmtadmin.cgi - 404 | |
[+] Checking: http://172.16.164.218:80/front-end-editor/lib/aloha-editor/plugins/extra/draganddropfiles/demo - 404 | |
[+] Checking: http://172.16.164.218:80/php/connector.minimal.php - 404 | |
[+] Checking: http://172.16.164.218:80/setup.xml - 404 | |
[+] Checking: http://172.16.164.218:80/ws/v1/cluster/apps/new-application - 404 | |
[+] Checking: http://172.16.164.218:80/login.cgi - 404 | |
[+] Checking: http://172.16.164.218:80/ws/v1/cluster/apps - 404 | |
[+] Checking: http://172.16.164.218:80/spywall/login.php - 404 | |
[+] Checking: http://172.16.164.218:80/spywall/ipchange.php - 404 | |
[+] Checking: http://172.16.164.218:80/includes/settings.php - 404 | |
[+] Checking: http://172.16.164.218:80/scripts_exec.php - 404 | |
[+] Checking: http://172.16.164.218:80/cgi-bin/rdfs.cgi - 404 | |
[+] Checking: http://172.16.164.218:80/display.php - 404 | |
[+] Checking: http://172.16.164.218:80/img/favicon.png?v=6.0.1-1213 - 404 | |
[+] Checking: http://172.16.164.218:80/nagiosxi/ - 404 | |
[+] Checking: http://172.16.164.218:80/josso/signon/login.do - 404 | |
[+] Checking: http://172.16.164.218:80/WANem/result.php - 404 | |
[+] Checking: http://172.16.164.218:80/nagiosql/admin/settings.php - 404 | |
[+] Checking: http://172.16.164.218:80/web/jquery/uploader/multi_uploadify.php - 404 | |
[+] Checking: http://172.16.164.218:80/picsdesc.xml - 404 | |
[+] Checking: http://172.16.164.218:80/httpmon.php - 404 | |
[+] Checking: http://172.16.164.218:80/nagiosql/admin/helpedit.php - 404 | |
[+] Checking: http://172.16.164.218:80/config/global.conf - 404 | |
[+] Checking: http://172.16.164.218:80/scripts.php - 404 | |
[+] Checking: http://172.16.164.218:80/hedwig.cgi - 404 | |
[+] Checking: http://172.16.164.218:80/cgi-bin/setConfigSettings - 404 | |
[+] Checking: http://172.16.164.218:80/authentication.cgi - 404 | |
[+] Checking: http://172.16.164.218:80/spywall/blocked_file.php - 404 | |
[+] Checking: http://172.16.164.218:80/tools_command.php - 404 | |
[+] Checking: http://172.16.164.218:80/pigwidgeon.cgi - 404 | |
[+] Checking: http://172.16.164.218:80/login.htm - 404 | |
[+] Checking: http://172.16.164.218:80/InternetGatewayDevice.xml - 404 | |
[+] Checking: http://172.16.164.218:80/hawkeye/v1/login - 404 | |
[+] Checking: http://172.16.164.218:80/tmUnblock.cgi - 404 | |
[+] Checking: http://172.16.164.218:80/hawkeye/v1/account - 404 | |
[+] Checking: http://172.16.164.218:80/ossim/action/getaction.php - 404 | |
[+] Checking: http://172.16.164.218:80/anyterm.html - 404 | |
[+] Checking: http://172.16.164.218:80/anyterm-module - 404 | |
[+] Checking: http://172.16.164.218:80/ForensicsAnalysisServlet/ - 404 | |
[+] Checking: http://172.16.164.218:80/ossim/policy/policy.php - 404 | |
[+] Checking: http://172.16.164.218:80/ossim/policy/newpolicy.php - 404 | |
[+] Checking: http://172.16.164.218:80/docs/changes.txt - 404 | |
[+] Checking: http://172.16.164.218:80/saveCert.imss - 404 | |
[+] Checking: http://172.16.164.218:80/en/content/index.php - 404 | |
[+] Checking: http://172.16.164.218:80/nagiosxi/admin/components.php - 404 | |
[+] Checking: http://172.16.164.218:80/ossim/conf/reload.php - 404 | |
[+] Checking: http://172.16.164.218:80/comm.asp - 404 | |
