Hijack
Enumeration
nmap -v -A -p- -Pn -sV hijack.thm -oN nmap
Host discovery disabled (-Pn). All addresses will be marked 'up' and scan times may be slower.
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-03-13 12:36 EDT
NSE: Loaded 156 scripts for scanning.
NSE: Script Pre-scanning.
Initiating NSE at 12:36
Completed NSE at 12:36, 0.00s elapsed
Initiating NSE at 12:36
Completed NSE at 12:36, 0.00s elapsed
Initiating NSE at 12:36
Completed NSE at 12:36, 0.00s elapsed
Initiating SYN Stealth Scan at 12:36
Scanning hijack.thm (10.10.119.217) [65535 ports]
Discovered open port 111/tcp on 10.10.119.217
Discovered open port 22/tcp on 10.10.119.217
Discovered open port 80/tcp on 10.10.119.217
Discovered open port 21/tcp on 10.10.119.217
Discovered open port 45869/tcp on 10.10.119.217
SYN Stealth Scan Timing: About 46.00% done; ETC: 12:37 (0:00:36 remaining)
Discovered open port 2049/tcp on 10.10.119.217
Discovered open port 42681/tcp on 10.10.119.217
Discovered open port 39023/tcp on 10.10.119.217
Discovered open port 56592/tcp on 10.10.119.217
Completed SYN Stealth Scan at 12:37, 83.61s elapsed (65535 total ports)
Initiating Service scan at 12:37
Scanning 9 services on hijack.thm (10.10.119.217)
Completed Service scan at 12:37, 11.57s elapsed (9 services on 1 host)
Initiating OS detection (try #1) against hijack.thm (10.10.119.217)
Initiating Traceroute at 12:37
Completed Traceroute at 12:37, 0.06s elapsed
Initiating Parallel DNS resolution of 1 host. at 12:37
Completed Parallel DNS resolution of 1 host. at 12:37, 0.01s elapsed
NSE: Script scanning 10.10.119.217.
Initiating NSE at 12:37
Completed NSE at 12:37, 3.60s elapsed
Initiating NSE at 12:37
Completed NSE at 12:38, 0.48s elapsed
Initiating NSE at 12:38
Completed NSE at 12:38, 0.00s elapsed
Nmap scan report for hijack.thm (10.10.119.217)
Host is up (0.061s latency).
Not shown: 65526 closed tcp ports (reset)
PORT STATE SERVICE VERSION
21/tcp open ftp vsftpd 3.0.3
22/tcp open ssh OpenSSH 7.2p2 Ubuntu 4ubuntu2.10 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey:
| 2048 94:ee:e5:23:de:79:6a:8d:63:f0:48:b8:62:d9:d7:ab (RSA)
| 256 42:e9:55:1b:d3:f2:04:b6:43:b2:56:a3:23:46:72:c7 (ECDSA)
|_ 256 27:46:f6:54:44:98:43:2a:f0:59:ba:e3:b6:73:d3:90 (ED25519)
80/tcp open http Apache httpd 2.4.18 ((Ubuntu))
| http-cookie-flags:
| /:
| PHPSESSID:
|_ httponly flag not set
|_http-title: Home
| http-methods:
|_ Supported Methods: GET HEAD POST OPTIONS
|_http-server-header: Apache/2.4.18 (Ubuntu)
111/tcp open rpcbind 2-4 (RPC #100000)
| rpcinfo:
| program version port/proto service
| 100000 2,3,4 111/tcp rpcbind
| 100000 2,3,4 111/udp rpcbind
| 100000 3,4 111/tcp6 rpcbind
| 100000 3,4 111/udp6 rpcbind
| 100003 2,3,4 2049/tcp nfs
| 100003 2,3,4 2049/tcp6 nfs
| 100003 2,3,4 2049/udp nfs
| 100003 2,3,4 2049/udp6 nfs
| 100005 1,2,3 38019/udp6 mountd
| 100005 1,2,3 46674/tcp6 mountd
| 100005 1,2,3 56592/tcp mountd
| 100005 1,2,3 59470/udp mountd
| 100021 1,3,4 32969/tcp6 nlockmgr
| 100021 1,3,4 39502/udp6 nlockmgr
| 100021 1,3,4 42681/tcp nlockmgr
| 100021 1,3,4 46160/udp nlockmgr
| 100227 2,3 2049/tcp nfs_acl
| 100227 2,3 2049/tcp6 nfs_acl
| 100227 2,3 2049/udp nfs_acl
|_ 100227 2,3 2049/udp6 nfs_acl
2049/tcp open nfs 2-4 (RPC #100003)
39023/tcp open mountd 1-3 (RPC #100005)
42681/tcp open nlockmgr 1-4 (RPC #100021)
45869/tcp open mountd 1-3 (RPC #100005)
56592/tcp open mountd 1-3 (RPC #100005)
Device type: general purpose
Running: Linux 5.X
OS CPE: cpe:/o:linux:linux_kernel:5.4
OS details: Linux 5.4
Uptime guess: 0.001 days (since Wed Mar 13 12:36:57 2024)
Network Distance: 2 hops
TCP Sequence Prediction: Difficulty=260 (Good luck!)
IP ID Sequence Generation: All zeros
Service Info: OSs: Unix, Linux; CPE: cpe:/o:linux:linux_kernel
TRACEROUTE (using port 1720/tcp)
HOP RTT ADDRESS
1 60.63 ms 10.8.0.1
2 61.26 ms hijack.thm (10.10.119.217)
NSE: Script Post-scanning.
Initiating NSE at 12:38
Completed NSE at 12:38, 0.00s elapsed
Initiating NSE at 12:38
Completed NSE at 12:38, 0.00s elapsed
Initiating NSE at 12:38
Completed NSE at 12:38, 0.00s elapsed
Read data files from: /usr/bin/../share/nmap
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 100.91 seconds
Raw packets sent: 69231 (3.047MB) | Rcvd: 69005 (2.761MB)
Last updated