Skip to content

Instantly share code, notes, and snippets.

@milo2012
Last active January 4, 2021 07:58
Show Gist options
  • Star 1 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save milo2012/96ab77e05714915ea22f8c214f838aac to your computer and use it in GitHub Desktop.
Save milo2012/96ab77e05714915ea22f8c214f838aac to your computer and use it in GitHub Desktop.
$ sudo python msfHelper1.py nmap__190723_132536.xml
[*] Launching Metasploit msfrpcd
[*] Reading from msfHelper.db
[*] Loaded 474 URI paths from msfHelper.db
[*] Loaded 2982 modules from Metasploit
[List of Unique Service Banners]
-------- ----------------------------------------------------------------------------
21/tcp vsftpd version: 2.3.4 ostype: Unix
2049/tcp version: 2-4 extrainfo: RPC #100003
512/tcp netkit-rsh rexecd ostype: Linux
6000/tcp extrainfo: access denied
3632/tcp distccd version: v1 extrainfo: (GNU) 4.2.4 (Ubuntu 4.2.4-1ubuntu4)
5900/tcp VNC extrainfo: protocol 3.3
6667/tcp UnrealIRCd hostname: irc.Metasploitable.LAN
139/tcp Samba smbd version: 3.X - 4.X extrainfo: workgroup: WORKGROUP
445/tcp Samba smbd version: 3.X - 4.X extrainfo: workgroup: WORKGROUP
8787/tcp Ruby DRb RMI extrainfo: Ruby 1.8; path /usr/lib/ruby/1.8/drb
5432/tcp PostgreSQL DB version: 8.3.0 - 8.3.7
25/tcp Postfix smtpd hostname: metasploitable.localdomain
22/tcp OpenSSH version: 4.7p1 Debian 8ubuntu1 extrainfo: protocol 2.0 ostype: Linux
3306/tcp MySQL version: 5.0.51a-3ubuntu5
23/tcp Linux telnetd ostype: Linux
53/tcp ISC BIND version: 9.4.2
1099/tcp GNU Classpath grmiregistry hostname: localhost
80/tcp Apache httpd version: 2.2.8 extrainfo: (Ubuntu) DAV/2
-------- ----------------------------------------------------------------------------
[Matching Ports with Metasploit]
+---------------------+--------------------------------------------------------------------------+
| Targets | Metasploit Module |
+=====================+==========================================================================+
| 172.16.164.218:512 | auxiliary/scanner/rservices/rexec_login |
+---------------------+--------------------------------------------------------------------------+
| 172.16.164.218:513 | auxiliary/scanner/rservices/rlogin_login |
+---------------------+--------------------------------------------------------------------------+
| 172.16.164.218:514 | auxiliary/scanner/rservices/rsh_login |
| | exploit/windows/misc/windows_rsh |
+---------------------+--------------------------------------------------------------------------+
| 172.16.164.218:1099 | auxiliary/gather/java_rmi_registry |
| | auxiliary/scanner/misc/java_jmx_server |
| | auxiliary/scanner/misc/java_rmi_server |
| | exploit/linux/misc/opennms_java_serialize |
| | exploit/multi/misc/java_rmi_server |
+---------------------+--------------------------------------------------------------------------+
| 172.16.164.218:6667 | exploit/multi/misc/legend_bot_exec |
| | exploit/multi/misc/pbot_exec |
| | exploit/multi/misc/ra1nx_pubcall_exec |
| | exploit/multi/misc/w3tw0rk_exec |
| | exploit/multi/misc/xdh_x_exec |
| | exploit/unix/irc/unreal_ircd_3281_backdoor |
+---------------------+--------------------------------------------------------------------------+
| 172.16.164.218:2049 | exploit/windows/nfs/xlink_nfsd |
+---------------------+--------------------------------------------------------------------------+
| 172.16.164.218:3306 | auxiliary/scanner/mysql/mysql_authbypass_hashdump |
| | auxiliary/scanner/mysql/mysql_file_enum |
| | auxiliary/scanner/mysql/mysql_hashdump |
| | auxiliary/scanner/mysql/mysql_login |
| | auxiliary/scanner/mysql/mysql_schemadump |
| | auxiliary/scanner/mysql/mysql_version |
| | auxiliary/scanner/mysql/mysql_writable_dirs |
| | exploit/linux/mysql/mysql_yassl_getname |
| | exploit/linux/mysql/mysql_yassl_hello |
| | exploit/multi/mysql/mysql_udf_payload |
| | exploit/windows/mysql/mysql_mof |
| | exploit/windows/mysql/mysql_start_up |
| | exploit/windows/mysql/mysql_yassl_hello |
+---------------------+--------------------------------------------------------------------------+
| 172.16.164.218:139 | exploit/freebsd/samba/trans2open |
| | exploit/linux/samba/chain_reply |
| | exploit/linux/samba/trans2open |
| | exploit/multi/ids/snort_dce_rpc |
| | exploit/multi/samba/nttrans |
| | exploit/multi/samba/usermap_script |
| | exploit/osx/samba/trans2open |
| | exploit/solaris/samba/trans2open |
+---------------------+--------------------------------------------------------------------------+
| 172.16.164.218:5900 | auxiliary/scanner/vnc/ard_root_pw |
| | auxiliary/scanner/vnc/vnc_login |
| | auxiliary/scanner/vnc/vnc_none_auth |
| | exploit/multi/vnc/vnc_keyboard_exec |
+---------------------+--------------------------------------------------------------------------+
| 172.16.164.218:111 | auxiliary/gather/nis_bootparamd_domain |
| | auxiliary/gather/nis_ypserv_map |
| | auxiliary/scanner/misc/sunrpc_portmapper |
| | auxiliary/scanner/nfs/nfsmount |
| | auxiliary/scanner/portmap/portmap_amp |
| | exploit/aix/rpc_cmsd_opcode21 |
| | exploit/aix/rpc_ttdbserverd_realpath |
| | exploit/netware/sunrpc/pkernel_callit |
| | exploit/solaris/sunrpc/sadmind_adm_build_path |
| | exploit/solaris/sunrpc/sadmind_exec |
| | exploit/solaris/sunrpc/ypupdated_exec |
| | exploit/windows/brightstor/mediasrv_sunrpc |
| | exploit/windows/emc/networker_format_string |
+---------------------+--------------------------------------------------------------------------+
| 172.16.164.218:80 | auxiliary/crawler/msfcrawler |
| | auxiliary/gather/advantech_webaccess_creds |
| | auxiliary/gather/avtech744_dvr_accounts |
| | auxiliary/gather/c2s_dvr_password_disclosure |
| | auxiliary/gather/cerberus_helpdesk_hash_disclosure |
| | auxiliary/gather/coldfusion_pwd_props |
| | auxiliary/gather/dolibarr_creds_sqli |
| | auxiliary/gather/doliwamp_traversal_creds |
| | auxiliary/gather/drupal_openid_xxe |
| | auxiliary/gather/external_ip |
| | auxiliary/gather/huawei_wifi_info |
| | auxiliary/gather/ibm_bigfix_sites_packages_enum |
| | auxiliary/gather/ipcamera_password_disclosure |
| | auxiliary/gather/jenkins_cred_recovery |
| | auxiliary/gather/joomla_com_realestatemanager_sqli |
| | auxiliary/gather/joomla_contenthistory_sqli |
| | auxiliary/gather/joomla_weblinks_sqli |
| | auxiliary/gather/mantisbt_admin_sqli |
| | auxiliary/gather/mongodb_js_inject_collection_enum |
| | auxiliary/gather/mybb_db_fingerprint |
| | auxiliary/gather/netgear_password_disclosure |
| | auxiliary/gather/oats_downloadservlet_traversal |
| | auxiliary/gather/pimcore_creds_sqli |
| | auxiliary/gather/rails_doubletap_file_read |
| | auxiliary/gather/vbulletin_vote_sqli |
| | auxiliary/gather/wp_all_in_one_migration_export |
| | auxiliary/gather/wp_ultimate_csv_importer_user_extract |
| | auxiliary/gather/wp_w3_total_cache_hash_extract |
| | auxiliary/gather/xerox_pwd_extract |
| | auxiliary/gather/xerox_workcentre_5xxx_ldap |
| | auxiliary/gather/zabbix_toggleids_sqli |
| | auxiliary/scanner/http/a10networks_ax_directory_traversal |
| | auxiliary/scanner/http/advantech_webaccess_login |
| | auxiliary/scanner/http/allegro_rompager_misfortune_cookie |
| | auxiliary/scanner/http/apache_mod_cgi_bash_env |
| | auxiliary/scanner/http/apache_optionsbleed |
| | auxiliary/scanner/http/apache_userdir_enum |
| | auxiliary/scanner/http/appletv_login |
| | auxiliary/scanner/http/backup_file |
| | auxiliary/scanner/http/bavision_cam_login |
| | auxiliary/scanner/http/binom3_login_config_pass_dump |
| | auxiliary/scanner/http/bitweaver_overlay_type_traversal |
| | auxiliary/scanner/http/blind_sql_query |
| | auxiliary/scanner/http/bmc_trackit_passwd_reset |
| | auxiliary/scanner/http/brute_dirs |
| | auxiliary/scanner/http/buffalo_login |
| | auxiliary/scanner/http/caidao_bruteforce_login |
| | auxiliary/scanner/http/canon_wireless |
| | auxiliary/scanner/http/cgit_traversal |
| | auxiliary/scanner/http/cisco_device_manager |
| | auxiliary/scanner/http/cisco_firepower_download |
| | auxiliary/scanner/http/cisco_firepower_login |
| | auxiliary/scanner/http/cisco_ios_auth_bypass |
| | auxiliary/scanner/http/clansphere_traversal |
| | auxiliary/scanner/http/cnpilot_r_web_login_loot |
| | auxiliary/scanner/http/coldfusion_locale_traversal |
| | auxiliary/scanner/http/coldfusion_version |
| | auxiliary/scanner/http/concrete5_member_list |
| | auxiliary/scanner/http/copy_of_file |
| | auxiliary/scanner/http/crawler |
| | auxiliary/scanner/http/dir_listing |
| | auxiliary/scanner/http/dir_scanner |
| | auxiliary/scanner/http/dir_webdav_unicode_bypass |
| | auxiliary/scanner/http/directadmin_login |
| | auxiliary/scanner/http/dlink_dir_300_615_http_login |
| | auxiliary/scanner/http/dlink_dir_615h_http_login |
| | auxiliary/scanner/http/dlink_dir_session_cgi_http_login |
| | auxiliary/scanner/http/dlink_user_agent_backdoor |
| | auxiliary/scanner/http/dnalims_file_retrieve |
| | auxiliary/scanner/http/dolibarr_login |
| | auxiliary/scanner/http/drupal_views_user_enum |
| | auxiliary/scanner/http/ektron_cms400net |
| | auxiliary/scanner/http/enum_wayback |
| | auxiliary/scanner/http/epmp1000_dump_config |
| | auxiliary/scanner/http/epmp1000_dump_hashes |
| | auxiliary/scanner/http/epmp1000_get_chart_cmd_exec |
| | auxiliary/scanner/http/epmp1000_ping_cmd_exec |
| | auxiliary/scanner/http/epmp1000_reset_pass |
| | auxiliary/scanner/http/epmp1000_web_login |
| | auxiliary/scanner/http/error_sql_injection |
| | auxiliary/scanner/http/etherpad_duo_login |
| | auxiliary/scanner/http/f5_bigip_virtual_server |
| | auxiliary/scanner/http/f5_mgmt_scanner |
| | auxiliary/scanner/http/file_same_name_dir |
| | auxiliary/scanner/http/files_dir |
| | auxiliary/scanner/http/fortinet_ssl_vpn |
| | auxiliary/scanner/http/frontpage_credential_dump |
| | auxiliary/scanner/http/gavazzi_em_login_loot |
| | auxiliary/scanner/http/git_scanner |
| | auxiliary/scanner/http/gitlab_login |
| | auxiliary/scanner/http/gitlab_user_enum |
| | auxiliary/scanner/http/goahead_traversal |
| | auxiliary/scanner/http/host_header_injection |
| | auxiliary/scanner/http/hp_sys_mgmt_login |
| | auxiliary/scanner/http/http_header |
| | auxiliary/scanner/http/http_login |
| | auxiliary/scanner/http/http_put |
| | auxiliary/scanner/http/http_traversal |
| | auxiliary/scanner/http/http_version |
| | auxiliary/scanner/http/httpbl_lookup |
| | auxiliary/scanner/http/httpdasm_directory_traversal |
| | auxiliary/scanner/http/iis_internal_ip |
| | auxiliary/scanner/http/iis_shortname_scanner |
| | auxiliary/scanner/http/ipboard_login |
| | auxiliary/scanner/http/jboss_vulnscan |
| | auxiliary/scanner/http/jenkins_command |
| | auxiliary/scanner/http/jenkins_enum |
| | auxiliary/scanner/http/joomla_bruteforce_login |
| | auxiliary/scanner/http/joomla_ecommercewd_sqli_scanner |
| | auxiliary/scanner/http/joomla_gallerywd_sqli_scanner |
| | auxiliary/scanner/http/joomla_pages |
| | auxiliary/scanner/http/joomla_plugins |
| | auxiliary/scanner/http/joomla_version |
| | auxiliary/scanner/http/kodi_traversal |
| | auxiliary/scanner/http/linknat_vos_traversal |
| | auxiliary/scanner/http/linksys_e1500_traversal |
| | auxiliary/scanner/http/litespeed_source_disclosure |
| | auxiliary/scanner/http/lucky_punch |
| | auxiliary/scanner/http/majordomo2_directory_traversal |
