Check out our new cloud service, Authentication Anywhere -- log in from anywhere you would like! Users can enter their username and password, for a totally secure login process! You definitely wouldn't be able to find any secrets that other people have in their profile, right?
Copy ┌──(kali㉿kali)-[~]
└─$ rustscan -a 10.10.75.171 --ulimit 5500 -b 65535 -- -A
.----. .-. .-. .----..---. .----. .---. .--. .-. .-.
| {} }| { } |{ {__ {_ _}{ {__ / ___} / {} \ | `| |
| .-. \| {_} |.-._} } | | .-._} }\ }/ /\ \| |\ |
`-' `-'`-----'`----' `-' `----' `---' `-' `-'`-' `-'
The Modern Day Port Scanner.
________________________________________
: https://discord.gg/GFrQsGy :
: https://github.com/RustScan/RustScan :
--------------------------------------
Nmap? More like slowmap.🐢
[~] The config file is expected to be at "/home/kali/.rustscan.toml"
[~] Automatically increasing ulimit value to 5500.
[!] File limit is lower than default batch size. Consider upping with --ulimit. May cause harm to sensitive servers
Open 10.10.75.171:22
Open 10.10.75.171:80
[~] Starting Script(s)
[>] Script to be run Some("nmap -vvv -p {{port}} {{ip}}")
[~] Starting Nmap 7.93 ( https://nmap.org ) at 2022-12-26 14:01 EST
NSE: Loaded 155 scripts for scanning.
NSE: Script Pre-scanning.
NSE: Starting runlevel 1 (of 3) scan.
Initiating NSE at 14:01
Completed NSE at 14:01, 0.00s elapsed
NSE: Starting runlevel 2 (of 3) scan.
Initiating NSE at 14:01
Completed NSE at 14:01, 0.00s elapsed
NSE: Starting runlevel 3 (of 3) scan.
Initiating NSE at 14:01
Completed NSE at 14:01, 0.00s elapsed
Initiating Ping Scan at 14:01
Scanning 10.10.75.171 [2 ports]
Completed Ping Scan at 14:01, 0.19s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 14:01
Completed Parallel DNS resolution of 1 host. at 14:01, 0.01s elapsed
DNS resolution of 1 IPs took 0.02s. Mode: Async [#: 1, OK: 0, NX: 1, DR: 0, SF: 0, TR: 1, CN: 0]
Initiating Connect Scan at 14:01
Scanning 10.10.75.171 [2 ports]
Discovered open port 22/tcp on 10.10.75.171
Discovered open port 80/tcp on 10.10.75.171
Completed Connect Scan at 14:01, 0.18s elapsed (2 total ports)
Initiating Service scan at 14:01
Scanning 2 services on 10.10.75.171
Completed Service scan at 14:02, 6.54s elapsed (2 services on 1 host)
NSE: Script scanning 10.10.75.171.
NSE: Starting runlevel 1 (of 3) scan.
Initiating NSE at 14:02
Completed NSE at 14:02, 5.40s elapsed
NSE: Starting runlevel 2 (of 3) scan.
Initiating NSE at 14:02
Completed NSE at 14:02, 0.76s elapsed
NSE: Starting runlevel 3 (of 3) scan.
Initiating NSE at 14:02
Completed NSE at 14:02, 0.00s elapsed
Nmap scan report for 10.10.75.171
Host is up, received syn-ack (0.18s latency).
Scanned at 2022-12-26 14:01:54 EST for 13s
PORT STATE SERVICE REASON VERSION
22/tcp open ssh syn-ack OpenSSH 8.2p1 Ubuntu 4ubuntu0.5 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey:
| 3072 4d052fab208bb6b5747c49d0b16075f4 (RSA)
| ssh-rsa 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
| 256 d5dbf71338d8abbc8e3df6958f4d4150 (ECDSA)
| ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBIYtRAchO2zKv/ts4gorhy9Z93QkKUYGALmYTQzYbl1IkYVjAOjLZtFHgfnqHASi6tm3NdHOK4gGYmPhkJBJzoc=
| 256 152265fea15a975efc7b242c9308e94b (ED25519)
|_ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIAH+drNQtx3cj4Rl+nGEbDdvrLJDBeoIAvWirJ2OfQhW
80/tcp open http syn-ack Apache httpd 2.4.53 ((Debian))
| http-methods:
|_ Supported Methods: GET HEAD POST OPTIONS
| http-cookie-flags:
| /:
| PHPSESSID:
|_ httponly flag not set
|_http-title: Login
|_http-server-header: Apache/2.4.53 (Debian)
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
NSE: Script Post-scanning.
NSE: Starting runlevel 1 (of 3) scan.
Initiating NSE at 14:02
Completed NSE at 14:02, 0.00s elapsed
NSE: Starting runlevel 2 (of 3) scan.
Initiating NSE at 14:02
Completed NSE at 14:02, 0.00s elapsed
NSE: Starting runlevel 3 (of 3) scan.
Initiating NSE at 14:02
Completed NSE at 14:02, 0.00s elapsed
Read data files from: /usr/bin/../share/nmap
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 14.25 seconds
http://10.10.75.171/login.php
view-source:http://10.10.75.171/login.php
<!-- use guest:guest credentials until registration is fixed -->
login
http://10.10.75.171/profile.php?user=guest
Hi, guest. Welcome to our site. Try not to peep your neighbor's profile.
view-source:http://10.10.75.171/profile.php?user=guest
<!-- admin account could be vulnerable, need to update -->
http://10.10.75.171/profile.php?user=admin
Hi, admin. Welcome to your site. The flag is: flag{66be95c478473d91a5358f2440c7af1f}