[+] Checking: http://172.16.164.218:80/interface/index.do - 404 | |
[+] Checking: http://172.16.164.218:80/en/logon.php - 404 | |
[+] Checking: http://172.16.164.218:80/en/database/import.php - 404 | |
[+] Checking: http://172.16.164.218:80/m - 404 | |
[+] Checking: http://172.16.164.218:80/login.imss - 404 | |
[+] Checking: http://172.16.164.218:80/cgi-bin/webcm - 404 | |
[+] Checking: http://172.16.164.218:80/upload - 404 | |
[+] Checking: http://172.16.164.218:80/initCert.imss - 404 | |
[+] Checking: http://172.16.164.218:80/includes/inline_image_upload.php - 404 | |
[+] Checking: http://172.16.164.218:80/continuum/about.action - 404 | |
[+] Checking: http://172.16.164.218:80/api/systems/details - 404 | |
[+] Checking: http://172.16.164.218:80/ping.html - 404 | |
[+] Checking: http://172.16.164.218:80/agent/linuxpkgs - 404 | |
[+] Checking: http://172.16.164.218:80/ayefeaturesconvert.js - 404 | |
[+] Checking: http://172.16.164.218:80/HNAP1/ - 404 | |
[+] Checking: http://172.16.164.218:80/setup.cgi - 404 | |
[+] Checking: http://172.16.164.218:80/spywall/releasenotes.php?relfile=../../../../../usr/local/apache2/logs/access_log - 404 | |
[+] Checking: http://172.16.164.218:80/sysinfo.cgi - 404 | |
[+] Checking: http://172.16.164.218:80/ping.cgi - 404 | |
[+] Checking: http://172.16.164.218:80/shell - 404 | |
[+] Checking: http://172.16.164.218:80/globe - 404 | |
[+] Checking: http://172.16.164.218:80/cgi-bin/ping.sh - 404 | |
[+] Checking: http://172.16.164.218:80/redirect.cgi - 404 | |
[+] Checking: http://172.16.164.218:80/php/utils/router.php/Administrator.get - 404 | |
[+] Checking: http://172.16.164.218:80/webacs/pages/common/login.jsp - 404 | |
[+] Checking: http://172.16.164.218:80/ossim/action/modifyactions.php - 404 | |
[+] Checking: http://172.16.164.218:80/servlet/UploadServlet - 404 | |
[+] Checking: http://172.16.164.218:80/mobile/index.php - 404 | |
[+] Checking: http://172.16.164.218:80/ossim/policy/getpolicy.php - 404 | |
[+] Checking: http://172.16.164.218:80/topology/home - 404 | |
[+] Checking: http://172.16.164.218:80/event/j_security_check;jsessionid=#{jsessionid} - 404 | |
[+] Checking: http://172.16.164.218:80/jsp_name - 404 | |
[+] Checking: http://172.16.164.218:80/LoginServlet - 404 | |
[+] Checking: http://172.16.164.218:80/ossim/session/token.php - 404 | |
[+] Checking: http://172.16.164.218:80/whatsnew.txt - 404 | |
[+] Checking: http://172.16.164.218:80/ossim/policy/deletepolicy.php - 404 | |
[+] Checking: http://172.16.164.218:80/Installers - 404 | |
[+] Checking: http://172.16.164.218:80/ossim/action/deleteaction.php - 404 | |
[+] Checking: http://172.16.164.218:80/mve/upload/gfd - 404 | |
[+] Checking: http://172.16.164.218:80/login - 404 | |
[+] Checking: http://172.16.164.218:80/cbmui/images - 404 | |
[+] Checking: http://172.16.164.218:80/SystemTab/uploadImage.asp - 404 | |
[+] Checking: http://172.16.164.218:80/event/runQuery.do - 404 | |
[+] Checking: http://172.16.164.218:80/LoginAdmin - 404 | |
[+] Checking: http://172.16.164.218:80/unins000.dat - 404 | |
[+] Checking: http://172.16.164.218:80/wlevs/visualizer/upload - 404 | |
[+] Checking: http://172.16.164.218:80/ohw/help/state - 404 | |
[+] Checking: http://172.16.164.218:80/chat.ghp - 404 | |
[+] Checking: http://172.16.164.218:80/LoginPage.do - 404 | |