| | auxiliary/scanner/http/manageengine_desktop_central_login |
| | auxiliary/scanner/http/mediawiki_svg_fileaccess |
| | auxiliary/scanner/http/mod_negotiation_brute |
| | auxiliary/scanner/http/mod_negotiation_scanner |
| | auxiliary/scanner/http/ms09_020_webdav_unicode_bypass |
| | auxiliary/scanner/http/ms15_034_http_sys_memory_dump |
| | auxiliary/scanner/http/mybook_live_login |
| | auxiliary/scanner/http/netgear_sph200d_traversal |
| | auxiliary/scanner/http/nginx_source_disclosure |
| | auxiliary/scanner/http/novell_mdm_creds |
| | auxiliary/scanner/http/ntlm_info_enumeration |
| | auxiliary/scanner/http/octopusdeploy_login |
| | auxiliary/scanner/http/onion_omega2_login |
| | auxiliary/scanner/http/options |
| | auxiliary/scanner/http/phpmyadmin_login |
| | auxiliary/scanner/http/pocketpad_login |
| | auxiliary/scanner/http/prev_dir_same_name_file |
| | auxiliary/scanner/http/radware_appdirector_enum |
| | auxiliary/scanner/http/rails_json_yaml_scanner |
| | auxiliary/scanner/http/rails_mass_assignment |
| | auxiliary/scanner/http/rails_xml_yaml_scanner |
| | auxiliary/scanner/http/replace_ext |
| | auxiliary/scanner/http/rewrite_proxy_bypass |
| | auxiliary/scanner/http/rfcode_reader_enum |
| | auxiliary/scanner/http/rips_traversal |
| | auxiliary/scanner/http/riverbed_steelhead_vcx_file_read |
| | auxiliary/scanner/http/robots_txt |
| | auxiliary/scanner/http/s40_traversal |
| | auxiliary/scanner/http/scraper |
| | auxiliary/scanner/http/sentry_cdu_enum |
| | auxiliary/scanner/http/sevone_enum |
| | auxiliary/scanner/http/simple_webserver_traversal |
| | auxiliary/scanner/http/smt_ipmi_cgi_scanner |
| | auxiliary/scanner/http/smt_ipmi_url_redirect_traversal |
| | auxiliary/scanner/http/soap_xml |
| | auxiliary/scanner/http/squid_pivot_scanning |
| | auxiliary/scanner/http/squiz_matrix_user_enum |
| | auxiliary/scanner/http/ssl_version |
| | auxiliary/scanner/http/svn_scanner |
| | auxiliary/scanner/http/svn_wcdb_scanner |
| | auxiliary/scanner/http/symantec_web_gateway_login |
| | auxiliary/scanner/http/title |
| | auxiliary/scanner/http/totaljs_traversal |
| | auxiliary/scanner/http/tplink_traversal_noauth |
| | auxiliary/scanner/http/trace |
| | auxiliary/scanner/http/trace_axd |
| | auxiliary/scanner/http/typo3_bruteforce |
| | auxiliary/scanner/http/vcms_login |
| | auxiliary/scanner/http/verb_auth_bypass |
| | auxiliary/scanner/http/vhost_scanner |
| | auxiliary/scanner/http/web_vulndb |
| | auxiliary/scanner/http/webdav_internal_ip |
| | auxiliary/scanner/http/webdav_scanner |
| | auxiliary/scanner/http/webdav_website_content |
| | auxiliary/scanner/http/webpagetest_traversal |
| | auxiliary/scanner/http/wordpress_content_injection |
| | auxiliary/scanner/http/wordpress_cp_calendar_sqli |
| | auxiliary/scanner/http/wordpress_ghost_scanner |
| | auxiliary/scanner/http/wordpress_login_enum |
| | auxiliary/scanner/http/wordpress_multicall_creds |
| | auxiliary/scanner/http/wordpress_pingback_access |
| | auxiliary/scanner/http/wordpress_scanner |
| | auxiliary/scanner/http/wordpress_xmlrpc_login |
| | auxiliary/scanner/http/wp_arbitrary_file_deletion |
| | auxiliary/scanner/http/wp_contus_video_gallery_sqli |
| | auxiliary/scanner/http/wp_dukapress_file_read |
| | auxiliary/scanner/http/wp_gimedia_library_file_read |
| | auxiliary/scanner/http/wp_mobile_pack_info_disclosure |
| | auxiliary/scanner/http/wp_mobileedition_file_read |
| | auxiliary/scanner/http/wp_nextgen_galley_file_read |
| | auxiliary/scanner/http/wp_simple_backup_file_read |
| | auxiliary/scanner/http/wp_subscribe_comments_file_read |
| | auxiliary/scanner/http/xpath |
| | auxiliary/scanner/http/zabbix_login |
| | auxiliary/scanner/ip/ipidseq |
| | auxiliary/scanner/lotus/lotus_domino_hashes |
| | auxiliary/scanner/lotus/lotus_domino_login |
| | auxiliary/scanner/lotus/lotus_domino_version |
| | auxiliary/scanner/misc/dvr_config_disclosure |
| | auxiliary/scanner/rogue/rogue_recv |
| | auxiliary/scanner/rogue/rogue_send |
| | auxiliary/scanner/sap/sap_icm_urlscan |
| | auxiliary/scanner/sap/sap_soap_rfc_dbmcli_sxpg_call_system_command_exec |
| | auxiliary/scanner/sap/sap_soap_rfc_pfl_check_os_file_existence |
| | auxiliary/scanner/sap/sap_soap_rfc_rzl_read_dir |
| | auxiliary/scanner/scada/indusoft_ntwebserver_fileaccess |
| | auxiliary/voip/cisco_cucdm_call_forward |
| | auxiliary/voip/cisco_cucdm_speed_dials |
| | auxiliary/voip/telisca_ips_lock_control |
| | exploit/bsdi/softcart/mercantec_softcart |
| | exploit/linux/http/advantech_switch_bash_env_exec |
| | exploit/linux/http/astium_sqli_upload |
| | exploit/linux/http/atutor_filemanager_traversal |
| | exploit/linux/http/axis_srv_parhand_rce |
| | exploit/linux/http/centreon_sqli_exec |
| | exploit/linux/http/centreon_useralias_exec |
| | exploit/linux/http/cisco_firepower_useradd |
| | exploit/linux/http/cisco_rv130_rmi_rce |
| | exploit/linux/http/cpi_tararchive_upload |
| | exploit/linux/http/crypttech_cryptolog_login_exec |
| | exploit/linux/http/ddwrt_cgibin_exec |
| | exploit/linux/http/denyall_waf_exec |
| | exploit/linux/http/dlink_command_php_exec_noauth |
| | exploit/linux/http/dlink_dcs931l_upload |
| | exploit/linux/http/dlink_dcs_930l_authenticated_remote_command_execution |
| | exploit/linux/http/dlink_diagnostic_exec_noauth |
| | exploit/linux/http/dlink_dir300_exec_telnet |
| | exploit/linux/http/dlink_dir615_up_exec |
| | exploit/linux/http/dlink_dir850l_unauth_exec |
| | exploit/linux/http/dlink_dsl2750b_exec_noauth |
| | exploit/linux/http/dlink_dspw110_cookie_noauth_exec |
| | exploit/linux/http/dlink_hnap_header_exec_noauth |
| | exploit/linux/http/dnalims_admin_exec |
| | exploit/linux/http/dolibarr_cmd_exec |
| | exploit/linux/http/dreambox_openpli_shell |
| | exploit/linux/http/efw_chpasswd_exec |
| | exploit/linux/http/esva_exec |
| | exploit/linux/http/fritzbox_echo_exec |
| | exploit/linux/http/github_enterprise_secret |
| | exploit/linux/http/gitlist_exec |
| | exploit/linux/http/goahead_ldpreload |
| | exploit/linux/http/groundwork_monarch_cmd_exec |
| | exploit/linux/http/huawei_hg532n_cmdinject |
| | exploit/linux/http/kaltura_unserialize_cookie_rce |
| | exploit/linux/http/kaltura_unserialize_rce |
| | exploit/linux/http/librenms_addhost_cmd_inject |
| | exploit/linux/http/linksys_apply_cgi |
| | exploit/linux/http/linksys_e1500_apply_exec |
| | exploit/linux/http/linksys_themoon_exec |
| | exploit/linux/http/linksys_wrt110_cmd_exec |
| | exploit/linux/http/linksys_wrt160nv2_apply_exec |
| | exploit/linux/http/linksys_wrt54gl_apply_exec |
| | exploit/linux/http/linksys_wvbr0_user_agent_exec_noauth |
| | exploit/linux/http/logsign_exec |
| | exploit/linux/http/microfocus_secure_messaging_gateway |
| | exploit/linux/http/multi_ncc_ping_exec |
| | exploit/linux/http/mutiny_frontend_upload |
| | exploit/linux/http/mvpower_dvr_shell_exec |
| | exploit/linux/http/nagios_xi_chained_rce |
| | exploit/linux/http/nagios_xi_chained_rce_2_electric_boogaloo |
| | exploit/linux/http/nagios_xi_magpie_debug |
| | exploit/linux/http/netgear_dgn1000_setup_unauth_exec |
| | exploit/linux/http/netgear_dgn1000b_setup_exec |
| | exploit/linux/http/netgear_dgn2200b_pppoe_exec |
| | exploit/linux/http/netgear_dnslookup_cmd_exec |
| | exploit/linux/http/netgear_r7000_cgibin_exec |
| | exploit/linux/http/netgear_unauth_exec |
| | exploit/linux/http/netgear_wnr2000_rce |
| | exploit/linux/http/nginx_chunked_size |
| | exploit/linux/http/pandora_fms_sqli |
| | exploit/linux/http/php_imap_open_rce |
| | exploit/linux/http/piranha_passwd_exec |
| | exploit/linux/http/qnap_qcenter_change_passwd_exec |
| | exploit/linux/http/raidsonic_nas_ib5220_exec_noauth |
| | exploit/linux/http/railo_cfml_rfi |
| | exploit/linux/http/samsung_srv_1670d_upload_exec |
| | exploit/linux/http/seagate_nas_php_exec_noauth |
| | exploit/linux/http/symantec_web_gateway_exec |
| | exploit/linux/http/symantec_web_gateway_file_upload |
| | exploit/linux/http/symantec_web_gateway_lfi |
| | exploit/linux/http/symantec_web_gateway_pbcontrol |
| | exploit/linux/http/symantec_web_gateway_restore |
| | exploit/linux/http/tiki_calendar_exec |
| | exploit/linux/http/tp_link_sc2020n_authenticated_telnet_injection |
| | exploit/linux/http/trendmicro_imsva_widget_exec |
| | exploit/linux/http/trendmicro_sps_exec |
| | exploit/linux/http/trueonline_billion_5200w_rce |
| | exploit/linux/http/trueonline_p660hn_v1_rce |
| | exploit/linux/http/trueonline_p660hn_v2_rce |
| | exploit/linux/http/vap2500_tools_command_exec |
| | exploit/linux/http/vcms_upload |
| | exploit/linux/http/wanem_exec |
| | exploit/linux/http/wd_mycloud_multiupload_upload |
| | exploit/linux/http/webcalendar_settings_exec |
| | exploit/linux/http/webid_converter |
| | exploit/linux/http/webmin_packageup_rce |
| | exploit/linux/http/wipg1000_cmd_injection |
| | exploit/linux/http/xplico_exec |
| | exploit/linux/http/zabbix_sqli |
| | exploit/linux/http/zimbra_xxe_rce |
| | exploit/multi/http/activecollab_chat |
| | exploit/multi/http/ajaxplorer_checkinstall_exec |
| | exploit/multi/http/apache_mod_cgi_bash_env_exec |
| | exploit/multi/http/apprain_upload_exec |
| | exploit/multi/http/atutor_sqli |
| | exploit/multi/http/auxilium_upload_exec |
| | exploit/multi/http/bolt_file_upload |
| | exploit/multi/http/builderengine_upload_exec |
| | exploit/multi/http/caidao_php_backdoor_exec |
| | exploit/multi/http/cisco_dcnm_upload |
| | exploit/multi/http/clipbucket_fileupload_exec |
| | exploit/multi/http/cmsms_showtime2_rce |
| | exploit/multi/http/cmsms_upload_rename_rce |
| | exploit/multi/http/coldfusion_ckeditor_file_upload |
| | exploit/multi/http/coldfusion_rds |
| | exploit/multi/http/confluence_widget_connector |
| | exploit/multi/http/cuteflow_upload_exec |
| | exploit/multi/http/dexter_casinoloader_exec |
| | exploit/multi/http/drupal_drupageddon |
| | exploit/multi/http/extplorer_upload_exec |
| | exploit/multi/http/familycms_less_exec |
| | exploit/multi/http/freenas_exec_raw |
| | exploit/multi/http/gestioip_exec |
| | exploit/multi/http/getsimplecms_unauth_code_exec |
| | exploit/multi/http/git_client_command_exec |
| | exploit/multi/http/git_submodule_command_exec |
| | exploit/multi/http/git_submodule_url_exec |
| | exploit/multi/http/gitlab_shell_exec |
| | exploit/multi/http/gitlist_arg_injection |
| | exploit/multi/http/gitorious_graph |
| | exploit/multi/http/glossword_upload_exec |
| | exploit/multi/http/glpi_install_rce |
| | exploit/multi/http/horde_form_file_upload |
| | exploit/multi/http/horde_href_backdoor |
| | exploit/multi/http/ibm_openadmin_tool_soap_welcomeserver_exec |
| | exploit/multi/http/ispconfig_php_exec |
| | exploit/multi/http/jenkins_script_console |
| | exploit/multi/http/jira_hipchat_template |
| | exploit/multi/http/joomla_http_header_rce |
| | exploit/multi/http/kordil_edms_upload_exec |
| | exploit/multi/http/lcms_php_exec |
| | exploit/multi/http/log1cms_ajax_create_folder |
| | exploit/multi/http/magento_unserialize |
| | exploit/multi/http/makoserver_cmd_exec |
| | exploit/multi/http/mantisbt_manage_proj_page_rce |
| | exploit/multi/http/mantisbt_php_exec |
| | exploit/multi/http/mediawiki_syntaxhighlight |
| | exploit/multi/http/mediawiki_thumb |
| | exploit/multi/http/mma_backdoor_upload |
| | exploit/multi/http/mobilecartly_upload_exec |
| | exploit/multi/http/monstra_fileupload_exec |
| | exploit/multi/http/moodle_cmd_exec |
| | exploit/multi/http/movabletype_upgrade_exec |
| | exploit/multi/http/mutiny_subnetmask_exec |
| | exploit/multi/http/nas4free_php_exec |
| | exploit/multi/http/navigate_cms_rce |
| | exploit/multi/http/nibbleblog_file_upload |
| | exploit/multi/http/novell_servicedesk_rce |
| | exploit/multi/http/nuuo_nvrmini_upgrade_rce |
| | exploit/multi/http/openmediavault_cmd_exec |
| | exploit/multi/http/openx_backdoor_php |
| | exploit/multi/http/opmanager_socialit_file_upload |
| | exploit/multi/http/oracle_reports_rce |
| | exploit/multi/http/oscommerce_installer_unauth_code_exec |
| | exploit/multi/http/pandora_upload_exec |
| | exploit/multi/http/phoenix_exec |
| | exploit/multi/http/php_cgi_arg_injection |
| | exploit/multi/http/php_utility_belt_rce |
| | exploit/multi/http/php_volunteer_upload_exec |
| | exploit/multi/http/phpfilemanager_rce |
| | exploit/multi/http/phpldapadmin_query_engine |
| | exploit/multi/http/phpmailer_arg_injection |
| | exploit/multi/http/phpmoadmin_exec |
| | exploit/multi/http/phpmyadmin_3522_backdoor |
| | exploit/multi/http/phpmyadmin_lfi_rce |
| | exploit/multi/http/phpmyadmin_null_termination_exec |
| | exploit/multi/http/phpmyadmin_preg_replace |
| | exploit/multi/http/phpscheduleit_start_date |
| | exploit/multi/http/phptax_exec |
| | exploit/multi/http/phpwiki_ploticus_exec |
| | exploit/multi/http/pimcore_unserialize_rce |
| | exploit/multi/http/playsms_filename_exec |
| | exploit/multi/http/playsms_uploadcsv_exec |
| | exploit/multi/http/pmwiki_pagelist |
| | exploit/multi/http/polarcms_upload_exec |
| | exploit/multi/http/processmaker_exec |
| | exploit/multi/http/processmaker_plugin_upload |
| | exploit/multi/http/qdpm_upload_exec |
| | exploit/multi/http/rails_actionpack_inline_exec |
| | exploit/multi/http/rails_double_tap |
| | exploit/multi/http/rails_json_yaml_code_exec |
| | exploit/multi/http/rails_secret_deserialization |
| | exploit/multi/http/rails_xml_yaml_code_exec |
| | exploit/multi/http/sflog_upload_exec |
| | exploit/multi/http/shopware_createinstancefromnamedarguments_rce |
| | exploit/multi/http/simple_backdoors_exec |
| | exploit/multi/http/sit_file_upload |
| | exploit/multi/http/snortreport_exec |
| | exploit/multi/http/sonicwall_gms_upload |
| | exploit/multi/http/sonicwall_scrutinizer_methoddetail_sqli |
| | exploit/multi/http/spree_search_exec |
| | exploit/multi/http/spree_searchlogic_exec |
| | exploit/multi/http/stunshell_eval |
| | exploit/multi/http/stunshell_exec |
| | exploit/multi/http/sun_jsws_dav_options |
| | exploit/multi/http/testlink_upload_exec |
| | exploit/multi/http/tomcat_mgr_deploy |
| | exploit/multi/http/tomcat_mgr_upload |
| | exploit/multi/http/traq_plugin_exec |
| | exploit/multi/http/v0pcr3w_exec |
| | exploit/multi/http/vbseo_proc_deutf |
| | exploit/multi/http/vbulletin_unserialize |
| | exploit/multi/http/vtiger_install_rce |
| | exploit/multi/http/vtiger_logo_upload_exec |
| | exploit/multi/http/vtiger_php_exec |
| | exploit/multi/http/vtiger_soap_upload |
| | exploit/multi/http/webpagetest_upload_exec |
| | exploit/multi/http/werkzeug_debug_rce |
| | exploit/multi/http/wikka_spam_exec |
| | exploit/multi/http/wp_crop_rce |
| | exploit/multi/http/wp_ninja_forms_unauthenticated_file_upload |
| | exploit/multi/http/wp_responsive_thumbnail_slider_upload |
| | exploit/multi/http/x7chat2_php_exec |
| | exploit/multi/http/zabbix_script_exec |
| | exploit/multi/http/zemra_panel_rce |
| | exploit/multi/http/zpanel_information_disclosure_rce |
| | exploit/multi/php/php_unserialize_zval_cookie |
| | exploit/multi/php/wp_duplicator_code_inject |
| | exploit/multi/wyse/hagent_untrusted_hsdata |
| | exploit/unix/ftp/proftpd_modcopy_exec |
| | exploit/unix/http/contentkeeperweb_mimencode |
| | exploit/unix/http/ctek_skyrouter |
| | exploit/unix/http/dell_kace_k1000_upload |
| | exploit/unix/http/epmp1000_get_chart_cmd_shell |
| | exploit/unix/http/epmp1000_ping_cmd_shell |
| | exploit/unix/http/freepbx_callmenum |
| | exploit/unix/http/laravel_token_unserialize_exec |
| | exploit/unix/http/lifesize_room |
| | exploit/unix/http/pfsense_clickjacking |
| | exploit/unix/http/quest_kace_systems_management_rce |
| | exploit/unix/http/tnftp_savefile |
| | exploit/unix/http/twiki_debug_plugins |
| | exploit/unix/http/vmturbo_vmtadmin_exec_noauth |
| | exploit/unix/http/xdebug_unauth_exec |
| | exploit/unix/sonicwall/sonicwall_xmlrpc_rce |
| | exploit/unix/webapp/actualanalyzer_ant_cookie_exec |
| | exploit/unix/webapp/arkeia_upload_exec |
| | exploit/unix/webapp/awstats_configdir_exec |
| | exploit/unix/webapp/awstats_migrate_exec |
| | exploit/unix/webapp/awstatstotals_multisort |
| | exploit/unix/webapp/barracuda_img_exec |
| | exploit/unix/webapp/base_qry_common |
| | exploit/unix/webapp/basilic_diff_exec |
| | exploit/unix/webapp/cacti_graphimage_exec |
| | exploit/unix/webapp/cakephp_cache_corruption |
| | exploit/unix/webapp/carberp_backdoor_exec |
| | exploit/unix/webapp/clipbucket_upload_exec |
| | exploit/unix/webapp/coppermine_piceditor |
| | exploit/unix/webapp/datalife_preview_exec |
| | exploit/unix/webapp/dogfood_spell_exec |
| | exploit/unix/webapp/drupal_coder_exec |
| | exploit/unix/webapp/drupal_drupalgeddon2 |
| | exploit/unix/webapp/drupal_restws_exec |
| | exploit/unix/webapp/drupal_restws_unserialize |
| | exploit/unix/webapp/egallery_upload_exec |
| | exploit/unix/webapp/elfinder_php_connector_exiftran_cmd_injection |
| | exploit/unix/webapp/flashchat_upload_exec |
| | exploit/unix/webapp/foswiki_maketext |
| | exploit/unix/webapp/freepbx_config_exec |
| | exploit/unix/webapp/generic_exec |
| | exploit/unix/webapp/get_simple_cms_upload_exec |
| | exploit/unix/webapp/google_proxystylesheet_exec |
| | exploit/unix/webapp/graphite_pickle_exec |
| | exploit/unix/webapp/guestbook_ssi_exec |
| | exploit/unix/webapp/hastymail_exec |
| | exploit/unix/webapp/havalite_upload_exec |
| | exploit/unix/webapp/horde_unserialize_exec |
| | exploit/unix/webapp/hybridauth_install_php_exec |
| | exploit/unix/webapp/instantcms_exec |
| | exploit/unix/webapp/invision_pboard_unserialize_exec |
| | exploit/unix/webapp/joomla_akeeba_unserialize |
| | exploit/unix/webapp/joomla_comfields_sqli_rce |
| | exploit/unix/webapp/joomla_comjce_imgmanager |
| | exploit/unix/webapp/joomla_contenthistory_sqli_rce |
| | exploit/unix/webapp/joomla_media_upload_exec |
| | exploit/unix/webapp/joomla_tinybrowser |
| | exploit/unix/webapp/jquery_file_upload |
| | exploit/unix/webapp/kimai_sqli |
| | exploit/unix/webapp/libretto_upload_exec |
| | exploit/unix/webapp/maarch_letterbox_file_upload |
| | exploit/unix/webapp/mambo_cache_lite |
| | exploit/unix/webapp/mitel_awc_exec |
| | exploit/unix/webapp/moinmoin_twikidraw |
| | exploit/unix/webapp/mybb_backdoor |
| | exploit/unix/webapp/nagios3_history_cgi |
| | exploit/unix/webapp/nagios3_statuswml_ping |
| | exploit/unix/webapp/nagios_graph_explorer |
| | exploit/unix/webapp/narcissus_backend_exec |
| | exploit/unix/webapp/open_flash_chart_upload_exec |
| | exploit/unix/webapp/openemr_sqli_privesc_upload |
| | exploit/unix/webapp/openemr_upload_exec |
| | exploit/unix/webapp/opensis_modname_exec |
| | exploit/unix/webapp/openview_connectednodes_exec |
| | exploit/unix/webapp/openx_banner_edit |
| | exploit/unix/webapp/oscommerce_filemanager |
| | exploit/unix/webapp/pajax_remote_exec |
| | exploit/unix/webapp/php_charts_exec |
| | exploit/unix/webapp/php_eval |
| | exploit/unix/webapp/php_include |
| | exploit/unix/webapp/php_vbulletin_template |
| | exploit/unix/webapp/php_xmlrpc_eval |
| | exploit/unix/webapp/phpbb_highlight |
| | exploit/unix/webapp/phpcollab_upload_exec |
| | exploit/unix/webapp/phpmyadmin_config |
| | exploit/unix/webapp/piwik_superuser_plugin_upload |
| | exploit/unix/webapp/projectpier_upload_exec |
| | exploit/unix/webapp/projectsend_upload_exec |
| | exploit/unix/webapp/redmine_scm_exec |
| | exploit/unix/webapp/seportal_sqli_exec |
| | exploit/unix/webapp/simple_e_document_upload_exec |
| | exploit/unix/webapp/sixapart_movabletype_storable_exec |
| | exploit/unix/webapp/skybluecanvas_exec |
| | exploit/unix/webapp/sphpblog_file_upload |
| | exploit/unix/webapp/spip_connect_exec |
| | exploit/unix/webapp/squash_yaml_exec |
| | exploit/unix/webapp/sugarcrm_rest_unserialize_exec |
| | exploit/unix/webapp/sugarcrm_unserialize_exec |
| | exploit/unix/webapp/tikiwiki_graph_formula_exec |
| | exploit/unix/webapp/tikiwiki_jhot_exec |
| | exploit/unix/webapp/tikiwiki_unserialize_exec |
| | exploit/unix/webapp/tikiwiki_upload_exec |
| | exploit/unix/webapp/trixbox_langchoice |
| | exploit/unix/webapp/twiki_history |
| | exploit/unix/webapp/twiki_maketext |
| | exploit/unix/webapp/twiki_search |
| | exploit/unix/webapp/vbulletin_vote_sqli_exec |
| | exploit/unix/webapp/vicidial_manager_send_cmd_exec |
| | exploit/unix/webapp/vicidial_user_authorization_unauth_cmd_exec |
| | exploit/unix/webapp/webmin_upload_exec |
| | exploit/unix/webapp/webtester_exec |
| | exploit/unix/webapp/wp_admin_shell_upload |
| | exploit/unix/webapp/wp_advanced_custom_fields_exec |
| | exploit/unix/webapp/wp_ajax_load_more_file_upload |
| | exploit/unix/webapp/wp_asset_manager_upload_exec |
| | exploit/unix/webapp/wp_creativecontactform_file_upload |
| | exploit/unix/webapp/wp_downloadmanager_upload |
| | exploit/unix/webapp/wp_easycart_unrestricted_file_upload |
| | exploit/unix/webapp/wp_foxypress_upload |
| | exploit/unix/webapp/wp_frontend_editor_file_upload |
| | exploit/unix/webapp/wp_google_document_embedder_exec |
| | exploit/unix/webapp/wp_holding_pattern_file_upload |
| | exploit/unix/webapp/wp_inboundio_marketing_file_upload |
| | exploit/unix/webapp/wp_infusionsoft_upload |
| | exploit/unix/webapp/wp_lastpost_exec |
| | exploit/unix/webapp/wp_mobile_detector_upload_execute |
| | exploit/unix/webapp/wp_nmediawebsite_file_upload |
| | exploit/unix/webapp/wp_optimizepress_upload |
| | exploit/unix/webapp/wp_photo_gallery_unrestricted_file_upload |
| | exploit/unix/webapp/wp_phpmailer_host_header |
| | exploit/unix/webapp/wp_pixabay_images_upload |
| | exploit/unix/webapp/wp_platform_exec |
| | exploit/unix/webapp/wp_property_upload_exec |
| | exploit/unix/webapp/wp_reflexgallery_file_upload |
| | exploit/unix/webapp/wp_revslider_upload_execute |
| | exploit/unix/webapp/wp_slideshowgallery_upload |
| | exploit/unix/webapp/wp_symposium_shell_upload |
| | exploit/unix/webapp/wp_total_cache_exec |
| | exploit/unix/webapp/wp_worktheflow_upload |
| | exploit/unix/webapp/wp_wpshop_ecommerce_file_upload |
| | exploit/unix/webapp/wp_wptouch_file_upload |
| | exploit/unix/webapp/wp_wysija_newsletters_upload |
| | exploit/unix/webapp/xoda_file_upload |
| | exploit/unix/webapp/xymon_useradm_cmd_exec |
| | exploit/unix/webapp/zeroshell_exec |
| | exploit/unix/webapp/zoneminder_packagecontrol_exec |
| | exploit/unix/webapp/zpanel_username_exec |
| | exploit/windows/http/amlibweb_webquerydll_app |
| | exploit/windows/http/apache_chunked |
| | exploit/windows/http/apache_mod_rewrite_ldap |
| | exploit/windows/http/apache_modjk_overflow |
| | exploit/windows/http/avaya_ccr_imageupload_exec |
| | exploit/windows/http/badblue_ext_overflow |
| | exploit/windows/http/badblue_passthru |
| | exploit/windows/http/bea_weblogic_jsessionid |
| | exploit/windows/http/bea_weblogic_transfer_encoding |
| | exploit/windows/http/belkin_bulldog |
| | exploit/windows/http/cogent_datahub_command |
| | exploit/windows/http/coldfusion_fckeditor |
| | exploit/windows/http/disk_pulse_enterprise_get |
| | exploit/windows/http/easychatserver_seh |
| | exploit/windows/http/efs_easychatserver_username |
| | exploit/windows/http/ektron_xslt_exec |
| | exploit/windows/http/ektron_xslt_exec_ws |
| | exploit/windows/http/fdm_auth_header |
| | exploit/windows/http/generic_http_dll_injection |
| | exploit/windows/http/gitstack_rce |
| | exploit/windows/http/hp_mpa_job_acct |
| | exploit/windows/http/hp_nnm_getnnmdata_hostname |
| | exploit/windows/http/hp_nnm_getnnmdata_icount |
| | exploit/windows/http/hp_nnm_getnnmdata_maxage |
| | exploit/windows/http/hp_nnm_nnmrptconfig_nameparams |
| | exploit/windows/http/hp_nnm_nnmrptconfig_schdparams |
| | exploit/windows/http/hp_nnm_openview5 |
| | exploit/windows/http/hp_nnm_ovalarm_lang |
| | exploit/windows/http/hp_nnm_ovbuildpath_textfile |
| | exploit/windows/http/hp_nnm_ovwebhelp |
| | exploit/windows/http/hp_nnm_ovwebsnmpsrv_main |
| | exploit/windows/http/hp_nnm_ovwebsnmpsrv_ovutil |
| | exploit/windows/http/hp_nnm_ovwebsnmpsrv_uro |
| | exploit/windows/http/hp_nnm_snmp |
| | exploit/windows/http/hp_nnm_snmpviewer_actapp |
| | exploit/windows/http/hp_nnm_toolbar_01 |
| | exploit/windows/http/hp_nnm_toolbar_02 |
| | exploit/windows/http/hp_nnm_webappmon_execvp |
| | exploit/windows/http/hp_nnm_webappmon_ovjavalocale |
| | exploit/windows/http/hp_openview_insight_backdoor |
| | exploit/windows/http/hp_power_manager_filename |
| | exploit/windows/http/hp_power_manager_login |
| | exploit/windows/http/httpdx_handlepeer |
| | exploit/windows/http/httpdx_tolog_format |
| | exploit/windows/http/ia_webmail |
| | exploit/windows/http/ipswitch_wug_maincfgret |
| | exploit/windows/http/kaseya_uploader |
| | exploit/windows/http/kaseya_uploadimage_file_upload |
| | exploit/windows/http/kolibri_http |
| | exploit/windows/http/landesk_thinkmanagement_upload_asp |
| | exploit/windows/http/mailenable_auth_header |
| | exploit/windows/http/manage_engine_opmanager_rce |
| | exploit/windows/http/manageengine_appmanager_exec |
| | exploit/windows/http/minishare_get_overflow |
| | exploit/windows/http/navicopa_get_overflow |
| | exploit/windows/http/novell_mdm_lfi |
| | exploit/windows/http/oats_weblogic_console |
| | exploit/windows/http/octopusdeploy_deploy |
| | exploit/windows/http/oracle_beehive_evaluation |
| | exploit/windows/http/oracle_beehive_prepareaudiotoplay |
| | exploit/windows/http/privatewire_gateway |
| | exploit/windows/http/rejetto_hfs_exec |
| | exploit/windows/http/sambar6_search_results |
| | exploit/windows/http/savant_31_overflow |
| | exploit/windows/http/servu_session_cookie |
| | exploit/windows/http/shttpd_post |
| | exploit/windows/http/solarwinds_fsm_userlogin |
| | exploit/windows/http/sonicwall_scrutinizer_sqli |
| | exploit/windows/http/sysax_create_folder |
| | exploit/windows/http/tomcat_cgi_cmdlineargs |
| | exploit/windows/http/trackit_file_upload |
| | exploit/windows/http/trendmicro_officescan_widget_exec |
| | exploit/windows/http/umbraco_upload_aspx |
| | exploit/windows/http/webster_http |
| | exploit/windows/http/xampp_webdav_upload_php |
| | exploit/windows/http/xitami_if_mod_since |
| | exploit/windows/http/zenworks_uploadservlet |
| | exploit/windows/iis/iis_webdav_scstoragepathfromurl |
| | exploit/windows/iis/iis_webdav_upload_asp |
| | exploit/windows/iis/ms01_023_printer |
| | exploit/windows/iis/ms01_026_dbldecode |
| | exploit/windows/iis/ms01_033_idq |
| | exploit/windows/iis/ms02_018_htr |
| | exploit/windows/iis/ms02_065_msadc |
| | exploit/windows/iis/ms03_007_ntdll_webdav |
| | exploit/windows/iis/msadc |
| | exploit/windows/isapi/ms00_094_pbserver |
| | exploit/windows/isapi/ms03_022_nsiislog_post |
| | exploit/windows/isapi/ms03_051_fp30reg_chunked |
| | exploit/windows/isapi/rsa_webagent_redirect |
| | exploit/windows/isapi/w3who_query |
| | exploit/windows/lotus/domino_http_accept_language |
| | exploit/windows/misc/gh0st |
| | exploit/windows/mssql/ms09_004_sp_replwritetovarbin_sqli |
| | exploit/windows/mssql/mssql_payload_sqli |
| | exploit/windows/proxy/bluecoat_winproxy_host |
| | exploit/windows/proxy/qbik_wingate_wwwproxy |
| | exploit/windows/scada/advantech_webaccess_dashboard_file_upload |
| | exploit/windows/scada/ge_proficy_cimplicity_gefebt |
+---------------------+--------------------------------------------------------------------------+
| 172.16.164.218:8787 | auxiliary/gather/solarwinds_orion_sqli |
| | exploit/linux/misc/drb_remote_codeexec |
+---------------------+--------------------------------------------------------------------------+
| 172.16.164.218:3632 | exploit/unix/misc/distcc_exec |
+---------------------+--------------------------------------------------------------------------+
| 172.16.164.218:53 | auxiliary/scanner/dns/dns_amp |
+---------------------+--------------------------------------------------------------------------+
| 172.16.164.218:22 | auxiliary/scanner/ssh/cerberus_sftp_enumusers |
| | auxiliary/scanner/ssh/detect_kippo |
| | auxiliary/scanner/ssh/eaton_xpert_backdoor |
| | auxiliary/scanner/ssh/fortinet_backdoor |
| | auxiliary/scanner/ssh/juniper_backdoor |
| | auxiliary/scanner/ssh/libssh_auth_bypass |
| | auxiliary/scanner/ssh/ssh_enumusers |
| | auxiliary/scanner/ssh/ssh_identify_pubkeys |
| | auxiliary/scanner/ssh/ssh_login |
| | auxiliary/scanner/ssh/ssh_login_pubkey |
| | auxiliary/scanner/ssh/ssh_version |
| | exploit/apple_ios/ssh/cydia_default_ssh |
| | exploit/linux/ssh/ceragon_fibeair_known_privkey |
| | exploit/linux/ssh/exagrid_known_privkey |
| | exploit/linux/ssh/f5_bigip_known_privkey |
| | exploit/linux/ssh/loadbalancerorg_enterprise_known_privkey |
| | exploit/linux/ssh/mercurial_ssh_exec |
| | exploit/linux/ssh/quantum_dxi_known_privkey |
| | exploit/linux/ssh/quantum_vmpro_backdoor |
| | exploit/linux/ssh/symantec_smg_ssh |
| | exploit/linux/ssh/vmware_vdp_known_privkey |
| | exploit/multi/ssh/sshexec |
| | exploit/unix/ssh/array_vxag_vapv_privkey_privesc |
| | exploit/unix/ssh/tectia_passwd_changereq |
| | exploit/windows/ssh/freeftpd_key_exchange |
| | exploit/windows/ssh/freesshd_authbypass |
| | exploit/windows/ssh/freesshd_key_exchange |
| | exploit/windows/ssh/sysax_ssh_username |
+---------------------+--------------------------------------------------------------------------+
| 172.16.164.218:23 | auxiliary/scanner/telnet/brocade_enable_login |
| | auxiliary/scanner/telnet/telnet_encrypt_overflow |
| | auxiliary/scanner/telnet/telnet_login |
| | auxiliary/scanner/telnet/telnet_ruggedcom |
| | auxiliary/scanner/telnet/telnet_version |
| | exploit/freebsd/telnet/telnet_encrypt_keyid |
| | exploit/linux/telnet/netgear_telnetenable |
| | exploit/linux/telnet/telnet_encrypt_keyid |
| | exploit/solaris/telnet/fuser |
| | exploit/solaris/telnet/ttyprompt |
| | exploit/unix/misc/polycom_hdx_auth_bypass |
| | exploit/unix/misc/polycom_hdx_traceroute_exec |
| | exploit/unix/polycom_hdx_auth_bypass |
| | exploit/windows/proxy/ccproxy_telnet_ping |
| | exploit/windows/scada/procyon_core_server |
| | exploit/windows/telnet/gamsoft_telsrv_username |
+---------------------+--------------------------------------------------------------------------+
| 172.16.164.218:5432 | auxiliary/scanner/postgres/postgres_dbname_flag_injection |
| | auxiliary/scanner/postgres/postgres_hashdump |
| | auxiliary/scanner/postgres/postgres_login |
| | auxiliary/scanner/postgres/postgres_schemadump |
| | auxiliary/scanner/postgres/postgres_version |
| | exploit/linux/postgres/postgres_payload |
| | exploit/multi/postgres/postgres_copy_from_program_cmd_exec |
| | exploit/multi/postgres/postgres_createlang |
| | exploit/windows/postgres/postgres_payload |
+---------------------+--------------------------------------------------------------------------+
| 172.16.164.218:25 | auxiliary/client/smtp/emailer |
| | auxiliary/scanner/smtp/smtp_enum |
| | auxiliary/scanner/smtp/smtp_ntlm_domain |
| | auxiliary/scanner/smtp/smtp_relay |
| | auxiliary/scanner/smtp/smtp_version |
| | auxiliary/vsploit/pii/email_pii |
| | exploit/apple_ios/email/mobilemail_libtiff |
| | exploit/linux/smtp/exim4_dovecot_exec |
| | exploit/osx/email/mailapp_image_exec |
| | exploit/unix/smtp/clamav_milter_blackhole |
| | exploit/unix/smtp/exim4_string_format |
| | exploit/unix/smtp/morris_sendmail_debug |
| | exploit/unix/smtp/qmail_bash_env_exec |
| | exploit/unix/webapp/squirrelmail_pgp_plugin |
| | exploit/windows/email/ms07_017_ani_loadimage_chunksize |
| | exploit/windows/email/ms10_045_outlook_ref_only |
| | exploit/windows/email/ms10_045_outlook_ref_resolve |
| | exploit/windows/lotus/domino_icalendar_organizer |
| | exploit/windows/lotus/lotusnotes_lzh |
| | exploit/windows/smtp/mailcarrier_smtp_ehlo |
| | exploit/windows/smtp/mercury_cram_md5 |
| | exploit/windows/smtp/ms03_046_exchange2000_xexch50 |
| | exploit/windows/smtp/wmailserver |
| | exploit/windows/smtp/ypops_overflow1 |
+---------------------+--------------------------------------------------------------------------+
| 172.16.164.218:445 | auxiliary/gather/windows_deployment_services_shares |
| | auxiliary/scanner/smb/psexec_loggedin_users |
| | auxiliary/scanner/smb/smb1 |
| | auxiliary/scanner/smb/smb2 |
| | auxiliary/scanner/smb/smb_enum_gpp |
| | auxiliary/scanner/smb/smb_login |
| | auxiliary/scanner/smb/smb_ms17_010 |
| | exploit/linux/samba/is_known_pipename |
| | exploit/linux/samba/lsa_transnames_heap |
| | exploit/linux/samba/setinfopolicy_heap |
| | exploit/netware/smb/lsass_cifs |
| | exploit/osx/samba/lsa_transnames_heap |
| | exploit/solaris/samba/lsa_transnames_heap |
| | exploit/windows/brightstor/etrust_itm_alert |
| | exploit/windows/oracle/extjob |
| | exploit/windows/smb/ipass_pipe_exec |
| | exploit/windows/smb/ms03_049_netapi |
| | exploit/windows/smb/ms04_007_killbill |
| | exploit/windows/smb/ms04_011_lsass |
| | exploit/windows/smb/ms04_031_netdde |
| | exploit/windows/smb/ms05_039_pnp |
| | exploit/windows/smb/ms06_025_rasmans_reg |
| | exploit/windows/smb/ms06_025_rras |
| | exploit/windows/smb/ms06_040_netapi |
| | exploit/windows/smb/ms06_066_nwapi |
| | exploit/windows/smb/ms06_066_nwwks |
| | exploit/windows/smb/ms06_070_wkssvc |
| | exploit/windows/smb/ms07_029_msdns_zonename |
| | exploit/windows/smb/ms08_067_netapi |
| | exploit/windows/smb/ms09_050_smb2_negotiate_func_index |
| | exploit/windows/smb/ms10_061_spoolss |
| | exploit/windows/smb/ms17_010_eternalblue |
| | exploit/windows/smb/ms17_010_eternalblue_win8 |
| | exploit/windows/smb/ms17_010_psexec |
| | exploit/windows/smb/netidentity_xtierrpcpipe |
| | exploit/windows/smb/psexec |
| | exploit/windows/smb/psexec_psh |
| | exploit/windows/smb/webexec |
+---------------------+--------------------------------------------------------------------------+
| 172.16.164.218:6000 | auxiliary/scanner/x11/open_x11 |
| | exploit/unix/x11/x11_keyboard_exec |
+---------------------+--------------------------------------------------------------------------+
| 172.16.164.218:21 | auxiliary/scanner/ftp/anonymous |
| | auxiliary/scanner/ftp/bison_ftp_traversal |
| | auxiliary/scanner/ftp/colorado_ftp_traversal |
| | auxiliary/scanner/ftp/easy_file_sharing_ftp |
| | auxiliary/scanner/ftp/ftp_login |
| | auxiliary/scanner/ftp/ftp_version |
| | auxiliary/scanner/ftp/konica_ftp_traversal |
| | auxiliary/scanner/ftp/pcman_ftp_traversal |
| | auxiliary/scanner/ftp/titanftp_xcrc_traversal |
| | exploit/freebsd/ftp/proftp_telnet_iac |
| | exploit/linux/ftp/proftp_sreplace |
| | exploit/linux/ftp/proftp_telnet_iac |
| | exploit/mainframe/ftp/ftp_jcl_creds |
| | exploit/multi/ftp/pureftpd_bash_env_exec |
| | exploit/multi/ftp/wuftpd_site_exec_format |
| | exploit/osx/ftp/webstar_ftp_user |
| | exploit/unix/ftp/proftpd_133c_backdoor |
| | exploit/unix/ftp/vsftpd_234_backdoor |
| | exploit/windows/ftp/3cdaemon_ftp_user |
| | exploit/windows/ftp/ability_server_stor |
| | exploit/windows/ftp/cesarftp_mkd |
| | exploit/windows/ftp/comsnd_ftpd_fmtstr |
| | exploit/windows/ftp/dreamftp_format |
| | exploit/windows/ftp/easyfilesharing_pass |
| | exploit/windows/ftp/easyftp_cwd_fixret |
| | exploit/windows/ftp/easyftp_list_fixret |
| | exploit/windows/ftp/easyftp_mkd_fixret |
| | exploit/windows/ftp/filecopa_list_overflow |
| | exploit/windows/ftp/freefloatftp_user |
| | exploit/windows/ftp/freefloatftp_wbem |
| | exploit/windows/ftp/freeftpd_pass |
| | exploit/windows/ftp/freeftpd_user |
| | exploit/windows/ftp/globalscapeftp_input |
| | exploit/windows/ftp/httpdx_tolog_format |
| | exploit/windows/ftp/kmftp_utility_cwd |
| | exploit/windows/ftp/ms09_053_ftpd_nlst |
| | exploit/windows/ftp/netterm_netftpd_user |
| | exploit/windows/ftp/open_ftpd_wbem |
| | exploit/windows/ftp/pcman_put |
| | exploit/windows/ftp/pcman_stor |
| | exploit/windows/ftp/quickshare_traversal_write |
| | exploit/windows/ftp/sami_ftpd_list |
| | exploit/windows/ftp/sami_ftpd_user |
| | exploit/windows/ftp/servu_chmod |
| | exploit/windows/ftp/servu_mdtm |
| | exploit/windows/ftp/slimftpd_list_concat |
| | exploit/windows/ftp/vermillion_ftpd_port |
| | exploit/windows/ftp/warftpd_165_pass |
| | exploit/windows/ftp/warftpd_165_user |
| | exploit/windows/ftp/wftpd_size |
| | exploit/windows/ftp/wsftp_server_503_mkd |
| | exploit/windows/ftp/wsftp_server_505_xmd5 |
| | exploit/windows/ftp/xlink_server |
+---------------------+--------------------------------------------------------------------------+
[+] Running: exploit/mainframe/ftp/ftp_jcl_creds - 172.16.164.218:21
[+] Running: exploit/multi/ftp/wuftpd_site_exec_format - 172.16.164.218:21
[+] Running: exploit/aix/rpc_cmsd_opcode21 - 172.16.164.218:111
[+] Running: exploit/multi/ftp/pureftpd_bash_env_exec - 172.16.164.218:21
[+] Running: exploit/apple_ios/ssh/cydia_default_ssh - 172.16.164.218:22
[+] Running: exploit/aix/rpc_ttdbserverd_realpath - 172.16.164.218:111
[+] Running: exploit/multi/ids/snort_dce_rpc - 172.16.164.218:139
[+] Running: exploit/multi/samba/usermap_script - 172.16.164.218:139
[+] Running: exploit/multi/mysql/mysql_udf_payload - 172.16.164.218:3306
[+] Running: exploit/multi/samba/nttrans - 172.16.164.218:139
[+] Running: exploit/multi/misc/java_rmi_server - 172.16.164.218:1099
[+] Running: exploit/multi/postgres/postgres_copy_from_program_cmd_exec - 172.16.164.218:5432
[+] Running: exploit/multi/postgres/postgres_createlang - 172.16.164.218:5432
[+] Running: exploit/multi/misc/legend_bot_exec - 172.16.164.218:6667
[+] Running: exploit/multi/vnc/vnc_keyboard_exec - 172.16.164.218:5900
[WORKING] 172.16.164.218:139 exploit/multi/samba/usermap_script
[WORKING] 172.16.164.218:1099 exploit/multi/misc/java_rmi_server
[+] Running: exploit/multi/misc/ra1nx_pubcall_exec - 172.16.164.218:6667
[+] Running: exploit/multi/misc/pbot_exec - 172.16.164.218:6667
[+] Running: exploit/multi/misc/w3tw0rk_exec - 172.16.164.218:6667
[+] Running: exploit/multi/misc/xdh_x_exec - 172.16.164.218:6667
[+] Running: auxiliary/scanner/ftp/anonymous - 172.16.164.218:21
[+] Running: auxiliary/scanner/ftp/ftp_version - 172.16.164.218:21
[+] Running: auxiliary/scanner/ssh/eaton_xpert_backdoor - 172.16.164.218:22
[+] Running: auxiliary/scanner/ftp/bison_ftp_traversal - 172.16.164.218:21
[+] Running: auxiliary/scanner/ftp/konica_ftp_traversal - 172.16.164.218:21
[+] Running: auxiliary/scanner/ssh/fortinet_backdoor - 172.16.164.218:22
[+] Running: auxiliary/scanner/ftp/colorado_ftp_traversal - 172.16.164.218:21
[+] Running: auxiliary/scanner/ftp/pcman_ftp_traversal - 172.16.164.218:21
[+] Running: auxiliary/scanner/ssh/juniper_backdoor - 172.16.164.218:22
[+] Running: auxiliary/scanner/ftp/easy_file_sharing_ftp - 172.16.164.218:21
[+] Running: auxiliary/scanner/ftp/titanftp_xcrc_traversal - 172.16.164.218:21
[+] Running: auxiliary/scanner/ssh/libssh_auth_bypass - 172.16.164.218:22
[+] Running: auxiliary/scanner/ftp/ftp_login - 172.16.164.218:21
[+] Running: auxiliary/scanner/ssh/detect_kippo - 172.16.164.218:22
[+] Running: auxiliary/scanner/ssh/ssh_enumusers - 172.16.164.218:22
[+] Running: auxiliary/scanner/ssh/ssh_login - 172.16.164.218:22
[+] Running: auxiliary/scanner/telnet/telnet_ruggedcom - 172.16.164.218:23
[+] Running: auxiliary/scanner/smtp/smtp_relay - 172.16.164.218:25
[+] Running: auxiliary/scanner/ssh/ssh_version - 172.16.164.218:22
[+] Running: auxiliary/scanner/telnet/telnet_version - 172.16.164.218:23
[+] Running: auxiliary/scanner/smtp/smtp_version - 172.16.164.218:25
[+] Running: auxiliary/scanner/telnet/brocade_enable_login - 172.16.164.218:23
[+] Running: auxiliary/client/smtp/emailer - 172.16.164.218:25
[+] Running: auxiliary/scanner/dns/dns_amp - 172.16.164.218:53
[+] Running: auxiliary/scanner/telnet/telnet_encrypt_overflow - 172.16.164.218:23
[+] Running: auxiliary/scanner/smtp/smtp_enum - 172.16.164.218:25
[+] Running: auxiliary/scanner/misc/sunrpc_portmapper - 172.16.164.218:111
[+] Running: auxiliary/scanner/telnet/telnet_login - 172.16.164.218:23
[+] Running: auxiliary/scanner/smtp/smtp_ntlm_domain - 172.16.164.218:25
[+] Running: auxiliary/scanner/nfs/nfsmount - 172.16.164.218:111
[+] Running: auxiliary/scanner/portmap/portmap_amp - 172.16.164.218:111
[+] Running: auxiliary/scanner/smb/smb_login - 172.16.164.218:445
[+] Running: auxiliary/gather/java_rmi_registry - 172.16.164.218:1099
[+] Running: auxiliary/scanner/smb/psexec_loggedin_users - 172.16.164.218:445
[+] Running: auxiliary/scanner/smb/smb_ms17_010 - 172.16.164.218:445
[+] Running: auxiliary/scanner/misc/java_jmx_server - 172.16.164.218:1099
[+] Running: auxiliary/scanner/smb/smb1 - 172.16.164.218:445
[+] Running: auxiliary/scanner/rservices/rexec_login - 172.16.164.218:512
[+] Running: auxiliary/scanner/misc/java_rmi_server - 172.16.164.218:1099
[+] Running: auxiliary/scanner/smb/smb2 - 172.16.164.218:445
[+] Running: auxiliary/scanner/rservices/rlogin_login - 172.16.164.218:513
[+] Running: auxiliary/scanner/mysql/mysql_authbypass_hashdump - 172.16.164.218:3306
[+] Running: auxiliary/scanner/smb/smb_enum_gpp - 172.16.164.218:445
[+] Running: auxiliary/scanner/rservices/rsh_login - 172.16.164.218:514
[+] Running: auxiliary/scanner/mysql/mysql_hashdump - 172.16.164.218:3306
[+] Running: auxiliary/scanner/mysql/mysql_login - 172.16.164.218:3306
[+] Running: auxiliary/scanner/mysql/mysql_schemadump - 172.16.164.218:3306
[+] Running: auxiliary/scanner/mysql/mysql_version - 172.16.164.218:3306
[+] Running: auxiliary/scanner/postgres/postgres_dbname_flag_injection - 172.16.164.218:5432
[+] Running: auxiliary/scanner/postgres/postgres_hashdump - 172.16.164.218:5432
[+] Running: auxiliary/scanner/postgres/postgres_login - 172.16.164.218:5432
[+] Running: auxiliary/scanner/postgres/postgres_schemadump - 172.16.164.218:5432
[+] Running: auxiliary/scanner/postgres/postgres_version - 172.16.164.218:5432
[+] Running: auxiliary/scanner/vnc/ard_root_pw - 172.16.164.218:5900
[+] Running: auxiliary/scanner/vnc/vnc_login - 172.16.164.218:5900
[+] Running: auxiliary/scanner/vnc/vnc_none_auth - 172.16.164.218:5900
[+] Running: auxiliary/scanner/x11/open_x11 - 172.16.164.218:6000
[+] Running: auxiliary/gather/solarwinds_orion_sqli - 172.16.164.218:8787
[List of Modules to Run Manually]
+---------------------+-----------------------------------------------------------------+---------------------------+
| Targets | Metasploit Module | Module Parameters |
+=====================+=================================================================+===========================+
| 172.16.164.218:25 | auxiliary/vsploit/pii/email_pii | MAILTO|SUBJECT |
| | auxiliary/apple_ios/email/mobilemail_libtiff | MAILTO|SUBJECT |
| | auxiliary/osx/email/mailapp_image_exec | MAILTO|SUBJECT |
| | auxiliary/unix/webapp/squirrelmail_pgp_plugin | MAILTO|SUBJECT |
| | auxiliary/windows/email/ms07_017_ani_loadimage_chunksize | MAILTO|SUBJECT |
| | auxiliary/windows/email/ms10_045_outlook_ref_only | MAILTO|SUBJECT |
| | auxiliary/windows/email/ms10_045_outlook_ref_resolve | MAILTO|SUBJECT |
| | auxiliary/windows/lotus/domino_icalendar_organizer | MAILFROM|MAILTO |
| | auxiliary/windows/lotus/lotusnotes_lzh | MAILTO|SUBJECT |
| | auxiliary/windows/smtp/mailcarrier_smtp_ehlo | LHOST |
+---------------------+-----------------------------------------------------------------+---------------------------+
| 172.16.164.218:22 | auxiliary/scanner/ssh/cerberus_sftp_enumusers | USER_FILE |
| | auxiliary/scanner/ssh/ssh_identify_pubkeys | KEY_FILE |
| | auxiliary/scanner/ssh/ssh_login_pubkey | KEY_PATH |
| | auxiliary/linux/ssh/mercurial_ssh_exec | SSH_PRIV_KEY_FILE |
| | auxiliary/multi/ssh/sshexec | PASSWORD |
+---------------------+-----------------------------------------------------------------+---------------------------+
| 172.16.164.218:445 | auxiliary/windows/smb/ms06_070_wkssvc | DOMAIN |
| | auxiliary/windows/smb/ms17_010_eternalblue | CheckScanner |
| | auxiliary/windows/smb/ms17_010_psexec | CheckScanner |
+---------------------+-----------------------------------------------------------------+---------------------------+
| 172.16.164.218:111 | auxiliary/gather/nis_bootparamd_domain | CLIENT |
| | auxiliary/gather/nis_ypserv_map | DOMAIN |
+---------------------+-----------------------------------------------------------------+---------------------------+
| 172.16.164.218:3306 | auxiliary/scanner/mysql/mysql_file_enum | FILE_LIST |
| | auxiliary/scanner/mysql/mysql_writable_dirs | DIR_LIST |
| | auxiliary/windows/mysql/mysql_mof | USERNAME|PASSWORD |
| | auxiliary/windows/mysql/mysql_start_up | USERNAME|PASSWORD |
+---------------------+-----------------------------------------------------------------+---------------------------+
| 172.16.164.218:80 | auxiliary/gather/oats_downloadservlet_traversal | OATSPASSWORD |
| | auxiliary/gather/pimcore_creds_sqli | APIKEY |
| | auxiliary/gather/xerox_workcentre_5xxx_ldap | NewLDAPServer |
| | auxiliary/scanner/http/apache_mod_cgi_bash_env | TARGETURI |
| | auxiliary/scanner/http/cgit_traversal | REPO |
| | auxiliary/scanner/http/enum_wayback | DOMAIN |
| | auxiliary/scanner/http/httpbl_lookup | HTTPBL_APIKEY |
| | auxiliary/scanner/http/litespeed_source_disclosure | PATH_SAVE |
| | auxiliary/scanner/http/nginx_source_disclosure | PATH_SAVE |
| | auxiliary/scanner/http/squid_pivot_scanning | RANGE |
| | auxiliary/scanner/http/vhost_scanner | DOMAIN |
| | auxiliary/scanner/http/web_vulndb | VULNCSV |
| | auxiliary/scanner/http/wp_arbitrary_file_deletion | USERNAME|PASSWORD |
| | auxiliary/scanner/http/wp_nextgen_galley_file_read | WP_USER|WP_PASS |
| | auxiliary/scanner/http/wp_subscribe_comments_file_read | WP_USER|WP_PASS |
| | auxiliary/scanner/rogue/rogue_send | EHOST |
| | auxiliary/voip/telisca_ips_lock_control | PHONENAME |
| | auxiliary/linux/http/efw_chpasswd_exec | EFW_PASSWORD|EFW_USERNAME |
| | auxiliary/linux/http/kaltura_unserialize_cookie_rce | ENTRYID |
| | auxiliary/linux/http/librenms_addhost_cmd_inject | USERNAME|PASSWORD |
| | auxiliary/linux/http/linksys_wrt160nv2_apply_exec | LHOST |
| | auxiliary/linux/http/nagios_xi_magpie_debug | RSRVHOST |
| | auxiliary/linux/http/netgear_dnslookup_cmd_exec | USERNAME|PASSWORD |
| | auxiliary/linux/http/symantec_web_gateway_restore | USERNAME|PASSWORD |
| | auxiliary/linux/http/trueonline_p660hn_v2_rce | LHOST |
| | auxiliary/linux/http/webmin_packageup_rce | USERNAME|PASSWORD |
| | auxiliary/multi/http/activecollab_chat | PASS|USER |
| | auxiliary/multi/http/apache_mod_cgi_bash_env_exec | TARGETURI |
| | auxiliary/multi/http/bolt_file_upload | PASSWORD|USERNAME |
| | auxiliary/multi/http/cmsms_showtime2_rce | USERNAME |
| | auxiliary/multi/http/cmsms_upload_rename_rce | USERNAME|PASSWORD |
| | auxiliary/multi/http/confluence_widget_connector | SRVHOST |
| | auxiliary/multi/http/horde_form_file_upload | USERNAME|PASSWORD |
| | auxiliary/multi/http/monstra_fileupload_exec | USERNAME|PASSWORD |
| | auxiliary/multi/http/moodle_cmd_exec | PASSWORD |
| | auxiliary/multi/http/nibbleblog_file_upload | USERNAME|PASSWORD |
| | auxiliary/multi/http/pimcore_unserialize_rce | USERNAME |
| | auxiliary/multi/http/qdpm_upload_exec | PASSWORD|USERNAME |
| | auxiliary/multi/http/rails_secret_deserialization | SECRET |
| | auxiliary/multi/http/sit_file_upload | USERNAME|PASSWORD |
| | auxiliary/multi/http/vtiger_logo_upload_exec | PASSWORD |
| | auxiliary/multi/http/wikka_spam_exec | USERNAME|PASSWORD|PAGE |
| | auxiliary/multi/http/wp_crop_rce | USERNAME|PASSWORD |
| | auxiliary/multi/http/wp_ninja_forms_unauthenticated_file_upload | FORM_PATH |
| | auxiliary/multi/http/wp_responsive_thumbnail_slider_upload | WPPASSWORD |
| | auxiliary/multi/http/x7chat2_php_exec | PASSWORD|USERNAME |
| | auxiliary/unix/webapp/get_simple_cms_upload_exec | USERNAME|PASSWORD |
| | auxiliary/unix/webapp/hastymail_exec | PASS|USER |
| | auxiliary/unix/webapp/joomla_media_upload_exec | USERNAME|PASSWORD |
| | auxiliary/unix/webapp/nagios_graph_explorer | PASSWORD |
| | auxiliary/unix/webapp/openemr_sqli_privesc_upload | PASS|USER |
| | auxiliary/unix/webapp/opensis_modname_exec | USERNAME|PASSWORD |
| | auxiliary/unix/webapp/openx_banner_edit | USERNAME|PASSWORD |
| | auxiliary/unix/webapp/piwik_superuser_plugin_upload | USERNAME|PASSWORD |
| | auxiliary/unix/webapp/sugarcrm_unserialize_exec | USERNAME|PASSWORD |
| | auxiliary/unix/webapp/webmin_upload_exec | USERNAME|PASSWORD |
| | auxiliary/unix/webapp/wp_admin_shell_upload | USERNAME|PASSWORD |
| | auxiliary/unix/webapp/wp_ajax_load_more_file_upload | WP_PASSWORD|WP_USERNAME |
| | auxiliary/unix/webapp/wp_photo_gallery_unrestricted_file_upload | USERNAME|PASSWORD |
| | auxiliary/unix/webapp/wp_slideshowgallery_upload | WP_USER|WP_PASSWORD |
| | auxiliary/unix/webapp/wp_wptouch_file_upload | PASSWORD|USER |
| | auxiliary/unix/webapp/xymon_useradm_cmd_exec | PASSWORD|USERNAME |
| | auxiliary/unix/webapp/zpanel_username_exec | USERNAME|PASSWORD |
| | auxiliary/windows/http/oats_weblogic_console | OATSPASSWORD |
| | auxiliary/windows/http/sysax_create_folder | SysaxUSER|SysaxPASS |
+---------------------+-----------------------------------------------------------------+---------------------------+
[*] 1 HTTP servers found
[*] 0 HTTPs servers found
[Bruteforcing URI Paths]
[+] Checking: http://172.16.164.218:80/portal - 404
[+] Checking: http://172.16.164.218:80/stmeetings - 404
[+] Checking: http://172.16.164.218:80/_all_dbs - 404
[+] Checking: http://172.16.164.218:80/cgi-bin/config.exp - 404
[+] Checking: http://172.16.164.218:80/courier/intermediate_login.html - 404
[+] Checking: http://172.16.164.218:80/dolibarr - 404
[+] Checking: http://172.16.164.218:80/admin/index.jsp - 404
[+] Checking: http://172.16.164.218:80/crowd/services - 404
[+] Checking: http://172.16.164.218:80/drupal - 404
[+] Checking: http://172.16.164.218:80/axis2/services/listServices - 404
[+] Checking: http://172.16.164.218:80/userinfo/search - 404
[+] Checking: http://172.16.164.218:80/axis2/axis2-admin/login - 404
[+] Checking: http://172.16.164.218:80/clansphere_2011.3 - 404
[+] Checking: http://172.16.164.218:80/cgi-mod/view_help.cgi - 404
[+] Checking: http://172.16.164.218:80/data/login - 404
[+] Checking: http://172.16.164.218:80/index.php?age=50[NoSQLi] - 200
[+] Checking: http://172.16.164.218:80/cgi-bin/dna - 404
[+] Checking: http://172.16.164.218:80/bitweaver - 404
[+] Checking: http://172.16.164.218:80/caidao.php - 404
[+] Checking: http://172.16.164.218:80/dolibarr/ - 404
[+] Checking: http://172.16.164.218:80/cgit - 404
[+] Checking: http://172.16.164.218:80/.git - 404
[+] Checking: http://172.16.164.218:80/forum - 404
[+] Checking: http://172.16.164.218:80/imc - 404
[+] Checking: http://172.16.164.218:80/status - 404
[+] Checking: http://172.16.164.218:80/opennms - 404
[+] Checking: http://172.16.164.218:80/jenkins - 404
[+] Checking: http://172.16.164.218:80/SiteScope - 404
[+] Checking: http://172.16.164.218:80/zabbix - 404
[+] Checking: http://172.16.164.218:80/jenkins/ - 404
[+] Checking: http://172.16.164.218:80/SiteScope/ - 404
[+] Checking: http://172.16.164.218:80/admin.php - 404
[+] Checking: http://172.16.164.218:80/eng - 404
[+] Checking: http://172.16.164.218:80/VPortal/mgtconsole/CheckPassword.jsp - 404
[+] Checking: http://172.16.164.218:80/api/users/login - 404
[+] Checking: http://172.16.164.218:80/mediawiki - 404
[+] Checking: http://172.16.164.218:80/s40 - 404
[+] Checking: http://172.16.164.218:80/provision/index.php - 404
[+] Checking: http://172.16.164.218:80/www - 404
[+] Checking: http://172.16.164.218:80/.svn - 404
[+] Checking: http://172.16.164.218:80/session - 404
[+] Checking: http://172.16.164.218:80/admin/j_security_check - 404
[+] Checking: http://172.16.164.218:80/index.php - 200
[+] Checking: http://172.16.164.218:80/sap/bc/soap/rfc - 404
[+] Checking: http://172.16.164.218:80/manager/html - 404
[+] Checking: http://172.16.164.218:80/vcms2 - 404
[+] Checking: http://172.16.164.218:80/bvsmweb - 404
[+] Checking: http://172.16.164.218:80/rips - 404
[+] Checking: http://172.16.164.218:80/ATutor - 404
[+] Checking: http://172.16.164.218:80/iControl/iControlPortal.cgi - 404
[+] Checking: http://172.16.164.218:80/centreon - 404
[+] Checking: http://172.16.164.218:80/admin2769gx8k3 - 404
[+] Checking: http://172.16.164.218:80/components/system/configuration/functions.php - 404
[+] Checking: http://172.16.164.218:80/pws/impcli - 404
[+] Checking: http://172.16.164.218:80/swimtemp - 404
[+] Checking: http://172.16.164.218:80/qcenter - 404
[+] Checking: http://172.16.164.218:80/ping.ccp - 404
[+] Checking: http://172.16.164.218:80/v2/apps - 404
[+] Checking: http://172.16.164.218:80/boardDataWW.php - 404
[+] Checking: http://172.16.164.218:80/railo-context - 404
[+] Checking: http://172.16.164.218:80/cgi-bin/dna/ - 404
[+] Checking: http://172.16.164.218:80/pandora_console - 404
[+] Checking: http://172.16.164.218:80/v1/projects - 404
[+] Checking: http://172.16.164.218:80/cgi-bin/chpasswd.cgi - 404
[+] Checking: http://172.16.164.218:80/cmsms - 404
[+] Checking: http://172.16.164.218:80/RPC2 - 404
[+] Checking: http://172.16.164.218:80/AjaXplorer-2.5.5 - 404
[+] Checking: http://172.16.164.218:80/spywall/pbcontrol.php - 404
[+] Checking: http://172.16.164.218:80/roller - 404
[+] Checking: http://172.16.164.218:80/cuteflow_v.2.11.2 - 404
[+] Checking: http://172.16.164.218:80/com_extplorer_2.1.0 - 404
[+] Checking: http://172.16.164.218:80/appRain-q-0.1.5 - 404
[+] Checking: http://172.16.164.218:80/vcms - 404
[+] Checking: http://172.16.164.218:80/WebCalendar-1.2.4 - 404
[+] Checking: http://172.16.164.218:80/gestioip - 404
[+] Checking: http://172.16.164.218:80/ATutor/ - 404
[+] Checking: http://172.16.164.218:80/glossword/1.8 - 404
[+] Checking: http://172.16.164.218:80/WeBid - 404
[+] Checking: http://172.16.164.218:80/Auxiliumpetratepro - 404
[+] Checking: http://172.16.164.218:80/jira - 404
[+] Checking: http://172.16.164.218:80/glpi - 404
[+] Checking: http://172.16.164.218:80/mma.php - 404
[+] Checking: http://172.16.164.218:80/kordil_edms - 404
[+] Checking: http://172.16.164.218:80/openadmin - 404
[+] Checking: http://172.16.164.218:80/jmx-console - 404
[+] Checking: http://172.16.164.218:80/mobilecartly - 404
[+] Checking: http://172.16.164.218:80/log1cms2.0 - 404
[+] Checking: http://172.16.164.218:80/moodle - 404
[+] Checking: http://172.16.164.218:80/invoker/JMXInvokerServlet - 404
[+] Checking: http://172.16.164.218:80/mt - 404
[+] Checking: http://172.16.164.218:80/admin-console/login.seam - 404
[+] Checking: http://172.16.164.218:80/mantisbt - 404
[+] Checking: http://172.16.164.218:80/navigate - 404
[+] Checking: http://172.16.164.218:80/interface - 404
[+] Checking: http://172.16.164.218:80/openx - 404
[+] Checking: http://172.16.164.218:80/wiki - 404
[+] Checking: http://172.16.164.218:80/wls-wsat/CoordinatorPortType - 404
[+] Checking: http://172.16.164.218:80/pandora_console/ - 404
[+] Checking: http://172.16.164.218:80/Phoenix/includes/geoip.php - 404
[+] Checking: http://172.16.164.218:80/php-utility-belt/ajax.php - 404
[+] Checking: http://172.16.164.218:80/phptax - 404
[+] Checking: http://172.16.164.218:80/sflog - 404
[+] Checking: http://172.16.164.218:80/bf102 - 404
[+] Checking: http://172.16.164.218:80/phpwiki - 404
[+] Checking: http://172.16.164.218:80/struts2-showcase/integration/saveGangster.action - 404
[+] Checking: http://172.16.164.218:80/polarbearcms - 404
[+] Checking: http://172.16.164.218:80/phpFileManager-0.9.8/index.php - 404
[+] Checking: http://172.16.164.218:80/struts2-showcase - 404
[+] Checking: http://172.16.164.218:80/phpmyadmin - 404
[+] Checking: http://172.16.164.218:80/qdPM - 404
[+] Checking: http://172.16.164.218:80/struts2-rest-showcase/orders/3 - 404
[+] Checking: http://172.16.164.218:80/missing404 - 404
[+] Checking: http://172.16.164.218:80/phpmyadmin/ - 404
[+] Checking: http://172.16.164.218:80/struts2-blank/example/HelloWorld.action - 404
[+] Checking: http://172.16.164.218:80/manager - 404
[+] Checking: http://172.16.164.218:80/blank-struts2/login.action - 404
[+] Checking: http://172.16.164.218:80/console - 404
[+] Checking: http://172.16.164.218:80/IDC.php - 404
[+] Checking: http://172.16.164.218:80/jos.php - 404
[+] Checking: http://172.16.164.218:80/wikka - 404
[+] Checking: http://172.16.164.218:80/sysaid - 404
[+] Checking: http://172.16.164.218:80/vtigercrm - 404
[+] Checking: http://172.16.164.218:80/x7chat2 - 404
[+] Checking: http://172.16.164.218:80/testlink-1.9.3 - 404
[+] Checking: http://172.16.164.218:80/zabbix/ - 404
[+] Checking: http://172.16.164.218:80/vtigercrm/ - 404
[+] Checking: http://172.16.164.218:80/Zemra/Panel/Zemra/system/command.php - 404
[+] Checking: http://172.16.164.218:80/zenworks - 404
[+] Checking: http://172.16.164.218:80/www/ - 404
[+] Checking: http://172.16.164.218:80/do/view/Main/WebHome - 404
[+] Checking: http://172.16.164.218:80/zpanel - 404
[+] Checking: http://172.16.164.218:80/lite - 404
[+] Checking: http://172.16.164.218:80/chat - 404
[+] Checking: http://172.16.164.218:80/_async/AsyncResponseService - 404
[+] Checking: http://172.16.164.218:80/GetSimpleCMS - 404
[+] Checking: http://172.16.164.218:80/basilic-1.5.14 - 404
[+] Checking: http://172.16.164.218:80/installer.php - 404
[+] Checking: http://172.16.164.218:80/hastymail2 - 404
[+] Checking: http://172.16.164.218:80/forums - 404
[+] Checking: http://172.16.164.218:80/sample - 404
[+] Checking: http://172.16.164.218:80/horde - 404
[+] Checking: http://172.16.164.218:80/elFinder - 404
[+] Checking: http://172.16.164.218:80/joomla - 404
[+] Checking: http://172.16.164.218:80/hybridauth - 404
[+] Checking: http://172.16.164.218:80/jQuery-File-Upload - 404
[+] Checking: http://172.16.164.218:80/kimai - 404
[+] Checking: http://172.16.164.218:80/librettoCMS_v.2.2.2 - 404
[+] Checking: http://172.16.164.218:80/nagios3/cgi-bin/history.cgi - 404
[+] Checking: http://172.16.164.218:80/simple_e_document_v_1_31 - 404
[+] Checking: http://172.16.164.218:80/php-charts_v1.0 - 404
[+] Checking: http://172.16.164.218:80/cgi-bin/mt - 404
[+] Checking: http://172.16.164.218:80/narcissus-master - 404
[+] Checking: http://172.16.164.218:80/phpcollab - 404
[+] Checking: http://172.16.164.218:80/sugarcrm - 404
[+] Checking: http://172.16.164.218:80/php-ofc-library - 404
[+] Checking: http://172.16.164.218:80/pp088 - 404
[+] Checking: http://172.16.164.218:80/sugarcrm/ - 404
[+] Checking: http://172.16.164.218:80/openemr - 404
[+] Checking: http://172.16.164.218:80/ProjectSend - 404
[+] Checking: http://172.16.164.218:80/tiki - 404
[+] Checking: http://172.16.164.218:80/opensis - 404
[+] Checking: http://172.16.164.218:80/seportal - 404
[+] Checking: http://172.16.164.218:80/zimbraAdmin - 404
[+] Checking: http://172.16.164.218:80/autopass - 404
[+] Checking: http://172.16.164.218:80/tiki/ - 404
[+] Checking: http://172.16.164.218:80/zm - 404
[+] Checking: http://172.16.164.218:80/vicidial - 404
[+] Checking: http://172.16.164.218:80/ws/control - 404
[+] Checking: http://172.16.164.218:80/webtester5 - 404
[+] Checking: http://172.16.164.218:80/cms400min - 404
[+] Checking: http://172.16.164.218:80/ctc/servlet - 404
[+] Checking: http://172.16.164.218:80/xoda - 404
[+] Checking: http://172.16.164.218:80/d4d/statusFilter.php - 404
[+] Checking: http://172.16.164.218:80/cms400min/ - 404
[+] Checking: http://172.16.164.218:80/TrackItWeb - 404
[+] Checking: http://172.16.164.218:80/cgi-bin/function.php?argument= - 404
[+] Checking: http://172.16.164.218:80/xymon-seccgi - 404
[+] Checking: http://172.16.164.218:80/status/Status_Basic.asp - 404
[+] Checking: http://172.16.164.218:80/umbraco - 404
[+] Checking: http://172.16.164.218:80/errorInSignUp.htm - 404
[+] Checking: http://172.16.164.218:80/cgi-bin/luci - 404
[+] Checking: http://172.16.164.218:80/Login.jsp - 404
[+] Checking: http://172.16.164.218:80/vtapi/v2/file/scan - 404
[+] Checking: http://172.16.164.218:80/common/index.jsf - 404
[+] Checking: http://172.16.164.218:80/ChangePhoto.jsp - 404
[+] Checking: http://172.16.164.218:80/HtmlAdaptor - 404
[+] Checking: http://172.16.164.218:80/version - 404
[+] Checking: http://172.16.164.218:80/login.jsf - 404
[+] Checking: http://172.16.164.218:80/gw_login.php - 404
[+] Checking: http://172.16.164.218:80/goform/websLogin - 404
[+] Checking: http://172.16.164.218:80/gw_admin.php?a=edit-own&t=users - 404
[+] Checking: http://172.16.164.218:80/console/login/LoginForm.jsp - 404
[+] Checking: http://172.16.164.218:80/global_group_login.php - 404
[+] Checking: http://172.16.164.218:80/userpictures - 404
[+] Checking: http://172.16.164.218:80/servlets/FileUploadServlet - 404
[+] Checking: http://172.16.164.218:80/jsp - 404
[+] Checking: http://172.16.164.218:80/appliance/applianceMainPage - 404
[+] Checking: http://172.16.164.218:80/appliance - 404
[+] Checking: http://172.16.164.218:80/admin/ - 404
[+] Checking: http://172.16.164.218:80/wizards/post2file.php - 404
[+] Checking: http://172.16.164.218:80/login_page.php - 404
[+] Checking: http://172.16.164.218:80/theme - 404
[+] Checking: http://172.16.164.218:80/ajax/jsonQuery.php - 404
[+] Checking: http://172.16.164.218:80/en-US/manager/appinstall/_upload - 404
[+] Checking: http://172.16.164.218:80/mods/documents/uploads/ - 404
[+] Checking: http://172.16.164.218:80/readme - 404
[+] Checking: http://172.16.164.218:80/main.php - 404
[+] Checking: http://172.16.164.218:80/proxy/ssllogin - 404
[+] Checking: http://172.16.164.218:80/actions/beats_uploader.php - 404
[+] Checking: http://172.16.164.218:80/www/delivery/fc.php - 404
[+] Checking: http://172.16.164.218:80/actions/pdir/pname - 404
[+] Checking: http://172.16.164.218:80/login.php - 404
[+] Checking: http://172.16.164.218:80/etc/apps/phpmyadmin/index.php - 404
[+] Checking: http://172.16.164.218:80/upload_area - 404
[+] Checking: http://172.16.164.218:80/etc/apps/phpmyadmin/import.php - 404
[+] Checking: http://172.16.164.218:80/upload_area/nodes_hierarchy - 404
[+] Checking: http://172.16.164.218:80/servlet/com.me.opmanager.extranet.remote.communication.fw.fe.FileCollector - 404
[+] Checking: http://172.16.164.218:80/event/index3.do - 404
[+] Checking: http://172.16.164.218:80/admin/libraries/ajaxfilemanager/ajax_create_folder.php - 404
[+] Checking: http://172.16.164.218:80/index.php?loggedout - 200
[+] Checking: http://172.16.164.218:80/event/agentUpload - 404
[+] Checking: http://172.16.164.218:80/admin/libraries/ajaxfilemanager/inc/data.php - 404
[+] Checking: http://172.16.164.218:80/agentUpload - 404
[+] Checking: http://172.16.164.218:80/files/php_pagename - 404
[+] Checking: http://172.16.164.218:80/olt/Login.do/../../olt/UploadFileUpload.do - 404
[+] Checking: http://172.16.164.218:80/new - 404
[+] Checking: http://172.16.164.218:80/jetspeed/login/redirector - 404
[+] Checking: http://172.16.164.218:80/images/../jsp/ProcessFileUpload.jsp - 404
[+] Checking: http://172.16.164.218:80/jetspeed/portal/Administrative/site.psml - 404
[+] Checking: http://172.16.164.218:80/Admin/archive/ArchiveCache - 404
[+] Checking: http://172.16.164.218:80/Admin/archive/upload.jsp - 404
[+] Checking: http://172.16.164.218:80/examples/save.lsp - 404
[+] Checking: http://172.16.164.218:80/themes/dashboard/assets/plugins/jquery-file-upload/server/php - 404
[+] Checking: http://172.16.164.218:80/includes/jquery.uploadify/upload.php - 404
[+] Checking: http://172.16.164.218:80/includes/jquery.uploadify/upload.php?folder=#{upload_dir} - 404
[+] Checking: http://172.16.164.218:80/LiveTime/WebObjects/LiveTime.woa - 404
[+] Checking: http://172.16.164.218:80/images/.. - 200
[+] Checking: http://172.16.164.218:80/LiveTime - 404
[+] Checking: http://172.16.164.218:80/addons/uploadify/uploadify.php - 404
[+] Checking: http://172.16.164.218:80/rails - 404
[+] Checking: http://172.16.164.218:80/public/uploads/pay_name - 404
[+] Checking: http://172.16.164.218:80/wizards - 404
[+] Checking: http://172.16.164.218:80/admin/Login.do - 404
[+] Checking: http://172.16.164.218:80/install.php - 404
[+] Checking: http://172.16.164.218:80/axis2-admin/login - 404
[+] Checking: http://172.16.164.218:80/test/logo - 404
[+] Checking: http://172.16.164.218:80/images - 404
[+] Checking: http://172.16.164.218:80/wikka.php - 404
[+] Checking: http://172.16.164.218:80/my_view_page.php - 404
[+] Checking: http://172.16.164.218:80/library/openflashchart/tmp-upload-images - 404
[+] Checking: http://172.16.164.218:80/spamlog.txt.php - 404
[+] Checking: http://172.16.164.218:80/SGPAdmin/fileRequest - 404
[+] Checking: http://172.16.164.218:80/ajax-load-more/core/repeater - 404
[+] Checking: http://172.16.164.218:80/servlet/Main - 404
[+] Checking: http://172.16.164.218:80/_search - 404
[+] Checking: http://172.16.164.218:80/j_security_check - 404
[+] Checking: http://172.16.164.218:80/scripts/upload.php - 404
[+] Checking: http://172.16.164.218:80/interface/login/login.php - 404
[+] Checking: http://172.16.164.218:80/mods/_core/modules - 404
[+] Checking: http://172.16.164.218:80/library/openflashchart/php-ofc-library/ofc_upload_image.php - 404
[+] Checking: http://172.16.164.218:80/havalite/upload.php - 404
[+] Checking: http://172.16.164.218:80/foxypress/uploadify/uploadify.php - 404
[+] Checking: http://172.16.164.218:80/upload.php - 404
[+] Checking: http://172.16.164.218:80/cgi-bin/kerbynet - 404
[+] Checking: http://172.16.164.218:80/affiliate_images - 404
[+] Checking: http://172.16.164.218:80/ofc_upload_image.php - 404
[+] Checking: http://172.16.164.218:80/sites/default/images - 404
[+] Checking: http://172.16.164.218:80/staticpages.php - 404
[+] Checking: http://172.16.164.218:80/egallery/uploadify.php - 404
[+] Checking: http://172.16.164.218:80/interface/main/main_screen.php - 404
[+] Checking: http://172.16.164.218:80/config.php - 404
[+] Checking: http://172.16.164.218:80/interface/new/new_comprehensive_save.php - 404
[+] Checking: http://172.16.164.218:80/admin/downloads.php - 404
[+] Checking: http://172.16.164.218:80/admincp/ - 404
[+] Checking: http://172.16.164.218:80/interface/super/manage_site_files.php - 404
[+] Checking: http://172.16.164.218:80/data/down_media - 404
[+] Checking: http://172.16.164.218:80/uploads/slideshow-gallery - 404
[+] Checking: http://172.16.164.218:80/nagiosxi/includes/components/graphexplorer/visApi.php - 404
[+] Checking: http://172.16.164.218:80/nagiosxi/index.php - 404
[+] Checking: http://172.16.164.218:80/admin/CHANGES - 404
[+] Checking: http://172.16.164.218:80/service/v4/rest.php - 404
[+] Checking: http://172.16.164.218:80/install2.php - 404
[+] Checking: http://172.16.164.218:80/admin/config.php - 404
[+] Checking: http://172.16.164.218:80/admin_area/charts/ofc-library/ofc_upload_image.php - 404
[+] Checking: http://172.16.164.218:80/system_groupmanager.php - 404
[+] Checking: http://172.16.164.218:80/admin_area/charts/tmp-upload-images - 404
[+] Checking: http://172.16.164.218:80/infusionsoft/Infusionsoft/utilities/code_generator.php - 404
[+] Checking: http://172.16.164.218:80/cgi-bin/vmtadmin.cgi - 404
[+] Checking: http://172.16.164.218:80/front-end-editor/lib/aloha-editor/plugins/extra/draganddropfiles/demo - 404
[+] Checking: http://172.16.164.218:80/php/connector.minimal.php - 404
[+] Checking: http://172.16.164.218:80/setup.xml - 404
[+] Checking: http://172.16.164.218:80/ws/v1/cluster/apps/new-application - 404
[+] Checking: http://172.16.164.218:80/login.cgi - 404
[+] Checking: http://172.16.164.218:80/ws/v1/cluster/apps - 404
[+] Checking: http://172.16.164.218:80/spywall/login.php - 404
[+] Checking: http://172.16.164.218:80/spywall/ipchange.php - 404
[+] Checking: http://172.16.164.218:80/includes/settings.php - 404
[+] Checking: http://172.16.164.218:80/scripts_exec.php - 404
[+] Checking: http://172.16.164.218:80/cgi-bin/rdfs.cgi - 404
[+] Checking: http://172.16.164.218:80/display.php - 404
[+] Checking: http://172.16.164.218:80/img/favicon.png?v=6.0.1-1213 - 404
[+] Checking: http://172.16.164.218:80/nagiosxi/ - 404
[+] Checking: http://172.16.164.218:80/josso/signon/login.do - 404
[+] Checking: http://172.16.164.218:80/WANem/result.php - 404
[+] Checking: http://172.16.164.218:80/nagiosql/admin/settings.php - 404
[+] Checking: http://172.16.164.218:80/web/jquery/uploader/multi_uploadify.php - 404
[+] Checking: http://172.16.164.218:80/picsdesc.xml - 404
[+] Checking: http://172.16.164.218:80/httpmon.php - 404
[+] Checking: http://172.16.164.218:80/nagiosql/admin/helpedit.php - 404
[+] Checking: http://172.16.164.218:80/config/global.conf - 404
[+] Checking: http://172.16.164.218:80/scripts.php - 404
[+] Checking: http://172.16.164.218:80/hedwig.cgi - 404
[+] Checking: http://172.16.164.218:80/cgi-bin/setConfigSettings - 404
[+] Checking: http://172.16.164.218:80/authentication.cgi - 404
[+] Checking: http://172.16.164.218:80/spywall/blocked_file.php - 404
[+] Checking: http://172.16.164.218:80/tools_command.php - 404
[+] Checking: http://172.16.164.218:80/pigwidgeon.cgi - 404
[+] Checking: http://172.16.164.218:80/login.htm - 404
[+] Checking: http://172.16.164.218:80/InternetGatewayDevice.xml - 404
[+] Checking: http://172.16.164.218:80/hawkeye/v1/login - 404
[+] Checking: http://172.16.164.218:80/tmUnblock.cgi - 404
[+] Checking: http://172.16.164.218:80/hawkeye/v1/account - 404
[+] Checking: http://172.16.164.218:80/ossim/action/getaction.php - 404
[+] Checking: http://172.16.164.218:80/anyterm.html - 404
[+] Checking: http://172.16.164.218:80/anyterm-module - 404
[+] Checking: http://172.16.164.218:80/ForensicsAnalysisServlet/ - 404
[+] Checking: http://172.16.164.218:80/ossim/policy/policy.php - 404
[+] Checking: http://172.16.164.218:80/ossim/policy/newpolicy.php - 404
[+] Checking: http://172.16.164.218:80/docs/changes.txt - 404
[+] Checking: http://172.16.164.218:80/saveCert.imss - 404
[+] Checking: http://172.16.164.218:80/en/content/index.php - 404
[+] Checking: http://172.16.164.218:80/nagiosxi/admin/components.php - 404
[+] Checking: http://172.16.164.218:80/ossim/conf/reload.php - 404
[+] Checking: http://172.16.164.218:80/comm.asp - 404
[+] Checking: http://172.16.164.218:80/interface/index.do - 404
[+] Checking: http://172.16.164.218:80/en/logon.php - 404
[+] Checking: http://172.16.164.218:80/en/database/import.php - 404
[+] Checking: http://172.16.164.218:80/m - 404
[+] Checking: http://172.16.164.218:80/login.imss - 404
[+] Checking: http://172.16.164.218:80/cgi-bin/webcm - 404
[+] Checking: http://172.16.164.218:80/upload - 404
[+] Checking: http://172.16.164.218:80/initCert.imss - 404
[+] Checking: http://172.16.164.218:80/includes/inline_image_upload.php - 404
[+] Checking: http://172.16.164.218:80/continuum/about.action - 404
[+] Checking: http://172.16.164.218:80/api/systems/details - 404
[+] Checking: http://172.16.164.218:80/ping.html - 404
[+] Checking: http://172.16.164.218:80/agent/linuxpkgs - 404
[+] Checking: http://172.16.164.218:80/ayefeaturesconvert.js - 404
[+] Checking: http://172.16.164.218:80/HNAP1/ - 404
[+] Checking: http://172.16.164.218:80/setup.cgi - 404
[+] Checking: http://172.16.164.218:80/spywall/releasenotes.php?relfile=../../../../../usr/local/apache2/logs/access_log - 404
[+] Checking: http://172.16.164.218:80/sysinfo.cgi - 404
[+] Checking: http://172.16.164.218:80/ping.cgi - 404
[+] Checking: http://172.16.164.218:80/shell - 404
[+] Checking: http://172.16.164.218:80/globe - 404
[+] Checking: http://172.16.164.218:80/cgi-bin/ping.sh - 404
[+] Checking: http://172.16.164.218:80/redirect.cgi - 404
[+] Checking: http://172.16.164.218:80/php/utils/router.php/Administrator.get - 404
[+] Checking: http://172.16.164.218:80/webacs/pages/common/login.jsp - 404
[+] Checking: http://172.16.164.218:80/ossim/action/modifyactions.php - 404
[+] Checking: http://172.16.164.218:80/servlet/UploadServlet - 404
[+] Checking: http://172.16.164.218:80/mobile/index.php - 404
[+] Checking: http://172.16.164.218:80/ossim/policy/getpolicy.php - 404
[+] Checking: http://172.16.164.218:80/topology/home - 404
[+] Checking: http://172.16.164.218:80/event/j_security_check;jsessionid=#{jsessionid} - 404
[+] Checking: http://172.16.164.218:80/jsp_name - 404
[+] Checking: http://172.16.164.218:80/LoginServlet - 404
[+] Checking: http://172.16.164.218:80/ossim/session/token.php - 404
[+] Checking: http://172.16.164.218:80/whatsnew.txt - 404
[+] Checking: http://172.16.164.218:80/ossim/policy/deletepolicy.php - 404
[+] Checking: http://172.16.164.218:80/Installers - 404
[+] Checking: http://172.16.164.218:80/ossim/action/deleteaction.php - 404
[+] Checking: http://172.16.164.218:80/mve/upload/gfd - 404
[+] Checking: http://172.16.164.218:80/login - 404
[+] Checking: http://172.16.164.218:80/cbmui/images - 404
[+] Checking: http://172.16.164.218:80/SystemTab/uploadImage.asp - 404
[+] Checking: http://172.16.164.218:80/event/runQuery.do - 404
[+] Checking: http://172.16.164.218:80/LoginAdmin - 404
[+] Checking: http://172.16.164.218:80/unins000.dat - 404
[+] Checking: http://172.16.164.218:80/wlevs/visualizer/upload - 404
[+] Checking: http://172.16.164.218:80/ohw/help/state - 404
[+] Checking: http://172.16.164.218:80/chat.ghp - 404
[+] Checking: http://172.16.164.218:80/LoginPage.do - 404
[+] Checking: http://172.16.164.218:80/jsp/tabs.jsp - 404
[+] Checking: http://172.16.164.218:80/AccessNow/start.html - 404
[+] Checking: http://172.16.164.218:80/api/json/admin/SubmitQuery - 404
[+] Checking: http://172.16.164.218:80/fileUpload.do - 404
[+] Checking: http://172.16.164.218:80/OvCgi/nnmRptConfig.exe - 404
[+] Checking: http://172.16.164.218:80/jsp/Login.do - 404
[+] Checking: http://172.16.164.218:80/banner.jpg - 404
[+] Checking: http://172.16.164.218:80/rest/collectors/1.0/tempattachment - 404
[+] Checking: http://172.16.164.218:80/registresult.htm - 404
[+] Checking: http://172.16.164.218:80/upload/upload - 404
[+] Checking: http://172.16.164.218:80/ServiceEmulation/services/EmulationAdmin - 404
[+] Checking: http://172.16.164.218:80/ServiceEmulation - 404
[+] Checking: http://172.16.164.218:80/cs/pdfupload - 404
[+] Checking: http://172.16.164.218:80/scripts - 404
[+] Checking: http://172.16.164.218:80/exchange/servlet/GetProductVersion - 404
[+] Checking: http://172.16.164.218:80/user/login - 404
[+] Checking: http://172.16.164.218:80/ip - 404
[+] Checking: http://172.16.164.218:80/cgi-bin/user/Config.cgi - 404
[+] Checking: http://172.16.164.218:80/% - 400
[+] Checking: http://172.16.164.218:80/olt/ - 404
[+] Checking: http://172.16.164.218:80/cgi-bin/authLogin.cgi - 404
[+] Checking: http://172.16.164.218:80/webdm/mibbrowser/mibFileUpload - 404
[+] Checking: http://172.16.164.218:80/servicedesk/servicedesk/servicedesk.nocache.js - 404
[+] Checking: http://172.16.164.218:80/search - 404
[+] Checking: http://172.16.164.218:80/rest/action - 404
[+] Checking: http://172.16.164.218:80/servicedesk/servicedesk - 404
[+] Checking: http://172.16.164.218:80/servicedesk/servicedesk/accountSerivce.gwtsvc - 404
[+] Checking: http://172.16.164.218:80/rtc/post/ - 404
[+] Checking: http://172.16.164.218:80/scripts/ - 404
[+] Checking: http://172.16.164.218:80/rest/v1/AccountService/Accounts - 404
[+] Checking: http://172.16.164.218:80/miq_policy/explorer - 404
[+] Checking: http://172.16.164.218:80/userSession.do - 404
[+] Checking: http://172.16.164.218:80/setup/reboot - 404
[+] Checking: http://172.16.164.218:80/adm/syscmd.asp - 404
[+] Checking: http://172.16.164.218:80/data/config/image.do - 404
[+] Checking: http://172.16.164.218:80/config.bin - 404
[+] Checking: http://172.16.164.218:80/apps/YouTube - 404
[+] Checking: http://172.16.164.218:80/getcfg.php - 404
[+] Checking: http://172.16.164.218:80/apps/YouTube/run - 404
[+] Checking: http://172.16.164.218:80/cgi-bin/tmUnblock.cgi - 404
[+] Checking: http://172.16.164.218:80/telpho/temp/telpho10.epb - 404
[+] Checking: http://172.16.164.218:80/dashboard - 404
[+] Checking: http://172.16.164.218:80/showcallfwd.cgi - 404
[+] Checking: http://172.16.164.218:80/phonecallfwd.cgi - 404
[+] Checking: http://172.16.164.218:80/hw-sys.htm - 404
[+] Checking: http://172.16.164.218:80/showcallfwdperline.cgi - 404
[+] Checking: http://172.16.164.218:80/log-in - 404
[+] Checking: http://172.16.164.218:80/_users/_all_docs - 404
[+] Checking: http://172.16.164.218:80/0x44/BuildMaster.Web.WebApplication/Inedo.BuildMaster.Web.WebApplication.Pages.LogInPage/LogIn - 404
[+] Checking: http://172.16.164.218:80/sap/bw/xml/soap/xmla?sap-client= - 404
[+] Checking: http://172.16.164.218:80/index.php/component/users/ - 200
[+] Checking: http://172.16.164.218:80/events/reports/view.cgi - 404
[+] Checking: http://172.16.164.218:80/mmr/MMR - 404
[+] Checking: http://172.16.164.218:80/objects/ - 404
[+] Checking: http://172.16.164.218:80/tools.php - 404
[+] Checking: http://172.16.164.218:80/+CSCOE+/logon.html - 404
[+] Checking: http://172.16.164.218:80/+webvpn+/webvpn_logout.html - 404
[+] Checking: http://172.16.164.218:80/remote/login?lang=en - 404
[+] Checking: http://172.16.164.218:80/+webvpn+/index.html - 404
[+] Checking: http://172.16.164.218:80/remote/logout - 404
[+] Checking: http://172.16.164.218:80/workorder/FileDownload.jsp - 404
[+] Checking: http://172.16.164.218:80/remote/logincheck - 404
[+] Checking: http://172.16.164.218:80/html/en/index.html - 404
[+] Checking: http://172.16.164.218:80/windows/code.php - 404
[+] Checking: http://172.16.164.218:80/cfg/EWplant.db - 404
[+] Checking: http://172.16.164.218:80/html/en/confAccessProt.html - 404
[+] Checking: http://172.16.164.218:80/setup/scan_results - 404
[+] Checking: http://172.16.164.218:80/exportFile - 404
[+] Checking: http://172.16.164.218:80/mTheme-Unus/css/css.php - 404
[+] Checking: http://172.16.164.218:80/WorkOrder.do - 404
[+] Checking: http://172.16.164.218:80/setupfirmware.php - 404
[+] Checking: http://172.16.164.218:80/setup/scan_wifi - 404
[+] Checking: http://172.16.164.218:80/rfcode_reader/api/whoami.json - 404
[+] Checking: http://172.16.164.218:80/ui/login/ - 404
[+] Checking: http://172.16.164.218:80/gi-media-library/download.php - 404
[+] Checking: http://172.16.164.218:80/~login - 404
[+] Checking: http://172.16.164.218:80/goform/down_cfg_file - 404
[+] Checking: http://172.16.164.218:80/modules/common/logs - 404
[+] Checking: http://172.16.164.218:80/gconfig.htm - 404
[+] Checking: http://172.16.164.218:80/options-general.php - 404
[+] Checking: http://172.16.164.218:80/services/listServices - 404
[+] Checking: http://172.16.164.218:80/setup/eureka_info - 404
[+] Checking: http://172.16.164.218:80/en-US/app/launcher/home - 404
[+] Checking: http://172.16.164.218:80/posts - 404
[+] Checking: http://172.16.164.218:80/dukapress/lib/dp_image.php - 404
[+] Checking: http://172.16.164.218:80/fakeURL1 - 404
[+] Checking: http://172.16.164.218:80/_snapshot/pwn - 404
[+] Checking: http://172.16.164.218:80/English/pages_MacUS/lan_set_content.html - 404
[+] Checking: http://172.16.164.218:80/fakeURL2 - 404
[+] Checking: http://172.16.164.218:80/_snapshot/pwnie - 404
[+] Checking: http://172.16.164.218:80/fakeURL3 - 404
[List of Matching Metasploit Modules]
Host Module
------------------- ----------------------------------
172.16.164.218:139 exploit/multi/samba/usermap_script
172.16.164.218:1099 exploit/multi/misc/java_rmi_server
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment