Vulnerable API App
Target Details
Service Discovery
$ sudo nmap -sS -sV -sC -Pn -A -oN nmap.txt 10.10.149.135 Nmap scan report for 10.10.149.135 Host is up (0.45s latency). Not shown: 997 closed tcp ports (reset) PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 8.2p1 Ubuntu 4ubuntu0.5 (Ubuntu Linux; protocol 2.0) | ssh-hostkey: | 3072 86:65:28:5a:90:b3:1f:8e:9c:0b:62:3a:71:4b:97:37 (RSA) | 256 87:37:9b:9d:fc:c4:dd:bc:21:0c:d9:a2:ab:96:90:be (ECDSA) |_ 256 a2:fd:4a:10:db:5b:ce:3d:c2:2c:c0:0c:8f:be:6c:41 (ED25519) 80/tcp open http nginx 1.18.0 (Ubuntu) |_http-title: Welcome to nginx! |_http-server-header: nginx/1.18.0 (Ubuntu) 5000/tcp open upnp? | fingerprint-strings: | GenericLines: | HTTP/1.1 400 Bad Request ... ... Network Distance: 4 hops Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel TRACEROUTE (using port 143/tcp) HOP RTT ADDRESS 1 354.40 ms 10.2.0.1 2 ... 3 4 447.88 ms 10.10.149.135 OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Service
Port
Version
Content Discovery
Endpoint
HTTP Methods Allowed
Exploit Endpoints
Get Target Machine Shell
Get User Flag
Privilege Escalation
Last updated