[+] Checking: http://172.16.164.218:80/jsp/tabs.jsp - 404 | |
[+] Checking: http://172.16.164.218:80/AccessNow/start.html - 404 | |
[+] Checking: http://172.16.164.218:80/api/json/admin/SubmitQuery - 404 | |
[+] Checking: http://172.16.164.218:80/fileUpload.do - 404 | |
[+] Checking: http://172.16.164.218:80/OvCgi/nnmRptConfig.exe - 404 | |
[+] Checking: http://172.16.164.218:80/jsp/Login.do - 404 | |
[+] Checking: http://172.16.164.218:80/banner.jpg - 404 | |
[+] Checking: http://172.16.164.218:80/rest/collectors/1.0/tempattachment - 404 | |
[+] Checking: http://172.16.164.218:80/registresult.htm - 404 | |
[+] Checking: http://172.16.164.218:80/upload/upload - 404 | |
[+] Checking: http://172.16.164.218:80/ServiceEmulation/services/EmulationAdmin - 404 | |
[+] Checking: http://172.16.164.218:80/ServiceEmulation - 404 | |
[+] Checking: http://172.16.164.218:80/cs/pdfupload - 404 | |
[+] Checking: http://172.16.164.218:80/scripts - 404 | |
[+] Checking: http://172.16.164.218:80/exchange/servlet/GetProductVersion - 404 | |
[+] Checking: http://172.16.164.218:80/user/login - 404 | |
[+] Checking: http://172.16.164.218:80/ip - 404 | |
[+] Checking: http://172.16.164.218:80/cgi-bin/user/Config.cgi - 404 | |
[+] Checking: http://172.16.164.218:80/% - 400 | |
[+] Checking: http://172.16.164.218:80/olt/ - 404 | |
[+] Checking: http://172.16.164.218:80/cgi-bin/authLogin.cgi - 404 | |
[+] Checking: http://172.16.164.218:80/webdm/mibbrowser/mibFileUpload - 404 | |
[+] Checking: http://172.16.164.218:80/servicedesk/servicedesk/servicedesk.nocache.js - 404 | |
[+] Checking: http://172.16.164.218:80/search - 404 | |
[+] Checking: http://172.16.164.218:80/rest/action - 404 | |
[+] Checking: http://172.16.164.218:80/servicedesk/servicedesk - 404 | |
[+] Checking: http://172.16.164.218:80/servicedesk/servicedesk/accountSerivce.gwtsvc - 404 | |
[+] Checking: http://172.16.164.218:80/rtc/post/ - 404 | |
[+] Checking: http://172.16.164.218:80/scripts/ - 404 | |
[+] Checking: http://172.16.164.218:80/rest/v1/AccountService/Accounts - 404 | |
[+] Checking: http://172.16.164.218:80/miq_policy/explorer - 404 | |
[+] Checking: http://172.16.164.218:80/userSession.do - 404 | |
[+] Checking: http://172.16.164.218:80/setup/reboot - 404 | |
[+] Checking: http://172.16.164.218:80/adm/syscmd.asp - 404 | |
[+] Checking: http://172.16.164.218:80/data/config/image.do - 404 | |
[+] Checking: http://172.16.164.218:80/config.bin - 404 | |
[+] Checking: http://172.16.164.218:80/apps/YouTube - 404 | |
[+] Checking: http://172.16.164.218:80/getcfg.php - 404 | |
[+] Checking: http://172.16.164.218:80/apps/YouTube/run - 404 | |
[+] Checking: http://172.16.164.218:80/cgi-bin/tmUnblock.cgi - 404 | |
[+] Checking: http://172.16.164.218:80/telpho/temp/telpho10.epb - 404 | |
[+] Checking: http://172.16.164.218:80/dashboard - 404 | |
[+] Checking: http://172.16.164.218:80/showcallfwd.cgi - 404 | |
[+] Checking: http://172.16.164.218:80/phonecallfwd.cgi - 404 | |
[+] Checking: http://172.16.164.218:80/hw-sys.htm - 404 | |
[+] Checking: http://172.16.164.218:80/showcallfwdperline.cgi - 404 | |
[+] Checking: http://172.16.164.218:80/log-in - 404 | |
[+] Checking: http://172.16.164.218:80/_users/_all_docs - 404 | |
[+] Checking: http://172.16.164.218:80/0x44/BuildMaster.Web.WebApplication/Inedo.BuildMaster.Web.WebApplication.Pages.LogInPage/LogIn - 404 | |
[+] Checking: http://172.16.164.218:80/sap/bw/xml/soap/xmla?sap-client= - 404 | |
[+] Checking: http://172.16.164.218:80/index.php/component/users/ - 200 | |
[+] Checking: http://172.16.164.218:80/events/reports/view.cgi - 404 | |
[+] Checking: http://172.16.164.218:80/mmr/MMR - 404 | |
[+] Checking: http://172.16.164.218:80/objects/ - 404 | |
[+] Checking: http://172.16.164.218:80/tools.php - 404 | |
[+] Checking: http://172.16.164.218:80/+CSCOE+/logon.html - 404 | |
[+] Checking: http://172.16.164.218:80/+webvpn+/webvpn_logout.html - 404 | |
[+] Checking: http://172.16.164.218:80/remote/login?lang=en - 404 | |
[+] Checking: http://172.16.164.218:80/+webvpn+/index.html - 404 | |
[+] Checking: http://172.16.164.218:80/remote/logout - 404 | |
[+] Checking: http://172.16.164.218:80/workorder/FileDownload.jsp - 404 | |
[+] Checking: http://172.16.164.218:80/remote/logincheck - 404 | |
[+] Checking: http://172.16.164.218:80/html/en/index.html - 404 | |
[+] Checking: http://172.16.164.218:80/windows/code.php - 404 | |
[+] Checking: http://172.16.164.218:80/cfg/EWplant.db - 404 | |
[+] Checking: http://172.16.164.218:80/html/en/confAccessProt.html - 404 | |
[+] Checking: http://172.16.164.218:80/setup/scan_results - 404 | |
[+] Checking: http://172.16.164.218:80/exportFile - 404 | |
[+] Checking: http://172.16.164.218:80/mTheme-Unus/css/css.php - 404 | |
[+] Checking: http://172.16.164.218:80/WorkOrder.do - 404 | |
[+] Checking: http://172.16.164.218:80/setupfirmware.php - 404 | |
[+] Checking: http://172.16.164.218:80/setup/scan_wifi - 404 | |
[+] Checking: http://172.16.164.218:80/rfcode_reader/api/whoami.json - 404 | |
[+] Checking: http://172.16.164.218:80/ui/login/ - 404 | |
[+] Checking: http://172.16.164.218:80/gi-media-library/download.php - 404 | |
[+] Checking: http://172.16.164.218:80/~login - 404 | |
[+] Checking: http://172.16.164.218:80/goform/down_cfg_file - 404 | |
[+] Checking: http://172.16.164.218:80/modules/common/logs - 404 | |
[+] Checking: http://172.16.164.218:80/gconfig.htm - 404 | |
[+] Checking: http://172.16.164.218:80/options-general.php - 404 | |
[+] Checking: http://172.16.164.218:80/services/listServices - 404 | |
[+] Checking: http://172.16.164.218:80/setup/eureka_info - 404 | |
[+] Checking: http://172.16.164.218:80/en-US/app/launcher/home - 404 | |
[+] Checking: http://172.16.164.218:80/posts - 404 | |
[+] Checking: http://172.16.164.218:80/dukapress/lib/dp_image.php - 404 | |
[+] Checking: http://172.16.164.218:80/fakeURL1 - 404 | |
[+] Checking: http://172.16.164.218:80/_snapshot/pwn - 404 | |
[+] Checking: http://172.16.164.218:80/English/pages_MacUS/lan_set_content.html - 404 | |
[+] Checking: http://172.16.164.218:80/fakeURL2 - 404 | |
[+] Checking: http://172.16.164.218:80/_snapshot/pwnie - 404 | |
[+] Checking: http://172.16.164.218:80/fakeURL3 - 404 | |
[List of Matching Metasploit Modules] | |
Host Module | |
------------------- ---------------------------------- | |
172.16.164.218:139 exploit/multi/samba/usermap_script | |
172.16.164.218:1099 exploit/multi/misc/java_rmi_server |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment